Next Article in Journal
An Underground Mine Ore Pass System Optimization via Fuzzy 0–1 Linear Programming with Novel Torricelli–Simpson Ranking Function
Next Article in Special Issue
Optimal Coherent Point Selection for 3D Quality Inspection from Silhouette-Based Reconstructions
Previous Article in Journal
Enhanced Automated Deep Learning Application for Short-Term Load Forecasting
Previous Article in Special Issue
Research on Multi-Objective Optimal Scheduling for Power Battery Reverse Supply Chain
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Anti-Recompression Video Watermarking Algorithm Based on H.264/AVC

1
College of Electronic Information Engineering, Shandong University of Science and Technology, Qingdao 266590, China
2
College of Electrical and Information Engineering, Hunan University, Changsha 410082, China
3
National Engineering Research Center of RVC, Changsha 410082, China
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(13), 2913; https://doi.org/10.3390/math11132913
Submission received: 24 May 2023 / Revised: 19 June 2023 / Accepted: 26 June 2023 / Published: 29 June 2023

Abstract

:
The problem of information security and copyright protection of video is becoming increasingly prominent. The current video watermarking algorithm does not have strong anti-compression, which has a significant impact on the visual effect of video. To solve this problem, this paper proposes a video watermarking algorithm based on H.264/AVC. The algorithm combines the non-zero quantization coefficient and the energy factor to select the appropriate chroma subblock, and then an optimized modulation is designed to embed the watermark into its DCT quantization coefficients in order to minimize the number of modifications of the subblocks. The invisibility and robustness experiments of the algorithm are conducted in the paper, and the Structural Similarity Indexes are above 0.99, and the False Bit Rates are all below 0.03. The results show that the algorithm has good invisibility, anti-compression performance and obvious advantages compared with other similar methods.

1. Introduction

Media technology and internet technology have provided great convenience for current video production and dissemination. However, the information security and copyright protection of video have also become prominent. Although digital watermarking technology can play a role in copyright protection, the current video watermarking algorithm has insufficient ability to resist re-compression.
At present, video watermarking is mainly divided into two categories: digital video watermarking algorithm based on the original domain or compressed domain [1]. The video watermarking algorithm based on the original domain embeds and extracts the watermark in the original video sequence without compression coding. It can be divided into video watermarking algorithms based on the space domain [2,3] or the transform domain [4,5,6,7]. Jerisha [2] et al. proposed a video watermarking algorithm in the space domain, which converts the original video frame from the original color space to HSV color space, and the watermark is embedded in a pair of coefficients in the HSV space. Fan [4] et al. proposed a video watermarking algorithm based on pseudo 3D-DCT (three-dimensional cosine transform). The algorithm performs the pseudo 3D-DCT transform on the low frequency component of NSCT (nonsubsampled contourlet transform) of the key frame group, and the encryption watermark is embedded into the NMF (non-negative matrix factorization) decomposition of the DC coefficient matrix of the 3D-DCT transform, which is strongly robust. Zhang [5] et al. proposed a blind video watermarking algorithm based on tensor decomposition, which uses the parity quantization of the maximum core tensor to realize the embedding and extraction of video watermarking.
Video watermarking based on the compressed domain is embedded and extracted in the process of video encoding and decoding or in the compressed video stream. Common video compression standards include MPEG-X [8], H.264/AVC [9,10], H.265/HEVC [11,12] and 3D-HEVC [13,14]. The video watermarking algorithm in H.264 encoding mode can be divided into three types: the video watermarking algorithm based on motion vector [15,16]; DCT (discrete cosine transform) coefficient; and entropy encoded codeword. Yang [15] et al. proposed a fragile video watermarking algorithm based on motion vector, extracted the feature code from the energy block of I frame, used the minimum Lagrange function search, and embedded the watermark in the motion vector with the best rate distortion performance in the macroblock with small segmentation mode. Sun [16] et al. proposed a bit-watershed video watermarking algorithm based on moving target detection. The algorithm embeds the watermark in the level codeword after P-frame entropy coding.
It is common to embed watermarking in DCT coefficients after video transform and coding. Liu [17] et al. proposed a video watermarking algorithm based on chromaticity residual DCT, selected the subblock with the largest residual, and embedded the watermark by modulating the three coefficients. Chen [18] et al. proposed a semi-fragile video watermarking algorithm that can achieve frame attack and video tamper detection at the same time. The frame number is used as the watermark information, and the relationship between non-zero DCT coefficients is used as the authentication code, and the watermark is embedded in subblocks with multiple non-zero coefficients. Xue [19] et al. designed a cost function combining block distortion, bit rate change and block complexity to select texture regions and embed the watermark with minimum distortion. Sun [20] et al. embedded the watermark into the DCT subblock by modulating the positive and negative coefficients of the watermark, and the algorithm can be applied to video sequences with different resolutions. Nguyen [21] et al. used an entropy encoder to encode the original video stream into intra-frame patterns and QDCT coefficients, and then constructed a two-dimensional histogram of the QDCT coefficients to embed the watermark by using the coefficient pair mapping (CPM) method.
In general, among the existing video watermarking algorithms, the embedded watermark has a great impact on the video quality, and the anti-recompression ability is insufficient. In order to solve this problem, this paper proposes a video watermarking algorithm based on H.264/AVC for anti-recompression. This algorithm embeds watermarking in the QDCT (quantification discrete cosine transform) coefficient of the video I frame chroma subblock. The modulation method combines the characteristics of video and watermark, which has little impact on the video quality. The experimental results show that the algorithm takes into account the invisibility and robustness, and significantly improves the anti-re-compression ability of the video.

