International Journal of Advanced Technology and Engineering Exploration (IJATEE) ISSN (P): 2394-5443 ISSN (O): 2394-7454 Vol - 10, Issue - 104, July 2023
  1. 1
    Google Scholar
Video data security: analysis, relevance and open challenges

Purnima , Rakesh Ahuja and Nidhi Gautam

Abstract

With the rapid advancement of technology, ensuring authentication and security in communication over long distances has become a primary concern. The film industry is particularly vulnerable to the unauthorized distribution of digital videos, which can be easily disseminated to a global audience due to widespread internet access. Video watermarking has gained significant importance in various applications such as copyright protection, security, fingerprinting, copy control, and annotation. Watermarking, whether in the form of an image, audio, or video, is a technique used to embed additional information within a digital video signal. This embedded information is utilized for copyright owner detection. Consequently, several methods for digital video watermarking (DVW) have been developed to address this issue. Watermarking has emerged as a crucial means of verifying ownership, ensuring authenticity, and safeguarding copyrights. Researchers employ watermarking techniques to hide confidential information, which can be made either visible or obscured based on the user's requirements. This approach plays a vital role in determining the ownership of information. To ensure secure watermarking, an optimization process is often employed. This paper presents an overview of the diverse trends and techniques adopted in the field of digital watermarking. It aims to provide a comprehensive guide to research scholars interested in exploring this area of study.

Keyword

Digital video watermarking, Discrete wavelet transform, Discrete cosine transform, Robustness, Security.

Cite this article

PurnimaAhuja R, Gautam N

Refference

[1][1]Cox I, Miller M, Bloom J, Fridrich J, Kalker T. Digital watermarking and steganography. Morgan Kaufmann; 2007.

[2][2]Cox I, Miller M, Bloom J, Honsinger C. Digital watermarking. Journal of Electronic Imaging. 2002; 11(3).

[3][3]Petitcolas FA, Anderson RJ, Kuhn MG. Information hiding-a survey. Proceedings of the IEEE. 1999; 87(7):1062-78.

[4][4]Lin EI, Eskicioglu AM, Lagendijk RL, Delp EJ. Advances in digital video content protection. Proceedings of the IEEE. 2005; 93(1):171-83.

[5][5]Anusree K, Binu GS. Biometric privacy using visual cryptography, halftoning and watermarking for multiple secrets. In national conference on communication, signal processing and networking 2014 (pp. 1-5). IEEE.

[6][6]Gupta P. Cryptography based digital image watermarking algorithm to increase security of watermark data. International Journal of Scientific & Engineering Research. 2012; 3(9):1-4.

[7][7]Asikuzzaman M, Pickering MR. An overview of digital video watermarking. IEEE Transactions on Circuits and Systems for Video Technology. 2017; 28(9):2131-53.

[8][8]Singh AK, Kumar B, Dave M, Ghrera SP, Mohan A. Digital image watermarking: techniques and emerging applications. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. 2016: 246-72.

[9][9]Cayre F, Fontaine C, Furon T. Watermarking security part two: practice. In security, steganography, and watermarking of multimedia contents VII 2005 (pp. 758-68). SPIE.

[10][10]Jensen-link LA, Thompson C. Effective video capture techniques for educational multimedia. In proceedings frontiers in education 25th annual conference, engineering education for the 21st century 1995 (pp. 30-3). IEEE.

[11][11]Sen J, Sen AM, Hemachandran K. An algorithm for digital watermarking of still images for copyright protection. Indian Journal of Computer Science and Engineering. 2012; 3(1):46-52.

[12][12]Channalli S, Jadhav A. Steganography an art of hiding data. arXiv preprint arXiv:0912.2319. 2009.

[13][13]Deshpande N, Rajurkar A, Manthalkar R. Review of robust video watermarking algorithms. arXiv preprint arXiv:1004.1770. 2010.

[14][14]Singh S, Singh AK, Ghrera SP. A recent survey on data hiding techniques. In international conference on IoT in social, mobile, analytics and cloud 2017 (pp. 882-6). IEEE.

