Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018, Article ID 6712065, 17 pages
https://doi.org/10.1155/2018/6712065
Research Article

A Novel Blind and Robust Video Watermarking Technique in Fast Motion Frames Based on SVD and MR-SVD

1LCCNS Laboratory, Department of Electronics, Faculty of Technology, Ferhat Abbas Setif University, Algeria
2LIS Laboratory, Department of Electronics, Faculty of Technology, Ferhat Abbas Setif University, Algeria

Correspondence should be addressed to Imen Nouioua; zd.fites-vinu@enemi_auoiuon

Received 23 July 2018; Revised 6 October 2018; Accepted 14 October 2018; Published 13 November 2018

Academic Editor: David Megias

Copyright © 2018 Imen Nouioua et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. C. Ingemar, M. L. Miller, A. B. Jeffrey, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Morgan Kaufmann Publishers Inc, 2008. View at Scopus
  2. S. Katzenbeisser and F. Petitcolas, “Information Hiding Techniques for Steganography and Digital Watermarking,” Artech House, 2000.
  3. H. Tao, L. Chongmin, J. M. Zain, and A. N. Abdalla, “Robust image watermarking theories and techniques: A review,” Journal of Applied Research and Technology, vol. 12, no. 1, pp. 122–138, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. M. Kutter, F. Jordan, and F. Bossen, “Digital watermarking of color images using amplitude modulation,” Journal of Electronic Imaging, vol. 7, no. 2, pp. 326–332, 1998. View at Publisher · View at Google Scholar · View at Scopus
  5. A. Karmakar, A. Phadikar, B. S. Phadikar, and G. K. Maity, “A blind video watermarking scheme resistant to rotation and collusion attacks,” Journal of King Saud University - Computer and Information Sciences, vol. 28, no. 2, pp. 199–210, 2016. View at Publisher · View at Google Scholar · View at Scopus
  6. T. R. Singh, K. M. Singh, and S. Roy, “Video watermarking scheme based on visual cryptography and scene change detection,” AEÜ - International Journal of Electronics and Communications, vol. 67, no. 8, pp. 645–651, 2013. View at Publisher · View at Google Scholar · View at Scopus
  7. W. Kong, B. Yang, D. Wu, and X. Niu, “SVD Based Blind Video Watermarking Algorithm,” in Proceedings of the First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06), pp. 265–268, Beijing, China, September 2006. View at Publisher · View at Google Scholar
  8. R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Transactions on Multimedia, vol. 4, no. 1, pp. 121–128, 2002. View at Publisher · View at Google Scholar · View at Scopus
  9. O. S. Faragallah, “Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain,” AEÜ - International Journal of Electronics and Communications, vol. 67, no. 3, pp. 189–196, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. K. Niu, X. Yang, and L. Xiang, “Hybrid quasi-3D DWT/DCT and SVD video watermarking,” in Proceedings of the 2010 IEEE International Conference on Software Engineering and Service Sciences, ICSESS 2010, pp. 588–591, China, July 2010. View at Scopus
  11. N. I. Yassin, N. M. Salem, and M. I. El Adawy, “QIM blind video watermarking scheme based on Wavelet transform and principal component analysis,” Alexandria Engineering Journal, vol. 53, no. 4, pp. 833–842, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. D. K. Thind and S. Jindal, “A semi blind DWT-SVD video watermarking,” in Proceedings of the International Conference on Information and Communication Technologies, ICICT 2014, pp. 1661–1667, India, December 2014. View at Scopus
  13. N. Leelavathy, E. V Prasad, and S. Kumar, “Video Watermarking Techniques: A Review,” International Journal of Computer Applications, vol. 104, no. 7, pp. 24–30, 2014. View at Publisher · View at Google Scholar
  14. F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1079–1107, 1999. View at Publisher · View at Google Scholar · View at Scopus
