CFP last date
20 January 2025
Reseach Article

A Fragile Video Watermarking Algorithm for Content Authentication based on Block Mean and Modulation Factor

by A. F. El Gamal, N. A. Mosa, W. K. El Said
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 4
Year of Publication: 2013
Authors: A. F. El Gamal, N. A. Mosa, W. K. El Said
10.5120/13850-1684

A. F. El Gamal, N. A. Mosa, W. K. El Said . A Fragile Video Watermarking Algorithm for Content Authentication based on Block Mean and Modulation Factor. International Journal of Computer Applications. 80, 4 ( October 2013), 21-28. DOI=10.5120/13850-1684

@article{ 10.5120/13850-1684,
author = { A. F. El Gamal, N. A. Mosa, W. K. El Said },
title = { A Fragile Video Watermarking Algorithm for Content Authentication based on Block Mean and Modulation Factor },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 4 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 21-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number4/13850-1684/ },
doi = { 10.5120/13850-1684 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:53:40.342603+05:30
%A A. F. El Gamal
%A N. A. Mosa
%A W. K. El Said
%T A Fragile Video Watermarking Algorithm for Content Authentication based on Block Mean and Modulation Factor
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 4
%P 21-28
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Most watermarking algorithms are either robust watermarking for copyright protection or fragile watermarking for tamper detection. This paper proposes a fragile video watermarking algorithm that has the ability to detect tamper in spatial domains. The original video frame is converted from RGB color space into YCbCr color space, then the chrominance component Cb is partitioned into non-overlapping blocks of pixels according to the number of bits of the original watermark. The watermark bits are embedded using a mathematical rule for each block separately. A detailed study for the applicability of this algorithm to content authentication is conducted. Experimental results reveal that the proposed algorithm achieves a low computation cost and high detection rate against a wide range of tampering attacks such as Filtering, Non-Geometric Transformation and Geometric Transformation.

References
  1. Cox, I. J. , Miller, M. L. , and Bloom, J. A. , "Digital watermarking and fundamentals", Morgan Kaufmann, San Francisco, 2002.
  2. Wu, M. , and Liu, B. D. , "Data hiding in image and video: Part I-fundamental issues and solutions", IEEE Trans. Image Processing, Vol. 12, No. 6, PP: 685-695, 2003.
  3. Yassin, N. I. , Salem, N. M. , and El Adawy, M. I. ," Block based video watermarking scheme using wavelet transform and principle component analysis", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue. 1, No. 3, PP: 296-301, 2012.
  4. Sinha, S. , Bardhan, P. , Pramanick, S. , Jagatramka, A. , Kole, D. K. , and Chakraborty, A. , "Digital video watermarking using discrete wavelet transform and principal component analysis", International Journal of Wisdom Based Computing, Vol. 1, No. 2, PP: 7-12, 2011.
  5. Jayamalar, T. , and Radha, V. , "Survey on digital video watermarking techniques and attacks on watermarks", International Journal of Engineering Science and Technology, Vol. 2, No. 12, PP: 6963-6967, 2010.
  6. Kalker, T. , Depovere, G. , Haitsma, J. , and Maes, M. , "A video watermarking system for broadcast monitoring", Proceedings of The SPIE, Vol. 3657, PP: 103-112, 1999.
  7. Paul, R. T. , "Review of robust video watermarking techniques", IJCA Special Issue on Computational Science - New Dimensions & Perspectives NCCSE, No. 3, PP: 90-95, 2011.
  8. Cox, I. J. , Kilian, J. , Leighton, F. T. , and Shamoon, T. , "Secure spread spectrum watermarking for multimedia", IEEE Trans. Image Processing, Vol. 6, No. 12, PP: 1673-1687, 1997.
  9. Li, C. H. , and Wang, S. S. , "Transform based watermarking for digital images and video", IEEE International Conference, 1999.
  10. Sinha, S. , Pramanick, S. , Jagatramka, A. , Bardhan, P. , Kole, D. K. , and Chakraborty, A. , "Digital video watermarking using singular value decomposition", Proceedings on IEEE EDS Student Paper Conference, PP: 53-56, 2011.
  11. Do. err, G. , and Dugelay, J. L. , "A guide tour of video watermarking", Signal Processing Image Communication", Vol. 18, No. 4, PP: 263-282, 2003.
  12. Wong, P. W. , and Memon, N. , "Secret and public key image watermarking schemes for image authentication and ownership verification", IEEE Trans. Image Process. , Vol. 10, No. 10, PP: 1593-1601, 2001.
  13. Yang, H. , and Kot, A. C. , "Binary image authentication with tampering localization by embedding cryptographic signature and block identifier", IEEE Signal Process. Lett. , Vol. 13, PP: 741-744, 2006.
  14. Lu, H. , Shen, R. , and Chung, F. L. , "Fragile watermarking scheme for image authentication", Electron. Lett, Vol. 39, No. 12, PP: 898-900, 2003.
  15. Wu, J. , Zhu, B. B. , Li, S. , and Lin, F. , "A secure image authentication algorithm with pixel-level tamper localization", in Proc. Int. Conf. Image Processing, PP: 1573-1576, 2004.
  16. Liu, S. H. , Yao, H. X. , Gao, W. , and Liu, Y. L. ,"An image fragile watermark scheme based on chaotic image pattern and pixel-pairs", Applied Mathematics and Computation, Vol. 185, PP: 869-882, 2007.
  17. Wu, M. , and Liu, B. , "Watermarking for image authentication", IEEE Trans. Image Processing, Vol 2, PP: 437-441, 1998.
  18. Alomari, R. S. , and Al-Jaber, A. , "A fragile watermarking algorithm for content authentication", International Journal of Computing and Information Sciences, Vol. 2, No. 1, PP: 27-37, 2004.
  19. Zhao, Y. , "Dual domain semi fragile watermarking for image authentication", Master Thesis, University of Toronto (Canada), 2003.
  20. Haouzia, A. , Noumeir, R. , "Methods for image authentication: a survey", Multimedia Tools and Applications, Vol. 39, Issue. 1, PP: 1- 46, 2008.
  21. Cox, I. J. , and Miller, M. L. , "The first 50 years of electronic watermarking", EURASIP Journal on Advances in Signal Processing, Vol. 2, PP: 126-132, 2002.
  22. Mintzer, F. , Braudaway, G. W. , and Yeung, M. M. , "Effective and ineffective digital watermarks", in Proc. ICIP'97, IEEE Int. Conf. on Image Processing, Santa Barbara, CA, Vol. III, PP: 223-226, 1997.
  23. Salomon, D. , "Data compression the complete reference", 3rd ED, Morgan Kaufmann Publishers, 2004.
  24. Ramamurthy, N. , and Varadarajan, S. , "The robust digital image watermarking scheme with back propagation neural network in DWT domain", Procedia Engineering, Vol. 38, PP: 3769-3778, 2012.
  25. Watanabe, J. , Hasegawa, M. , and Kato, S. , "A robust and fragile watermarking method", International Workshop on Spectral Methods and Multirate Signal Processing , Vienna, Austria, PP: 211-216, 2004.
  26. Zayer, W. H. , and Mnati, M. N. , "Secure and non blind watermarking scheme for RGB images using arnold scrambling based on DWT", Advances in Environmental Biology, Vol. 5, No. 9, PP: 2697-2707, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Content Authentication Fragile Video Watermarking Tampering Attacks Modulation Factor.