2. H.264 Compression Standard and Watermark Embedding Location Selection

2.1. H.264/AVC Video Compression Standard

H.264 is a video coding standard issued by the joint video group composed of the International Organization for Standardization and ITU. It is one of the most widely used video coding methods at present. Figure 1 shows the principle block diagram of H.264 video coding [22]. H.264 includes I frame, P frame and B frame, wherein I frame is a full-frame compression coding frame, which is generated without reference to other pictures, and P frame is a prediction frame generated by reference to the previous I frame and P frame prediction coding. The main process of H.264 coding is to first perform DCT transform and quantization of the residual between the current frame and the predicted frame, and then entropy encode the obtained quantization coefficient sequence and write it into the code stream. According to the characteristics of the video frame, the encoder selects intra prediction or inter prediction to process the video frame, I frame uses intra prediction coding mode to encode, and P frame uses inter prediction to encode the image.
The H.264 video decoding process is shown in Figure 2. The decoder obtains data information from the code stream, obtains transform coefficients through entropy decoding and reordering, and obtains residual blocks through inverse quantization and inverse DCT transformation. At the same time, the decoder uses the header information obtained from the code stream to make the intra prediction and generate prediction blocks. The decoder adds the prediction block and the residual block to obtain the frame image, which is filtered and reconstructed to obtain the decoded image.

2.2. Watermark Embedding Position Selection

The watermark is embedded in the encoding process of H.264. The embedding position can be selected from I frame or P frame, chroma block or brightness block. I frame will participate in the encoding process of P frame as a reference frame, and the experiment found that embedding watermarking on the chroma subblock can be more resistant to recompression than the brightness subblock, so embedding watermark on the QDCT coefficient of I frame chroma subblock has less impact on the video.
For the selection of I frame chroma subblock embedded with watermark, this paper combines the number of NNZ (non-zero coefficients) and Ef (energy factor) as the condition of subblock selection, that is, the definition function:
C ( i ) = N N Z ( i ) + E f ( i )
where i represents the i-th 4 × 4 chroma block; N N Z ( i ) represents the number of non-zero coefficients of the i-th subblock; E f ( i ) represents the energy factor of the i-th subblock and is the sum of the absolute values of the quantization transformation coefficients of the i-th subblock.
The specific selection method is to first select the third non-zero quantization coefficient of all I frame chroma subblocks that is not 2 or −2, then calculate the C value of the selected subblocks and select several subblocks with the largest C value as the watermark embedding objects.

3. Watermark Embedding and Extraction Algorithm

3.1. Video Watermark Embedding Algorithm

The video watermark embedding algorithm framework in this paper is shown in Figure 3. The algorithm can be applied to color video. First all I-frames and their chromaticity subblocks are extracted for color video sequences in the compression process, and the subblocks to be embedded are selected according to the C-value size of each subblock; Then, according to the characteristics of the video and watermark, the modulation mode is determined adaptively; after modulation by the third non-zero quantized DCT coefficient of the subblock, the watermark is embedded; The watermarks are replayed back to the I frame and the H.264 encoding is continued. Finally, the H.264 encoded video containing watermark is outputted.

