Research article Special Issues

Zero-watermarking Algorithm for Audio and Video Matching Verification

  • Received: 04 November 2021 Revised: 26 January 2022 Accepted: 06 February 2022 Published: 28 February 2022
  • MSC : 00A69

  • For the needs of tamper-proof detection and copyright identification of audio and video matching, this paper proposes a zero-watermark algorithm that can be used for audio and video matching verification. The algorithm segments audio and video in smaller time units, generates a video frame feature matrix based on NSCT, DCT, and SVD, and generates a sound watermark based on methods such as DWT and K-means. The zero watermark combines video, audio and copyright information. The experimental results show that the zero watermark generated by this algorithm can not only realize highly accurate matching detection and positioning of audio and video, but also well resist common single attack and combination attacks such as noise, scaling, rotation, frame attack and format conversion, which has good robustness.

    Citation: Wenxue Sun, Huiyuan Zhao, Xiao Zhang, Yuchao Sun, Xiaoxin Liu, Xueling Lv, Di Fan. Zero-watermarking Algorithm for Audio and Video Matching Verification[J]. AIMS Mathematics, 2022, 7(5): 8390-8407. doi: 10.3934/math.2022468

    Related Papers:

  • For the needs of tamper-proof detection and copyright identification of audio and video matching, this paper proposes a zero-watermark algorithm that can be used for audio and video matching verification. The algorithm segments audio and video in smaller time units, generates a video frame feature matrix based on NSCT, DCT, and SVD, and generates a sound watermark based on methods such as DWT and K-means. The zero watermark combines video, audio and copyright information. The experimental results show that the zero watermark generated by this algorithm can not only realize highly accurate matching detection and positioning of audio and video, but also well resist common single attack and combination attacks such as noise, scaling, rotation, frame attack and format conversion, which has good robustness.



