New Video Watermark Scheme Resistant to Super Strong Cropping Attacks
نویسندگان
چکیده
Firstly, the nonnegative matrix factorization with sparseness constraints on parts of the basis matrix (NMFSCPBM) method is proposed in this paper. Secondly, the encrypted watermark is embedded into the big coefficients of the basis matrix that the host video is decomposed into by NMFSCPBM. At the same time, the watermark embedding strength is adaptively adjusted by the video motion characteristic coefficients extracted by NMFSCPBM method. On watermark detection, as long as the residual video contains the numbers of the least remaining sub-blocks, the complete basis matrix can be completely recovered through the decomposition of the nonnegative matrix of the least remaining sub-blocks in residual videos by NMFSCPBM, and then the complete watermark can be extracted. The experimental results show that the average intensity resistant to the various regular cropping of this scheme is up to 95.97% and that the average intensity resistant to the various irregular cropping of this scheme is up to 95.55%. The bit correct rate (BCR) values of the extracted watermark are always 100% under all of the above situations. It is proved that the watermark extraction is not limited by the cropping position and type in this scheme. Compared with other similar methods, the performance of resisting strong cropping is improved greatly.
منابع مشابه
Two Novel Chaos-Based Algorithms for Image and Video Watermarking
In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...
متن کاملRobust multiplicative video watermarking using statistical modeling
The present paper is intended to present a robust multiplicative video watermarking scheme. In this regard, the video signal is segmented into 3-D blocks like cubes, and then, the 3-D wavelet transform is applied to each block. The low frequency components of the wavelet coefficients are then used for data embedding to make the process robust against both malicious and unintentional attacks. Th...
متن کاملA Robust Digital Image Watermarking Scheme Based on DWT
In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...
متن کاملDWT Based Blind Digital Video Watermarking Scheme for Video Authentication
Digital video is one of the popular multimedia data exchanged in the internet. Due to their perfectly replicable nature many illegal copies of the original video can be made. Methods are needed to protect copyrights of the owner and prevent illegal copying. A video can also undergo several intentional attacks like frame dropping, averaging, cropping and median filtering and unintentional attack...
متن کاملA Robust Digital Image Watermarking Scheme Based on DWT
In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Information Security
دوره 3 شماره
صفحات -
تاریخ انتشار 2012