  15. P. Rasti, S. Samiei, M. Agoyi, S. Escalera, and G. Anbarjafari, “Robust non-blind color video watermarking using QR decomposition and entropy analysis,” Journal of Visual Communication and Image Representation, vol. 38, pp. 838–847, 2016. View at Publisher · View at Google Scholar · View at Scopus
  16. S. M. Youssef, A. A. ElFarag, and N. M. Ghatwary, “Adaptive video watermarking integrating a fuzzy wavelet-based human visual system perceptual model,” Multimedia Tools and Applications, vol. 73, no. 3, pp. 1545–1573, 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. T. Tabassum and S. M. Islam, “A digital video watermarking technique based on identical frame extraction in 3-Level DWT,” in Proceedings of the 2012 15th International Conference on Computer and Information Technology (ICCIT), pp. 101–106, Chittagong, Bangladesh, December 2012. View at Publisher · View at Google Scholar
  18. L. Agilandeeswari and K. Ganesan, “A robust color video watermarking scheme based on hybrid embedding techniques,” Multimedia Tools and Applications, vol. 75, no. 14, pp. 8745–8780, 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. X. Jiang, Q. Liu, and Q. Wu, “A new video watermarking algorithm based on shot segmentation and block classification,” Multimedia Tools and Applications, vol. 62, no. 3, pp. 545–560, 2013. View at Publisher · View at Google Scholar · View at Scopus
  20. K. Chetan and K. Raghavendra, “DWT Based Blind Digital Video Watermarking Scheme for Video Authentication,” International Journal of Computer Applications, vol. 4, no. 10, pp. 19–26, 2010. View at Google Scholar
  21. Y. Jia, W. Lin, and A. A. Kassim, “Estimating just-noticeable distortion for video,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 7, pp. 820–829, 2006. View at Publisher · View at Google Scholar · View at Scopus
  22. H. C. Andrews and C. L. Patterson, “Singular value decompositions and digital image processing,” IEEE Transactions on Signal Processing, vol. 24, no. 1, pp. 26–53, 1976. View at Publisher · View at Google Scholar · View at Scopus
  23. R. Kakarala and P. O. Ogunbona, “Signal analysis using a multiresolution form of the singular value decomposition,” IEEE Transactions on Image Processing, vol. 10, no. 5, pp. 723–735, 2001. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  24. B. Chen and G. W. Wornell, “Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,” IEEE Transactions on Information Theory, vol. 47, no. 4, pp. 1423–1443, 2001. View at Publisher · View at Google Scholar
  25. M. Yaghoobi, “A New Approach for Image Encryption Using Chaotic Logistic Map,” in Proceedings of the 2008 International Conference on Advanced Computer Theory and Engineering (ICACTE), pp. 585–590, Phuket, Thailand, December 2008. View at Publisher · View at Google Scholar
  26. R. Dugad, K. Ratakonda, and N. Ahuja, “Robust video shot change detection,” in Proceedings of the 1998 IEEE Second Workshop on Multimedia Signal Processing, pp. 376–381, Redondo Beach, CA, USA, 1998. View at Publisher · View at Google Scholar
  27. A. Anees, I. Hussain, A. Algarni, and M. Aslam, “A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map,” Security and Communication Networks, vol. 2018, 2018. View at Google Scholar
  28. R. Thanki, V. Dwivedi, and K. Borisagar, “A hybrid watermarking scheme with CS theory for security of multimedia data,” Journal of King Saud University - Computer and Information Sciences, 2017. View at Google Scholar · View at Scopus
  29. http://media.xiph.org/video/derf/, Accessed on 06 July 2018.
  30. B. G. Haskell and A. N. Netravali, Digital Pictures: Representation, Compression, and Standards, Perseus Publishing, 1997.
  31. http://www.virtualdub.org, Accessed on 06 July 2018.
  32. F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Attacks on Copyright Marking Systems,” in Information Hiding, vol. 1525 of Lecture Notes in Computer Science, pp. 218–238, Springer Berlin Heidelberg, Berlin, Heidelberg, 1998. View at Publisher · View at Google Scholar
  33. http://www.petitcolas.net/watermarking/stirmark, Accessed on 19 September 2018.