Review of Robust Video Watermarking Algorithms

Reading time: 6 minute
...

📝 Original Info

  • Title: Review of Robust Video Watermarking Algorithms
  • ArXiv ID: 1004.1770
  • Date: 2010-04-13
  • Authors: Researchers from original ArXiv paper

📝 Abstract

There has been a remarkable increase in the data exchange over web and the widespread use of digital media. As a result, multimedia data transfers also had a boost up. The mounting interest with reference to digital watermarking throughout the last decade is certainly due to the increase in the need of copyright protection of digital content. This is also enhanced due to commercial prospective. Applications of video watermarking in copy control, broadcast monitoring, fingerprinting, video authentication, copyright protection etc is immensely rising. The main aspects of information hiding are capacity, security and robustness. Capacity deals with the amount of information that can be hidden. The skill of anyone detecting the information is security and robustness refers to the resistance to modification of the cover content before concealed information is destroyed. Video watermarking algorithms normally prefers robustness. In a robust algorithm it is not possible to eliminate the watermark without rigorous degradation of the cover content. In this paper, we introduce the notion of Video Watermarking and the features required to design a robust watermarked video for a valuable application. We review several algorithms, and introduce frequently used key techniques. The aim of this paper is to focus on the various domains of video watermarking techniques. The majority of the reviewed methods based on video watermarking emphasize on the notion of robustness of the algorithm.

💡 Deep Analysis

Deep Dive into Review of Robust Video Watermarking Algorithms.

There has been a remarkable increase in the data exchange over web and the widespread use of digital media. As a result, multimedia data transfers also had a boost up. The mounting interest with reference to digital watermarking throughout the last decade is certainly due to the increase in the need of copyright protection of digital content. This is also enhanced due to commercial prospective. Applications of video watermarking in copy control, broadcast monitoring, fingerprinting, video authentication, copyright protection etc is immensely rising. The main aspects of information hiding are capacity, security and robustness. Capacity deals with the amount of information that can be hidden. The skill of anyone detecting the information is security and robustness refers to the resistance to modification of the cover content before concealed information is destroyed. Video watermarking algorithms normally prefers robustness. In a robust algorithm it is not possible to eliminate the water

📄 Full Content

Video Watermarking is a young and rapidly evolving field in the area of multimedia. Following factors have contributed towards the triggering of interest in this field. a) The society is contaminated by the tremendous piracy of digital data, as copying of digital media has become comparatively easy. b) This is an era where need has arise for fight against "Intellectual property rights infringements". c) Copyright protection must not be eroded due to malicious attacks d) Tampering of the digital data needs to be concealed at some point.

The requirement of secure communication and digital data transfer has potentially increased with the development of multimedia systems. Data integrity is not secure in image transfers [16]. The main technique used for protection of Intellectual Property rights and copyright protection is digital watermarking [1, 2, and 3]. The copyright data may be in the form of text [4] [5], image [6]- [9], audio [10], video [11][12][13][14][15]. Watermarking may be visible or invisible. Invisible watermarking implies that the presence of the watermark is barely discernible when the watermarked signal is displayed. Watermark embedding may bring in diminutive distortion into the audible or visible components of the watermarked signal. If the watermark cannot be easily removed from the watermarked signal even after applying common watermarking attacks then it is referred as robust embedding.

The basic components involved in robust watermarking are watermark embedding, attack, and watermark detection. In watermark embedding, a watermark signal (Text, image or audio etc) is constructed and then embedded into an original signal (Video in context with this paper) to produce the watermarked signal. Once embedding is done, the watermarked video can be subjected to various attacks. During watermark detection, the watermark detector is given a test signal that may be watermarked, attacked or not. The watermark detector reports whether the watermark is present or not on examining the signal at its input.

According to the grapevine, any image watermarking technique can be extended to watermark videos, but reality speaks that video watermarking techniques need to meet other challenges than that in image watermarking schemes. Basically, the watermarking technologies are classified in various domains like the spatial domain or temporal domain [17] [18] and the frequency domain [19][20][21][22].

This paper is organized six sections. The subsequent section explains the important aspects of video watermarking. Section III focuses the widespread applications of video watermarking .Section IV considers the robustness aspect by elaborating on the common attacks in video watermarking. The various domains of video watermarking are explored and a robust algorithm in each domain is considered in Section V. This is a vast section as has six main subsections dealing with spread spectrum domain, Spatial, DCT, DWT, Feature Domain and SVD domain of video watermarking. And a conclusion is presented in the last section.

Video watermarking embeds data in the video for the purpose of identification, annotation and copyright. A number of video watermarking techniques have been proposed. These techniques exploit different ways in order to embed a robust watermark and to maintain original video fidelity. Conventional encryption algorithms permit only authorized users to access encrypted digital data. Once such data are decrypted, however, there is no way in prohibiting its illegal copying and distribution.

Many algorithms for developing watermarks on images are extended for videos. But some points need to be considered during the extensions. a) Between the frames there exists a huge amount of intrinsically redundant data. b) There must be a strong balance between the motion and the motionless regions c) Strong concern must be put forth on real time and streaming video applications The following aspects are important for the design of video watermarking systems. a) Imperceptibility: The watermark embedding should cause as little degradation to the host video as possible. b) Robustness: The watermark must be robust to common signal processing manipulations and attempts to remove or impair the watermark. c) Security: The embedded information must be secure against tampering. d) Capacity: The amount of embedded information must be large enough to uniquely identify the owner of the video

The present section is completely devoted to the presentation of various applications in which digital watermarking can convey a precious hold up in the perspective of video. Digital video watermarking is used in a variety of applications. Various applications are elucidated in detail in [23]. Some major ones are a) Fingerprinting: In this technique the video is uniquely identified by its resultant fingerprint by software that recognizes extracts and then compresses distinguishing components of a video. Some of the features that are involv

…(Full text truncated)…

📸 Image Gallery

cover.png page_2.webp page_3.webp

Reference

This content is AI-processed based on ArXiv data.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut