Mathematical Problems in Engineering

Mathematical Problems in Engineering / 2021 / Article

Research Article | Open Access

Volume 2021 |Article ID 5580098 | https://doi.org/10.1155/2021/5580098

Chirag Sharma, Amandeep Bagga, Bhupesh Kumar Singh, Mohammad Shabaz, "A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application", Mathematical Problems in Engineering, vol. 2021, Article ID 5580098, 27 pages, 2021. https://doi.org/10.1155/2021/5580098

A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application

Academic Editor: Vijay Kumar
Received16 Feb 2021
Revised01 Mar 2021
Accepted20 Mar 2021
Published09 Apr 2021

Abstract

The multimedia technologies are gaining a lot of popularity these days. Many unauthorized persons are gaining the access of multimedia such as videos, audios, and images. The transmission of multimedia across the Internet by unauthorized person has led to the problem of illegal distribution. The problem arises when copyrighted data is getting accessed without the knowledge of copyright owner. The videos are the most attacked data during COVID-19 pandemic. In this paper, the frame selection video watermarking technique is proposed to tackle the issue. The proposed work enlightens frame selection followed by watermarking embedding and testing of the technique against various attacks. The embedding of the watermark is done on selected frames of the video. The additional security feature Hyperchaotic Encryption is applied on watermark before embedding. Watermark embedding is done using graph-based transform and singular-valued decomposition and the performance of the technique is further optimized using hybrid combination of grey wolf optimization and genetic algorithm. Many researchers face the challenge of quality loss after embedding of watermark. Proposed technique will aim to overcome those challenges. A total of 6 videos (Akiyo, Coastguard, Foreman, News, Bowing, and Pure Storage) are used for carrying out research work. The performance evaluation of the proposed technique has been carried out after processing it against practical video processing attacks Gaussian noise, sharpening, rotation, blurring, and JPEG compression.

1. Introduction

The widespread of the Internet has led to the distribution of multimedia data, i.e., images, videos, and audios everywhere. The access to multimedia has become possible thus maintaining the confidentiality of the need of an hour. The illegal distribution and copying of multimedia data such as videos and images has lead to the design and development of watermarking technique. Many of the illegal users are getting the access of the real-time videos from various sources such as NETFLIX, Amazon Prime, and various OTT Platforms, and thus, illegal distribution is done. These videos are available in compressed domain. A watermark is a digital data that can be used like text, audio, and image and can be embedded in the multimedia, videos and images, so that it can be detected or extracted later so as to identify illegal use of multimedia media data [1]. An efficient watermarking scheme is characterized by four properties [2]:(a)Imperceptibility: this property calculates the degree of invisibility of the hidden signal to the user, so the watermark should be targeted in those locations where watermark signal is unnoticeable(b)Robustness: this property verifies the ability of watermark to survive attacks such as cropping, resizing, and additional noise(c)Capacity: it identifies the total amount of data that can be hidden in the multimedia data(d)Security: it identifies the addition of cipher to watermark that can be embedded in multimedia data

Real-time videos are the most part utilized interactive media information accessible now days. The illegal use by unauthorized personnel has propelled researchers to develop various video watermarking techniques [3]. The video watermarking techniques has many constraints regarding extraction of frames [4], selection of frames [5], types of videos [1], and codes of video [6]. There are 2 types of videos where watermark can be embedded, raw videos and compressed videos [7]. Raw videos are the videos that can be obtained using TV capture card or satellite that has huge bit rate and quality is never compromised in those, whereas compressed videos are processed in compressed domain where the bit rate is less and this watermarking scheme is faster, and it allows low computation cost for processing the watermark [8]. The increasing use of real-time video-based applications such as videos on demand [9], set top box, and online streaming such as Netflix and Amazon Prime are demanding high compression to meet the requirements of bandwidth for certain users along with maintaining best quality of videos [6]. For the real-time videos to be available with best codec, different video codecs have been mentioned in [6] so as to meet requirement of users in today’s world. Some of them are H.264/AVC (advanced video codec), XVID, and WMV, but since H.264 is the codec used nowadays, so the proposed watermarking scheme will be applicable to the same. The major challenge in watermarking in real-time videos is the selection of extracted frames and finding the best suitable frames from the video to embed watermark, and many frame selection mechanisms have been proposed in [10]. Our proposed technique will give optimal results in comparison to these. After the frames are selected, the next challenge is to select areas of frame to be watermarked. The research has been done of various techniques by various researchers [11]. The major challenge is the addition of watermark in the frames of the video poses the loss of quality [12] by affecting the video bit rate of the video [13], so the research is being carried out to focus on real-time requirements such as downscaling; quality loss of the video after watermark is added to the video, and our proposed work intends to solve these issues. Video watermarking techniques have been classified into following types based on domain [6]. In spatial or pixel domain methods, watermark is embedded directly on pixel positions; the best example of this method is LSB (Least Significant Bit) modification, although this is the fast method but lacks in achieving imperceptibility [6]. In frequency domain methods, host signal is converted to frequency signal [14]. The techniques are mentioned in Figure 1. The proposed technique deals with a transform named as graph-based transform that transforms signals in the form of graphs (V, E). The technique is coupled with SVD. The validity of watermarking scheme is dependent upon values of peak signal-to-noise ratio (PSNR) after applying attacks such as rotation, Gaussian noise, and compression attack on the proposed watermarking scheme. Further sections explain the research work carriec out in this area followed by the proposed technique.

