An Improved Video Keyframe Detection Technique Leads to Video Authentication
An Improved Video Keyframe Detection Technique Leads to Video Authentication |
||
|
||
© 2023 by IJETT Journal | ||
Volume-71 Issue-4 |
||
Year of Publication : 2023 | ||
Author : B.S. Kapre, A. M. Rajurkar, D. S. Guru |
||
DOI : 10.14445/22315381/IJETT-V71I4P216 |
How to Cite?
B.S. Kapre, A. M. Rajurkar, D. S. Guru, "An Improved Video Keyframe Detection Technique Leads to Video Authentication," International Journal of Engineering Trends and Technology, vol. 71, no. 4, pp. 171-189, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I4P216
Abstract
Codec standard H.264/AVC compression has recently become more popular. Secure sharing of these videos is needed in applications like surveillance, remote sensing, telemedicine, and medical videos. Many times videos get edited, copied, and illegally distributed during transmission over public networks. Therefore, research on video watermarking based on this video compression standard has become very popular. In this research, a blind keyframe-based H.264/AVC video authentication technique is proposed. Embedding a watermark in each video frame increases the size of the video, and as well as it can be easily extracted by the attacker; adding a watermark in all frames is a time-consuming process. To avoid these problems, we propose a novel shot boundary detection algorithm by employing Karl-Pearson Correlation Coefficient (K-PCC) and Absolute Mean Difference (AMD), and SVD is used for the selection of keyframes. The proposed technique uses DWT, DCT, and Arnold Transform to generate a Content-Based Watermark (CBW) for each keyframe, enhancing security. These extracted keyframes are used for embedding and extraction of the watermarks. Further, DCT based embedding technique is used for embedding the watermark. The experimental findings demonstrate that the proposed method outperforms in terms of imperceptibility and robustness and can successfully detect shot boundaries under various camera actions. Also, the summarized video is effectively generated using the presented SVD-based key frame selection technique.
Keywords
K-Pearson Correlation Coefficient, Absolute Mean Difference, Video watermarking, Keyframe, DCT.
References
[1] Sandra Eliza Fontes Avila et al., “VSUMM: A Mechanism Designed to Produce Static Video Summaries and a Novel Evaluation Method,” Pattern Recognition Letters, vol. 32, no. 1, pp. 56–68, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Yassine Himeur, and Bachir Boudraa, “Secure and Robust Audio Watermarking System for Copyright Protection,” 2012 24th International Conference on Microelectronics (ICM), 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Nazeer Muhammad, and Nargis Bibi, “Digital Image Watermarking using Partial Pivoting Lower and Upper Triangular Decomposition into the Wavelet Domain,” IET Image Processing, vol. 9, no. 9, pp. 795–803, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Dawen Xu, Rangding Wang, and Yun Q. Shi, “Data Hiding in Encrypted h.264/AVC Video Streams by Codeword Substitution,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 4, pp. 596–606, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Nilesh Dubey, and Hardik Modi, “A State of Art Comparison of Robust Digital Watermarking Approaches for Multimedia Content (Image and Video) Against Multimedia Device Attacks,” International Journal of Engineering Trends and Technology, vol. 70, no. 8, pp. 132-139, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] K.Duraisamy, “Video Source Tracking and Copyright Protection in Video Watermarking,” SSRG International Journal of Communication and Media Science, vol. 1, no. 1, pp. 6-11, 2014.
[CrossRef] [Publisher Link]
[7] L. Agilandeeswari, and K. Ganesan, “A Robust Color Video Watermarking Scheme Based on Hybrid Embedding Techniques,” Multimedia Tools and Applications, vol. 75, pp. 8745–8780, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Yassine Himeur, and Karima Ait-Sadi, “Joint Color and Texture Descriptor using Ring Decomposition for Robust Video Copy Detection in Large Databases,” 2015 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Yassine Himeur, Karima Ait-Sadi, and Abdelmalik Ouamane, “A Fast and Robust Key-frames Based Video Copy Detection Using BSIF-RMI,” 2014 International Conference on Signal Proceedings and Multimedia Application (SIGMAP), 2014.
