Skip to main content

Advertisement

Log in

A robust and secure key-frames based video watermarking system using chaotic encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Currently we are facing a wide interest in multimedia security and copyright protection due to the explosion of data exchange in the Internet and the extensive use of digital media. In this paper, we propose a video watermarking method in which watermark information are encrypted using a new chaotic encryption, and then, embedded in the key-frames extracted from the video stream. Under this framework, a simple and fast key-frames extraction algorithm based on gradient magnitude similarity deviation (GMSD) is used. This algorithm can significantly decrease the complexity of video watermarking systems. In order to insert the watermark in a blind manner, new insertion and extraction functions are designed by means of a quantization process. A double transformation domain based on discrete wavelet transform (DWT) and singular value decomposition (SVD) is adopted to robustly embed the watermark with low visual distortion. Evaluation study is conducted to verify the performance through a series of experiments. The proposed system outperforms several recent algorithms found in the literature in terms of the robustness and imperceptibility under potential attacks. Furthermore, the security requirement of the proposed algorithm is achieved with the proposed chaotic encryption procedure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
€32.70 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (France)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Abdallah HA, Ghazy RA, Kasban H, Faragallah OS, Shaalan AA, Hadhoud MM, Dessouky MI, El-Fishawy NA, Alshebeili SA, Abd El-samie FE (2014) Homomorphic image watermarking with a singular value decomposition algorithm. Inf Process Manag 50(6):909–923

    Article  Google Scholar 

  2. Agilandeeswari L, Ganesan K (2016) A robust color video watermarking scheme based on hybrid embedding techniques. Multimed Tools Appl 75(14):8745–8780

    Article  Google Scholar 

  3. Avila SEF, Lopes APB (2011) VSUMM: a mechanism designed to produce static video summaries and a novel evaluation method. Pattern Recogn Lett 32(1):56–68

    Article  Google Scholar 

  4. Chen H, Zhu Y (2014) A robust video watermarking algorithm based on singular value decomposition and slope-based embedding technique. Multimed Tools Appl 71(3):991–1012

    Article  Google Scholar 

  5. Cisco visual networking index (2012) Forecast and methodology, 2011–2016, Cisco Systems Inc.

  6. Cox IJ, Miller ML, Bloom JA, Kalker T, Fridrich J (2008) Digital watermarking and steganography. Morgan Kaufmann

  7. Dang C, Radha H (2015) RPCA-KFE: key frame extraction for video using robust principal component analysis. IEEE Trans Image Proc 24(11):3742–53

    Article  MathSciNet  Google Scholar 

  8. Dawen X, Rangding W, Shi YQ (2014) Data hiding in encrypted h.264/AVC video streams by codeword substitution. IEEE Trans Inf Forensics Security 9(4):596–606

    Article  Google Scholar 

  9. Dutta T, Sur A, Nandi S (2013) Mcrd: motion coherent region detection in h.264 compressed video. In: Proceedings international conference on multimedia and expo (ICME). San Jose, CA, USA, pp 1–6

  10. Ejaz N, Mehmood I, Baik SW (2014) Feature aggregation based visual attention model for video summarization. Comput Electr Eng 40:993–1005

    Article  Google Scholar 

  11. El’Arbi M, Koubaa M, Charfeddine M, Ben Amar C (2011) A dynamic video watermarking algorithm in fast motion areas in the wavelet domain. Multimed Tools Appl 55(3):579–600

    Article  Google Scholar 

  12. Faragallah OS (2013) Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain. Int J Electron Commun (AEÜ) 67(3):189–196

    Article  Google Scholar 

  13. FIPS PUB 197 (2001) Advanced encryption standard. New York

  14. FIPS PUB 46 (1977) Data encryption standard

  15. Fu C, Chen JJ, Zou H, Meng WH, Zhan YF, Yu YW (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–2378

    Article  Google Scholar 

  16. Furini M, Geraci F, Montangero M, Pellegrini M (2010) STIMO: STILl and MOving video storyboard for the web scenario. Multimed Tools Appl 46(1):47–69

    Article  Google Scholar 

  17. Gaj S, Patel AS, Sur A (2016) Object based watermarking for h.264/AVC video resistant to rst attacks. Multimed Tools Appl 75(6):3053–3080

    Article  Google Scholar 

  18. Ganic E, Eskicioglu AM (2004) Robust DWT-SVD domain image watermarking: embedding data in all frequencies. In: Proceedings the workshop on multimedia and security (MM&Sec). Magdeburg, Germany, pp 166–174

  19. Himeur Y, Ait-Sadi K (2015) Joint color and texture descriptor using ring decomposition for robust video copy detection in large databases. In: Proceedings the 15th IEEE international symposium on signal processing and information technology (ISSPIT). Abu Dhabi, UAE, pp 495–500

  20. Himeur Y, Ait-Sadi K, Ouamane A (2014) A fast and robust key-frames based video copy detection using BSIF-RMI. In: Proceedings the 11th international conference on signal proceedings and multimedia application (SIGMAP). Vienna, Austria, pp 40–47

  21. Himeur Y, Boudraa B (2012) Secure and robust audio watermarking system for copyright protection. In: Proceedings the 24th international conference on microelectronics (ICM). Algiers, Algeria, pp 1–4

  22. Hu HT, Hsu LY (2015) Exploring DWT-SVD-DCT feature parameters for robust multiple watermarking against JPEG and JPEG2000 compression. Comput Electr Eng 41(1):52–63

    Article  Google Scholar 

  23. Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjustedSine map. Inf Sci 339:237–53

    Article  Google Scholar 

  24. Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94

    Article  Google Scholar 

  25. Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063

    Article  Google Scholar 

  26. Langelaar G, Setyawan I, Lagendijk RL (2000) Watermarking digital image and video data. A state-of-the-art overview. IEEE Signal Proc Mag 17(5):20–43

    Article  Google Scholar 

  27. Li Z, Chen XW, Ma J (2015) Adaptively imperceptible video watermarking based on the local motion entropy. Multimed Tools Appl 74(8):2781–2802

    Article  Google Scholar 

  28. Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90:2714–2722

    Article  MATH  Google Scholar 

  29. Lin W, Sun MT, Li H, Chen Z, Li W, Zhou B (2012) Macroblock classification method for video applications involving motions. IEEE Trans Broadcast 58(1):34–46

    Article  Google Scholar 

  30. Mishra A, Agarwal C, Sharma A, Bedi P (2014) Optimized gray-scale image watermarking using DWT–SVD and firefly algorithm. Expert Syst Appl 41(17):7858–7867

    Article  Google Scholar 

  31. Muhammad K, Sajjad M, Baik SW (2016) Dual-level security based Cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy. J Med Syst 40:114

    Article  Google Scholar 

  32. Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic LSB substitution method (m-LSB-SM) using multi-level encryption and achromatic component of an image. Multimed Tools Appl 75(22):14867–893

    Article  Google Scholar 

  33. Muhammad N, Bibi N (2015) Digital image watermarking using partial pivoting lower and upper triangular decomposition into the wavelet domain. IET Image Proc 9(9):795–803

    Article  Google Scholar 

  34. Mundur P, Rao Y, Yesha Y (2006) Keyframe-based video summarization using Delaunay clustering. Int J Digit Libr 6(2):219–232

    Article  Google Scholar 

  35. Preda RO, Vizireanu DN (2011) Robust wavelet-based video watermarking scheme for copyright protection using the human visual system. J Electron Imaging 20(1):13–22

    Article  Google Scholar 

  36. Ren J, Jiang J, Chen J (2009) Shot boundary detection in MPEG videos using local and global indicators. IEEE Trans Circuits Syst Video Techn 19(8):1234–1238

    Article  Google Scholar 

  37. Sarkar A, Singh V, Ghosh P, Manjunath B, Singh A (2010) Efficient and robust detection of duplicate videos in a large database. IEEE Trans Circuits Syst Video Techn 20(6):870–885

    Article  Google Scholar 

  38. Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92(5):1202–1215

    Article  Google Scholar 

  39. Shahid Z, Chaumont M, Puech W (2013) H.264/AVC video watermarking for active fingerprinting based on Tardos code. Signal Image Video Proc 7(4):679–694

    Article  Google Scholar 

  40. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715

    Article  MathSciNet  MATH  Google Scholar 

  41. Singh RT, Manglem Singh K, Roy S (2013) Video watermarking scheme based on visual cryptography and scene change detection. Int J Electron Commun (AEÜ) 67(8):645–651

    Article  Google Scholar 

  42. Sprott JC (2003) Chaos and time-series analysis. Oxford University Press, London

    MATH  Google Scholar 

  43. Stinson DR (2006) Cryptography: theory and practice. Chapman and Hall CRC, Boca Raton

    MATH  Google Scholar 

  44. Wu Y, Zhou Y, Noonan JP, Agaianc S (2014) Design of image cipher using latin squares. Inf Sci 264:317–339

    Article  MathSciNet  MATH  Google Scholar 

  45. Xiang-yang W, Yu-nan L, Shuo L, Hong-ying Y, Pan-pan N, Yan Z (2015) A new robust digital watermarking using local polar harmonic transform. Comput Electr Eng 46:403–418

    Article  Google Scholar 

  46. Xue W, Zhang L, Mou X, Bovik A (2014) Gradient magnitude similarity deviation: a highly efficient perceptual image quality index. IEEE Trans Image Proc 23(2):684–695

    Article  MathSciNet  MATH  Google Scholar 

  47. Xuemei J, Quan L, Qiaoyan W (2013) A new video watermarking algorithm based on shot segmentation and block classification. Multimed Tools Appl 62(3):545–560

    Article  Google Scholar 

  48. Yavuz E, Yazıcı R, Kasapbaşı MC, Yamaç E (2015) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471–483

    Article  Google Scholar 

  49. Youssef SM, Abou ElFarag A, Ghatwary NM (2014) Adaptive video watermarking integrating a fuzzy wavelet-based human visual system perceptual model. Multimed Tools Appl 73(3):1545–1573

    Article  Google Scholar 

  50. Youtube: Statistics, [online]. Available: http://www.youtube.com/yt/press/statistics.html

  51. Zhang M, Tong X (2014) A new chaotic map based image encryption schemes for several image formats Original. J Syst Softw 98:140–154

    Article  Google Scholar 

  52. Zhou G, Zhang D, Liu Y, Yuan Y, Liu Q (2015) A novel image encryption algorithm based on chaos and line map. Neurocomputing 169:150–157

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yassine Himeur.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Himeur, Y., Boukabou, A. A robust and secure key-frames based video watermarking system using chaotic encryption. Multimed Tools Appl 77, 8603–8627 (2018). https://doi.org/10.1007/s11042-017-4754-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4754-2

Keywords

Navigation