the watermark should survive in the digital media
after performing various attacks. The watermarking
attacks consist of intentional attacks made to the
marked media to remove or change the watermark
and various signal processing schemes such as
compression, resampling, halftoning, cropping, etc.
This feature of the watermarking schemes is
addressed as robustness requirement. In the case of
destination-based watermarks, another characteristic
should also be considered defining how widely it
can be distributed. This is called watermark’s
capacity, which states the ability to detect different
watermarks with a low probability of error, as the
number of distinct watermarks increases. There is
always a tradeoff between these three requirements.
Different models of the Human Visual System
(HVS) have been proposed to be used in the image
and video compression applications. Due to the fact
that both compression algorithms and watermarking
schemes aim to find redundant data of the digital
media (to get removed in the former and to be used
for inserting watermark in the latter), visual models
employed for the compression applications can also
be used in the watermarking schemes.
To be imperceptible, an image or video
watermark should consider the characteristics of the
HVS. Depending on how HVS models are used,
watermarking schemes can be classified into two
major categories: image-independent and image-
adaptive (or generally content-based) watermarking
schemes (Wolfgang, 1993). Algorithms belonging to
the first class are based on the Modulation Transfer
Function (MTF) of the human eye only, but do not
mention any particular characteristic of the
particular image or video frames. On the other hand,
image-adaptive watermarking schemes depend not
only on the frequency response of the human eye,
but also on the properties of the image itself.
Consequently, image-adaptive watermarking
schemes can maximize the watermark robustness,
while satisfying the transparency requirement. In
other words, a content-based watermark is
perceptually adapted to local characteristics of the
host image or video. The main theme of this paper is
to develop a content-based watermarking scheme for
video host signals.
Various applications have been proposed for
video watermarking (Doerr, 2003). Video
watermarking has been suggested for preventing
illegal copying in the future DVD devices (Bloom,
1999). Also video watermarking can be used for the
aim of automatically checking whether a specified
program, e.g. commercial advertisement, has been
broadcasted by some channels in a specific period of
time (Depovere, 1999). Inserting a unique
watermark ID for each customer transmitted through
Pay-Per-View and Video-On-Demand services
enables it to trace back traitor users (Lin, 2001). But
its first targeted application is copyright protection,
in which the owner inserts its registered watermark
into the digital property to prove its paternity in the
case of finding an illegally copied version (Qiao,
1998).
In this paper, a content-based method for
watermarking of video streams is developed
regarding motion entropy of the host video. In
Section 2, some discussion on the content-based
watermarking schemes is given and the entropy
masking effect is introduced. Section 3 extends
image watermarking methods to the video contents.
The proposed algorithm using motion entropy is
described in Section 4. Section 5 presents
implementation results and a comparison with the
traditional methods. Finally, Section 6 concludes the
paper.
2 CONTENT-BASED
WATERMARKING SCHEMES
In this section, some image-adaptive watermarking
methods based on DCT transform are described. The
IA-DCT method proposed by Podilchuk et al. is a
good paradigm of image-adaptive watermarking
schemes (Podilchuk, 1998). The method is the dual
of the image-independent scheme proposed by Cox
et al. in (Cox, 1995). In the IA-DCT method,
Watson’s visual model (Watson, 1993) is used to
insert watermark in the DCT coefficients of the host
image. First, the image is divided into 8*8 non-
overlapping blocks of pixels and then the watermark
signal, which is a Gaussian zero-mean random
process with variance equal to one, is inserted in the
DCT transform of the blocks, as:
⎩
⎨
⎧
≥+
=
otherwiseX
jndXifwjnd
X
X
vub
vubvubvubvub
vub
vub
,,
,,,,,,,,
,,
'
,,
*
(1)
where X
b,u,v
is the (u,v)-th coefficient of DCT
transform over b’th block, jnd is the corresponding
Just Noticeable Difference (JND) which is evaluated
using Watson’s visual model, w
b,u,v
is the
corresponding watermark bit, and X
'
b,u,v
is the
resultant watermarked DCT coefficient.
In (Watson, 1997), Watson introduced a new
masking effect called entropy masking, which is due
to unfamiliarity of the observer. In fact, entropy
masking is due to weakness of human brain in
processing simultaneous complex phenomena. By
ROBUST CONTENT-BASED VIDEO WATERMARKING EXPLOITING MOTION ENTROPY MASKING EFFECT
253