[15][15]Sunesh HK. Watermark attacks and applications in watermarking. In national workshop-cum-conference on recent trends in mathematics and computing 2011:8-10.

[16][16]Chang X, Wang W, Zhao J, Zhang L. A survey of digital video watermarking. In seventh international conference on natural computation 2011 (pp. 61-5). IEEE.

[17][17]Lee SJ, Jung SH. A survey of watermarking techniques applied to multimedia. In international symposium on industrial electronics proceedings (Cat. No. 01TH8570) 2001 (pp. 272-7). IEEE.

[18][18]Sharma C, Bagga A, Singh BK, Shabaz M. A novel optimized graph-based transform watermarking technique to address security issues in real-time application. Mathematical Problems in Engineering. 2021; 2021:1-27.

[19][19]Asikuzzaman M, Alam MJ, Lambert AJ, Pickering MR. Imperceptible and robust blind video watermarking using chrominance embedding: a set of approaches in the DT CWT domain. IEEE Transactions on Information Forensics and Security. 2014; 9(9):1502-11.

[20][20]Ahuja R, Bedi SS. Video watermarking scheme based on IDR frames using MPEG-2 structure. International Journal of Information and Computer Security. 2019; 11(6):585-603.

[21][21]Cox IJ, Miller ML, Bloom JA. Watermarking applications and their properties. In proceedings international conference on information technology: coding and computing (Cat. No. PR00540) 2000 (pp. 6-10). IEEE.

[22][22]Doerr G, Dugelay JL. A guide tour of video watermarking. Signal Processing: Image Communication. 2003; 18(4):263-82.

[23][23]Singh AK, Dave M, Mohan A. Wavelet based image watermarking: futuristic concepts in information security. Proceedings of the National Academy of Sciences, India section A: physical sciences. 2014; 84:345-59.

[24][24]Cox IJ, Miller ML. Review of watermarking and the importance of perceptual modeling. In human vision and electronic imaging II 1997 (pp. 92-9). SPIE.

[25][25]Kaur M, Jindal S, Behal S. A study of digital image watermarking. Journal of Research in Engineering and Applied Sciences. 2012; 2(2):126-36.

[26][26]Moniruzzaman M, Hawlader MA, Hossain MF. Wavelet based watermarking approach of hiding patient information in medical image for medical image authentication. In international conference on computer and information technology 2014 (pp. 374-8). IEEE.

[27][27]Bakhtiari S, Ibrahim S, Salleh M, Bakhtiari M. JPEG mage encryption with elliptic curve cryptography. In international symposium on biometrics and security technologies 2014 (pp. 144-9). IEEE.

[28][28]Ouslim M, Sabri A, Mouhadjer H. Securing biometric data by combining watermarking and cryptography. In 2nd international conference on advances in biomedical engineering 2013 (pp. 179-82). IEEE.

[29][29]Han Y, He W, Ji S, Luo Q. A digital watermarking algorithm of color image based on visual cryptography and discrete cosine transform. In ninth international conference on P2P, parallel, grid, cloud and internet computing 2014 (pp. 525-30). IEEE.

[30][30]Ghosh S, De S, Maity SP, Rahaman H. A novel dual purpose spatial domain algorithm for digital image watermarking and cryptography using extended hamming code. In 2nd international conference on electrical information and communication technologies 2015 (pp. 167-72). IEEE.

[31][31]Kumar S, Dutta A. A novel spatial domain technique for digital image watermarking using block entropy. In international conference on recent trends in information technology 2016 (pp. 1-4). IEEE.

[32][32]Shahid M, Kumar P. Digital video watermarking: issues and challenges. International Journal of Advanced Research in Computer Engineering & Technology. 2018; 7(4):400-5.

[33][33]Hartung F, Kutter M. Multimedia watermarking techniques. Proceedings of the IEEE. 1999; 87(7):1079-107.

[34][34]Seenivasagam DV, Subbulakshmi S, Radhamani S. A survey on video watermarking and its applications. International Journal of Advanced Research in Computer Science and Software Engineering. 2014; 4(3):3015-8.

[35][35]Singh P, Chadha RS. A survey of digital watermarking techniques, applications and attacks. International Journal of Engineering and Innovative Technology. 2013; 2(9):165-75.

[36][36]Bhattacharya S, Chattopadhyay T, Pal A. A survey on different video watermarking techniques and comparative analysis with reference to H. 264/AVC. In international symposium on consumer electronics 2006 (pp. 1-6). IEEE.

[37][37]Mane GV, Chiddarwar GG. Review paper on video watermarking techniques. International Journal of Scientific and Research Publications. 2013; 3(4):1-5.

[38][38]Panchal H, Acharya K, Panchal P, Thakar N. Digital watermarking on extracted key frames from uncompressed color video using 4-level DWT. In international conference on emerging trends in networks and computer communications 2011 (pp. 331-5). IEEE.

[39][39]Varaprasad SA, Srinivas P, Vidya T, kumara CA. LSB modification, correlation, transform based digital image watermarking techniques. International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering. 2015; 3(12):136-9.

[40][40]Wang Y, Ostermann J, Zhang Y. Video formation, perception, and representation. Signal Processing, Prentice Hall. 2001.

[41][41]Comesana P, Pérez-freire L, Pérez-gonzález F. Fundamentals of data hiding security and their application to spread-spectrum analysis. In international workshop on information hiding 2005 (pp. 146-60). Berlin, Heidelberg: Springer Berlin Heidelberg.

[42][42]Bas P, Cayre F. Achieving subspace or key security for WOA using natural or circular watermarking. In proceedings of the 8th workshop on multimedia and security 2006 (pp. 80-8).

[43][43]Cayre F, Fontaine C, Furon T. Watermarking security part one: theory. In security, steganography, and watermarking of multimedia contents VII 2005 (pp. 746-57). SPIE.

[44][44]Cayre F, Fontaine C, Furon T. Watermarking security: theory and practice. IEEE Transactions on Signal Processing. 2005; 53(10):3976-87.

[45][45]Hartung FH, Su JK, Girod B. Spread spectrum watermarking: malicious attacks and counterattacks. In security and watermarking of multimedia contents 1999 (pp. 147-58). SPIE.

[46][46]Holliman MJ, Macy WW, Yeung MM. Robust frame-dependent video watermarking. In security and watermarking of multimedia contents II 2000 (pp. 186-97). SPIE.

[47][47]Ahuja R, Bedi SS. Video watermarking scheme based on candidates I-frames for copyright protection. Indonesian Journal of Electrical Engineering and Computer Science. 2017; 5(2):391-400.

[48][48]Ahuja R, Bedi SS. Robust video watermarking scheme based on intra-coding process in MPEG-2 Style. International Journal of Electrical & Computer Engineering. 2017; 7(6):3332-43.

[49][49]Harish NJ, Kumar BB, Kusagur A. Hybrid robust watermarking techniques based on DWT, DCT, and SVD. International Journal of Advanced Electrical and Electronics Engineering. 2013; 2(5):137-43.

[50][50]Sridhar B, Arun C. Secure video watermarking algorithm based on wavelet with multiple watermarks. Latin American Applied Research. 2015; 45(3):207-12.

[51][51]Zhang X. Reversible data hiding in encrypted image. IEEE Signal Processing Letters. 2011; 18(4):255-8.

[52][52]Biswas SN, Nahar S, Das SR, Petriu EM, Assaf MH, Groza V. MPEG-2 digital video watermarking technique. In international instrumentation and measurement technology conference proceedings 2012 (pp. 225-9). IEEE.

[53][53]Yu X, Wang C, Zhou X. A survey on robust video watermarking algorithms for copyright protection. Applied Sciences. 2018; 8(10):1-26.

[54][54]Kaur P, Laxmi DV. Review on different video watermarking techniques. International Journal of Computer Science and Mobile Computing. 2014; 3(9):190-5.

[55][55]Mohal D, Sharma S. Image encryption strategies to enhance security of image: an exhaustive analysis. International Journal of Advanced Research in Computer Science. 2017; 8(9):351-61.