3.1.1. Modulation Mode of Watermark

When embedding the watermark, the third quantization coefficient in the selected subblock needs to be modulated, which may affect the video quality. In order to reduce the impact, the subblock with large C value is selected in this paper. The modulation mode is determined according to whether the third quantization coefficient of the subblock is ±1, and the strong interference with the third quantization coefficient of the subblock is ±2 is also excluded; In addition, four modulation modes are given in this paper, and which modulation mode is selected is determined by parameters to minimize the number of modified subblocks. After analyzing and synthesizing the characteristics of existing methods and video subblocks, and after experimental verification, the optimized modulation method and the associated expressions are given. The four modulation modes are as follows:
Modulation mode 1:
Q 3 k = Q 3 k + 1   i f   W ( k ) = 1   a n d   Q 3 k = 1 1   i f   W ( k ) = 0   a n d   Q 3 k 1 Q 3 k   o t h e r
Modulation mode 2:
Q 3 k = Q 3 k + 1   i f   W ( k ) = 0   a n d   Q 3 k = 1 1   i f   W ( k ) = 1   a n d   Q 3 k 1 Q 3 k   o t h e r
Modulation mode 3:
Q 3 k = Q 3 k 1   i f   W ( k ) = 1   a n d   Q 3 k = 1 1   i f   W ( k ) = 0   a n d   Q 3 k 1 Q 3 k   o t h e r
Modulation mode 4:
Q 3 k = Q 3 k 1   i f   W ( k ) = 0   a n d   Q 3 k = 1 1   i f   W ( k ) = 1   a n d   Q 3 k 1 Q 3 k   o t h e r
where, Q 3 k is the third non-zero quantization coefficient of the k-th subblock; Q 3 k is the third non-zero quantization coefficient of the kth subblock after modulation; W ( k ) is the watermark sequence ( k = 1 , 2 , , 1024 ) .
The parameters S i of each modulation method are specified as follows:
S 1 = k = 1 1024 a ( k ) , S 2 = k = 1 1024 a ˜ ( k )
S 3 = k = 1 1024 b ( k ) , S 4 = k = 1 1024 b ˜ ( k )
where, a ( k ) = W ( k )   i f   Q 3 k = 1 W ˜ ( k )   i f   Q 3 k 1 , b ( k ) = W ( k )   i f   Q 3 k = 1 W ˜ ( k )   i f   Q 3 k 1   , If a ( k ) , b ( k ) is 1, it means the k-th subblock needs to be modified; if it is 0, it means the k-th subblock does not need to be modified; the symbol “~” indicates the inverse. Therefore, S i indicates the number of subblocks that need to be modified by the i-th modulation method. In this paper, the modulation method corresponding to the smallest value of S i is selected for embedding the watermark, which can further reduce the impact of watermark embedding on the video to improve the anti-compression performance of the watermark.

3.1.2. Watermark Embedding Process

The detailed steps for watermark embedding are shown in Algorithm 1, as follows:
(1)
The watermarked image of size 32 × 32 is encrypted by Arnold scrambling, and then it is converted into a watermark sequence W ( k )   ( k = 1 , 2 , , 1024 ) of size 1 × 1024 .
(2)
The H.264/AVC encoder is used to encode the video to the end of quantization, exclude the third I frame chroma subblock with non-zero quantization factor of 2 or −2, calculate the C value of the remaining chroma subblocks, select the 1024 subblocks with the largest C value as the watermark subblocks to be embedded, and record the position of the subblocks in the D array.
(3)
The S i of each subblock to be embedded is judged, to determine the modulation mode according to their minimum value and to modify the value of Q 3 k to achieve watermark embedding, and embed 1-bit watermark information in each subblock.
(4)
After embedding all the watermarks, the subblocks are put back to their original positions and video coding continued to obtain the H.264 video stream with watermarks.
Algorithm 1:Watermark embedding algorithm.
Input:Video sequence V, Watermark image img
InitializeW1 = zeros(32,32), W = zeros(1,1024)
Begin:W1 = Arnold(img)
W = reshape(W1,1,1024)
Encode V with H.264 encoding
Extract chroma subblocks of all I frames in V
Calculate the C of each subblock     /*C = NNZ + Ef*/
Select 1024 subblocks B k with the largest C   /*k = 1, 2, 3, ..., 1024*/
Store the position of B k in D
Calculate S i of B k
Select and record the modulation mode M corresponding to the minimum value in S i
By modulating the third non-zero coefficient of B k to embed W(k), B k is obtained
Put B k back to I frame
Put I frame back in V
Continue to encode V with H.264 encoding
Output:Video with watermark V 1 , Subblock location D, Modulation mode M

