A State of Art Comparison of Robust Digital Watermarking Approaches for Multimedia Content (Image and Video) Against Multimedia Device Attacks

A State of Art Comparison of Robust Digital Watermarking Approaches for Multimedia Content (Image and Video) Against Multimedia Device Attacks

  IJETT-book-cover           
  
© 2022 by IJETT Journal
Volume-70 Issue-8
Year of Publication : 2022
Authors : Nilesh Dubey, Hardik Modi
DOI : 10.14445/22315381/IJETT-V70I8P213

How to Cite?

Nilesh Dubey, Hardik Modi, "A State of Art Comparison of Robust Digital Watermarking Approaches for Multimedia Content (Image and Video) Against Multimedia Device Attacks," International Journal of Engineering Trends and Technology, vol. 70, no. 8, pp. 132-139, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I8P213

Abstract
The threat of secondhand copyright violation has become a major concern for digital media owners as the quality of multimedia devices such as cameras, cell phones, printers, scanners, and so on improves. Secondhand piracy involves pirates using multimedia devices to duplicate digital content and present it on their behalf. As a result, dealing with it has become critical. Many schemes have been proposed to address ownership conflict, including cryptography, stenography, and watermarking. Watermarking is the most popular technique among researchers, but it still needs much work to resist multimedia device attacks. The uses, problems, and qualities of digital watermarking techniques are explored, studied, and classed. Following that is an overview of several upcoming revolutionary watermarking solutions. A popular topic of discussion is using a strong watermarking method to defend against scan and print attacks. A powerful and robust video watermarking technology that aids in the prevention of piracy and the defeat of camcorder attacks. The topic of attackable multimedia devices is discussed. After discussing each technique, conducted literature research to compile a survey. Finally, summarize the findings and make some suggestions for future research.

Keywords
Watermarking, Camcorder Attack, Secondhand piracy, Print and Scan attack, Multimedia device, Frequency Domain.