A number of research studies related to watermark embedding using DWT as a transform domain has been carried out by Chaudhary et al. [3] which embeds watermark on the selected frame. High frequency subbands are selected on the areas where watermark embedding is present [15]. The research frequency domain achieves more level of robustness compared to spatial domain but is not efficient to handle various attack scenarios. The combination of DWT and SVD was also applied by various researchers [16]. The improvement of results based on values of PSNR was obtained against image processing attack scenarios. The particle swarm optimization methods [13] based on Dither modulation optimizes the results of PSNR by optimizing various factors (optimal frequency set) for embedding watermark. Applying optimization algorithm on combination of DWT and SVD has also produced high values of PSNR. The same has been listed in the work done by Mishra et al. [17]. Here, combination of DWT and SVD is carried out with firefly algorithm where multiple scaling factors were optimized using firefly algorithm. Cheung [10] proposed the scheme, depth map coding, using graph-based transform and transform domain scarification to counter the problems faced by discrete cosine transform method considering its inability to code block that contains arbitrarily shaped edges. The proposed scheme Agarwal et al. [18] also extended work by using hybrid fuzzy-BPN architecture to embed binary watermark in gray scale images, and the proposed scheme achieves good results in real-time scenarios. Rajpal et al. [19] extended the work done by Agarwal et al. [18] by applying novel fuzzy frame selection technique using bidirectional extreme learning machine on videos. The proposed scheme by [20] addresses fast mechanism to select frames. Masoumi and Amiri [4] proposed a method of video watermarking by applying BWT (biorthogonal wavelet transform) and SVD by using artificial bee optimization algorithm. Tabassum and Islam [3] proposed a method of identical frame extraction, and using frame difference method, identification and selection of appropriate frames is done to embed watermark inside them. The method is improved by Masoumi and Amiri [4] where motioned part of video is detected using the technique proposed in [21] by applying 3D wavelet transformation coefficients of different subbands which are selected for embedding. Venugopala et al. [11] listed key areas of feature selection for watermarking embedding by adjusting the pixel values and using scene change detection mechanism. Research carried out by Kumar and Rewani [8] also featured secured watermarking technique by encrypting watermark using rail fence cipher before embedding to randomly selected frames, and Mansouri and Amiri [21] have also proposed secured video watermarking in compressed domain by proposing new content-based key to select particular regions for embedding watermark. Araghi and Manaf [22] proposed a secured watermarking scheme by employing DWT with 2D SVD, thus eliminating the challenges of dependencies of watermarked image with cover images along with the use of 2 level-authentication systems to be applied on watermark extraction. This method increases the dimensionality of the image space, which increases the efficiency of the algorithm and makes it easier to implement in real-time application. Egilmez et al. [23] applied a concept of graph-based transform on video compression considering graph-based transform designs and edge adaptive design for video encoding and decoding. Gu et al. [24] proposed a large-scale optimization technique to solve large-scale global optimization problems by introducing hybrid grey wolf optimization with genetic algorithm. Cao and Wang [25] proposed a secure watermarking technique based on hyperchaotic encryption on binary watermark to add additional security mechanism on the watermark. The proposed scheme achieved high values of PSNR, NC, and SSIM against various attacks. Sharma et al. [26] conducted the research by using graph-based transform, singular-valued decomposition, and hyperchaotic encryption on selected frames of video. The results were good, but the addition of optimization can still improve it.

3. Proposed Work

The contribution to the research is done in 3 phases.(i)Frame extraction and selection(ii)Embedding watermarking procedure(iii)Watermark extraction procedure(iv)Performance evaluation

3.1. Frame Extraction and Selection

The first phase in the proposed work is finding the suitable number of frames from extracted frames. The process of finding suitable frames in real time is carried out using scene change detection. The proposed work has applied frame selection technique on the video based on compressed domain which is used in various real-time applications such as broadcasting. The watermark cannot be embedded in all extracted frames because adding watermark will significantly increase the bit rate of video and thus will affect the processing time and increase complexity of code. So, frame selection is a very crucial step to decide which frames are selected from the set of extracted frames. Frame selection will depend on motion and motionless frames, and the selection criteria for a frame depend upon variations in the video. The significant changes in the video will have higher number of frames getting selected. Frame selection using a key has been conducted in most of the studies, but it does not serve as the best method as frame selection [27]. In the proposed work, an advanced approach with temporal sampling is done on Sobel–Feldman algorithm which can be used to identify the frame from the set of similar and different frames of video. The comparison of adjacent frames is done with one another to find frame difference which is calculated in equation (1). The value of the frame difference will decide whether the frame will be considered as the part of the same group or a different group. If the difference is large, then it will be considered as part of a different group. The parameter of decision will be taken as threshold which is calculated in equation (2); if frame difference is higher than threshold, the next frame will be the part of next group. The temporal sampling is performed which enhances the process of frame selection that gives better results compared to [3]. After different frames have been taken as part of different groups, the random key generator is used to select one similar image out of similar images. The work gives better results in comparison to Gu et al. [28] where random frame selection was carried out [29]. Frame difference can be represented as histogram difference which can be expressed aswhere Fk is representing frame difference, Hk is the histogram value of kth frame of level m, and T is the number of levels of the histogram. The proposed work focuses on the value of histogram difference; the selection of frames is carried out on the basis of difference represented in equation (1), and the frames with less difference compared to threshold cannot be chosen, but the frames representing the large histograms difference value are selected in the next group. The grouping of similar images is based on scene change detection. The threshold is maintained to detect intensity histogram difference to calculate sudden transition amongst frames (in order to find larger frame difference). This scenario is expressed aswhere Mb = threshold value, s and μ are the mean and standard deviation value of selected frame intensity histogram difference, And α is the factor that varies from 2 to 6, and in our research, we have taken this value as 2.5. The temporal sampling has also enhanced the process of frame selection. For the video with higher number of motioned frames, the given proposed algorithm will give better results in terms of frame selection, and the process is optimized by temporal sampling. The frame selection is always followed by frame extraction which can be done randomly by extracting frames after the timeline of certain seconds. The process is carried by applying a timer on the given video for selection of frames that runs till the end of the video. The criteria of frame selection depend on the comparison of Fk with Mb. The algorithm is given Algorithm 1.

Input: T← No of frames, M←Mean (T), S←Std Deviation (T)
MbM + αS (equation (2))
Fk← Frame difference (equation (1))
Output: selected (T)
Begin
(1)For i←1 to T
(2){
(3)Read (T) and store in variables
(4)Compute the difference amongst frames and store in Fk
(5)  if (Fk > Mb)
(6) {
(7) Select and group them
(8) Apply random key amongst frames from different groups
(9) Write frames to the disk
(10) }
(11) }
End

The frame selection procedure is represented in Figure 2, where the number of frames gets extracted from the video. The grouping is done based on frame difference. The single frame is selected from a group, and after that the watermark embedding process is carried out. Algorithm 1 provides frame selection procedure which is the crucial part of research.

