To address the challenges of video copyright protection and ensure the perfect recovery of original video,we propose a dual-domain watermarking scheme for digital video,inspired by Robust Reversible Watermarking(RRW)t...To address the challenges of video copyright protection and ensure the perfect recovery of original video,we propose a dual-domain watermarking scheme for digital video,inspired by Robust Reversible Watermarking(RRW)technology used in digital images.Our approach introduces a parameter optimization strategy that incre-mentally adjusts scheme parameters through attack simulation fitting,allowing for adaptive tuning of experimental parameters.In this scheme,the low-frequency Polar Harmonic Transform(PHT)moment is utilized as the embedding domain for robust watermarking,enhancing stability against simulation attacks while implementing the parameter optimization strategy.Through extensive attack simulations across various digital videos,we identify the optimal low-frequency PHT moment using adaptive normalization.Subsequently,the embedding parameters for robust watermarking are adaptively adjusted to maximize robustness.To address computational efficiency and practical requirements,the unnormalized high-frequency PHT moment is selected as the embedding domain for reversible watermarking.We optimize the traditional single-stage extended transform dithering modulation(STDM)to facilitate multi-stage embedding in the dual-domain watermarking process.In practice,the video embedded with a robust watermark serves as the candidate video.This candidate video undergoes simulation according to the parameter optimization strategy to balance robustness and embedding capacity,with adaptive determination of embedding strength.The reversible watermarking is formed by combining errors and other information,utilizing recursive coding technology to ensure reversibility without attacks.Comprehensive analyses of multiple performance indicators demonstrate that our scheme exhibits strong robustness against Common Signal Processing(CSP)and Geometric Deformation(GD)attacks,outperforming other advanced video watermarking algorithms under similar conditions of invisibility,reversibility,and embedding capacity.This underscores the effectiveness and feasibility of our attack simulation fitting strategy.展开更多
Beyond-5G(B5G)aims to meet the growing demands of mobile traffic and expand the communication space.Considering that intelligent applications to B5G wireless communications will involve security issues regarding user ...Beyond-5G(B5G)aims to meet the growing demands of mobile traffic and expand the communication space.Considering that intelligent applications to B5G wireless communications will involve security issues regarding user data and operational data,this paper analyzes the maximum capacity of the multi-watermarking method for multimedia signal hiding as a means of alleviating the information security problem of B5G.The multiwatermarking process employs spread transform dither modulation.During the watermarking procedure,Gram-Schmidt orthogonalization is used to obtain the multiple spreading vectors.Consequently,multiple watermarks can be simultaneously embedded into the same position of a multimedia signal.Moreover,the multiple watermarks can be extracted without affecting one another during the extraction process.We analyze the effect of the size of the spreading vector on the unit maximum capacity,and consequently derive the theoretical relationship between the size of the spreading vector and the unit maximum capacity.A number of experiments are conducted to determine the optimal parameter values for maximum robustness on the premise of high capacity and good imperceptibility.展开更多
基金supported in part by the National Natural Science Foundation of China under Grant 62202496,62272478the Basic Frontier Innovation Project of Engineering University of People Armed Police under Grant WJY202314,WJY202221.
文摘To address the challenges of video copyright protection and ensure the perfect recovery of original video,we propose a dual-domain watermarking scheme for digital video,inspired by Robust Reversible Watermarking(RRW)technology used in digital images.Our approach introduces a parameter optimization strategy that incre-mentally adjusts scheme parameters through attack simulation fitting,allowing for adaptive tuning of experimental parameters.In this scheme,the low-frequency Polar Harmonic Transform(PHT)moment is utilized as the embedding domain for robust watermarking,enhancing stability against simulation attacks while implementing the parameter optimization strategy.Through extensive attack simulations across various digital videos,we identify the optimal low-frequency PHT moment using adaptive normalization.Subsequently,the embedding parameters for robust watermarking are adaptively adjusted to maximize robustness.To address computational efficiency and practical requirements,the unnormalized high-frequency PHT moment is selected as the embedding domain for reversible watermarking.We optimize the traditional single-stage extended transform dithering modulation(STDM)to facilitate multi-stage embedding in the dual-domain watermarking process.In practice,the video embedded with a robust watermark serves as the candidate video.This candidate video undergoes simulation according to the parameter optimization strategy to balance robustness and embedding capacity,with adaptive determination of embedding strength.The reversible watermarking is formed by combining errors and other information,utilizing recursive coding technology to ensure reversibility without attacks.Comprehensive analyses of multiple performance indicators demonstrate that our scheme exhibits strong robustness against Common Signal Processing(CSP)and Geometric Deformation(GD)attacks,outperforming other advanced video watermarking algorithms under similar conditions of invisibility,reversibility,and embedding capacity.This underscores the effectiveness and feasibility of our attack simulation fitting strategy.
基金funded by The National Natural Science Foundation of China under Grant(No.62273108,62306081)The Youth Project of Guangdong Artificial Intelligence and Digital Economy Laboratory(Guangzhou)(PZL2022KF0006)+3 种基金The National Key Research and Development Program of China(2022YFB3604502)Special Fund Project of GuangzhouScience and Technology Innovation Development(202201011307)Guangdong Province Industrial Internet Identity Analysis and Construction Guidance Fund Secondary Node Project(1746312)Special Projects in Key Fields of General Colleges and Universities in Guangdong Province(2021ZDZX1016).
文摘Beyond-5G(B5G)aims to meet the growing demands of mobile traffic and expand the communication space.Considering that intelligent applications to B5G wireless communications will involve security issues regarding user data and operational data,this paper analyzes the maximum capacity of the multi-watermarking method for multimedia signal hiding as a means of alleviating the information security problem of B5G.The multiwatermarking process employs spread transform dither modulation.During the watermarking procedure,Gram-Schmidt orthogonalization is used to obtain the multiple spreading vectors.Consequently,multiple watermarks can be simultaneously embedded into the same position of a multimedia signal.Moreover,the multiple watermarks can be extracted without affecting one another during the extraction process.We analyze the effect of the size of the spreading vector on the unit maximum capacity,and consequently derive the theoretical relationship between the size of the spreading vector and the unit maximum capacity.A number of experiments are conducted to determine the optimal parameter values for maximum robustness on the premise of high capacity and good imperceptibility.