3.2. Video Watermark Extraction Algorithm

The framework of the video watermark extraction algorithm is shown in Figure 4. Firstly, the video to be detected extracts all I frames in the decoding process, extracts the chroma subblock according to the recorded position in D, demodulates the chroma subblock according to the recorded modulation mode, extracts the watermark sequence, and obtains the watermark image after boosting and inverting the disorder. The pseudo code of watermark extraction is shown in Algorithm 2. The extraction methods corresponding to the four modulation methods are as follows:
The extraction method for modulation method 1 is:
w ( k ) = 1   i f   q 3 k 1 0   i f   q 3 k = 1
where w ( k ) denotes the k-th watermark value and q 3 k is the third non-zero quantization factor in the k-th subblock.
The extraction method for modulation method 2 is:
w ( k ) = 1   i f   q 3 k = 1 0   i f   q 3 k 1
The extraction method for modulation method 3 is:
w ( k ) = 1   i f   q 3 k 1 0   i f   q 3 k = 1
The extraction method for modulation method 4 is:
w ( k ) = 1   i f   q 3 k = 1 0   i f   q 3 k 1
Algorithm 2:Watermark extraction algorithm
Input:Video to be detected v2, Subblock location D, Modulation mode M
Initialize:w = zeros(1,1024), w1 = w2 = zeros(32,32)
Begin:Decode v2 with H.264 decoding
Extract all I frames in v2
Extract subblocks to be detected b l in all I frames according to D
/*l = 1, 2, 3, ..., 1024*/
Determine the demodulation algorithm according to the modulation mode M
Demodulate b l and extract w(l)
w1 = reshape(w,32,32)
w2 = IArnold(w1)/*IArnold is the inverse transformation of Arnold*/
Output:The extracted watermark image w2

4. Experimental Results and Analysis

The experiments were conducted on Visual Studio2021 and MATLAB2016b platforms, using the H.264/AVC test model JM8.6 for video encoding and decoding, and programming in the C-language. The specific settings of the experimental parameters are shown in Table 1. In this paper, Hall.qcif, Mobile.qcif, Foreman.qcif, News.qcif, Stefan.cif and Bus.cif are selected as the test videos, among which, Stefan.cif is 90 frames, Bus.cif is 150 frames and all other videos are 300 frames.

4.1. Subblock Selection Rationality Experiments

In this paper, experiments were conducted on different subblock selection methods, and the total watermark experiments were conducted according to the subblocks selected by different methods. Figure 5 shows the extracted watermark BER (bit error rate) values for each group of experiments under the requantization attack, and the BER is calculated as in Equation (12). The combination of NNZ and Ef is 1 as the screening subblock condition in this paper, 2 is using only NNZ as the screening subblock condition, and 3 is using only Ef as the screening subblock condition. As can be seen from Figure 5, the BER values of 1 are mostly lower than those of 2 and 3, so the combination of NNZ and Ef for selecting subblocks results in better anti-requantization performance.
B E R = 1 P × Q ( i = 0 P 1 j = 0 Q 1 w ( i , j ) w ( i , j ) )
where w is the original watermark, w is the extracted watermark, P and Q are the size of the watermark, is XOR operation.

4.2. Invisibility Experiment

The algorithm in this paper is based on the video and watermark characteristics to select the modulation method that has the least modification to the video, thus greatly reducing the impact of the embedding of the watermark on the video quality. In this paper, we use PSNR (peak signal to noise ratio) and SSIM (structural similarity index) as video quality evaluation indexes to embed watermarks in six videos to experiment with the invisibility of the algorithm, and the results are shown in Table 2.
In Table 2, PSNR1 is the PSNR value of the encoded video image and the original video image, and PSNR2 is the PSNR value of the video image and the original video image after embedding the watermark and encoding. It can be seen that the PSNR value of the video after embedding the watermark decreases very little compared with that before embedding, which is no more than 0.2 dB, and the SSIM values are all above 0.99, which indicates that the algorithm in this paper has good invisibility. Moreover, Stefan’s experimental results show that although the video has only 90 frames, the SSIM is still above 0.99 when embedding the same size watermark as in other videos, which indicates that the algorithm from this paper has good invisibility for videos with fewer frames.

