1 Introduction

In recent years, the dissemination and exchange of digital products become more convenient, the piracy problem is growing seriously. Therefore, it is very urgent to the copyright protection of multimedia content. As an important branch of information hiding, digital watermarking technology plays an irreplaceable role in the information security field. Robust digital watermarking technology has good application value in related fields of digital content protection, such as the pirate and copyright protection, copy control.

The current digital watermarking methods, whether the spatial domain watermarking algorithm, or the frequency domain watermarking algorithm, is to embed the watermarking by modifying the image information, which will lead to a certain amount of image distortion. We often reduce the watermark strength to ensure that the watermark is not visible, which will affect algorithm’s robustness. In order to avoid image distortion, Wen quan [10] proposed the concept of zero watermarking, namely the use of important information to construct the watermark, but not modify any content of image. In addition, different carrier generate different watermarking, unlike that conventional watermark has a specific content, so it is necessary to establish the zero watermark database to store the watermark information. Although zero watermarking can solve the imperceptibility problem, how to find the important features of the image to construct zero watermarking has become the focus of research. The use of high order cumulant and the most significant bit to construct zero watermark, can effectively improve the robustness of the watermark against conventional attacks, but the ability to resist geometric attacks is greatly reduced. Niu Wanhong, Yan Huiqin proposed a zero watermarking algorithm based on the highest effective bit [9]. Due to the high image plane for image sensory quality has played a major role, low impact on the visual effect of image plane is small, so the selection of images of high information construct zero-watermark has certain robustness. Zhou constructs water key through the use of low frequency component obtained by Contourlet transform on the original video [17]. It can resist compression attacks well, but it is poor to the rotation attacks. Xu [11] presents a video zero watermarking algorithm based on Zernike moment, it can be very good to resist rotation attacks, but the algorithm is complex and large amount of calculation.

For the zero watermarking algorithm, the key point of the study is to extract the features characterizing the works in the digital works, and thus to construct a robust zero watermarking. In order to improve the ability to resist the attacks of watermarking, especially geometrical attack, this paper uses DWT and DCT dual transform domain to obtain the key feature information as zero watermarking, and do log-polar transform on the watermarking to resist the rotation attack.

2 Related technology

2.1 Discrete wavelet transform

Discrete wavelet transform, is a branch of science which is developed based on Fourier transform [3]. Since wavelet transform appeared, it replaced the Fourier transform position with analysis of its multi scale refinement. Fourier transform is the reflection of the frequency characteristics of the signal all the time, not information in any local time. The wavelet transform is the local transformation of time and frequency. It can be a function or signal multi-scale and multi-resolution analysis by translation and dilation operation [15], solving a lot of problems.

Wavelet transform has the multi-resolution characteristics well, interval wavelet support is not the same size square. The basic idea of DWT transform in image processing is the image multi-resolution decomposition. The image is decomposed into two parts, the low frequency and high frequency. The original carrier signal will be 4 parts through a layer of wavelet decomposition, namely, a low frequency part and three high frequency parts [7, 16]. If we decompose into two layers to the low frequency part after one layer wavelet decomposition, then will get 4 sub-band parts, and so on, we will get multi-level wavelet decomposition coefficients through multiple decomposition. The low frequency sub-band part contains most of the information carrier, and the high frequency part can be divided into horizontal (HL), vertical (LH), and diagonal (HH) in three directions, this part describes the detail information carrier in three directions. The image of the two layer wavelet decomposition principle as shown in Fig. 1.

Fig. 1
figure 1

Schematic diagram of two-layer wavelet decomposition

In the zero watermarking algorithms, generally we choose the low frequency coefficient to construct watermark [12], as it contains most of the energy of the original image. The watermark constructed by this method is robust against common attacks.

2.2 Discrete cosine transform

DCT transform is orthogonal transform based on real; it avoids the complex computation of discrete Fourier transform. The transformation is one of the core lossy image compression systems.

A pixel s(x, y) in image size of N × N DCT transform as shown in (1) [1]:

$$ S\left(u,v\right)=\frac{2}{N}c(u)c(v){\displaystyle \sum_{x=0}^{N-1}{\displaystyle \sum_{y=0}^{N-1}s\left(x,y\right) \cos \left(\frac{\pi u\left(2x+1\right)}{2N}\right) \cos \left(\frac{\pi v\left(2y+1\right)}{2N}\right)}} $$
(1)

Inverse discrete cosine transform as shown in (2):

$$ s\left(x,y\right)=\frac{2}{N}{\displaystyle \sum_{u=0}^{N-1}{\displaystyle \sum_{v=0}^{N-1}c(u)c(v)S\left(u,v\right) \cos \left(\frac{\pi u\left(2x+1\right)}{2N}\right)}} \cos \left(\frac{\pi v\left(2y+1\right)}{2N}\right) $$
(2)

Where

$$ c(u)=c(v)=\left\{\begin{array}{l}\frac{1}{\sqrt{2}},\kern1em u=0,v=0\\ {}1,\kern2.25em u,v=1,2,\dots N-1\end{array}\right. $$

Given the image information s(x, y), there are two ways of its DCT transform. One of is the image s(x, y) as a two-dimensional signal, directly on the DCT transform; another kind is consistent with JPEG compression standard, first divides the image into 8 × 8 block, then for each block DCT transform. No matter for which block DCT transform, we will get DC coefficients and AC coefficients [5, 8]. DC coefficients belong to the low frequency part, it focuses on the maximum energy of the block [2, 4], and AC coefficients belong to the high frequency part.