[56][56]Jadhav A, Kolhekar M. Digital watermarking in video for copyright protection. In international conference on electronic systems, signal processing and computing technologies 2014 (pp. 140-4). IEEE.

[57][57]Mohanty SP, Kougianos E. Real-time perceptual watermarking architectures for video broadcasting. Journal of Systems and Software. 2011; 84(5):724-38.

[58][58]Langelaar GC, Setyawan I, Lagendijk RL. Watermarking digital image and video data. a state-of-the-art overview. IEEE Signal Processing Magazine. 2000; 17(5):20-46.

[59][59]Podilchuk CI, Delp EJ. Digital watermarking: algorithms and applications. IEEE Signal Processing Magazine. 2001; 18(4):33-46.

[60][60]Leelavathy N, Prasad EV, Kumar SS. Video watermarking techniques: a review. International Journal of Computer Applications. 2014; 104(7):24-30.

[61][61]Zhang Y. Digital watermarking technology: a review. In ETP international conference on future computer and communication 2009 (pp. 250-2). IEEE.

[62][62]Jayamalar T, Radha V. Survey on digital video watermarking techniques and attacks on watermarks. International Journal of Engineering Science and Technology. 2010; 2(12):6963-7.

[63][63]Paul RT. Review of robust video watermarking techniques. IJCA Special Issue on Computational Science. 2011; 3:90-5.

[64][64]Shoemaker C. Hidden bits: a survey of techniques for digital watermarking. Independent Study, EER. 2002; 290:1673-87.

[65][65]Chan PW, Lyu MR, Chin RT. A novel scheme for hybrid digital video watermarking: approach, evaluation and experimentation. IEEE Transactions on Circuits and Systems for Video Technology. 2005; 15(12):1638-49.

[66][66]Hazim HT, Alseelawi N, Alrikabi HT. A novel method of invisible video watermarking based on index mapping and hybrid DWT-DCT. International Journal of Online & Biomedical Engineering. 2023; 19(4):155-73.

[67][67]Liu S, Bo-wei CD, Gong L, Ji W, Seo S. A real-time video watermarking algorithm for authentication of small-business wireless surveillance networks. International Journal of Distributed Sensor Networks. 2015; 11(9):1-11.

[68][68]Singh N, Joshi S, Birla S. Cover dependent watermarking against ambiguity attacks. Procedia Computer Science. 2020; 171:1137-46.

[69][69]Doërr G, Dugelay JL. Collusion issue in video watermarking. In security, steganography, and watermarking of multimedia contents VII 2005 (pp. 685-96). SPIE.

[70][70]Doërr G, Dugelay JL. Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Transactions on Signal Processing. 2004; 52(10):2955-64.

[71][71]Lei B, Song I, Rahman SA. Robust and secure watermarking scheme for breath sound. Journal of Systems and Software. 2013; 86(6):1638-49.

[72][72]Agrawal P, Khurshid A. DWT and GA-PSO based novel watermarking for videos using audio watermark. In advances in swarm intelligence: 5th international conference, ICSI 2014, Hefei, China, proceedings, Part II 5 2014 (pp. 212-20). Springer International Publishing.

[73][73]Guo J, Zheng P, Huang J. Secure watermarking scheme against watermark attacks in the encrypted domain. Journal of Visual Communication and Image Representation. 2015; 30:125-35.

[74][74]Arab F, Abdullah SM, Hashim SZ, Manaf AA, Zamani M. A robust video watermarking technique for the tamper detection of surveillance systems. Multimedia Tools and Applications. 2016; 75:10855-85.

[75][75]Han J, Zhao X, Qiu C. A digital image watermarking method based on host image analysis and genetic algorithm. Journal of Ambient Intelligence and Humanized Computing. 2016; 7:37-45.

[76][76]Sridhar B, Arun C. An enhanced approach in video watermarking with multiple watermarks using wavelet. Journal of Communications Technology and Electronics. 2016; 61:165-75.

[77][77]Kumar GD, Teja DP, Reddy SS, Sasikaladevi N. An efficient watermarking technique for biometric images. Procedia Computer Science. 2017; 115:423-30.

[78][78]Shukla D, Sharma M. A novel scene-based video watermarking scheme for copyright protection. Journal of Intelligent Systems. 2018; 27(1):47-66.

[79][79]Yoo G, Kim H. Real-time video watermarking techniques robust against re-encoding. Journal of Real-Time Image Processing. 2017; 13:467-77.

[80][80]Himeur Y, Boukabou A. A robust and secure key-frames based video watermarking system using chaotic encryption. Multimedia Tools and Applications. 2018; 77:8603-27.

[81][81]Zear A, Singh AK, Kumar P. A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools and Applications. 2018; 77:4863-82.

[82][82]Shukla D, Sharma M. Robust scene-based digital video watermarking scheme using level-3 DWT: approach, evaluation, and experimentation. Radioelectronics and Communications Systems. 2018; 61:1-12.

[83][83]Nouioua I, Amardjia N, Belilita S. A novel blind and robust video watermarking technique in fast motion frames based on SVD and MR-SVD. Security and Communication Networks. 2018; 2018:1-7.

[84][84]Arab F, Zamani M, Poger S, Manigault C, Yu S. A framework to evaluate the performance of video watermarking techniques. In 2nd international conference on information and computer technologies 2019 (pp. 114-7). IEEE.

[85][85]Singh R, Singh S, Sharma N. A review of digital watermarking technique. International Journal of Computer Applications. 2015:1-6.

[86][86]Mohanarathinam A, Kamalraj S, Prasanna VGK, Ravi RV, Manikandababu CS. Digital watermarking techniques for image security: a review. Journal of Ambient Intelligence and Humanized Computing. 2020; 11:3221-9.

[87][87]Nadesh RK, Arivuselvan K, Aishwarya K. A hybrid Approach for video watermarking using DWT and SVD. In innovations in power and advanced computing technologies 2019 (pp. 1-6). IEEE.

[88][88]Alotaibi SS. Optimization insisted watermarking model: hybrid firefly and Jaya algorithm for video copyright protection. Soft Computing. 2020; 24(19):14809-23.

[89][89]Sharma C, Amandeep B, Sobti R, Lohani TK, Shabaz M. A secured frame selection based video watermarking technique to address quality loss of data: combining graph based transform, singular valued decomposition, and hyperchaotic encryption. Application-Aware Multimedia Security Techniques. 2021; 2021:1-19.

[90][90]Agarwal H, Husain F. Development of payload capacity enhanced robust video watermarking scheme based on symmetry of circle using lifting wavelet transform and SURF. Journal of Information Security and Applications. 2021; 59:102846.

[91][91]Neena PM, Narayanan SA, Bijlani K. Copyright protection for E-learning videos using digital watermarking. In fifth international conference on advances in computing and communications 2015 (pp. 447-50). IEEE.

[92][92]Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A. Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Generation Computer Systems. 2018; 86:926-39.

[93][93]Panyavaraporn J, Horkaew P. DWT/DCT-based invisible digital watermarking scheme for video stream. In 10th international conference on knowledge and smart technology 2018 (pp. 154-7). IEEE.

[94][94]Kumar NU, Sandhya G, Bachu S. Security of finger prints with video watermarking techniques based on DWT and SVD. In IOP conference series: materials science and engineering 2021 (pp. 1-8). IOP Publishing.

[95][95]Li J, Liu H, Huang J, Shi YQ. Reference index-based H. 264 video watermarking scheme. ACM Transactions on Multimedia Computing, Communications, and Applications. 2012; 8(2S):1-22.

[96][96]Keerthana P, Nikita E, Lakkshmi R, Devi RS. Tampering detection in video inter-frame using watermarking. International Journal of Research in Engineering, Science and Management. 2019; 2(3):251-4.

[97][97]Rao R. Video watermarking algorithm using the SVD transform. International Journal of Engineering Research and Development. 2013; 8(11):1-8.

[98][98]Isac B, Santhi V. A study on digital image and video watermarking schemes using neural networks. International Journal of Computer Applications. 2011; 12(9):1-6.

[99][99]Bahrami Z, Akhlaghian TF. A new robust video watermarking algorithm based on SURF features and block classification. Multimedia Tools and Applications. 2018; 77:327-45.

[100][100]Al-athamneh M, Kurugollu F, Crookes D, Farid M. Video authentication based on statistical local information. In proceedings of the 9th international conference on utility and cloud computing 2016 (pp. 388-91). ACM.

[101][101]Velickovic ZS, Milivojevic ZN, Velickovic MZ. A secured digital video watermarking in chrominance model. In international scientific-professional conference on information technology 2018 (pp. 1-4). IEEE

[102][102]Lafkih S, Zaz Y. Digital video watermarking for solar panel indexation and monitoring. In 3rd international renewable and sustainable energy conference 2015 (pp. 1-5). IEEE.

[103][103]Kulkarni TS, Dewan JH. Digital video watermarking using hybrid wavelet transform with Cosine, Haar, Kekre, Walsh, Slant and Sine transforms. In international conference on computing communication control and automation 2016 (pp. 1-5). IEEE.

[104][104]Dhevanandhini G, Yamuna G. An efficient lossless video watermarking extraction process with multiple watermarks using artificial jellyfish algorithm. Turkish Journal of Computer and Mathematics Education. 2021; 12(6):3048-55.

[105][105]Patel SV, Yadav AR. Invisible digital video watermarking using 4 level DWT. In national conference on recent trends in engineering & technology 2011 (pp. 1-6).

[106][106]Verma Y, Singh M. Implementation the effects of barrel distortion in field of digital video watermarking. International Journal of Science, Engineering and Technology Research. 2017; 6(6):2278-7798.

[107][107]Shanmugam M, Chokkalingam A. Performance analysis of 2 level DWT-SVD based non blind and blind video watermarking using range conversion method. Microsystem Technologies. 2018; 24:4757-65.

[108][108]Al-gindy A, Omar AA, Mashal O, Shaker Y, Alhogaraty E, Moussa S. A new watermarking scheme for digital videos using DCT. Open Computer Science. 2022; 12(1):248-59.

[109][109]Ke Z, Huang H, Liang Y, Ding Y, Cheng X, Wu Q. Robust video watermarking based on deep neural network and curriculum learning. In international conference on e-business engineering 2022 (pp. 80-5). IEEE.

[110][110]Fan D, Zhang X, Kang W, Zhao H, Lv Y. Video watermarking algorithm based on NSCT, pseudo 3D-DCT and NMF. Sensors. 2022; 22(13):1-18.

[111][111]Singh R, Mittal H, Pal R. Optimal keyframe selection-based lossless video-watermarking technique using IGSA in LWT domain for copyright protection. Complex & Intelligent Systems. 2022; 8(2):1047-70.

[112][112]Fan D, Sun W, Zhao H, Kang W, Lv C. Audio and video matching zero-watermarking algorithm based on NSCT. Complexity. 2022; 2022:1-14.

[113][113]Velazquez-garcia L, Cedillo-hernandez A, Cedillo-hernandez M, Nakano-miyatake M, Perez-meana H. Imperceptible–visible watermarking for copyright protection of digital videos based on temporal codes. Signal Processing: Image Communication. 2022; 102:116593.

[114][114]Bistroń M, Piotrowski Z. Efficient video watermarking algorithm based on convolutional neural networks with entropy-based information mapper. Entropy. 2023; 25(2):1-26.

[115][115]Tarhouni N, Masmoudi S, Charfeddine M, Amar CB. Fake COVID-19 videos detector based on frames and audio watermarking. Multimedia Systems. 2023; 29(1):361-75.

[116][116]Ali J, Ghrera SP. A secure method of copyright protection for digital videos using split watermark embedding algorithm. In fourth international conference on image information processing 2017 (pp. 1-5). IEEE.

[117][117]Ram B. Digital image watermarking technique using discrete wavelet transform and discrete cosine transform. SSRN. 2013: 1-7.