4.3. Anti-Recompression and Anti-Requantization Test

4.3.1. Anti-Recompression Test

Recompression and requantization are the two main attacks on the video, and experiments on both are conducted separately in this paper. In the anti-recompression experiment, the experimental video is recompressed with equal quantization values (the original quantization parameter is 20). The paper uses the normalized correlation coefficient NC (normalized correlation) and the false bit rate BER as evaluation metrics, and when the NC value is greater than 0.8, the correlation between the two watermarked images is higher and the algorithm is more robust [23]. The NC is calculated as follows:
N C = i = 0 P 1 j = 0 Q 1 w ( i , j ) × w ( i , j ) / i = 0 P 1 j = 0 Q 1 ( w ( i , j ) ) 2 × i = 0 P 1 j = 0 Q 1 ( w ( i , j ) ) 2
where w is the original watermark, w is the extracted watermark, P and Q are the size of the watermark.
Figure 6 shows the NC and BER values of the watermark extracted from the experimental video after the first, second and third recompressions, respectively. It can be seen that the NC values of the watermarks extracted from the experimental videos after three recompressions are above 0.98 and the BER are below 0.016, which indicates that the algorithm has a strong resistance to recompression.

4.3.2. Anti-Requantization Attack

In this paper, experiments are performed on videos under different QP (quantization parameter) for the heavy compression attack. In the experiment, the initial QP is 20, and then a requantization attack with QP from 16 to 23 is performed to calculate the NC and BER values for the extracted watermarked images. The results are shown in Figure 7, the abscissa is the QP value, and the error rates of the extracted watermarks after requantization are all below 0.14, indicating that this algorithm can resist the requantization attack well, especially when the QP is reduced.

4.4. Bit Increase Rate Experiment

Because the watermark will modify the data in the video during the embedding process, the size of the video will change and affect the transmission of the video in the network. Therefore, this paper uses the bit increase rate index to measure video network affinity. The smaller the bit increase rate, the better video affinity can be obtained. The bit increase rate is calculated as follows:
B I R = ( ( B I R w a t e r B I R o r g ) / B I R o r g ) × 100 %
where, B I R w a t e r is the bit rate after the video is embedded with the watermark, and B I R o r g is the bit rate before the video is embedded with the watermark.
Figure 8 shows the bit increase rate of the proposed algorithm, all of which are lower than 0.04, indicating that the proposed algorithm has good real-time performance.

4.5. Complexity Experiment

Considering the computational complexity of the algorithm in this paper, the time required for encoding and decoding before and after embedding the watermark was measured. The experimental results comparing the encoding and decoding time of the original video and the encoding and decoding time of the video with watermark are shown in Table 3. It can be seen that before and after embedding the watermark, the time difference of encoding is no more than 5.262 s, and the time difference of decoding is no more than 5.093 s, and the complexity is low.

4.6. Comparison Experiments with Similar Algorithms

We also conducted comparison experiments with an algorithm from the literature [24,25]. The experimental parameter settings are consistent with the comparison literature, and the data values of the comparison literature are taken from the original paper. The paper [24] is the first quantization coefficient that embeds the watermark into the subblock by selecting the subblock for embedding the watermark based on the video texture information and motion vector entropy. The paper [25] achieves the embedding of the watermark by modifying the positive and negative signs of the non-zero DCT coefficients of the chromaticity subblock. The algorithm in this paper differs from the comparison algorithm in that the modulation can be determined according to the video and watermark characteristics after selecting the subblock to achieve a more robust and invisible video watermark.

4.6.1. Invisibility Comparison

The initial QP from the literature [24] is 20, and the initial QP from the literature [25] is 28. In this paper, when performing the invisibility comparison experiment, the initial QP was consistent with the comparison literature. Table 4 and Table 5 show the invisibility experimental results of the three algorithms, and it can be seen that the SSIM value of this algorithm is higher than that of the literature [24,25], which indicates that this algorithm has better invisibility.

