Keywords

1 Introduction

The security and unauthorized redistribution of digital contents are getting essential in the digital world. Recent advances in internet technology resulted in an increase in the utilization of the digital video. Hence, the digital data (video) can be shared, copied, distributed, and modified very easily [1, 2]. For the security of digital media in opposition to illegal distributions and manipulations, digital watermarking is being used [3, 4].

The uniqueness of digital media is obtained by extracting the embedded information. Watermarking can be used for many reasons, such as proof of ownership, copy control, broadcast monitoring, and authentication. [5, 6]. Visible watermark and an invisible watermark are two types of watermark. The invisible watermark gives more security to the multimedia like video, image, and document because human eye scan analyzes visible watermark so that attackers can attack without any difficulty on this by different attacks that may be geometric or non-geometric [7].

The watermark embedding, attack, and watermark detection are the essential components of robust watermarking [8]. Goal of watermark is to be robust enough to resist attacks, but not at the expense of altering the value of the multimedia data being protected. Digital video watermarking is achieved by inserting secret data in a video sequence to protect the video from unauthorized copying. Video string is still undisturbed with evenly time spaced images. Image data hiding methods can be applied for video watermarking as well, but video watermarking schemes require to face many challenges. Watermarked video is much sensible to plagiarize attacks, namely digital–analog conversion, frame interchanging, averaging of the frame, lossy compression, etc.

The rest of the paper is organized as follows. In Sect. 2, we explained related work done in digital video watermarking. Our proposed algorithm, with its block diagram, is explained in Sect. 3. The experimental results demonstrated in Sect. 4 followed by conclusion of the proposed work in the last section.

2 Related Work

Digital watermarking can be done using discrete cosine transform based on binary watermark technique [9] and QIM technique. Sridha and Arun [10] proposed a discrete wavelet transform (DWT) for security enhancement in video watermarking. Dual SVD and DWT based on selective pixel [11] give high robustness against multiple watermarking attacks. To achieve strong robustness against various signal processing operations, DWT- and PCA-based scheme is proposed [12]. DWT and PCA are used to hide the data in the digital video [13].

A digital watermarking system for video authentication using DMT is discovered by Monika et al. [14]. It presents multi-wavelet-based invisible watermarking. A hybrid DMT-SVD method is determined to be more reliable than the DWT method [15]. In [16], DWT-DCT-SVD is implemented on intravascular ultrasound (IVUS) video. Replacing biomedical signals among hospitals necessitates reliable and efficient communication. In this, binary watermark images embedded into intravascular ultrasound video. The whole video is divided into frames and application of DWT, DCT followed by SVD composes the watermark hiding technique.

Different existing video watermarking technologies based on DWT [17,18,19,20,21] and SVD [22,23,24] and their properties were studied to make it easier to select an appropriate technique which provides quantitative results. To increase the security and robustness of the watermark, some cases used combined or hybrid two frequency domains [25]. Based on DWT and DCT, for example, a watermark was embedded in a selected sub-band of the Y-component. The required perceptual quality of the video can be achieved by combining DWT with SVD [26]. The study proposed in [27] presented DWT- and DCT-based digital video watermarking using an invisible watermarking algorithm based on the spatial frequency domain. This paper presents a video watermarking technique using DWT-DFT-SVD, and watermark is embedded in YCbCr color space.

3 Proposed Algorithm

The robustness of the proposed model is improved by utilizing the features of DWT, DFT, and SVD technique. DFT is robust to Gaussian noise, shift invariance, JPEG compression, image sharpening and helps in noise removal. Inserting watermark using DWT enhances the robustness against attacks, and it retains the image quality. Any change in singular values does not affect the video quality, and singular values remain unchanged to attacks. The presented method consists of two sections, namely the watermark embedding process and extraction process.

3.1 Watermark Embedding Process

The process of embedding watermark in the video is depicted in Fig. 1, and steps are described as follows:

Fig. 1.
figure 1

Watermark embedding process

  1. S1

    The input video is divided into frames, and it is converted from RGB to YCbCr color space. The Y-component is used for watermark embedding process.

  2. S2

    2D-DWT (Haar wavelet) of single level is applied to the Y luma component. Four sub-bands, namely LL, LH, HL, and HH, are obtained. Out of which LL component is selected from total sub-bands.

  3. S3

    DFT is applied to LL component.

  4. S4

    To get an array of U, S, and V matrices of the video frame, SVD is performed on the output of DFT transformed LL component.

    $$ A = {\text{USV}}^{T} $$
    (1)
  5. S5

    The watermark video is converted from RGB to YCbCr color space. Here, again the Y luma component is used.

  6. S6

    The LL* component is selected after applying DWT on the Y-component.

  7. S7

    Complex valued Fourier transformed LL* component is achieved by applying DFT to LL* sub-band.

