Efficient Watermark Embedding and Extracting in Raw Digital Video: Leveraging the Least Significant Bit Technique in the Spatial Domain

Authors

  • Hajar Maseeh Yasin Duhok Polytechnic University, Technical College of Informatics/Akre, Duhok, Kurdistan Region, Iraq
  • Amira B. Sallow Duhok Polytechnic University, Technical College of Administration, Duhok, Kurdistan Region, Iraq
  • Riyadh Zaghlool Mahmood University of Mosul, Computer Science, Mosul, Iraq

Keywords:

Watermark, Digital Video Watermarking, Least Significant Bit (LSB), Least Significant Nibble (LSN), Uncompressed Video, Spatial Domain

Abstract

With the emergence of the internet, digital media creators have been able to distribute their works by making them available on web pages or public chatting forums. The person with permission to access these pages or forums can copy these media, modify them, and get an identical original copy. Using digital content has shown various issues, like how authors can ensure the copyright of their works. Additional information has been included with multimedia to protect the media before distribution. This research proposed a new method for embedding watermarks in colored videos in the spatial domain. The embedding and extracting process of the watermark is based on the principle of probability. The embedding process occurs in the Least Significant bit (LSB) of the pixel, determined by the probability of whether the number of “1” in the least Significant Nibble (LSN) of the pixel is even or odd. If it's even, and the watermark bit is “1”, the second bit of the pixel will be complemented; otherwise, the pixel remains unchanged. If it's odd, and the watermark bit is 0, the complement will be done on the second bit; otherwise, there is no change. To preserve imperceptibility and quality, this process applies to all video frames, specifically in the blue channel. After undergoing proposed attacks, watermark extraction from the video is also based on the probability principle. It involves collecting even LSNs and comparing them with the total number of pixels in one block. If the sum exceeds the total count of pixels in the block, the extracted bit is 0; otherwise, it's 1. The effectiveness of the proposed algorithm is demonstrated by obtaining optimal values for quality metrics like PSNR, SSIM, and MSE. Regarding robustness, the Normalized Cross-Correlation (NCC) metric is used, yielding highly favorable results that showcase the algorithm's strength and ability to extract watermarks after various attacks, such as distortion and geometric attacks like cropping and resizing. This system is perfect in terms of Imperceptibility, Data Payload, Computational Complexity, Computational Time and Error Probability.

Downloads

Download data is not yet available.

References

N. Zermi, A. Khaldi, R. Kafi, F. Kahlessenane, and S. Euschi, "A DWT-SVD based robust digital watermarking for medical image security," Forensic science international, vol. 320, p. 110691, 2021.

A. Mohanarathinam, S. Kamalraj, G. Prasanna Venkatesan, R. V. Ravi, and C. Manikandababu, "Digital watermarking techniques for image security: a review," Journal of Ambient Intelligence and Humanized Computing, vol. 11, pp. 3221-3229, 2020.

A. Fkirin, G. Attiya, A. El-Sayed, and M. A. Shouman, "Copyright protection of deep neural network models using digital watermarking: a comparative study," Multimedia Tools and Applications, vol. 81, pp. 15961-15975, 2022.

R. Munir, "A secure fragile video watermarking algorithm for content authentication based on Arnold Cat Map," in 2019 4th International Conference on Information Technology (InCIT), 2019, pp. 32-37.

B. Aditya, U. Avaneesh, K. Adithya, A. Murthy, R. Sandeep, and B. Kavyashree, "Invisible semi-fragile watermarking and steganography of digital videos for content authentication and data hiding," International Journal of Image and Graphics, vol. 19, p. 1950015, 2019.

M. Zairi, T. Boujiha, and A. Ouelli, "Secure fragile watermarking based on Huffman encoding and optimal embedding strategy," Indonesian Journal of Electrical Engineering and Computer Science, vol. 29, pp. 1132-1139, 2023.

H. Ding, R. Tao, J. Sun, J. Liu, F. Zhang, X. Jiang, et al., "A compressed-domain robust video watermarking against recompression attack," IEEE Access, vol. 9, pp. 35324-35337, 2021.

N. Aissaoui, R. Kaibou, and M. S. Azzaz, "Real-Time FPGA Implementation of Digital Video Watermarking Techniques using Co-Design Approach: Comparative Study," in 2022 7th International Conference on Image and Signal Processing and their Applications (ISPA), 2022, pp. 1-6.

F. Cao, T. Wang, D. Guo, J. Li, and C. Qin, "Screen-shooting resistant image watermarking based on lightweight neural network in frequency domain," Journal of Visual Communication and Image Representation, vol. 94, p. 103837, 2023.

E. Farri and P. Ayubi, "A robust digital video watermarking based on CT-SVD domain and chaotic DNA sequences for copyright protection," Journal of Ambient Intelligence and Humanized Computing, pp. 1-25, 2022.

M. Bistroń and Z. Piotrowski, "Efficient Video Watermarking Algorithm Based on Convolutional Neural Networks with Entropy-Based Information Mapper," Entropy, vol. 25, p. 284, 2023.

Q. Liu, S. Yang, J. Liu, L. Zhao, P. Xiong, and J. Shen, "An efficient video watermark method using blockchain," Knowledge-Based Systems, vol. 259, p. 110066, 2023.

A. Bhaskar, C. Sharma, K. Mohiuddin, A. Singh, O. A. Nasr, and M. Alwetaishi, "A robust video watermarking scheme with squirrel search algorithm," Comput. Mater. Continua, vol. 71, pp. 3069-3089, 2022.

V. Adul and E. Mwangi, "A robust video watermarking approach based on a hybrid SVD/DWT technique," in 2017 IEEE AFRICON, 2017, pp. 309-313.

A. Karmakar, A. Phadikar, B. S. Phadikar, and G. K. Maity, "A blind video watermarking scheme resistant to rotation and collusion attacks," Journal of king saud university-computer and information sciences, vol. 28, pp. 199-210, 2016.

S. Lagzian, M. Soryani, and M. Fathy, "A new robust watermarking scheme based on RDWT-SVD," International Journal of Intelligent Information Processing, vol. 2, pp. 22-29, 2011.

P. Yang, Y. Lao, and P. Li, "Robust watermarking for deep neural networks via bi-level optimization," in Proceedings of the IEEE/CVF International Conference on Computer Vision, 2021, pp. 14841-14850.

A. Shehab, M. Elhoseny, K. Muhammad, A. K. Sangaiah, P. Yang, H. Huang, et al., "Secure and robust fragile watermarking scheme for medical images," IEEE access, vol. 6, pp. 10269-10278, 2018.

X. Zhang and S. Wang, "Fragile watermarking with error-free restoration capability," IEEE Transactions on Multimedia, vol. 10, pp. 1490-1499, 2008.

L. Rakhmawati, W. Wirawan, and S. Suwadi, "A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability," EURASIP Journal on Image and Video Processing, vol. 2019, pp. 1-22, 2019.

K. Sreenivas and V. Kamkshi Prasad, "Fragile watermarking schemes for image authentication: a survey," International Journal of Machine Learning and Cybernetics, vol. 9, pp. 1193-1218, 2018.

F. M. Khalifa and M. G. Saeed, "Image Watermarking Using All Phase Discrete Cosine Biorthogonal Transform in Selected Pixel Blocks," Polytechnic Journal, vol. 10, pp. 68-73, 2020.

P. Lefèvre, P. Carré, C. Fontaine, P. Gaborit, and J. Huang, "Efficient image tampering localization using semi-fragile watermarking and error control codes," Signal Processing, vol. 190, p. 108342, 2022.

L. Agilandeeswari, M. Prabukumar, and F. A. Alenizi, "A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication," Multimedia Tools and Applications, pp. 1-53, 2023.

N. Sivasubramanian and G. Konganathan, "A novel semi fragile watermarking technique for tamper detection and recovery using IWT and DCT," Computing, vol. 102, pp. 1365-1384, 2020.

A. Hammami, A. Ben Hamida, and C. Ben Amar, "Blind semi-fragile watermarking scheme for video authentication in video surveillance context," Multimedia Tools and Applications, vol. 80, pp. 7479-7513, 2021.

Q. Su, D. Liu, Z. Yuan, G. Wang, X. Zhang, B. Chen, et al., "New rapid and robust color image watermarking technique in spatial domain," IEEE Access, vol. 7, pp. 30398-30409, 2019.

W. Wan, J. Wang, Y. Zhang, J. Li, H. Yu, and J. Sun, "A comprehensive survey on robust image watermarking," Neurocomputing, vol. 488, pp. 226-247, 2022.

Z. Yuan, Q. Su, D. Liu, and X. Zhang, "A blind image watermarking scheme combining spatial domain and frequency domain," The visual computer, vol. 37, pp. 1867-1881, 2021.

P. Venugopala, H. Sarojadevi, N. N. Chiplunkar, and V. Bhat, "Video watermarking by adjusting the pixel values and using scene change detection," in 2014 Fifth International Conference on Signal and Image Processing, 2014, pp. 259-264.

V. Bánoci, M. Broda, G. Bugár, and D. Levický, "2D-Spread spectrum watermark framework for multimedia copyright protection," in 2014 24th International Conference Radioelektronika, 2014, pp. 1-4.

R. Al-janabi, "A New Digital Watermarking Algorithm Based on Image Comparison Technique," Int.J.Computer Technology & Applications, vol. 6, pp. 7-11, 2015.

J. Upadhyay, B. Mishra, and P. Patel, "A modified approach of video watermarking using DWT-BP based LSB algorithm," in 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC), 2017, pp. 1-6.

N. F. Hassan and R. Abbas, "Proposed video watermarking algorithm based on edge or corner regions," Engineering and Technology Journal, vol. 36, pp. 25-32, 2018.

H. Marmolin, "Subjective MSE measures," IEEE transactions on systems, man, and cybernetics, vol. 16, pp. 486-489, 1986.

S. Winkler and P. Mohandas, "The evolution of video quality measurement: From PSNR to hybrid metrics," IEEE transactions on Broadcasting, vol. 54, pp. 660-668, 2008.

U. Sara, M. Akter, and M. S. Uddin, "Image quality assessment through FSIM, SSIM, MSE and PSNR—a comparative study," Journal of Computer and Communications, vol. 7, pp. 8-18, 2019.

Z. Jalil, M. A. Jaffar, and A. M. Mirza, "A novel text watermarking algorithm using image watermark," International Journal of Innovative Computing, Information and Control, vol. 7, 2011.

M. Alghoniemy and A. H. Tewfik, "Geometric distortion correction in image watermarking," in Security and Watermarking of Multimedia Contents II, 2000, pp. 82-89.

Diniesh, V. C. ., Prasad, L. V. R. C. ., Bharathi , R. J. ., Selvarani, A., Theresa, W. G. ., Sumathi, R. ., & Dhanalakshmi, G. . (2023). Performance Evaluation of Energy Efficient Optimized Routing Protocol for WBANs Using PSO Protocol. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 116–121. https://doi.org/10.17762/ijritcc.v11i4s.6314

Moore, B., Clark, R., Martinez, J., Rodriguez, A., & Rodriguez, L. Anomaly Detection in Internet of Things (IoT) Data Streams. Kuwait Journal of Machine Learning, 1(4). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/151

Kamble, S.D., Saini, D.K.J.B., Jain, S., Kumar, K., Kumar, S., Dhabliya, D. A novel approach of surveillance video indexing and retrieval using object detection and tracking (2023) Journal of Interdisciplinary Mathematics, 26 (3), pp. 341-350.

Downloads

Published

03.09.2023

How to Cite

Maseeh Yasin, H. ., B. Sallow, A. ., & Mahmood, R. Z. . (2023). Efficient Watermark Embedding and Extracting in Raw Digital Video: Leveraging the Least Significant Bit Technique in the Spatial Domain. International Journal of Intelligent Systems and Applications in Engineering, 12(1s), 491–504. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3486

Issue

Section

Research Article