4.6.2. Comparison of Recompression and Requantification

Figure 9 shows the results of the gravimetric comparison experiment with the literature [24]. In the literature [24], the initial QP in the gravimetric experiment is 20, and the value range of QP in the second compression is [16,23]. It can be seen from Figure 9 that the BER value of this algorithm is lower than that of the literature [24] and has better robustness.
Table 6 shows the results of comparative experiments with the literature [25]. In the literature [25], the initial QP of the anti re-compression experiment is 28, the initial QP of the requantification experiment is 24, and the QP of the second compression is 22. From Table 6, it can be seen that the algorithm has better performance of anti-compression and quantification than the literature [25].

5. Conclusions

This paper presents an anti-recompression video watermarking algorithm based on H.264/AVC. The algorithm optimizes subblock selection and watermark embedding with the proposed modulation method to minimize the number of subblock modifications. In experiments, the SSIM of the algorithms are above 0.99, the NC values are greater than 0.9, BER is 0.0271—lower than the comparison algorithms. The experimental results show that the proposed algorithm can resist the recompression and requantification attacks well, and the video quality changes little. Compared with other similar methods, it has more advantages.
The algorithm in this paper can be used to solve the security and copyright problems in the current video compression domain, and can be used to identify and protect the copyright of images in videos. At present, the information such as subblock position and modulation method is also needed in the watermark extraction. It is a non-blind watermark. Future research continues on blind extraction of watermarks and examination of algorithm performance under noise, clipping and other image attacks.

Author Contributions

D.F. the first author, proposed and completed the algorithm to guide the experiment and data analysis. Revising and improving the paper. H.Z. the second author, proposed and improved algorithms, and was responsible for experiments and data sorting. Wrote this paper. C.Z. the third author, assisted in experiments and data processing, and was responsible for drawing tables, etc. H.L. the forth author, assisted in the collaborative paper, improved the chart formula, and checked the whole paper. X.W. the corresponding author, supported the proposal and improvement of algorithms, and guided the ideas and schemes of experiments and data analysis. All authors have read and agreed to the published version of the manuscript.

Funding

The research was supported by the following projects: Scientific research project of National Language Commission (YB135-125).

Data Availability Statement

The datasets used and/or analysed during the current study available from the corresponding author on reasonable request.

Conflicts of Interest

The authors declare that there is no conflict of interest regarding the publication of this paper.