In the zero watermarking algorithms, generally we choose the low frequency coefficient to construct watermark. As this part concentrates most of the energy of the original image, the general image processing and non-malicious compression will not change this part. So the watermark has good robustness.

2.3 The log-polar transform

The log-polar transform expresses a kind of transform image description. Descartes coordinates represents the scene plane coordinate position, as shown in Fig. 2. The log-polar transformation coordinates position, as shown in Fig. 3.

Fig. 2
figure 2

Descartes coordinate

Fig. 3
figure 3

Log-polar coordinate

Descartes coordinate plane: z = x + yi

Log-polar coordinate plane: § = lnr,ψ = θ

Where r2 = x2 + y2,θ = arctan(y/x)

Log-polar coordinates has two very important properties. In the axial the scale changes into log-polar lower translation. For example, a target takes the fixation as the center to amplify k times. Transform formula is as follows:

$$ {\xi}_1= \ln \left(k\cdot \rho \right)= \ln (k)+ \ln (r)= \ln (k)+\xi $$
(3)

Among them, ξ,ξ1 represent Y-axis in log-polar coordinate before and after the longitudinal. Equation (3) shows that the equivalent mapping moves down ln(k) units, target rotates L radian around the fixation point.

$$ {\psi}_1=\psi +L $$
(4)

Among them, ψ,ψ1 represent X-axis in log-polar coordinate before and after the rotation. Equation (4) shows that the equivalent mapping image moves to the right L units. The two features is called distance invariability and angle invariance [6]. Namely it makes rotation and scaling in Cartesian coordinates convert into cyclic shift [13]. In the watermarking algorithm, we can use this property to resist rotation attacks.

3 Video zero watermarking algorithm

3.1 The zero watermarking generation algorithm

At present, many watermarking algorithms are using in dual transformed domains for their robustness. As different transform domain combination has different processing effect on the carrier in 3D spatial data to process the video files. We combined the above two kind of transformation by using 2D DWT and 3D DCT method, then added the log-polar transform to generate zero watermarking. The more detail steps are described as bellows. Figure 4 shows the watermark generating flow chart in our method.

Fig. 4
figure 4

Watermark generating flow chart

  1. Step 1.

    Reading the original video data, while selecting the key frames from the original video, then group these frames according to the size of N;

  2. Step 2.

    2D DWT transform for each frame of each group;

  3. Step 3.

    Divide each group of each frame of the low frequency LL coefficients into 8*8 block size;

  4. Step 4.

    3D DCT transform for each block, and get DC coefficients matrix;

  5. Step 5.

    Log polar transform to the DC coefficients and get the LPM image;

  6. Step 6.

    Generate sequence A{A1, A2,…AM}and B{B1, B2,…BM} whose range within the [0.1/2n] by K1 and K2, this is Logistic Map Encryption [14];

  7. Step 7.

    As the range of the elements in the sequence between [0.1], take Ai = R × Ai, Bi = R × Bi, (i = 1.2, …,M) where R is the size of the low frequency domain. We can ensure the position of the selection distribution in the low frequency domain;

  8. Step 8.

    Calculate {LLRA1-LLRB1, LLRA2-LLRB2,…LLRAi-LLRBi} according to the generated structural points sequence and get the difference sequence Y{Y1,Y2…Yi};

  9. Step 9.

    In accordance with Yi ≤ 0,W = 0;Yi > 0,W = 1 to generate 0.1 matrix;

  10. Step 10.

    Make the CS image and the generated 0.1 matrix do logical XOR operation, generating registered zero watermarking.

3.2 The zero watermarking detection algorithm

The detection processing is similar to the generation processing as in the former section. It is performed the same procedure to generate zero watermarking, and then operated logical XOR operation with registered watermarking to get the original watermark. The detecting procedure is shown in Fig. 5.