[Google Scholar] [Publisher Link]
[10] Dawen Xu, Rangding Wang, and Jicheng Wang, “A Novel Watermarking Scheme for H.264/AVC Video Authentication,” Signal processing: Image Communication, vol. 26, no. 6, pp. 267-279, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[11] T. Wiegand et al., “Overview of the H.264/AVC Video Coding Standard,” IEEE Transactions on Circuits and Systems for Video Technology, vol.13, no. 7, pp. 560–576, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Hanieh Khalilian, and Ivan V. Bajic, “Video Watermarking with Empirical PCA-based Decoding,” IEEE Transactions on Image Processing, vol. 22, no. 12, pp. 4825–4840, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Tanfeng Sun et al., “A Novel Differential Energy Video Watermarking Based on Watson Visual Model,” 2009 Second International Symposium on Electronic Commerce and Security, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[14] C.H. Wu et al., “A Flexible H.264/AVC Compressed Video Watermarking Scheme using Particle Swarm Optimization Based Dither Modulation,” AEU- International Journal of Electronics and Communications, vol. 65, no. 1, pp. 27-36, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Jiang Xuemei, Liu Quan, and Wu Qiaoyan, “A New Video Watermarking Algorithm Based on Shot Segmentation and Block Classification,” Multimedia Tools and Applications, vol. 62, pp. 545–560, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Ta Minh Thanh et al., “Robust Semi-blind Video Watermarking Based on Framepatch Matching,” AEU-International Journal of Electronics and Communications, vol. 68, no. 10, pp. 1007-1015, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Nisreen I. Yassin, Nancy M. Salem, and Mohamed I. Eladawy, “Block Based Video Watermarking Scheme using Wavelet Transform and Principle Component Analysis,” International Journal of Computer Science Issues, vol. 9, no. 1, pp. 296–301, 2012.
[Google Scholar] [Publisher Link]
[18] Ching-Sheng Hsu, and Young-Chang Hou, “A Visual Cryptography and Statistics Based Method for Ownership Identification of Digital Images,” World Academy of Science, Engineering and Technology, vol. 2, pp. 172–175, 2005.
[19] Majid Masoumi, and Shervin Amiri, “A Blind Scene-based Watermarking for Video Copyright Protection,” AEU-International Journal of Electronics and Communications, vol. 67, no. 6, pp. 528–535, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Jiang Xuemei, Liun Quan, and Wu Qiaoyan, “A New Video Watermarking Algorithm Based on Shot Segmentation and Block Classification,” Multimedia Tools and Applications, vol. 62, pp. 545–560, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Chen Li et al., “A Semi-Fragile Video Watermarking Algorithm Based on H.264/AVC,” Wireless Communications and Mobile Computing, vol. 2020, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Shahad Almuzairai, and Nisreen Innab, “Video Watermarking System for Copyright Protection based on Moving Parts and Silence Deletion,” International Journal of Advanced Computer Science and Applications, vol. 10, no. 2, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Sibaji Gaj, Ashish Singh Patel, and Arijit Sur, “Object Based Watermarking for H.264/AVC Video Resistant to Rst Attacks,” Multimedia Tools and Applications, vol. 75, pp. 3053-3080, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Y. Tonomura et al., “VideoMAP and VideoSpaceIcon: Tools for Automatizing Video Content,” In: Proceedings ACM INTERCHI’93 Conference, 1993.
[25] Hirotada Ueda, Takafumi Miyatake, and Satoshi Yoshizawa, “IMPACT: An Interactive Natural-motion-picture Dedicated Multimedia Authoring System,” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 343-350, 1991.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Yong Rui, T.S. Huang, and S. Mehrotra, “Exploring video Structure Beyond the Shots,” Proceedings IEEE International Conference on Multimedia Computing and Systems (ICMCS), 1998.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Alex Pentland et al., “Video and Image Semantics: Advanced Tools for Telecommunications,” IEEE MultiMedia, vol. 1, pp. 73–75, 1994.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Zhonghua Sun, and Ping Fu, “Combination of Color and Object Outline Based Method in Video Segmentation,” Proceedings of SPIE- The International Society for Optical Engineering, pp. 61-69, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Shaik Hedayath Basha et al., “Video Watermarking using DWT and Elgamal for Authentication and Security,” SSRG International Journal of Electronics and Communication Engineering, vol. 5, no. 1, pp. 4-9, 2018.
