IJISA Vol. 17, No. 2, 8 Apr. 2025
Cover page and Table of Contents: PDF (size: 810KB)
PDF (810KB), PP.31-41
Views: 0 Downloads: 0
DWT, DCT, PPLU Decomposition, Forensic, Digital Watermarking
In the direct-to-home (DTH) environment video-on-demand (VOD) applications are tremendously popular due to its inexpensive and convenient nature. In VOD approach legal customers can connect their set-top boxes (STB) to the Internet and can access or record the available content. Due to the easy transmission of the highest quality digital data to the customers by the pay-per-view approach, the data are highly at risk. The data can be vulnerable for illegal distribution of duplicate copies and they are prone to unnecessary modifications which creates a financial loss to the information creators. So it is necessary to authenticate the owner as well as the illegal distributor to reduce the digital piracy which is the motivation for this work. This paper presents a forensic watermarking scheme for protecting copyrights, and for identifying the illegal distributor who distributes the legal copy in the illegal fashion though it is copyright violation. In this paper, two watermarks are embedded in the video that is on-demand, where one watermark is the owner’s information and another watermark is related to the unique information of the STB. This work is also suitable for the biomedical domain, where one watermark can be the patient information and another watermark will be the health center information, in order to secure the patient information and the hospital information.
Ayesha Shaik, Masilamani V., "Copyright Protection and Illegal Distributor Identification for Video-on-demand Applications using Forensic Watermarking", International Journal of Intelligent Systems and Applications(IJISA), Vol.17, No.2, pp.31-41, 2025. DOI:10.5815/ijisa.2025.02.03
[1]Amelia Groen. Why i demand more from my video on demand.
[2]APEC. 2011 cti report to ministers:effective practices for addressing unauthorized camcording.
[3]Mediasilo. Secure: Security, check- enterprise-grade security trusted by the biggest names in business and entertainment.
[4]Webroot. The Societal Costs of Digital Piracy.
[5]Shaifali M Arora Et Al. A Dwt-Svd Based Robust Digital Watermarking for Digital Images. Procedia Computer Science,132:1441–1448, 2018.
[6]Simon Stokes. Digital Copyright. 2014.
[7]NIdaa Hasan Abbas, Sharifah Mumtazah Syed Ahmad, Sajida Parveen, Wan Azizun Wan, And Abd Rahman Bin Ramli. Design Of High Performance Copyright Protection Watermarking Based On Lifting Wavelet Transform And Bi Empirical Mode Decomposition. Multimedia Tools and Applications, 77:24593–24614, 2018.
[8]TFE Times. The pyramid of internet piracy.
[9]Nazeer Muhammad and Nargis Bibi. Digital image watermarking using partial pivoting lower and upper triangular decomposition into the wavelet domain. IET Image Processing, 9(9):795–803, 2015.
[10]Xiao-Ping Zhang and Kan Li. Comments on” an svd-based watermarking scheme for protecting rightful ownership”. IEEE Transactions on Multimedia, 7(3):593–594, 2005.
[11]Nexguard. Nagra nexguard forensic watermarking.
[12]Alin C Popescu and Hany Farid. Statistical tools for digital forensics. In International workshop on information hiding, pages 128–147. Springer, 2004.
[13]Alin C Popescu and Hany Farid. Exposing digital forgeries in color filter array interpolated images. IEEE Transactions on Signal Processing, 53(10):3948–3959, 2005.
[14]Jan Lukas, Jessica Fridrich, and Miroslav Goljan. Digital camera identification from sensor pattern noise. IEEE Transactions on Information Forensics and Security, 1(2):205–214, 2006.
[15]Rainer B¨ohme, Matthias Kirchner, S Katzenbeisser, and F Petitcolas. Media forensics. In Information Hiding, volume 9, pages 231–259. Artech House, 2016.
[16]Steven Lysonski and Srinivas Durvasula. Digital piracy of mp3s: consumer and ethical predispositions. Journal of Consumer Marketing, 25(3):167–178, 2008.
[17]Mahbuba Begum and Mohammad Shorif Uddin. Digital image watermarking techniques: a review. Information, 11(2):110, 2020.
[18]Zurinahni Zainol, Je Sen Teh, Moatsum Alawida, Abdulatif Alabdulatif, et al. Hybrid svd-based image watermarking schemes: a review. IEEE Access, 9:32931–32968, 2021.
[19]Wenbo Wan, Jun Wang, Yunming Zhang, Jing Li, Hui Yu, and Jiande Sun. A comprehensive survey on robust image watermarking. Neurocomputing, 488:226–247, 2022.
[20]Yue Li, Hongxia Wang, and Mauro Barni. A survey of deep neural network watermarking techniques. Neurocomputing, 461:171–193, 2021.
[21]Xin Li, Yonatan Shoshan, Alexander Fish, and Graham A Jullien. A simplified approach for designing secure random number generators in hw. In 2008 15th IEEE International Conference on Electronics, Circuits and Systems, pages 372–375. IEEE, 2008.
[22]Virat. The virat video dataset.
[23]VIPSL. Database: Images video clips.
[24]Kanjar De and V Masilamani. Image sharpness measure for blurred images in frequency domain. Procedia Engineering, 64:149–158, 2013.
[25]Kanjar De and V Masilamani. Fast no-reference image sharpness measure for blurred images in discrete cosine transform domain. In 2016 IEEE Students’ Technology Symposium (TechSym), pages 256–261. IEEE, 2016.
[26]Karen Egiazarian, Jaakko Astola, Nikolay Ponomarenko, Vladimir Lukin, Federica Battisti, and Marco Carli. New full-reference quality metrics based on hvs. In Proceedings of the second international workshop on video processing and quality metrics, volume 4, page 4, 2006.