logo资料库

Watermarking Techniques for Copyright Protection of Videos.pdf

第1页 / 共128页
第2页 / 共128页
第3页 / 共128页
第4页 / 共128页
第5页 / 共128页
第6页 / 共128页
第7页 / 共128页
第8页 / 共128页
资料共128页,剩余部分请下载后查看
Preface
Contents
List of Figures
List of Tables
Chapter 1: Introduction
1.1 Prologue
1.2 Basic of Watermarking
1.3 Requirements of Watermarking
1.3.1 Types of Watermarking
1.3.2 Applications of Watermarking
1.4 Watermarking Attacks
1.5 Quality Measures for Watermarking
1.6 Colorspace Conversion
1.7 Related Works to Video Watermarking
1.8 Book Organization
Bibliography
Chapter 2: Video Watermarking in Spatial Domain
2.1 Visible Watermarking
2.2 Invisible Watermarking
2.2.1 Least Significant Bit Substitution Approach
2.2.1.1 Watermark Embedding Process
2.2.1.2 Watermark Extraction Process
2.2.1.3 Experimental Results
2.2.1.4 Observation on Obtained Results
2.2.2 Correlation-Based Approach
2.2.2.1 Watermark Embedding Process
2.2.2.2 Watermark Extraction Process
2.2.2.3 Results of Imperceptibility Test
2.2.2.4 Results of Robustness Test
2.2.2.5 Observation on Obtained Results
Bibliography
Chapter 3: Video Watermarking in Transform Domain
3.1 Discrete Cosine Transform (DCT)-Based Approach
3.1.1 Watermark Embedding Process
3.1.2 Watermark Extraction Process
3.1.3 Results of Imperceptibility Test
3.1.4 Results of Robustness Test
3.1.5 Observation on Obtain Results
3.1.6 Comparison with Correlation-Based Approach
3.2 Discrete Wavelet Transform (DWT)-Based Approach
3.2.1 Watermark Embedding Process
3.2.2 Watermark Extraction Process
3.2.3 Results of Imperceptibility Test
3.2.4 Results of Robustness Test
3.2.5 Observation on Obtain Results
3.2.6 Comparison with Correlation and DCT-Based Approaches
Bibliography
Chapter 4: Singular Value Decomposition (SVD)-Based Video Watermarking
4.1 SVD-Based Approach with Binary Message
4.1.1 Watermark Embedding Process
4.1.2 Watermark Extraction Process
4.1.3 Results of Imperceptibility Test
4.1.4 Results of Robustness Test
4.2 SVD-Based Approach with Grayscale Message
4.2.1 Results of Imperceptibility Test
4.2.2 Results of Robustness Test
4.3 Observation on Obtain Results
4.4 Comparison with Correlation-, DCT-, and DWT-Based Approaches
Bibliography
Chapter 5: Video Watermarking in Hybrid Domain
5.1 DCT + DWT + SVD-Based Approach for Binary Message
5.1.1 Watermark Embedding Process
5.1.2 Watermark Extraction Process
5.1.3 Results of Imperceptibility Test
5.1.4 Results of Robustness Test
5.2 DCT + DWT + SVD-Based Approach with Grayscale Message
5.2.1 Watermark Embedding Process
5.2.2 Watermark Extraction Process
5.2.3 Results of Imperceptibility Test
5.2.4 Results of Robustness Test
5.3 Observation on Obtain Results
5.3.1 Comparison with DCT-, DWT-, and SVD-Based Approaches
Bibliography
Chapter 6: Video Watermarking in Sparse Domain
6.1 CS Theory-Based Video Watermarking Approach
6.1.1 Watermark Embedding Process
6.1.2 Watermark Extraction Process
6.1.3 Results of Imperceptibility Test
6.1.4 Results of Robustness Test
6.1.5 Observation on Obtain Results
Bibliography
Chapter 7: Conclusion and Future Direction
Index
Signals and Communication Technology AshishM.Kothari· VedvyasDwivedi RohitM.Thanki Watermarking Techniques for Copyright Protection of Videos
Signals and Communication Technology
The series “Signals and Communications Technology” is devoted to fundamentals and applications of modern methods of signal processing and cutting-edge communication technologies. The main topics are information and signal theory, acoustical signal processing, image processing and multimedia systems, mobile and wireless communications, and computer and communication networks. Volumes in the series address researchers in academia and industrial R&D departments. The series is application-oriented. The level of presentation of each individual volume, however, depends on the subject and can range from practical to scientific. More information about this series at http://www.springer.com/series/4748
Ashish M. Kothari • Vedvyas Dwivedi Rohit M. Thanki Watermarking Techniques for Copyright Protection of Videos
Ashish M. Kothari Atmiya Institute of Technology and Science Rajkot, Gujarat, India Rohit M. Thanki C. U. Shah University Wadhwan City, Gujarat, India Vedvyas Dwivedi C. U. Shah University Wadhwan City, Gujarat, India ISSN 1860-4862 Signals and Communication Technology ISBN 978-3-319-92836-4 https://doi.org/10.1007/978-3-319-92837-1 ISSN 1860-4870 (electronic) ISBN 978-3-319-92837-1 (eBook) Library of Congress Control Number: 2018943291 © Springer International Publishing AG, part of Springer Nature 2019 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Printed on acid-free paper This Springer imprint is published by the registered company Springer International Publishing AG part of Springer Nature. The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface Digital watermarking is a technique to put a secret message, which may be logo of a company, name of the creator, etc., behind the cover medium, which may be image, audio, or video. Digital watermarking algorithms should fulfill three require- ments of robustness, perceptibility, and payload capacity. Digital watermarking algorithms may be designed in spatial domain or transform domain. Watermarking in the spatial domain alters the pixel value directly depending on the watermark and that in the transform domain modifies the frequency coefficients of the cover medium depending on the watermark. This book explains three of the spatial domain video watermarking algorithms, namely visible watermarking, invisible watermarking using Least Significant Bit (LSB) substitution method, and invisible watermarking using correlation-based approach. Basically visible watermarking is used for giving the identity of the pro- ducer of the cover medium that can be made visible on the cover medium. The identity includes transparent and nontransparent parts, and the algorithm would superimpose identity on the cover medium in such a manner that the part of the cover medium which is superimposed by the identity is replaced with the identity and the other part remains unaltered. In the invisible watermarking using LSB algo- rithm, Most Significant Bit (MSB) of the message is replaced with the LSB of the frame of the video. If the message is smaller than the frame, then multiple copies of the message is placed in the frame so as to make the frame robust against cropping attack. In the third spatial domain method of invisible watermarking, namely cor- relation-based watermarking, one Pseudo-random Noise (PN) sequence is added to the block of the frame of video depending on the message bit. At the receiver side, the same PN sequence is correlated with the block of frame and the message is recovered based on the amount of correlation achieved. Work continues in the transform domain wherein Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) are used for invisible watermarking. In the DCT-based method, two pixels are used for embedding the message wherein selections of these pixels are made according to the standard JPEG quantization table. In the DWT-based method the frame first undergoes a sub-band coding and then horizontal sub-band v
vi Preface is modified according to the message. One linear algebra method, namely Singular Value Decomposition (SVD), is also used for the purpose of embedding both binary and grayscale watermarks. Here the singular values of the frame of video are modi- fied according to the message. A hybrid algorithm is also explained wherein DCT, DWT, and SVD are com- bined so as to have advantages of all three. For the evaluation of perceptibility at the transmitter side, two pixel quality matrices are calculated in each of the above- mentioned methods, namely peak signal-to-noise ratio and mean square error. For the sake of evaluation of the robustness, i.e., quality of the message recovered at receiver end correlation between the recovered message and original message is calculated for each method. Based on the experiments the hybrid method is found to be better in both from the point of view of perceptibility and robustness. Finally, compressive sensing- based watermarking algorithms for copyright protection of digital videos are explained. These are new watermarking techniques and known as sparse domain watermarking. This book is a Ph.D. research work and extension work of Dr. Ashish Kothari submitted to the Department of Electronics and Communication Engineering, Shri Jagdish Prasad Jhabarmal Tibrewal University (JJTU), Jhunjhunu, Rajasthan, in 2013, under the supervision of Dr. Vedvyas Dwivedi. The authors are indebted to numerous colleagues for valuable suggestions during the entire period of the manu- script preparation. We would also like to thank the publishers at Springer, in particu- lar Mary E. James, senior publishing editor/CS Springer, for their helpful guidance and encouragement during the creation of this book. Rajkot, Gujarat, India Wadhwan City, Gujarat, India Ashish M. Kothari Vedvyas Dwivedi Rohit M. Thanki
Contents 1 2 3 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Prologue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 1.2 Basic of Watermarking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Requirements of Watermarking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3 Types of Watermarking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.1 1.3.2 Applications of Watermarking . . . . . . . . . . . . . . . . . . . . . . . . 5 Watermarking Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.4 Quality Measures for Watermarking . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.5 Colorspace Conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.6 Related Works to Video Watermarking . . . . . . . . . . . . . . . . . . . . . . . 9 1.7 Book Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 1.8 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Video Watermarking in Spatial Domain . . . . . . . . . . . . . . . . . . . . . . . . 19 Visible Watermarking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 2.1 2.2 Invisible Watermarking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Least Significant Bit Substitution Approach . . . . . . . . . . . . . 21 2.2.1 2.2.2 Correlation-Based Approach . . . . . . . . . . . . . . . . . . . . . . . . . 25 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Video Watermarking in Transform Domain . . . . . . . . . . . . . . . . . . . . 37 Discrete Cosine Transform (DCT)-Based Approach . . . . . . . . . . . . . 37 3.1 Watermark Embedding Process . . . . . . . . . . . . . . . . . . . . . . . 39 3.1.1 Watermark Extraction Process . . . . . . . . . . . . . . . . . . . . . . . . 40 3.1.2 3.1.3 Results of Imperceptibility Test . . . . . . . . . . . . . . . . . . . . . . . 40 Results of Robustness Test . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 3.1.4 Observation on Obtain Results . . . . . . . . . . . . . . . . . . . . . . . 46 3.1.5 3.1.6 Comparison with Correlation-Based Approach . . . . . . . . . . . 48 Discrete Wavelet Transform (DWT)-Based Approach . . . . . . . . . . . 48 Watermark Embedding Process . . . . . . . . . . . . . . . . . . . . . . . 50 3.2.1 3.2.2 Watermark Extraction Process . . . . . . . . . . . . . . . . . . . . . . . . 52 3.2 vii
分享到:
收藏