[CrossRef] [Publisher Link]
[30] Yassine Himeur, and Abdelkrim Boukabou, “A Robust and Secure Key-frames Based Video Watermarking System using Chaotic Encryption,” Multimedia Tools and Applications, vol. 77, pp. 8603-8627, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Zhila Bahrami, and Fardin Akhlaghian Tab, “A New Robust Video Watermarking Algorithm Based on SURF Features and Block Classification,” Multimedia Tools and Applications, vol. 77, pp. 327-345, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Soumik Das, Monalisa Banerjee, and Atal Chaudhuri, “An Improved Video Key-frame Extraction Algorithm Leads to Video Watermarking,” International Journal of Informatioan Tecnology, vol. 10, pp. 21-34, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Sethuraman Ponni alias Sathya, and Srinivasan Ramakrishnan, “Non-redundant Frame Identification and Keyframe Selection in DWT-PCA Domain for Authentication of Video,” IET Image Processing, vol. 14, no. 2, pp. 366-375, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Roop Singh, Himanshu Mittal, and Raju Pal, “Optimal Keyframe Selection-based Lossless Video-watermarking Technique Using IGSA in LWT Domain for Copyright Protection,” Complex & Intelligent Systems, vol. 8, pp. 1047-1070, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[35] S. Ponni alias Sathya, and S. Ramakrishnan, “Fibonacci Based Key Frame Selection and Scrambling for Video Watermarking in DWT–SVD Domain,” Wireless Personal Communications, vol. 102, pp. 2011-2031, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Chirag Sharma et al., “A Secured Frame Selection Based Video Watermarking Technique to Address Quality Loss of Data: Combining Graph Based Transform, Singular Valued Decomposition, and Hyperchaotic Encryption,” Security and Communication Networks, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Naveed Ejaz, Irfan Mehmood, and Sung Wook Baik, “Feature Aggregation Based Visual Attention Model for Video Summarization,” Computers and Electrical Engineering, vol. 40, no. 3, pp. 993–1005, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Chinh Dang, and Hayder Radha, “RPCA-KFE: Key Frame Extraction for Video Using Robust Principal Component Analysis,” IEEE Transactions on Image Processing, vol. 24, no. 11, pp. 3742–3753, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[39] M.G. Kendall, The Advanced Theory of Statistics, 4th Edition, Macmillan, 1979.
[40] P.S. Dinesh et al., “Digital Fragile Watermarking Video Based on Discrete Wavelet Transformation,” SSRG International Journal of Computer Science and Engineering, vol. 6, no. 11, pp. 5-9, 2019.
[CrossRef] [Publisher Link]
[41] Zhi Li, Xiao-Wei Chen, and Jianhua Ma, “Adaptively Imperceptible Video Watermarking Based on the Local Motion Entropy,” Multimedia Tools and Applications, vol. 74, pp. 2781–2802, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[42] Wang Xiang-yang et al., “A New Robust Digital Watermarking using Local Polar Harmonic Transform,” Computers and Electrical Engineering, vol. 46, pp. 403–418, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[43] David R. Bull, Communicating Pictures: A Course in Image and Video Coding, Cambridge: Academic Press, 2014.
[Google Scholar] [Publisher Link]
[44] Amal Hammami, Amal Ben Hamida, and Chokri Ben Amar, “Blind Semi-fragile Watermarking Scheme for Video Authentication in Video Surveillance Context,” Multimedia Tools and Applications, vol. 80, pp. 7479-7513, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[45] Preeti Garg, and R. Rama Kishore, “Performance Comparison of Various Watermarking Techniques,” Multimedia Tools and Applications, vol. 79, pp. 25921-25967, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[46] Mohammad Moosazadeh, and Gholamhossein Ekbatanifard, “An Improved Robust Image Watermarking Method using DCT and YCoCg-R Color Space,” Optik, vol. 140, pp. 975-988, 2017.
[CrossRef] [Google Scholar] [Publisher Link]