    加载中


    [1] H. Agarwal, F. Husain, Development of payload capacity enhanced robust video watermarking scheme based on symmetry of circle using lifting wavelet transform and SURF, J. Inf. Secur. Appl., 59 (2021), 102846. https://doi.org/10.1016/j.jisa.2021.102846 doi: 10.1016/j.jisa.2021.102846
    [2] S. Xuecheng, L. Zheming, W. Zhe, L. Yongliang, A geometrically robust multi-bit video watermarking algorithm based on 2-D DFT, Multimed. Tools Appl., 80 (2021), 13491-13511. https://doi.org/10.1007/s11042-020-10392-9 doi: 10.1007/s11042-020-10392-9
    [3] G. Sandaruwan, L. Ranathunga, Robust and adaptive watermarking technique for digital images. IEEE International Conference on Industrial & Information Systems. IEEE, 2017, 1-6. https://doi.org/10.1109/ICⅡNFS.2017.8300387
    [4] M. Reza Keyvanpour, N. Khanbani, M. Boreiry, A secure method in digital video watermarking with transform domain algorithms, Multimed. Tools Appl., 80 (2021), 20449-20476. https://doi.org/10.1007/s11042-021-10730-5 doi: 10.1007/s11042-021-10730-5
    [5] D. Ariatmanto, F. Ernawan, An improved robust image watermarking by using different embedding strengths, Multimed. Tools Appl., 79 (2020), 12041-12067. https://doi.org/10.1007/s11042-019-08338-x doi: 10.1007/s11042-019-08338-x
    [6] J. Abraham, V. Paul, An imperceptible spatial domain color image watermarking scheme, J. King Saud Univ.-Comput. Inf. Sci., 31 (2019), 125-133. https://doi.org/10.1016/j.jksuci.2016.12.004 doi: 10.1016/j.jksuci.2016.12.004
    [7] W. Zhou, G. Jiang, M. Yu, F. Shao, Z. Peng, Reduced-reference stereoscopic image quality assessment based on view and disparity zero-watermarks, Signal Process. Image Commun., 29 (2014), 167-176. https://doi.org/10.1016/j.image.2013.10.005 doi: 10.1016/j.image.2013.10.005
    [8] D. Fan, Y. Li, S. Gao, A novel zero watermark optimization algorithm based on Gabor transform and discrete cosine transform, Concurr. Comput. Pract. Exp., 2 (2020). https://doi.org/10.1002/cpe.5689 doi: 10.1002/cpe.5689
    [9] C. Kumar, A. K. Singh, P. Kumar, et al, SPHIT-based multiple image watermarking in NSCT domain, Concurr. Comput. Pract. Exp., 32 (2020), e4912.1-e4912.9. https://doi.org/10.1002/cpe.4912 doi: 10.1002/cpe.4912
    [10] M. Moosazadeh, G. Ekbatanifard, An improved robust image watermarking method using DCT and YCoCg-R color space, Optik, 140 (2017), 975-988. https://doi.org/10.1016/j.ijleo.2017.05.011 doi: 10.1016/j.ijleo.2017.05.011
    [11] C. Zhu, Y. Li, W. Chi, S. Gao, D. Fan, Zero-watermarking algorithm for color image in contourlet domain based on Schur decomposition, Inf. Technol. Inf. Technol., 227 (2019), 94-98.
    [12] D. Wei, Y. Li, Convolution and Multichannel Sampling for the Offset Linear Canonical Transform and Their Applications, IEEE T. Signal PR., 67 (2019), 6009-6024. https://doi.org/10.1109/TSP.2019.2951191 doi: 10.1109/TSP.2019.2951191
    [13] D. Wei, M. Jiang, A fast image encryption algorithm based on parallel compressive sensing and DNA sequence, Optik, 238 (2021), 166748. https://doi.org/10.1016/j.ijleo.2021.166748 doi: 10.1016/j.ijleo.2021.166748
    [14] Y. Li, D. Wei, L. Zhang, Double-encrypted watermarking algorithm based on cosine transform and fractional Fourier transform in invariant wavelet domain, Inf. Sci., 551 (2021), 205-227. https://doi.org/10.1016/j.ins.2020.11.020 doi: 10.1016/j.ins.2020.11.020
    [15] W. Zhou, C. Liu, J. Lei, L. Yu, T. Luo, HFNet: Hierarchical feedback network with multilevel atrous spatial pyramid pooling for RGB-D saliency detection, Neurocomputing, 2021. https://doi.org/10.1016/j.neucom.2021.11.100 doi: 10.1016/j.neucom.2021.11.100
    [16] W. Zhou, J. Liu, J. Lei, L. Yu, J. Hwang, GMNet: Graded-feature multilabel-learning network for RGB-thermal urban scene semantic segmentation, IEEE T. Image Process., 30 (2021), 7790-7802. https://doi.org/10.1109/TIP.2021.3109518 doi: 10.1109/TIP.2021.3109518
    [17] M. Tancik, B. Mildenhall, R. NG, Invisible hyperlinks in physical photographs, Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2020, 2117-2126. https://doi.org/10.1109/CVPR42600.2020.00219 doi: 10.1109/CVPR42600.2020.00219
    [18] S. Anguraj, P. S. Shantharajah, E J. Jeba, A steganographic method based on optimized audio embedding technique for secure data communication in the Internet of Things, Comput. Intell., 36 (2019), 557-573. https://doi.org/10.1111/coin.12253 doi: 10.1111/coin.12253
    [19] P. Hu, D. Peng, Z. Yi. Y. Xiang, Robust time-spread echo watermarking using characteristics of host signals, Electron. Lett., 52 (2016), 5-6. https://doi.org/10.1049/el.2015.1508 doi: 10.1049/el.2015.1508
