A DNN robust video watermarking method in dual-tree complex wavelet transform domain

被引:3
作者
Chang, Xuanming [1 ]
Chen, Beijing [1 ,2 ]
Ding, Weiping [3 ]
Liao, Xin [4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Engn Res Ctr Digital Forens, Minist Educ, Nanjing 210044, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Nanjing 210044, Peoples R China
[3] Nantong Univ, Sch Informat Sci & Technol, Nantong 226019, Peoples R China
[4] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Peoples R China
基金
中国国家自然科学基金;
关键词
Video watermarking; Deep neural network; Dual-tree complex wavelet transform; 3D convolution; DIGITAL VIDEO; H.264/AVC;
D O I
10.1016/j.jisa.2024.103868
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning is increasingly being applied in the field of robust watermarking. However, the existing deep learning-based video watermarking methods only uses spatial domain information as the input and the robustness against attacks such as H.264/AVC compression is still not strong. Therefore, this paper proposes a deep learning-based robust video watermarking method in dual-tree complex wavelet transform (DT-CWT) domain. The video frames are transformed into the DT-CWT domain and the suitable high-pass subbands are selected as candidate embedding positions. Then, the 2D and 3D convolutions are combined to extract both intraframe spatial features and inter-frame temporal features for finding the stable and imperceptible coefficients for watermark embedding in the candidate positions. The convolutional attention module (CBAM) is used to further adjust the embedding coefficients and strengths. In addition, the attack layer, where a differentiable proxy is specially designed in this paper for the simulation of non-differentiable H.264/AVC compression, is introduced to generate distorted watermarked videos for improving the robustness against different attacks. Experimental results show that our method is superior to both the existing deep learning-based methods and traditional methods in the robustness against both spatial and temporal attacks while preserving high video quality. The source code is available at https://github.com/imagecbj/A-DNN-Robust-Video-Watermarking-Method-in-DT-C WT-Domain.
引用
收藏
页数:12
相关论文
共 43 条
[1]   Development of payload capacity enhanced robust video watermarking scheme based on symmetry of circle using lifting wavelet transform and SURF [J].
Agarwal, Himanshu ;
Husain, Farooq .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 59
[2]  
Zhang KA, 2019, Arxiv, DOI arXiv:1909.01285
[3]  
[Anonymous], 1998, P IEEE DIG SIGN PROC
[4]   Imperceptible and robust blind video watermarking using chrominance embedding: A set of approaches in the DT CWT domain [J].
Asikuzzaman, Md. ;
Alam, Md. Jahangir ;
Lambert, Andrew J. ;
Pickering, Mark Richard .
IEEE Transactions on Information Forensics and Security, 2014, 9 (09) :1502-1517
[5]   An Overview of Digital Video Watermarking [J].
Asikuzzaman, Md. ;
Pickering, Mark R. .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2018, 28 (09) :2131-2153
[6]   Robust DT CWT-Based DIBR 3D Video Watermarking Using Chrominance Embedding [J].
Asikuzzaman, Md. ;
Alam, Md. Jahangir ;
Lambert, Andrew J. ;
Pickering, Mark R. .
IEEE TRANSACTIONS ON MULTIMEDIA, 2016, 18 (09) :1733-1748
[7]  
Asikuzzaman M, 2015, 2015 PICTURE CODING SYMPOSIUM (PCS) WITH 2015 PACKET VIDEO WORKSHOP (PV), P277, DOI 10.1109/PCS.2015.7170090
[8]   A new chaotic complex map for robust video watermarking [J].
Ayubi, Peyman ;
Jafari Barani, Milad ;
Yousefi Valandar, Milad ;
Yosefnezhad Irani, Behzad ;
Sedagheh Maskan Sadigh, Reza .
ARTIFICIAL INTELLIGENCE REVIEW, 2021, 54 (02) :1237-1280
[9]   Watermarking of MPEG-4 video objects [J].
Barni, M ;
Bartolini, F ;
Checcacci, N .
IEEE TRANSACTIONS ON MULTIMEDIA, 2005, 7 (01) :23-32
[10]   A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition [J].
Begum, Mahbuba ;
Ferdush, Jannatul ;
Uddin, Mohammad Shorif .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (08) :5856-5867