References

  1. Wang, Y.F.; Zhou, Y.M.; Qian, Z.X.; Li, S.; Zhang, X.P. Review of robust video watermarking. J. Image Graph. 2022, 27, 27–42. [Google Scholar]
  2. Liby, J.J.; Jaya, T. HSV model based data hiding in video for watermark applications. J. Intell. Fuzzy Syst. 2021, 41, 2731–2742. [Google Scholar] [CrossRef]
  3. Amiri, M.D.; Amiri, A.; Meghdadi, M. HVS-based scalable video watermarking. Multimed. Syst. 2019, 25, 273–291. [Google Scholar] [CrossRef]
  4. Di, F.; Zhang, X.; Kang, W.; Zhao, H.; Lv, Y. Video watermarking algorithm based on NSCT, pseudo 3D-DCT and NMF. Sensors 2022, 22, 4752. [Google Scholar]
  5. Zhang, S.; Guo, X.; Xu, X.; Li, L.; Chang, C.-C. A video watermark algorithm based on tensor decomposition. Math. Biosci. Eng. 2019, 16, 3435–3449. [Google Scholar] [CrossRef] [PubMed]
  6. Sun, W.; Zhao, H.; Zhang, X.; Sun, Y.; Liu, X.; Lv, X.; Fan, D. Zero-watermarking algorithm for audio and video matching verification. Aims Math. 2022, 7, 8390–8407. [Google Scholar] [CrossRef]
  7. Asikuzzaman, M.; Mareen, H.; Moustafa, N.; Choo, K.K.R.; Pickering, M.R. Blind camcording-resistant video watermarking in the DTCWT and SVD domain. IEEE Access 2022, 10, 15681–15698. [Google Scholar] [CrossRef]
  8. Rajpal, A.; Mishra, A.; Bala, R. A novel fuzzy frame selection based watermarking scheme for MPEG-4 videos using Bi-directional extreme learning machine. Appl. Soft Comput. 2019, 74, 603–620. [Google Scholar] [CrossRef]
  9. Li, Y.; Wang, H. Robust H.264/AVC video watermarking without intra distortion drift. Multimed. Tools Appl. 2019, 78, 8535–8557. [Google Scholar] [CrossRef]
  10. Ghasempour, M.; Ghanbari, M. A low complexity system for multiple data embedding into H.264 Coded video bit-Stream. IEEE Trans. Circuits Syst. Video Technol. 2020, 30, 4009–4019. [Google Scholar] [CrossRef]
  11. Zhou, Y.; Wang, C.; Zhou, X. An Intra-Drift-Free robust watermarking algorithm in high efficiency video coding compressed domain. IEEE Access 2019, 7, 132991–133007. [Google Scholar] [CrossRef]
  12. Kaur, G.; Kasana, S.S.; Sharma, M.K. An efficient authentication scheme for high efficiency video coding/H.265. Multimed. Tools Appl. 2019, 78, 21245–21271. [Google Scholar] [CrossRef]
  13. El-Shafai, W.; El-Rabaie, S.; El-Halawany, M.M.; El-Samie, F.E.A. Security of 3D-HEVC transmission based on fusion and watermarking techniques. Multimed. Tools Appl. 2019, 78, 27211–27244. [Google Scholar] [CrossRef]
  14. Yi, Y.; Feng, G. A Video Zero-watermarking algorithm against recompression coding for 3D-HEVC. J. Signal Process. 2020, 36, 778–786. [Google Scholar]
  15. Yang, J.; Zheng, G. A fragile video watermarking algorithm based on motion vectors. Electron. Des. Eng. 2017, 25, 153–156. [Google Scholar]
  16. Sun, J.; Jiang, X.; Liu, J.; Zhang, F.; Li, C. An anti-Recompression video watermarking algorithm in bitstream domain. Tsinghua Sci. Technol. 2021, 26, 22–30. [Google Scholar] [CrossRef]
  17. Liu, K.; Li, C.; Tian, L.; Zhang, Y.; Song, H. A video watermarking algorithm against re-compression based on H.264/AVC. Comput. Appl. Softw. 2018, 35, 163–168. [Google Scholar]
  18. Li, C.; Yang, Y.; Liu, K.; Tian, L. A semi-Fragile video watermarking algorithm based on H.264/AVC. Wirel. Commun. Mob. Comput. 2020, 2020, 8848553. [Google Scholar] [CrossRef]
  19. Xue, Y.; Zhou, J.; Zeng, H.; Zhong, P.; Wen, J. An adaptive steganographic scheme for H.264/AVC video with distortion optimization. Signal Process. Image A Publ. Eur. Assoc. Signal Process. 2019, 76, 22–30. [Google Scholar] [CrossRef]
  20. Sun, Y.; Wang, J.; Huang, H.; Chen, Q. Research on scalable video watermarking algorithm based on H. 264 compressed domain. Optik 2021, 227, 165911. [Google Scholar] [CrossRef]
  21. Nguyen, T.S. Reversible Data Hiding Scheme Based on Coefficient Pair Mapping for Videos H. 264/AVC without Distortion Drift. Symmetry 2022, 14, 1768. [Google Scholar] [CrossRef]
  22. Tian, L.; Dai, H.; Li, C. A semi-fragile video watermarking algorithm based on chromatic Residual DCT. Multimed. Tools Appl. 2020, 79, 1759–1779. [Google Scholar] [CrossRef]
  23. Di, F.; Sun, W.; Zhao, H.; Kang, W. Audio and video matching zero-watermarking algorithm based on NSCT. Complexity 2022, 2022, 3445583. [Google Scholar]
  24. Ding, H.; Tao, R.; Sun, J.; Liu, J.; Zhang, F.; Jiang, X.; Li, J. A compressed-domain robust video watermarking against recompression attack. IEEE Access 2021, 9, 35324–35337. [Google Scholar] [CrossRef]