Fig. 5
figure 5

Watermark detecting flow chart

  1. Step 1.

    Reading the original video data, while selecting the key frames from the original video, then group these frames according to the size of N;

  2. Step 2.

    2D DWT transform for each frame of each group;

  3. Step 3.

    Divide each group of each frame of the low frequency LL coefficients into 8 × 8block size;

  4. Step 4.

    3D DCT transform for each block, and get DC coefficients matrix;

  5. Step 5.

    Log polar transform to the DC coefficients and get the LPM image;

  6. Step 6.

    Generate sequence A{A1, A2,…AM}and B{B1, B2,…BM} whose range within the [0.1/2n] by K1 and K2, this is Logistic Map Encryption;

  7. Step 7.

    As the range of the elements in the sequence between [0.1], take Ai = R × Ai, Bi = R × Bi, (i = 1.2, …,M) where R is the size of the low frequency domain. We can ensure the position of the selection distribution in the low frequency domain;

  8. Step 8.

    Calculate {LLRA1-LLRB1, LLRA2-LLRB2,…LLRAi-LLRBi} according to the generated structural points sequence and get the difference sequence Y{Y1,Y2…Yi};

  9. Step 9.

    In accordance with Yi ≤ 0,W = 0;Yi > 0,W = 1 to generate 0.1 matrix;

  10. Step 10.

    Remove the watermark from the registration database, by using the Boolean XOR and generated 0.1 matrix, to obtain original watermark.

4 The results and analysis of experiments

To evaluate the performance of our method, we carried out the experiments using Matlab 2010. We prepared the 100 uncompressed video files with the size of 320 × 240 and the binary image with the size of 20 × 15 as the watermark.

To verify the effectiveness of the algorithm, we selected video files that have rich high-frequency information (number 2 and 4), rich low-frequency information (number 5 and 7) and uniform distributed information (number 1.3 and 6). Table 1 shows the watermark generation and detection results without attacks.

Table 1 Effect diagram of watermark generating and detecting

To verify the robustness of our algorithm, we also carried out the attack experiments such as the Gauss noise, salt and pepper noise, rotation, frame exchange, frame loss, compression and other attacks.

4.1 Gaussian noise attacks

To demonstrate the robustness of this algorithm against Gaussian attacks, this paper made Gaussian attacks experiments. The results are shown in table 2.

Table 2 Extracted results of Gaussian noise attacks

The results of Table 2, the more noise strength is the lower, video quality. Though in distorted video image, we can still extract identifiable watermark. It means that the algorithm has good robustness to Gaussian noise attacks.

4.2 Salt & pepper noise attacks

Our experimental results against Salt & pepper attacks are shown in table 3.

Table 3 Extracted results of salt & pepper noise attacks

As see in Table 3, we can still detect the watermark well in the density of 0.5. It can be seen that the algorithm has good robustness against the Salt & pepper attacks.

4.3 Low-pass filtering attacks

To show the robustness of this algorithm against low-pass filtering attacks, we performed low-pass filtering attacks experiments. The results are shown in the Table 4.

Table 4 Extracted results of low-pass filtering attacks

As see in Table 4, we can observe that the video files are burred after low-pass filtering attacks. But our method can still extract the watermark. It shows that the algorithm is robust against low-pass filtering attacks.

4.4 Rotation attacks

To show the robustness of this algorithm against rotation attacks, we performed rotation attack experiments. The rotation angles are 10°, 45° and 60°. The results are shown in the Table 5.

Table 5 Extracted results of rotation attacks

From Table 5, we can see that this algorithm can effectively detect the watermark after log-polar transform. It proves that the algorithm has good robustness to rotation attacks.

4.5 Frame attacks

Frame attack is a common to the video watermarking attack. Exchanging the position of frames, or deleting some frames, are not easy to be perceived. To show the robustness of this algorithm against frame attacks, we performed frame attack experiments. The results are shown in the Table 6.

Table 6 Extracted results of frame attacks

In Table 6, we can see that whether exchanging the frames or loss of frames, we can detect the watermark with completely and accurately.

4.6 Compression attacks

Coding is the most basic way to handle video files. At present, the most commonly used compression method is MPEG-4 standard. The video is compressed, information may be lost, which is likely to destroy the watermark. To demonstrate the robustness of this algorithm against compression attacks, this paper made compression attacks experiments. The results are shown in table 7.

Table 7 Extracted results of compression attacks

From Table 7, we can see that we can still extract the watermark after compression attacks. So the algorithm can resist compression attacks well.

4.7 Comparison and analysis of the algorithm performance

In order to further verify the robustness of the algorithm, this article has carried on the contrast experiment with the literature [11, 17]. Below are the results.

From Fig. 6, we can see, compared with other two kinds of algorithms, this algorithm has strong robustness in resistance against, especially for the rotation attacks.

Fig. 6
figure 6

Comparison of experimental results

5 Conclusion

This paper proposed a video zero watermarking algorithm based dual transform domain and log-polar transform. We took the key features of video by using the dual transform domain as watermark, and then performed log-polar transform for the watermarking. In order to evaluate the performance of the proposed method, we performed the experiments with respect to robustness against several of attacks, such as adding Gaussian noise, rotation, low-pass filtering and compression. The results show that this algorithm not only can resist conventional attacks, but also is robust against geometric attacks. The bit error rates for Gaussian noise, salt and pepper noise, low-pass filtering, frame and compression attacks are less than or equal to 0.02, 0.03, 0.01, 0.06, 0.00 and 0.02 respectively.

In further studies, we should apply our method to different types of files to prove the validity of the algorithm, through the objective analysis of some performance evaluation index and experiment the different types of attacks, such as noise attack, rotation attack, cropping attack, frame attack to verify robustness.