ارائه روش جدید نهاننگاری ویدئو کور و مقاوم با استفاده از تبدیلات سه بعدی
محورهای موضوعی : پردازش چند رسانه ای، سیستمهای ارتباطی، سیستمهای هوشمندشاهرخ فلاح تربه بر 1 , فرزاد زرگری 2
1 - دانشگاه آزاد اسلامی واحد علوم تحقیقات، دانشکده مکانیک، برق و کامپیوتر، تهران، ایران
2 - موسسه تحقیقات فناوری اطلاعات و ارتباطات، تهران، ایران
کلید واژه: تبدیل کانتورلت, نهاننگاری کور ویدئو, تبدیل موجک, تبدیلات سهبعدی,
چکیده مقاله :
نهاننگاری ویدئو با استفاده از تبدیلات سهبعدی، ویدیوی نهاننگاری شده را در برابر حملاتی مانند میانگینگیری فریم، تبانی و... مقاومتر میکند. نهاننگاری با استفاده از تبدیلات سه بعدی به عنوان راهکاری در مقابله با مشکلات ناشی از نهاننگاری مستقل امضا در یک یا چند فریم استفاده می شود. در این مقاله یک الگوریتم نهاننگاری ویدئو کور مقاوم جدید بر پایه تبدیل سه بعدی پیشنهاد شده است. تبدیل به کارگرفته ترکیبی از تبدیل کانتورلت دو بعدی و تبدیل موجک گسسته یک بعدی است. در روش پیشنهادی، هر فریم از ویدئو به ستونهای فرد و زوج سه بعدی تقسیم میشود. تبدیل بر روی هر دوی آنها اعمال می شود و امضا در قسمت زوج ویدیو با استفاده از ضریب انرژی بالای قسمت فرد گنجانده میشود. نتایج آزمایشات حاکی از افت کیفیت ناچیز ویدئو نهاننگاری شده و کیفیت مناسب امضا استخراجی میباشد همچنین روش پیشنهادی در برابر حملات رایج ویدئوهای نهان نگاری شده مقاومت مناسب تری نسبت به راهکارهای مشابه ارائه میکند.
Introduction: Digital images and videos can be copied, reproduced, and distributed with the same quality as the original ones, and this violates the copyright of original producers and the distributors. As a result, embedding information about the original producer and distributor in digital images and video attracted great attention for digital right management. Watermarking provides the facility to embed the required information in images and videos. Robust watermarking is used for embedding authentication information and hence should be robust against various attacks. On the other hand, in fragile watermarking the embedded data should be destroyed by any alteration in the watermarked image or video. Reversible digital watermarking techniques are proposed for lossless restoration of the original image from the watermarked image. Watermarking is non-blind when a copy of the signature or other related information is required for extracting the signature from the watermarked image or video and is blind when the signature can be extracted from watermarked data without any other subsidiary information. Watermarking the signature in a group of successive frames of a video file by the use of 3-D transforms attracted attention because it makes the watermarked video more robust against attacks such as frame averaging and alteration, and watermarking by 3-D transform is employed as a solution to the problems caused by independent watermarking of signature in one or several frames.Methods: Contourlet transform offers a high degree of directionality and anisotropy besides the multi-scale and time-frequency localization properties in wavelet transform. As a result, Contourlet transforms the representation of curved edges in the images with smoother contour and fewer coefficients compared to the wavelet transform. In this paper, a blind robust watermarking method based on a hybrid 3-D transform is proposed. The hybrid 3-D transform is derived by employing the 2-D Contourlet transform along with the 1-D wavelet transform. The signature will be watermarked in the low-frequency sub-band derived from the third level transform. To watermark the signature, we save a modified copy of the high energy coefficients of the even part in the odd part. For signature extraction, the watermarked region is partitioned into odd and even columns. The 3-level 3-D is applied to odd and even parts to transform coefficients. The high-energy sub-bands in odd and even parts are separated to extract the signature.Results: Experimental results indicate low degradation of the quality of the watermarked video, along with high robustness of the watermarked video against common attacks in comparison with other tested blind video watermarking methods.Discussion: A comparison of the proposed method with other methods indicates the superior performance of the proposed method in most of the attacks.
[1] |
Alper Koz, George A. Triantafyllidis, A. Aydin Alatan, "3D Watermarking: Techniques and Directions," in Three-Dimensional Television, Springer Berlin Heidelberg, 2008, pp. 427-470. |
[2] |
S. Lian, Y. Zhang, H. J. Park and P. Kitsos, "Secure Multimedia Communication," SECURITY AND COMMUNICATION NETWORKS, p. 437–440, 2008. |
[3] |
N. Narawade and R. Kanphade, "Reversible Watermarking: A Complete Review," International Journal of Computer Science and Telecommunications, vol. 2, no. 3, pp. 46-50, June 2011. |
[4] |
S. Iftikhar, M. Kamran and Z. Anwar, "A survey on reversible watermarking techniques for relational databases," SECURITY AND COMMUNICATION NETWORKS, vol. 8, no. 15, p. 2580–2603, October 2015. |
[5] |
L. Yang, Q. Chen, J. Tian and D. Wu, "Robust Track-and-Trace Video Watermarking," SECURITY AND COMMUNICATION NETWORKS, vol. 5, no. 4, p. 353–363, April 2012. |
[6] |
A. Sadik, M. Al-Taweel and P. Sumari, "Robust Video Watermarking Based On 3D-DWT Domain," in TENCON 2009-2009 IEEE Region 10 Conference, 2009. |
[7] |
Z. Huai-yu, L. Ying and W. Cheng-ke, "A Blind Spatial-temporal Algorithm Based on 3D Wavelet for Video Watermarking," in Multimedia and Expo, 2004. ICME'04. 2004 IEEE International Conference on, 2004. |
[8] |
Y. Li, X. Gao and H. Ji, "A 3D Wavelet Based Spatial-Temporal Approach for Video Watermarking," in Computational Intelligence and Multimedia Applications, 2003. ICCIMA 2003. Proceedings. Fifth International Conference on IEEE, 2003. |
[9] |
W. Y. P. Lei, "Video watermarking algorithm based on spatial domain contourlet-temporal wavelet transform," Journal Of Electronic Measurement And Instrument, vol. 24, no. 12, pp. 1088-1094, 2010. |
[10] |
A.Essaouabi, E.Ibnelhaj, "A 3D Wavelet -Based Method for Digital Video Watermarking," in Networked Digital Technologies, 2009. NDT '09. First International Conference on IEEE, 2009. |
[11] |
D. Pu, L. Yinghua and D. Jiangyan, "Video Watermarking Approach Based on Temporal Difference And Discrete Wavelet Transform," in Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, 2010. |
[12] |
Y. G. Fu, "Robust Video Watermarking Scheme based on 3D DCT," in Computer Application and System Modeling (ICCASM), 2010 International Conference on, 2010. |
[13] |
Yubo Zhang, Hongbo Bi, "A Robust Blind Video Watermarking Scheme in the 3D-DCT Domain," in 2011 International Conference in Electrics, Communication and Automatic Control Proceedings, Springer New York, 2012, pp. 1009-1015. |
[14] |
B. R. GAURAV BHATNAGAR, "Wavelet packet transform-based robust video watermarking technique," Indian Academy of Sciences, vol. 37, no. 3, p. 371–388, June 2012. |
[15] |
S.Ranjbar, F.Zargari, et al, "A highly robust two-stage Contourlet-based digital image watermarking method," Elesevier Signal Processing: Image Communication, p. 1526–1536, November 2013. |
[16] |
A. Woiselle, J.-L. Starck, J. Fadili, "3D curvelet transforms and astronomical data restoration," Applied and Computational Harmonic Analysis, vol. 28, p. 171–188, 2010. |
[17] |
D. N. babu and D. Jagadeesh, "A Blind and Robust Video Watermarking Technique in DCT Domain," International Journal of Engineering and Innovative Technology, vol. 2, no. 2, pp. 128-132, August 2012. |
[18] |
A. Mansouri, A. Mahmoudi Aznaveh, F. Torkamani-Azar and F. Kurugollu, "A Low Complexity Video Watermarking in H.264 Compressed Domain," IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, Vols. VOL. 5, NO. 4, pp. 649-657, december 2010. |
[19] |
S.Sinha; et al, "Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis," in Digital video watermarking using discrete wavelet transform and principal component analysis, 2011. |
[20] |
G. Kasana, K. Singh and S. Singh Bhatia, "Block-Based High Capacity Multilevel Image Steganography," Journal of Circuits, Systems, and Computers, vol. 25, p. 21, 2016. |
[21] |
MOHAMED S. YASEIN and PAN AGATHOKLIS, "A WAVELET-BASED BLIND IMAGE DATA EMBEDDING ALGORITHM," Journal of Circuits, Systems, and Computers, vol. 17, pp. 107-122, 2008. |
[22] |
O. S. F. Allah, "Efficient video watermarking based on singular value decomposition in the discrete wavelet," International Journal of Electronics and Communications, March 2013. |
_||_