Reference
[1] Xiao, Zihao et al., "A Robust and Encrypted Digital Image Watermarking Method Against Print-Scan," Chinese Automation Congress (CAC), pp. 696-700, 2015.
[2] Amiri, s. Hamid & Jamzad, Mansour, “Robust Watermarking against Print and Scan Attack through Efficient Modeling Algorithm Signal Processing: Image Communication,” vol. 29, 2014. Crossref, 10.1016/j.image.2014.07.004.
[3] J. Hou, D. Kim and H. Lee, "Blind 3D Mesh Watermarking for 3D Printed Model by Analyzing Layering Artifact," in IEEE Transactions on Information Forensics and Security, vol. 12, no. 11, pp. 2712-2725, 2017. Doi: 10.1109/TIFS.2017.2718482.
[4] M. Asikuzzaman and M. R. Pickering, "An Overview of Digital Video Watermarking," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 28, no. 9, pp. 2131-2153, 2018. Doi: 10.1109/TCSVT.2017.2712162.
[5] Huang, Kai &Tian, Xiaobo& Yu, Hongzhou& Yu, Min & Yin, Aiguo, “A High Capacity Watermarking Technique for the Printed Document,” Electronics, vol. 8, pp. 1403, 2019. Crossref, 10.3390/electronics8121403.
[6] M. Asikuzzaman, M. J. Alam, A. J. Lambert, and M. R. Pickering, "Imperceptible and Robust Blind Video Watermarking using Chrominance Embedding: A Set of Approaches in the DT CWT Domain," IEEE Transactions on Information Forensics and Security, vol. 9, no. 9, pp. 1502–1517, 2014.
[7] J. M. Konstantinides, A. Mademlis, P. Daras, P. A. Mitkas, and M. G. Strintzis, "Blind Robust 3-D Mesh Watermarking Based on Oblate Spheroidal Harmonics," IEEE Transactions on Multimedia, vol. 11, no. 1, pp. 23–38, 2009.
[8] A. G. Bors, "Watermarking Mesh-Based Representations of 3-D Objects Using Local Moments," IEEE Transactions on Image Processing, vol. 15, no. 3, pp. 687–701, 2006.
[9] J. Bennour and J. Dugelay, "Protection of 3D Object through Silhouette Watermarking," IEEE International Conference on Acoustics, Speech and Signal Processing, vol. 2, pp. 221–224, 2006.
[10] E. Garcia and J. Dugelay, "Texture-Based Watermarking of 3D Video Objects," IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 853–866, 2003.
[11] D. C. Hwang, K. H. Bae, M. H. Lee, and E. S. Kim, "Real-Time Stereo Image Watermarking using Discrete Cosine Transform and Adaptive Disparity Maps," Proc. SPIE Multimedia Systems and Applications VI, vol. 5241, pp. 233–242, 2003.
[12] D. C. Hwang, K. H. Bae, and E. S. Kim, "Stereo Image Watermarking Scheme Based on Discrete Wavelet Transform and Adaptive Disparity Estimation," Proc. SPIE Mathematics of Data/Image Coding, Compression, and Encryption VI, vol. 5208, pp. 196–205, 2004.
[13] J. N. Ellinas, "Reversible Watermarking on Stereo Image Sequences," International Journal of Signal Processing, vol. 5, no. 3, pp. 210– 215, 2009.
[14] N. K. Dubey and S. Kumar, "A Review of Watermarking Application in Digital Cinema for Piracy Deterrence," Fourth International Conference on Communication Systems and Network Technologies, pp. 626-630, 2014. Doi: 10.1109/CSNT.2014.131.
[15] N. K. Dubey and S. Kumar, "An Effective Approach of DistortionResistant Video Watermarking for Piracy Deterrence," International Journal of Security and Its Applications, vol. 9, no. 1, pp. 283- 294, 2015.
[16] N. K. Dubey and H. Modi, "Comparatives Study of Various Techniques against Camcorder Piracy in Theater," 4th International Conference on Computing Communication and Automation (ICCCA), pp. 1-4, 2018. Doi: 10.1109/CCAA.2018.8777598.
[17] N. K. Dubey and H. Modi, "A New Paradigm: Psychovisual Modulation to Project Movie in Theatre to Get Rid of Theatre Piracy", Journal of Advanced Research in Dynamical and Control Systems, vol. 11, no. 1, pp. 313-319, 2019.
[18] Dinesh P S, Ramya R, Prabhadevi D, Dr. Palanisamy C, "Digital Fragile Watermarking Video Based on Discrete Wavelet Transformation," SSRG International Journal of Computer Science and Engineering, vol. 6, no. 11, pp. 5-9, 2019. Crossref, https://doi.org/10.14445/23488387/IJCSE-V6I11P102