3.2. Watermark Embedding Procedure

The next step after selection of frames is to embed the encrypted watermark. The watermark is not applied directly on the frame; the transformation of the frame has to be done using a transform. The embedding of watermark on selected frames imposes the challenge of quality loss. Every selected frame has its own property, so the target is to embed the watermark so as to obtain high values of PSNR. The watermark is not embedded directly as the image is required to be transformed before embedding is done. Mostly research is done on DWT and DCT for transforming the frame [30], and the proposed technique focuses on transforming the frame into graph-based transform followed by SVD. The embedding factor to embed a watermark is calculated using equation (11). The combined technique of GBT-SVD does provide good values of the embedding factor which results in good values of PSNR but the same can be improved by adding optimization to the embedding factor, where the target value of PSNR is further improved, which results in less loss of quality after the watermark is embedded to the selected frame. The performance of the proposed technique is always tested when attacks are applied to the watermarked frame. High values of PSNR always indicate the good performance of the technique. Most of the research on embedding of watermark is carried out using discrete wavelet transform and discrete cosine transform. However, the proposed technique presented in the paper is hybrid combination of GBT-SVD-GWO-GA. The target is to get higher values of PSNR after embedding of watermark. The same can be addressed in the following sections. The proposed work applies graph-based transform followed by singular value decomposition on selected frames. Graph-based transform (GBT) is a transform the uses signal in the form of graph and produces better results in terms of adapting in signal structure of an image. This section introduces novel embedding technique based on the combination of GBT and SVD, further optimized by hybrid algorithm of grey wolf optimization and genetic algorithm. The additional security feature given in Section 3.2.3 based on hyperchaotic encryption adds to the functionality of proposed technique. The embedding of encrypted watermark is proposed in further sections.

3.2.1. Embedding Technique

Graph-based transform is a newly formed transform that is represented as G = {V, E, s}, where V and E are the vertices and edges of the graph and s represents the frame signal for graph G:where represents the weight of the edge. The degree matrix is a diagonal matrix:

Then, the Laplacian graph matrix L would be defined aswhere the operator L is also known as Kirchhoff operator, which is represented as adjacency matrix A. Eigenvalue decomposition is done to a set of real nonnegative eigenvalues which are represented by , and orthogonal eigenvectors are represented by V = {.….}, derived as

Decorrelation of the signal defined on the graph is done using eigenvectors:

3.2.2. Incremental Optimization Method for Embedding Factor

The embedding factor in equation (11) is optimized using an incremental approach to grey wolf optimization. The major part in embedding is to take care of PSNR after embedding of watermark. The embedding factor of GBT and SVD calculated in equation (10) was taken as 0.02, and the quality loss is addressed after applying certain attacks. The proposed scheme in the given research achieves good results in terms of PSNR by optimizing the embedding factor by using the combined approach of grey wolf optimization and genetic algorithm. The grey wolf optimization model [11] optimizes the factor by finding the fitness value from the position of 3 wolves α, β, and δ which provides the best solution, 2nd best solution, and 3rd best solution. The approach is to find a prey which is referred as PSNR in the watermarking scheme, thus in order to get the fittest solution. The whole process is the search of prey, gradually updating the position so as to capture the prey faster. α is the leader of the pack and rest of the wolves follow it. The position of grey wolves is updated by using formula given in equation (11) and the following equation:where  = distance between grey wolf and a prey,  = coefficient vector, t = number of iterations,  = position vector of prey,  = position vector of wolf, and  = balance convergence coefficient between prey and wolf. The calculation of coefficient vectors is done by equation (13) and the following equation:where linearly decreases from 2 to 0, and are random vectors, and decreases with decrease in . It means the wolf is very much near to the prey to be attacked. The grey wolves will update the positions by moving within search space to find optimal solution. The location updating is done by following equations (16)–(22):where  = distance amongst wolves, , , and are wolves and the prey, represent parameters that determine position w.r.t to , , and wolves, and  = the positional vector after updating grey wolf.

Steps of GWO model of optimization:(1)First step is to generate the initial set of population randomly and initialize parameters (2)Second step is to calculate the fitness value of the grey wolf individual and save the highest individual with highest fitness values (3)Third step is to update the position parameter value as per equations (15)–(21) so as to obtain the next generation population and further updating value of (4)Calculate fitness value of each individual of grey wolf and update (5)Repeat Steps 2–4 until maximum iterations are reached and optimal solution is obtained

Improved algorithm of global exploration improves convergence speed. The value of a improves efficiency of algorithm. The value of a does not impact any local convergence, thus solving large-scale multimodel problems will be hard. So, the improvement in the value of a will improve optimal solution and the same is listed aswhere amax = initial value of parameter a, amin = end value of parameter a, i = iteration index, imax = maximum iterations, and  = nonlinear adjustment coefficient.

The value of A from equation (12) entirely depends upon value of a, where higher value of A expands searching criteria of a better way. If |A| < 1, then the range is limited to a certain extent. The population evaluation directly impacts the efficiency of an optimized algorithm. To calculate the same, assume current population fitness is represented by Fi. Selection of individuals is done by the highest fitness values. The value of K represents total fitness and Pi represents probability of selected individual given in equations (24) and (25), respectively:

Cumulative fitness value Ki is calculated till children are consistent like parent, and the same is illustrated in equation (25):

To solve large-scale problems, the grey wolf optimization algorithm is combined with genetic algorithm, where entire population P is divided into t × d subpopulations Pi (i = 1....t and j = 1….d). Crossover is applied to increase diversity of population. Linear crossover is applied in the proposed work. A random number is generated for each individual xi for crossover population. The crossover probability is represented by Pc and c11 and c21 represent children generated from parents p11 and p22, where z represents the random number that ranges from 0 to 1. The crossover operation is derived from equations (27) and (28):

Mutation operator is applied on elite individuals in population. The individuals are represented as xi with mutation probability Pm. Selection of gene xk is done with probability Pm, and generation of new individuals xi1 = based on 2 criteria:where l and u are lower and upper bounds to generate new individuals and z is a random number between 0 to 1. The hybrid optimization model is represented as follows.