  8. S8

    To get U*, S*, and V* matrices, SVD is applied on the output component.

    $$ A = {\text{U}}*{\text{S}}*{\text{V}}*^{T} $$
    (2)
  9. S9

    Singular values of watermark embedded with singular values of every frame. The number of singular values to be embedded in each frame is equal to α scaling factor which concludes the power of watermark.

    $$ {\text{S}}_{W} = {\text{S}} + \alpha {\text{S}}* $$
    (3)
  10. S10

    Inverse SVD is applied on U, Sw, and V matrices to get the LLw component.

  11. S11

    Untransformed LLw is obtained by applying IDFT using magnitude and phase components.

  12. S12

    Watermarked Yw luma component is achieved by performing IDWT to LLw, LH, HL, and HH.

  13. S13

    RGB format conversion is done after combining Cb and Cr components to Yw component.

  14. S14

    Non-selected frames are combined with the watermarked frames to obtain the complete watermarked video sequence.

3.2 Watermark Extraction Process

The process of extraction watermark is depicted in Fig. 2, and steps are described as follows:

Fig. 2.
figure 2

Watermark extraction process

  1. S15

    Initially, watermarked video is split into frames and it is converted from RGB YCbCr color space. For the watermark extraction process, Yw component is selected.

  2. S16

    2D-DWT (Haar wavelet) of single level is used to the Yw component which is nothing but the luma component. Four sub-bands, namely LLw, LH, HL, and HH, are obtained. Out of which LLw component is selected from total sub-bands.

  3. S17

    DFT is applied to LLw component.

  4. S18

    To get an array of U, Sw and V matrices of the selected video frame, SVD is performed on the output of DFT transformed LLw part.

    $$ A_{W \, = } {\text{U S}}_{W} {\text{V}}^{T} . $$
    (4)
  5. S19

    Singular matrix (S*) of watermark can be achieved by the given equation,

    $$ {\text{S}}^{*} = {\text{S}}_{W} {-}{\text{S}}/\alpha . $$
    (5)
  6. S20

    To get the LL* component, ISVD is performed after combining S* matrix with U* and V* matrices.

  7. S21

    Untransformed LL* component is obtained by applying IDFT using magnitude and phase components.

  8. S22

    Unwatermarked Y*luma component is achieved by performing IDWT to LL*, LH*, HL* and HH*.

  9. S23

    RGB format conversion is done after combining Cb* and Cr* components to Y* component to obtain the original watermark.

4 Experimental Results

The experimentation of the presented approach is carried out using MATLAB 10. Six video samples were used having various resolutions with distinct format (.avi, .mov, .mp4, .mpg, .wmv). Color watermark with size 384 × 512 in.png format has been selected. Frame selection and embedding have done according to the proposed scheme.

Table 1 shows the original and watermarked video frames of different video samples. It describes that the watermarked and original frames are indistinguishable subjectively. Peak-signal-to-noise ratio (PSNR) is calculated to assure the security of the video. PSNR values are dependent on MSE.

Table 1. Original and watermarked frames of six different videos

Table 2 illustrates the extracted watermark images for all video samples without attack and after applying different attacks. From this, it is observed that the maximum correlation is obtained between the original and extracted watermark.

Table 2. Extracted watermark for six video samples

Normalized correlation for all video samples is compared and shown in Table 3. NC is used to measure the similarity between the original watermark image and extracted watermark image. The average normalized correlation (NC) of all videos is equal to 0.99, and it gets somewhat degrade for salt and pepper attack as well as for rotation attack. Vid.avi (720 × 1280) and Vid.mpg (480 × 640) give a very low value of NC, which is equal to 0.37 for cropping attack.

Table 3. Normalized correlation against attacks for different video frames

The robustness of the proposed algorithm is analyzed by applying different attacks on the video. Figure 3 demonstrates the PSNR with and without attacks for six different video samples, where I1—PSNR without attack, I2—Gaussian noise, I3—salt and pepper noise, I4—rotation attack, I5—cropping attack, I6—median filtering attack, I7—histogram equalization, I8—image sharpening.

Fig. 3.
figure 3figure 3

PSNR with and without attacks for different videos

The investigational outcomes have validated the proposed model in terms of improved NC and PSNR results by applying different attacks on videos.

Table 4 depicts the comparison analysis of the proposed work with the existing video watermarking techniques. It gives better results than the other methods. In present work, various videos of high-definition resolution are used with color watermark, and several attacks are applied to check the robustness. The given method achieved great PSNR in the range of 63–73 dB with NC value 0.99.

Table 4. Comparative analysis

5 Conclusion

The primary purpose of the work recognized so far is to give accurate and precise video watermarking. The algorithm is implemented DWT in conjunction with DFT transform and SVD, which is vital for achieving better security. A color watermark has been embedded into the original video. Without much loss of data and features of the host video, inserting color watermark in the low-frequency sub-band helps to improve the robustness of embedding procedure. The proposed algorithm is imperceptible and robust against several attacks, and the value of PSNR (more than 60 dB) and NC (0.99) is measured high. There are some ways to be discovered for future work. An alternate watermark can be used, such as audio or video for embedding process to check the robustness of video watermarking. The implementation of this algorithm can be done using VHDL to address the hardware efficiency of this work.