    [20] M. Mosleh, S. Setayeshi, B. Barekatain, M. Mohammad, A novel audio watermarking scheme based on fuzzy inference system in DCT domain, Multimed. Tools Appl., 80 (2021), 20423-20447. https://doi.org/10.1007/s11042-021-10686-6 doi: 10.1007/s11042-021-10686-6
    [21] M. Abdelwahab Khaled, M. Abd El-atty Saied, Wi. El-Shafa, S. El-Rabaie, F. E. Abd El-Samie, Efficient SVD-based audio watermarking technique in FRT domain, Multimed. Tools Appl., 79 (2020), 5617-5648. https://doi.org/10.1007/s11042-019-08023-z doi: 10.1007/s11042-019-08023-z
    [22] H. Karajeh, T. Khatib, L. Rajab, M. Maqableh, A robust digital audio watermarking scheme based on DWT and Schur decomposition, Multimed. Tools Appl., 78 (2019), 18395-18418. https://doi.org/10.1007/s11042-019-7214-3 doi: 10.1007/s11042-019-7214-3
    [23] S. Bhargavi Latha, D. Venkata Reddy, A. Damodaram, Video watermarking using neural networks, Int. J. Inf. Comput. Secur., 14 (2021), 40-59. https://doi.org/10.1504/IJICS.2021.112207 doi: 10.1504/IJICS.2021.112207
    [24] J. Sang, Q. Liu, C. Song, Robust video watermarking using a hybrid DCT-DWT approach, J. Electron. Sci. Technol., 18 (2020), 179-189. https://doi.org/10.1016/j.jnlest.2020.100052 doi: 10.1016/j.jnlest.2020.100052
    [25] Kh. Manglem Singh, A robust rotation resilient video watermarking scheme based on the SIFT, Multimed. Tools Appl., 77 (2018), 16419-16444. https://doi.org/10.1007/s11042-017-5213-9 doi: 10.1007/s11042-017-5213-9
    [26] A. Rakesh, B. Sarabjeet Singh, Video watermarking scheme based on IDR frames using MPEG-2 structure, Int. J. Inf. Comput. Secur., 11 (2019), 585-603. https://doi.org/10.1504/IJICS.2019.103065 doi: 10.1504/IJICS.2019.103065
    [27] C. Li, Y. Yang, K. Liu, L. Tian, A Semi-Fragile video watermarking algorithm based on H.264/AVC, Wirel. Commun. Mob. Comput., 2020. https://doi.org/10.1155/2020/8848553 doi: 10.1155/2020/8848553
    [28] F. Madine, M. A. Akhaee, N. Zarmehi, A multiplicative video watermarking robust to H.264/AVC compression standard, Signal Process. Image Commun., 68 (2018), 229-240. https://doi.org/10.1016/j.image.2018.06.015 doi: 10.1016/j.image.2018.06.015
    [29] S. Gaj, A. Sur, PK. Bora, Prediction mode based H.265/HEVC video watermarking resisting re-compression attack, Multimed. Tools Appl., 79 (2020), 18089-18119. https://doi.org/10.1007/s11042-019-08301-w doi: 10.1007/s11042-019-08301-w
    [30] J. Dittmann, A. Steinmetz, R. Steinmetz, Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking, IEEE International Conference of the Multimedia Systems, 1 (1999), 574-579. https://doi.org/10.1109/MMCS.1999.779264 doi: 10.1109/MMCS.1999.779264
    [31] P. Agrawal, A. Khurshid, DWT and GA-PSO Based Novel Watermarking for Videos Using Audio Watermark, International conference on swarm intelligence. ICSI, 2014,212-220. https://doi.org/10.1007/978-3-319-11897-0_25
    [32] M. Sun dararajan, G. Yamuna, CWT and CS algorithm based video watermarking using audio watermark, Procedia Comput. Sci., 87 (2016), 93-98. https://doi.org/10.1016/j.procs.2016.05.132 doi: 10.1016/j.procs.2016.05.132
    [33] X. Wang, Y. Pan, Audio and video cross watermarking algorithm based-on visual saliency model, Electron. Meas. Technol., 40 (2017), 112-115.
    [34] Z. Esmaeilbeig, S. Ghaemmaghami, Compressed Video Watermarking for Authentication and Reconstruction of the Audio Part, 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology. ISCISC. 2018, 1-6. https://doi.org/10.1109/ISCISC.2018.8546897
    [35] G. Sucharitha, R. Kumar Senapati, Biomedical image retrieval by using local directional edge binary patterns and Zernike moments, Multimed. Tools Appl., 79 (2020), 1847-1864. https://doi.org/10.1007/s11042-019-08215-7 doi: 10.1007/s11042-019-08215-7
    [36] J. Qu, Image encryption algorithm based on Logistic chaotic scrambling, Science and Technology Innovation, 2020, 2.
    [37] Y. Jiang, M. Cai, C. Song, SIFT based video watermarking algorithm against manifold attacks in contourlet domain, Comput. Simul., 35 (2018), 314-320.
    [38] C. Maiti, B. C. Dhara, Robust non-blind video watermarking using DWT and QR decomposition, Adv. Intel. Syst. Comput., 999 (2020), 333-343. https://doi.org/10.1007/978-981-13-9042-5_28 doi: 10.1007/978-981-13-9042-5_28
    [39] R. Singh, A. Ashok, M. Saraswat, Robust Video Watermarking in Frequency Domain for Copyright Protection, ACM International Conference Proceeding Series, AICPS, 2021,174-178. https://doi.org/10.1145/3474124.3474148
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2018) PDF downloads(77) Cited by(2)

Article outline

Figures and Tables

Figures(10)  /  Tables(2)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog