Video Saliency Detection for Visual Cryptography-Based Watermarking

Video Saliency Detection for Visual Cryptography-Based Watermarking

Adrita Barari (Defence Institute of Advanced Technology, India) and Sunita V. Dhavale (Defence Institute of Advanced Technology, India)
DOI: 10.4018/978-1-4666-8723-3.ch006
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

The aim of this chapter is to review the application of the technique of Visual cryptography in non-intrusive video watermarking. The power of saliency feature extraction is also highlighted in the context of Visual Cryptography based watermarking systems for videos. All schemes in literature related to Visual cryptography based video watermarking, have been brought together with special attention on the role of saliency feature extraction in each of these schemes. Further a novel approach for VC based video watermarking using motion vectors (MVP Algorithm) as a salient feature is suggested. Experimental results show the robustness of proposed MVP Algorithm against various video processing attacks. Also, compression scale invariance is achieved.
Chapter Preview
Top

1. Introduction

The rapid growth in digital video editing technologies has become a threat to the authenticity and integrity of video data. In case of wide range of applications, such as video surveillance, video broadcast, DVDs, video conferencing, and video-on-demand applications, protection of intellectual property rights of transmitted video data is vital. Digital watermarking technology has emerged in last decade as a well-known solution for video copyright protection (Hartung & Kutter, 1999). In digital watermarking technique (Hartung & Kutter, 1999; Petitcolas, F.A.P, 2000), a watermark representing the copyright information () is embedded into the cover video () to obtain new watermarked signal , practically indistinguishable from , by people, in such a way that an eavesdropper cannot detect the presence of in . At the time of ownership dispute, the embedded watermark is extracted () from the watermarked video () and used for verification. Almost all digital video data today is distributed and stored in the compressed format. Hence, existing approaches in video watermarking can be categorized as uncompressed domain video watermarking (Sun & Liu, 2005; Chen & Leung, 2008; Blanchi & Piva, 2013) and compressed domain video watermarking (Ardizzone, E., La Cascia, M., Avanzato, A., & Bruna, A., 1999; Lin, Eskicioglu, Reginald, & Edward, 2005; Fang & Lin, 2006; Sejdic, Djurovic & Stankovic 2011; Aly, H., 2011).

A well-designed video watermarking system must offer both perceptual transparency and robustness (Petitcolas, F.A.P, 2000). Perceptual transparency means that the watermarked video should be perceptually equivalent to the original video. Robustness refers to a reliable extraction of the watermark even if the watermarked video is degraded during different intentional and non-intentional attacks. Assuring perceptual transparency is difficult in video compared to that with still images, due to the temporal dimension existing in video. Embedding different watermarks into video frames independently without taking the temporal dimension into account usually yields a flicker effect in video. This is due to the fact that the differences exist between the intensities of pixels at the same position in two successive video frames.

Complete Chapter List

Search this Book:
Reset