  25. Dai, H.; Tian, L.; Li, C. Video watermarking algorithm against recompression based on chromatic DCT. Comput. Eng. Des. 2019, 40, 1218–1224. [Google Scholar]
Figure 1. Structure diagram of H.264/AVC encoder.
Figure 1. Structure diagram of H.264/AVC encoder.
Mathematics 11 02913 g001
Figure 2. Structure diagram of H.264/AVC decoder.
Figure 2. Structure diagram of H.264/AVC decoder.
Mathematics 11 02913 g002
Figure 3. Watermark embedding algorithm framework.
Figure 3. Watermark embedding algorithm framework.
Mathematics 11 02913 g003
Figure 4. Watermark extraction algorithm framework.
Figure 4. Watermark extraction algorithm framework.
Mathematics 11 02913 g004
Figure 5. Requantization BER value under different screening conditions.
Figure 5. Requantization BER value under different screening conditions.
Mathematics 11 02913 g005aMathematics 11 02913 g005b
Figure 6. BER and NC values under recompression attack.
Figure 6. BER and NC values under recompression attack.
Mathematics 11 02913 g006
Figure 7. BER and NC values under requantization attack.
Figure 7. BER and NC values under requantization attack.
Mathematics 11 02913 g007
Figure 8. Experimental results of bit increase rate.
Figure 8. Experimental results of bit increase rate.
Mathematics 11 02913 g008
Figure 9. Comparison of BER values between the algorithm in this paper and the algorithm in the literature [24] under the recompression attack.
Figure 9. Comparison of BER values between the algorithm in this paper and the algorithm in the literature [24] under the recompression attack.
Mathematics 11 02913 g009
Table 1. Experimental parameter configuration.
Table 1. Experimental parameter configuration.
Parameter TypeParameter Value
Frame rate30 fps
GOP structureIPPP
Coding gradeBaseline
Entropy coding typeCACVL
Quantitative parameters20
Table 2. PSNR and SSIM values of video after embedding watermark.
Table 2. PSNR and SSIM values of video after embedding watermark.
Experiment VideoPSNR1PSNR2SSIM
Foreman35.615135.51840.9992
News35.916435.72820.9974
Mobile30.610730.53900.9991
Hall36.078235.86110.9986
Stefan34.616034.46900.9968
Bus34.771934.72320.9993
Table 3. Time complexity experiment results.
Table 3. Time complexity experiment results.
Experiment VideoOriginal
Encoding
Watermarking EncodingDifferenceOriginal
Decoding
Watermarking DecodingDifference
Foreman340.237345.4995.262123.944125.1721.228
News299.304302.8263.522118.118120.3982.28
Mobile359.185361.1521.967126.979121.8865.093
Hall315.482317.8782.396135.158132.6402.518
Table 4. The invisibility comparison between the algorithm in this paper and the algorithm in [24].
Table 4. The invisibility comparison between the algorithm in this paper and the algorithm in [24].
Experiment VideoSSIM of Ref. [24]SSIM of Ours
Mobile0.99510.9991
Stefan0.98450.9968
Foreman0.99410.9992
Bus0.99010.9993
Hall0.97630.9986
Table 5. The invisibility comparison between the algorithm in this paper and the algorithm in [25].
Table 5. The invisibility comparison between the algorithm in this paper and the algorithm in [25].
Experiment VideoSSIM of Ref. [25]SSIM of Ours
Mobile0.9880.9967
News0.9700.997
Tempete0.9880.9962
Flower0.9720.9994
Waterfall0.9810.9979
Table 6. Comparison between the algorithm in this paper and the algorithm in [25] under the recompression and requantization attack.
Table 6. Comparison between the algorithm in this paper and the algorithm in [25] under the recompression and requantization attack.
Experiment VideoNC Value under Recompression AttackBER Value under Recompression AttackBER Value under Requantification Attack
Ref. [25]OursRef. [25]OursRef. [25]Ours
Mobile0.980.99680.030.00290.140.0225
News0.921----
Tempete0.940.980.10.01370.130.0205
Flower0.970.9989--0.140.0225
Waterfall0.910.99260.170.0078--
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Fan, D.; Zhao, H.; Zhang, C.; Liu, H.; Wang, X. Anti-Recompression Video Watermarking Algorithm Based on H.264/AVC. Mathematics 2023, 11, 2913. https://doi.org/10.3390/math11132913

AMA Style

Fan D, Zhao H, Zhang C, Liu H, Wang X. Anti-Recompression Video Watermarking Algorithm Based on H.264/AVC. Mathematics. 2023; 11(13):2913. https://doi.org/10.3390/math11132913

Chicago/Turabian Style

Fan, Di, Huiyuan Zhao, Changying Zhang, Hongyun Liu, and Xiaoming Wang. 2023. "Anti-Recompression Video Watermarking Algorithm Based on H.264/AVC" Mathematics 11, no. 13: 2913. https://doi.org/10.3390/math11132913

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop