Video Watermarking With Digital Signature and Fingerprinting

Video Watermarking With Digital Signature and Fingerprinting

DOI: 10.4018/978-1-6684-4945-5.ch002
Chapter PDF Download
Open access chapters are freely available for download

Abstract

A digital watermark, which is embedded in an image sequence or video frames as the form of a binary string or visual logo, is a small size of visible data. Thus, the quality of embedded videos is often slashed due to the watermarking. Comparative video watermarking is a highly innovative method that was designed to unravel this issue. In this chapter, the authors make use of singular value decomposition (SVD) and discrete wavelet transform (DWT) for video watermarking; the authors employed inverse transform (IDWT) to extract the video watermark. The digital signature is also utilised to increase the authenticity of watermarks and verify any changes. The authors combine this approach with digital fingerprinting as well as to get the improved results. Throughout the designed attacks, the merits of the new watermarking paradigm such as robustness, convergence, and stability are attained with security and authenticity by calculating the metrics such as MSE, PSNR, entropy, SSIM, etc.
Chapter Preview
Top

Introduction

Digital watermarking is a way of embedding secure information into digital media for transcoding. A machine-detectable pattern that could be put on several documents for anti-counterfeiting purposes was identified in 1979. A number of years later, a method for embedding an identification code into an audio signal was identified by researchers. Researchers firstly employed the term digital watermark in 1988. The notion of digital watermarking gained widespread acceptance in the early 1990s. The first information hiding workshop (IHW), which included digital watermarking as one of its key topics, was held in 1996 (Gupta, 2021).

A watermark is visible where it is easily seen by the owner and observer or invisible where decoding algorithms can be identified by the originator (Gupta, 2021). The watermark needs to be durable for this application so that it cannot be broken by digital media alteration. The algorithm needs to be blind, another prerequisite for watermarking for copyright protection. The host media is not needed to remove the watermarking information for blind operations. Security is an important issue that requires only the owner to change the watermark. The number of special sessions held at recent conferences and the efforts made on related European projects such as Certimark and Encrypt are a good indication of the increasing interest in this topic, whereas watermarking robustness has usually been associated with the possibility of decoding error or resistance to removal of watermarks, the definition of watermarking protection is still fuzzy.

Recent work has been accepted that security attacks have wider applications than robustness attacks, as the former is concerned not only with the simple impairment of communication mechanism but also with the achievement of rights given by the system's hidden parameters. Watermarking helps to recognize the actual possessor of digital information. It is one of the potential strategies for securing digital information.

Digital watermarking is an effective approach for protecting intellectual property and copyrights by shielding multimedia data such as photographs, videos, or audio files from information such as signatures, logos, or manuscripts. However, a high risk of piracy is also seen by copyright owners, especially large Hollywood studios and music labels. Using analogue devices leads to a lower risk in the past than using digital media; copying an analogue file contributes to consistency degradation. However, songs and movies can be generated without any quality degradation using digital media recording, because the data is a stream of 0's and 1's.

Cryptography provides a small security measure; once the decrypted material enters the consumer, there will be no further security. Therefore, further content protection is required, even after it is decrypted. The watermarking is a popular approach that is used to comply with the creator's copyright rights. The knowledge is hidden inside the content in digital watermarking. Digital watermarking can withstand various types of attacks, including compression, conversion from digital to analogue, and changes in file format. In order to fulfil all these processes, a watermark can be created.

For copy prevention and copyright protection, watermarking has been well-thought-out. The watermark may be used in copyright protection applications to recognize the copyright holder and ensure sufficient payment of the royalties. Although copyright security and copy prevention have been major drivers of watermarking field research, there are a range of earlier applications for which watermarking has been used. It includes broadening, monitoring, monitoring activities, and confirmation. Medical photographs, satellite images, and photos taken by mobile phone cameras include other applications.

Usually, one hidden key is used in the watermarking process. The essential element of information that the material is legitimate or not by identifying the watermark is the hidden key. Insertion or embedding is called positioning in watermarking process. The process that the watermark is extracted is called watermark extraction. The use of a watermark is also a solution for copyright security and authentication of ownership; the digital data becomes much stable and is safe from infringement. There are various types of methods available for watermarking including watermark extraction. Each of them offers various characteristics and functions that can be used for multiple purposes.

Complete Chapter List

Search this Book:
Reset