The proposed model of GWO-GA optimizes the embedding factor to target high values of PSNR. The results obtained by using the incremental approach not only gets high values of PSNR alone but also gets high values of PSNR when different attacks such as Gaussian noise, sharpening, rotation, blurring, and JPEG compression are applied to watermarked frames. The algorithm of the incremental approach by GWO-GA is given in Algorithm 2. The approach starts with application of grey wolf optimization to find best search agents followed by genetic algorithm to further optimize to get high values of PSNR as a target function. The same is implemented in this research and optimization is applied to the embedding factor which is done using combined transform of GBT-SVD. Although the same transform is used to embed the watermark, using the optimization model provides additional feature to target high values and provides better results. The working of the hybrid grey wolf optimization and genetic algorithm (GWO-GA) is done in 2 phases where optimization of the embedding factor is done by using grey wolf optimization followed genetic algorithm. The areas to find best fitness parameter (PSNR) is done by calculating fitness of each search agent, updating the fitness value after every iteration. The process is continued till the best fitness value is calculated followed by the incremental approach of genetic algorithm which also searches for the best fitness value (PSNR), and the higher value of PSNR is directly proportional to quality. The process of selecting subpopulation is followed by mutation if the high PSNR value is not found out which is followed by crossover; then, convergence is done to get the best fitness value. Algorithm 2 provides the optimized embedding factor. The algorithm works better when compared with alone of grey wolf optimization and genetic algorithm. The embedding of watermark is done using graph-based transform (GBT) and singular-valued decomposition (SVD). During the embedding process, the embedding factor taken in equation (11) is optimized using this incremental approach so as to aim the higher value of PSNR, and the results obtained in Section 4 are a proof of this technique being robust, and the same approach is being tested on 6 videos and higher values of PSNR is obtained in all.

Input: embedding factor
Output: optimized embedding factor for watermark embedding on alpha value
Begin
(1)Initialize parameters a, F, and L and population size N, Pc, and Pm
(2)Initialize current population P
(3)i = 0
(4)While i < imax
(5) {
(6) Find the fitness value of all search agents
(7)   Sα = Best Search agent for embedding factor
    Sβ = 2nd Best Search agent for embedding factor
    Sδ = 3rd Best Search agent for embedding factor
(8) for i = 1 to N
(9)  {
(10)   Update search agent positions given in equation (21).
(11)  }
(12)  Assign P1←P except S
(13)  for i = 1 to N−1
(14)   {
(15)  Get new value of P2 by the selection on new value of P1.
(16)   }
(17)  Assign P←newP2, Sα
(18)  Generate subpopulation Ps using partitioning on P.
(19)  Select the individuals using crossover probability Pc.
(20)  for i = 1 to NPc
(21)   {
(22)  Perform crossover on each search agent by equations (27) and (28).
(23)   }
(24)Generate Sα, Sβ, and Sδ, by equation (29) on mutation probability Pm.
(25)}
(26)Return Sα.
End
3.2.3. Encryption of Watermark before Embedding

The watermark embedded on selected frames is encrypted using hyperchaotic encryption to add security feature to the proposed technique [25]:

The value of x, y, z, and calculated from the above equation will be used for encrypting the watermark image to be used in a frame. The standard values of a, b, and c were taken as per [25]. The second step is to convert R, S into x, y for column and row, respectively, to encrypt the watermarked frame:

The 3rd step is to interchange the coefficients of mth row and x (m)th row of image W (m = 1, 2, ………..i and N = 1, 2, ……….j):where W1 is the encrypted watermark image to be embedded.

The encryption of a watermark image is represented as W (i, j) where image size is represented as mn. The first step is generating the sequence of R and S using the Lorenz system. The security feature added here adds to the security feature by encrypting watermark before being embedded, thus making the technique more secure. Real-time applications such as broadcasting face security issues and copyright protection. The proposed technique combined with hyperchaotic encryption adds to security feature and also adds to copyright protection. In previous research done in [31], rail fence cipher is used as a security feature that is applied to binary image watermark. The watermark was ciphered with rail fence cipher so that exact retrieval of the watermark from any unauthorized person is not easy. Mostly research is carried out using transposition cipher [19] as adding higher security mechanisms such as AES and DES will increase the complexity of code. The research carried out by [25] is secure and provides better results compared to transposition ciphers. Hyperchaotic encryption is not adding to the complexity of code. Algorithm 3 provides embedding of the watermark inside selected frames using the optimized embedding factor provided by Algorithms 2 and 4 and defines the extraction of watermark. Figure 3 explains the updated embedding factor using a hybrid algorithm.

Input: selected frames from Algorithm 1
Output: watermarked video
Begin
(1) for selected frames ←1 to k.
(2) {
(3) Take a binary image watermark W (i, j).
(4) Use layer separation on selected RGB frame K (i, j) and watermarked image W (i, j).
(5)Apply hyperchaotic encryption on the watermark.
(6)Apply GBT transform on each layer of K (i, j).
(7)Apply SVD and extract USV feature of each layer of K (i, j) and W (i, j).
(8)Take S value of the frame and watermarked image.
(9)Optimize the value of embedding factor α mentioned in equation (6) using hybrid GWO-GA.
(10) Embed watermark W (i, j) to K (i, j) using optimized value of α calculated in equation (6).
(11)Combine both S values of selected frame and watermarked image to get modified S from
(12)Target the best PSNR from alpha value calculated from equation
(13)Repeat steps from 2 to 12 till all the selected frames are processed.
(14)}
(15)for frames 1 to m in directory of extracted frames.
(16){
(17)Combine watermarked frames and replace them with frames in extracted frame directory.
(18)Process all selected frames and frames in given directory to form watermarked video.
(19)}
End
Input: watermarked video
Output: recovered watermark
Begin
(1) Take watermarked video
(2) for frames from 1 to k
(3) {
(4)Perform layer separation on RGB frame
(5)Apply GBT transform on each layer of .
(6)Apply SVD and extract USV feature of each layer of .
(7)Extract watermark from using formula =()/α
(8)Extract S value.
(9)Perform inverse SVD to combine S value with USV of each layer
(10)Perform inverse GBT transform
(11)Decrypt watermark using key
(12)Repeat steps from 4 to 12 till all the watermarks on selected frames are extracted.
(13)}
End
3.3. Watermark Extraction Procedure

This section describes the watermark extraction procedure so as to recover the watermark from the watermarked video. The extraction of a watermarked from the watermarked video is a reverse process of embedding when the watermark was embedded with the help of equation (10). The extraction of frames is followed by applying GBT and SVD and the extraction is calculated as per equation (32). This is followed by inverse GBT and inverse SVD, then decryption is done using a key, and then the watermark is recovered. Figure 4 represents the watermarking embedding procedure, and Figure 5 represents the watermark extraction procedure:where = extracted watermark, = watermarked frame, and = selected frame.