[19] M. Lee, K. Kim and H. Lee, "Digital Cinema Watermarking for Estimating the Position of the Pirate," in IEEE Transactions on Multimedia, vol. 12, no. 7, pp. 605-621, 2010. Doi: 10.1109/TMM.2010.2061221.
[20] Gosavi, Chhaya& Mali, Suresh, “Secure, Robust Video Watermarking to Prevent Camcorder Piracy,” Indian Journal of Science and Technology, vol. 10, pp. 1-10, 2017. Crossref, 10.17485/ijst/2017/v10i18/111377.
[21] Y. Xiang, I. Natgunanathan, Y. Rong, and S. Guo, "Spread Spectrumbased High Embedding Capacity Watermarking Method For Audio Signals," IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 23, no. 12, pp. 2228–2237, 2015.
[22] M. Asikuzzaman, M. J. Alam, and M. R. Pickering, "A Blind and Robust Video Watermarking Scheme in the DT CWT And SVD Domain," Picture Coding Symposium, pp. 277–281, 2015.
[23] Q. Z. Hou, "Some Studies on Invoice Anti-Counterfeiting Based on Binary Image Watermarking Technology," Hangzhou Dianzi, 2015.
[24] J.-U. Hou, D.-G. Kim, S. Choi, and H.-K. Lee, "3d Print-Scan Resilient Watermarking using a Histogram-Based Circular Shift Coding Structure," in Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, New York, NY, USA, pp. 115– 121, 2015.
[25] N. T. B. Abdulla and K. A. Navas, "Robust Video Watermarking Resilient To Inadvertent Attacks," International Conference on Power Electronics and Renewable Energy Applications (PEREA), pp. 1-5, 2020. Doi: 10.1109/PEREA51218.2020.9339797.
[26] DhatreyeeEluri, and Raghu Ram, A. "Smart Maneuvering of Security Camera," SSRG International Journal of Electronics and Communication Engineering, vol. 9, no. 5, pp. 17-20, 2022. Crossref, https://doi.org/10.14445/23488549/IJECE-V9I5P103
[27] Mohammed, A.A., Salih, D.A., Saeed, A.M. et al., “An Imperceptible Semi-Blind Image Watermarking Scheme in DWT-SVD Domain using a Zigzag Embedding Technique,” Multimed Tools Appl, vol. 79, pp. 32095–32118, 2020. Crossref, https://doi.org/10.1007/s11042-020-09694-9
[28] Zhengwei Zhang, Mingjian Zhang, Liuyang Wang, "Reversible Image Watermarking Algorithm Based on Quadratic Difference Expansion", Mathematical Problems in Engineering, vol. 2020, pp. 8, 2020. Crossref, https://doi.org/10.1155/2020/1806024.
[29] ShahadAlmuzairai and NisreenInnab, "Video Watermarking System for Copyright Protection based on Moving Parts and Silence Deletion," International Journal of Advanced Computer Science and Applications(IJACSA), vol. 10, no. 2, 2019. Crossref, http://dx.doi.org/10.14569/IJACSA.2019.0100279
[30] Lagzian S, Soryani M, Fathy M, “Robust Watermarking Scheme Based on RDWT-SVD: Embedding Data in All Sub Bands,” IEEE, pp. 48-52, 2011.
[31] Chen, Po-Yueh& Lin, Chi-Long, “Print and Scan Resistant Watermarking Scheme for Colour Images,” The Imaging Science Journal, vol. 63, 2015. 1743131X15Y.000. 10.1179/1743131X15Y.0000000010.
[32] J. Hou, D. Kim and H. Lee, "Blind 3D Mesh Watermarking for 3D Printed Model by Analyzing Layering Artifact," in IEEE Transactions on Information Forensics and Security, vol. 12, no. 11, pp. 2712-2725, 2017. Doi: 10.1109/TIFS.2017.2718482.
[33] Li, L., Dong, Z., Lu, J., Dai, J., Huang, Q., Chang, C., & Wu, T, “AN H.264/AVC HDTV Watermarking Algorithm Robust to Camcorder Recording,” J. Vis. Commun. Image Represent, vol. 26, pp. 1-8, 2015.
[34] N. M. Makbol and B. E. Khoo, "Robust Blind Image Watermarking Scheme Based on Redundant Discrete Wavelet Transform and Singular Value Decomposition," AEU - International Journal of Electronics and Communications, vol. 67, no. 2, pp. 102 – 112, 2013.
[35] Jie, Sang & Qi, Liu & Chun-Lin, Song, “Robust Video Watermarking Using A Hybrid DCT-DWT Approach,” Journal of Electronic Science and Technology, vol. 18, pp. 100052, 2020. Crossref, 10.1016/j.jnlest.2020.100052.
[36] Ding, Dawei& Li, Zongzhi& Li, Shujia, “Image Watermarking Encryption Scheme Based on Fractional Order Chaotic System,” International Journal of Advanced Network, Monitoring and Controls, vol. 2, pp. 79-89, 2017. Crossref, 10.21307/ijanmc-2017-012.