3.4. Performance Evaluation

The performance evaluation of the watermarking technique is typically calculated in terms of quality parameters of the video and robustness against various attack scenarios such as Gaussian noise, sharpening, rotation, blurring, and JPEG compression. The parameters are as follows.

PSNR (peak signal-to-noise ratio): PSNR is a major quality parameter that differentiates the original and watermark frame on the basis of the mean square error. It is calculated by the following equation:where G and H = rows and columns of the image,  = selected frame, and = watermarked frame.

The average PSNR is the sum of PSNR of all selected frames divided by the number of frames. The objective of the proposed technique is obtaining high values of PSNR as embedding of the watermark which causes quality loss. Higher values of PSNR indicate the efficiency of the technique.

To find the similarity between the selected frame and watermarked frame, the quality parameters’ NC (normalized correlation), SSIM (structural similarity index measure), and BER (bit error rate) are calculated by the following equation:

The numerical values of NC, SSIM, and BER lie in the range of [0, 1]. While SSIM and NC measure the similarity, so high values of them are preferred, and BER is inversely proportional to PSNR, so lower values indicate the efficiency of the technique.

4. Experimental Results

The results were calculated in MATLAB 2018b using i5 processor. The frame selection and embedding time is dependent on the type of processor used. The compiled results are dependent upon watermark embedding and frame selection.

Total of 6 cif-encoded videos have been taken and frame selection mechanism is dependent on scene change detection, and using the frame selection algorithm mentioned in Section 3.1, the frames were selected from the videos. Akiyo did not have sufficient scene change detection, so the watermarking technique could not be applied on that, as the value of Fk (frame difference) was not greater than Mb (threshold), so no significant frames got selected from the video, and rest of the videos have significant frames selected as per frame selection algorithm in Section 3.1. Table 1 represents number of frames getting selected from the input video dataset. Pure storage video has got maximum frames selected. Some videos indicated major changes due to which more frames got selected from them. The datasets of the videos were obtained from Figures 6a6i signify some selected frames from the dataset of videos. Along with these videos 2 binary watermarks and their encrypted versions have been shown. The compressed domain videos taken in the research are the same type of videos used in broadcast application; to remove unauthorized access to these videos, the given videos are embedded with encrypted watermark that addresses the issues faced by real-time application. The encrypted watermark not only addresses security issues but also adds to copyright protection so as to achieve ownership identification. The experimental results were divided into certain phases. Starting with taking the input video in avi or mp4 file, this phase is followed by frame extraction. The relevant frames were selected from extracted frame which is followed by the embedding of watermark. Embedding of watermark is done using the proposed method followed by testing the validity of the technique by applying certain attacks. Higher values of PSNR and lower values of BER implicate the proposed technique to be efficient which leads to less loss in quality of output video. Every video will have different properties which mean frame selection in every video will be different. The same is demonstrated in this research, where different videos have different numbers of frames getting selected. Figures 7a–7e represent the watermarked frame after the watermarking process along with the binary watermark. Figures 8a8d represent the plot of various videos and their respective quality parameters against no attack.


S. NoVideo nameNo. of frames selected

1Akiyo0
2Coastguard1
3Foreman2
4News3
5Bowing4
6Pure storage5

4.1. Experimental Tests for Quality Check

The experimental tests have been carried out using 2 binary watermarks, and the results are calculated by applying the watermark on the selected frame of the video. There are 2 types of calculation of results done: with attacks and without attacks. The following sections describe the performance of proposed techniques against both scenarios.

The value of quality parameters is taken as per comparison with original and watermarked frames. The higher value of PSNR, NC, and SSIM and lower value of BER suggests the proposed scheme is efficient when the watermark is imparted to the original host video. Table 2 compiles results of embedding of watermark 1 on selected frames. Tables 1 and 2 indicate there is not much of a difference when both watermarks are applied on the same set of videos. Binary watermark 1 is taken for carrying out the research work, and all the attacks in further sections are applied on the same watermark.


VideoPSNR (db)SSIMNCBER

Coastguard52.57680.999930.99990.01902
Foreman53.056850.999760.99990.01885
News54.00780.999930.99990.01852
Bowing53.2893750.99969250.99990.01876
Pure storage54.919220.9998940.99990.01829

The embedding technique requires iterations to the process of combined transform of GBT-SVD with GWO and GA. To formulate results, we have taken iterations’ value as 10. Since the method is entirely dependent on processor speed, so taking the large value of iteration will be time-consuming, although the higher value of iteration will give better results. Table 3 compiles the results of watermarked frames for all videos. The results of average values of Figures 7a–7e and Figures 9a–9e depict the average values of quality parameters PSNR, SSIM, NC, and BER on selected frames from 5 videos. The high values of PSNR, SSIM, and NC and the less value of BER indicate less quality loss after embedding of both types of watermark. It means the visual quality is good overall. It is hard to distinguish between the original and watermarked frame. The results obtained in the proposed technique supersede the results obtained in [4, 8, 20, 21, 28, 32, 33]. Figures 10a10d represent plots of average values of performance parameters using watermark 2.


VideoPSNR (db)SSIMNCBER

Coastguard55.02020.999770.999980.01817
Foreman56.32710.9997650.9999850.01776
News55.109730.999970.999990.01814
Bowing53.490830.999710.9999780.01869
Pure storage55.418380.9998450.9999830.01807

4.2. Experimental Tests for Time Complexity

Tables 4 and 5 compile the processing time (in seconds) required to carry out frame selection, embedding, and extraction of both watermark for given set of videos. Figure 11 represents plots for comparison of quality parameters of both watermarks. The time is entirely based on processor requirements. The total time consumed depends on selection of frames from the video. Pure storage video has got 5 frames selected and the time for every frame varies from 20 to 35 seconds for every frame. Embedding time is dependent on the number of selected frames and iterations in which optimization is applied. As a standard, 10 iterations have been taken to obtain good value of fitness, i.e., PSNR, and more iteration will lead to higher value of embedding time. Total time consumed for every video is mentioned in Tables 4 and 5, and plots of the same are represented in Figure 12. The value of embedding time is similar for both watermark 1 and watermark 2. The value of embedding time is directly proportional to the number of selected frames. Total of 5 frames got selected from pure storage video; thus, total embedding time is the highest for the same video.


VideoFrame selection timeEmbedding timeExtraction time

Coastguard0.31845251.79714.34
Foreman0.94113474.72676.23
News1.19484714.36167.56
Bowing1.41451950.456811.56
Pure storage1.164161100.361313.78


VideoFrame selection timeEmbedding timeExtraction time

Coastguard0.31845230.79714.14
Foreman0.94113460.26566.21
News1.19484730.36168.23
Bowing1.41451962.456812.12
Pure storage1.164161088.261313.30

Plots in Figures 13a and 13b represent the embedding time for both watermarks. It can be seen in plots that there is less difference in the values of quality parameters when both watermarks are compared.

The analysis was done using watermark 2 and results were obtained which are highlighted in Table 5.

4.3. Processing Attacks

The robustness of the proposed technique is tested against various attack scenarios such as Gaussian noise, sharpening, rotation, blurring, and JPEG compression. Series of experiments have been conducted to attack every watermarked frame to measure quality loss. The robustness of the technique entirely depends upon the values of PSNR, SSIM, NC, and BER. The proposed technique is designed to have real-time requirement in mind which is tested against these signal processing attacks. The processing attacks have been applied with some variance of the value of an attack to check robustness of the scheme. The detailed description is given as follows.

4.3.1. Gaussian Noise Attack

In Gaussian noise attack, random Gaussian sequence real values {0, 0.0001, 0.001, 0.01} are added to the all frames of the watermarked video using watermark 1. The value 0 indicates no attack is applied. The results for 0 value were obtained from Table 2.

It can be identified from plots in Figures 14a14d that values of quality parameters reduce after increasing Gaussian noise variance, although difference is less and negligible, indicating the proposed technique performs better in case of Gaussian noise.

It can be seen from plots in Figures 14a14d as average PSNR, NC, and SSIM decrease with increase in the attack value and BER increases with increase in the attack value. The higher value of PSNR, NC, and SSIM justifies the robustness of the proposed technique. Figures 14a14d compile plots of real-time testing by applying this attack with different values of Gaussian noise for all quality parameters using values {0, 0.0001, 0.001, 0.01} for all 5 videos taken in research work. PSNR, SSIM, NC, and BER values of all the videos are similar. The value of NA in graphs means no attack is applied and higher values of PSNR, NC, and SSIM will be obtained for NA. Lower values of BER are obtained for NA. Table 6 represents the value of quality parameters of watermarked frames after Gaussian noise with 0.0001 variance is applied to all. Results indicate the proposed technique to be robust against this attack.


VideoPSNR (db)SSIMNCBER

Coastguard39.76340.999930.999040.025149
Foreman39.85250.9761450.9990450.025093
News39.85980.969660.999210.025088
Bowing39.836450.9593580.9988180.025103
Pure storage39.784440.9611820.9986980.025136

4.3.2. Sharpening Attack

In sharpening attack, random sequence real values {0, 0.0001, 0.001, 0.01} are added to all frames of the watermarked video using watermark 1. It can be seen from plots in Figures 15a15d as average PSNR, NC, and SSIM decrease with increase in the attack value, and BER increases with increase in the attack value. The higher value of PSNR, NC, and SSIM justifies the robustness of the proposed technique against sharpening attack. The value of sharpening attack for 0.0001 and 0.001 is approximately the same. Sharpening attack has negligible difference on the watermarked frame, and the higher value of NC indicates the robustness of the proposed technique. Figures 15a15d compile results of sharpening attack for all quality parameters using values {0, 0.0001, 0.001, 0.01} for all 5 videos taken in research work. PSNR, SSIM, NC, and BER values of all the videos are similar. The value of NA in graphs means no attack is applied and higher values of PSNR, NC, and SSIM will be obtained for NA. Lower values of BER are obtained for NA. The value 0 indicates no attack is applied. The results for 0 value were obtained from Table 2. The sharpening attack is applied to highlight details of the image. The result calculation of the watermarked frame is represented in Table 7.


VideoPSNR (db)SSIMNCBER

Coastguard50.0540.998870.999940.01902
Foreman49.69480.9983750.999930.020126
News49.782570.998440.9999330.020087
Bowing49.91240.997520.999920.020036
Pure storage50.078260.9977520.999910.019976

4.3.3. Rotation Attack

In rotation attack, a watermarked frame is rotated with an angle of {0, 1, 90, 180} using watermark 1. The value 0 indicates no attack is applied. The results for 0 value were obtained from Table 2. It can be seen from plots in Figures 16a16d as average PSNR, NC, and SSIM deteriorate with increase in the attack value and BER increases with increase in the attack value. PSNR, SSIM, NC, and BER values of all the videos are similar. The value of NA in graphs means no attack is applied and higher values of PSNR, NC, and SSIM will be obtained for NA. Lower values of BER are obtained for NA. The result calculation of these watermarked frames after rotation attack is represented in Table 8.


VideoPSNR (db)SSIMNCBER

Coastguard8.30420.09946−0.3990.12042
Foreman8.16010.31619−0.175860.12255
News8.4881670.231913−0.109940.117817
Bowing11.105850.2218730.0670680.090324
Pure storage11.981040.4776260.1322060.08598

Table 8 represents result calculation of quality parameters of watermarked frames of input video dataset after rotation attack is applied using watermark 1.

4.3.4. Blurring Attack

In blurring attack, random sequence real values {0, 2. 05, 3.05, 4.05} are added to all frames of the watermarked video using watermark 1. The value 0 indicates no attack is applied. The results for 0 value were obtained from Table 2. It can be seen from plots in Figures 17a17d as average PSNR, NC, and SSIM decrease with increase in the attack value and BER increases with increase in the attack value. The higher value of PSNR, NC, and SSIM justifies the robustness of the proposed technique against blurring attack. Plots in Figures 17a17d compile results of blurring attack for all quality parameters using values {0, 2.05, 3.05, 4.05} for all 5 videos taken in research work. PSNR, SSIM, NC, and BER values of all the videos are similar. The value of NA in graphs means no attack which is applied, and higher values of PSNR, NC, and SSIM will be obtained for NA. Lower values of BER are obtained for NA. Table 9 represents calculation of quality parameters after blurring attack.


VideoPSNR (db)SSIMNCBER

Coastguard39.55190.993130.998970.025283
Foreman43.40120.997250.99960.023055
News36.000730.9929930.9980830.027777
Bowing40.978630.9930150.999080.024403
Pure storage37.822220.9874120.9978740.026453

4.3.5. JPEG Compression Attack

In JPEG Compression attack, values {0, 98, 96, 94} are taken, that is, applied to the all-watermarked video. The value 0 indicates no attack is applied. The results for 0 value were obtained from Table 2. It can be seen from plots in Figures 18a18d as average PSNR, NC, and SSIM decrease with decrease in value of compression attack value and BER increases with decrease in attack value. Higher value of PSNR, NC, and SSIM justifies the robustness of the proposed technique against compression attack. Plots in Figures 18a18d compile results of compression attack for all quality parameters using values {0, 98, 96, 94} for all 5 videos taken in research work. PSNR, SSIM, NC, and BER values of all the videos are similar. The value of NA in graphs means no attack is applied and higher values of PSNR, NC, and SSIM will be obtained for NA. Lower values of BER are obtained for NA.

Result calculation of all parameters after JPEG compression is done using Table 10. Figures 19(a–d) describe plots of all the attacks applied on input dataset.


VideoPSNR (db)SSIMNCBER

Coastguard46.58950.99680.999820.021464
Foreman44.716450.9957850.9996950.022371
News42.83970.9934830.99960.023344
Bowing46.087080.9941650.9997450.021699
Pure storage46.214620.9958920.9997160.021671

The results compiled from plots in Figures 19(a–d) suggest that the proposed technique achieves good results when all 5 attacks are applied on watermarked video. Higher value of quality parameters is achieved of all videos. The proposed novel technique is robust against all attacks applied and achieves higher values against various attack scenarios.

4.4. Analysis of Compressed and Uncompressed Data

The proposed technique was applied on both compressed and uncompressed video, but most of the analysis was done on uncompressed video as it takes less time to process using optimization algorithm. The same was analyzed with plots in Figures 20a and 20b. Although PSNR of uncompressed video was more, other factors such as SSIM, NC, and BER were almost similar.

5. Conclusion

In this paper, (1) frame selection was implemented using scene change detection along with temporal sampling and (2) approach was done to embed the encrypted watermark using hybrid combination of graph-based transform along with singular value decomposition (SVD) combined with optimized approach of grey wolf optimization and genetic algorithm which covers various areas such as broadcasting and copyright protection. The proposed technique focuses on real-time requirements of the video such as quality loss after embedding of the watermark. The quality parameters PSNR, SSIM, NC, and BER are used to evaluate effectiveness of the scheme against various attack scenarios. The higher values of PSNR, SSIM, and NC and lower BER values indicate that the proposed embedding approach achieves good visual quality and robustness. The embedding watermarking technique was found to be robust against practical video processing attacks: Gaussian noise, sharpening, rotation, blurring, and JPEG compression. Various OTT platforms do cover compressed domain of videos and our proposed technique covers all aspects of security for broadcasting application, since the watermark was encrypted with hyperchaotic encryption and successful recovery of the watermark after extraction suggests the efficiency of watermarking. The efficiency of the technique can be improved with advanced optimization methods and machine learning models which will be addressed in future work.

Data Availability

The data used to support the findings of the study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

References

  1. D. Ye, C. Zou, Y. Dai, and Z. Wang, “A new adaptive watermarking for real-time MPEG videos,” Applied Mathematics and Computation, vol. 185, no. 2, pp. 907–918, 2007. View at: Publisher Site | Google Scholar
  2. P. Venugopala, H. Sarojadevi, N. N. Chiplunkar, and V. Bhat, “Video watermarking by adjusting the pixel values and using scene change detection,” in Proceedings of the 2014 Fifth International Conference on Signal and Image Processing, pp. 259–264, Bangalore, India, January 2014. View at: Publisher Site | Google Scholar
  3. V. Chaudhary, A. Mishra, R. Mehta, M. Verma, R. P. Singh, and N. Rajpal, “Watermarking of grayscale images in DCT domain using least-squares support vector regression,” International Journal of Machine Learning and Computing, vol. 2, no. 6, p. 725, 2012. View at: Publisher Site | Google Scholar
  4. S. Mirjalili, A. H. Gandomi, S. Z. Mirjalili, S. Saremi, H. Faris, and S. M. Mirjalili, “Salp swarm algorithm: a bio-inspired optimizer for engineering design problems,” Advances in Engineering Software, vol. 114, pp. 163–191, 2017. View at: Publisher Site | Google Scholar
  5. A. Mishra, C. Agarwal, A. Sharma, and P. Bedi, “Optimized gray-scale image watermarking using DWT-SVD and firefly algorithm,” Expert Systems with Applications, vol. 41, no. 17, pp. 7858–7867, 2014. View at: Publisher Site | Google Scholar
  6. C. Agarwal, A. Mishra, and A. Sharma, “A novel gray-scale image watermarking using hybrid fuzzy-BPN architecture,” Egyptian Informatics Journal, vol. 16, no. 1, pp. 83–102, 2015. View at: Publisher Site | Google Scholar
  7. C. Sharma, A. Bagga, R. Sobti, T. Lohani, and M. Shabaz, “A secured frame selection based video watermarking technique to address quality loss of data: combining graph based transform, singular valued decomposition, and hyperchaotic encryption,” Security and Communication Network, vol. 2021, Article ID 5536170, 19 pages, 2021. View at: Publisher Site | Google Scholar
  8. A. K Singh, M. Dave, and A. Mohan, “Hybrid technique for robust and imperceptible multiple watermarking using medical images,” Multimedia Tools and Applications, vol. 75, no. 14, pp. 8381–8401, 2016. View at: Publisher Site | Google Scholar
  9. G. Cheung, W. Kim, A. Ortega, J. Ishida, and A. Kubota, “Depth map coding using graph based transform and transform domain sparsification,” in Proceedings of the 2011 IEEE 13th International Workshop on Multimedia Signal Processing, Hangzhou, China, October 2011. View at: Publisher Site | Google Scholar
  10. R. Rewani, M. Kumar, and A. K. S Pundir, “Digital image watermarking: a survey,” International Journal of Engineering Research and Applications (IJERA), vol. 3, no. 4, pp. 1750–1753, 2013. View at: Google Scholar
  11. C. Sharma and A. Bhaskar, “A review on video watermarking techniques for compressed domain with optimization algorithms,” Materials Today: Proceedings, 2020. View at: Publisher Site | Google Scholar
  12. C. Sharma and A. Bhaskar, “A review on video watermarking techniques for compressed domain with optimization algorithms,” Materials Today: Proceedings, 2020. View at: Publisher Site | Google Scholar
  13. B. Sridhar and C. Arun, “An enhanced approach in video watermarking with multiple watermarks using wavelet,” Journal of Communications Technology and Electronics, vol. 61, no. 2, pp. 165–175, 2016. View at: Publisher Site | Google Scholar
  14. O. S. Faragallah, “Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain,” AEU-International Journal of Electronics and Communications, vol. 67, no. 3, pp. 189–196, 2013. View at: Publisher Site | Google Scholar
  15. S. Bhattacharya, T. Chattopadhyay, and A. Pal, “A survey on different video watermarking techniques and comparative analysis with reference to H. 264/AVC,” in Proceedings of the 2006 IEEE International Symposium on Consumer Electronics, pp. 1–6, St. Petersburg, Russia, June 2006. View at: Publisher Site | Google Scholar
  16. A. Rajpal, A. Mishra, and R. Bala, “A novel Fuzzy selection based watermarking scheme for MPEG-4 videos using bi-directional extreme learning machine,” Applied Soft Computing Journal, vol. 74, pp. 603–620, 2018. View at: Google Scholar
  17. W. Wang, H. Y. Tan, P. Sun, Y. Pang, and B. B. Ren, “A novel digital image encryption algorithm based on wavelet transform and multi-chaos,” Wireless Communication and Sensor Network, pp. 711–719, 2016. View at: Publisher Site | Google Scholar
  18. C. Sharma, G. Singh, and G. Singh Saini, “Efficient video watermarking technique for quality loss of data,” Indian Journal of Science and Technology, vol. 9, no. 47, 2016. View at: Publisher Site | Google Scholar
  19. S. Mirjalili, “The ant lion optimizer,” Advances in Engineering Software, vol. 83, pp. 80–98, 2015. View at: Publisher Site | Google Scholar
  20. A. Mansouri, A. Aznaveh, and F. Azar, “Blind H. 264 compressed video watermarking with pattern consideration,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010, March 2010. View at: Publisher Site | Google Scholar
  21. A. Sake and R. Tirumala, “Bi-orthogonal wavelet transform based video watermarking using optimization techniques,” Materials Today: Proceedings, vol. 5, no. 1, pp. 1470–1477, 2018. View at: Publisher Site | Google Scholar
  22. J. Hou, H. Liu, and L. Chau, “Graph-based transform for data decorrelation,” in Proceedings of the 2016 IEEE International Conference on Digital Signal Processing (DSP), Beijing, China, October 2016. View at: Publisher Site | Google Scholar
  23. S. Mirjalili and A. Lewis, “The whale optimization algorithm,” Advances in Engineering Software, vol. 95, pp. 51–67, 2016. View at: Publisher Site | Google Scholar
  24. F. Seghir and A. Khababa, “A hybrid approach using genetic and fruit fly optimization algorithms for QoS-aware cloud service composition,” Journal of Intelligent Manufacturing, vol. 29, pp. 1773–1792, 2016. View at: Publisher Site | Google Scholar
  25. Y. Li, S. Zhang, Y. Yin, W. Xiao, and J. Zhang, “A novel online sequential extreme learning machine for gas utilization ratio prediction in blast furnaces,” Sensors, vol. 17, no. 8, p. 1847, 2017. View at: Publisher Site | Google Scholar
  26. C. Sharma and A. Bhaskar, “A review on video watermarking techniques for compressed domain with optimization algorithms,” Materials Today: Proceedings, 2020. View at: Publisher Site | Google Scholar
  27. T. Tabassum and S. M. M. Islam, “A digital video watermarking technique based on identical frame extraction in 3-level DWT,” in Proceedings of the 2012 15th International Conference on Computer and Information Technology (ICCIT), pp. 101–106, Chittagong, Bangladesh, December 2012. View at: Publisher Site | Google Scholar
  28. Q. Gu, X. Li, and S. Jung, “Hybrid genetic grey wolf algorithm for large scale global optimization,” Complexity, vol. 2019, Article ID 2653512, 18 pages, 2019. View at: Publisher Site | Google Scholar
  29. C. Sharma and A. Bagga, “Video watermarking scheme based on DWT, SVD, rail fence for quality loss of data,” in Proceedings of the 2018 4th International Conference on Computing Sciences, pp. 84–87, ICCS), Jalandhar, India, August 2018. View at: Publisher Site | Google Scholar
  30. H. Egilmez, Y. Hsuan, and C. Ortega, “Graph-based transforms for video coding,” IEEE Transactions on Image Processing, vol. 29, pp. 9330–9344, 2019. View at: Publisher Site | Google Scholar
  31. D. Kaur Thind and S. Jindal, “A semi blind-DWT-SVD video watermarking,” Procedia Computer Science, vol. 46, pp. 1661–1667, 2014. View at: Publisher Site | Google Scholar
  32. X. Wang and M. Wang, “A hyperchaos generated from Lorenz system,” Physica A: Statistical Mechanics and Its Applications, vol. 387, no. 14, pp. 3751–3758, 2008. View at: Publisher Site | Google Scholar
  33. Z. Cao and L. Wang, “A secure video watermarking technique based on hyperchaotic Lorentz system,” Multimedia Tools and Applications, vol. 78, no. 18, pp. 26089–26109, 2019. View at: Publisher Site | Google Scholar

Copyright © 2021 Chirag Sharma et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Related articles

No related content is available yet for this article.
 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder
Views432
Downloads367
Citations

Related articles

No related content is available yet for this article.

Article of the Year Award: Outstanding research contributions of 2021, as selected by our Chief Editors. Read the winning articles.