Conference PaperPDF Available

Real-Time FPGA Implementation of Digital Video Watermarking Techniques using Co-Design Approach: Comparative Study

Authors:
Real-Time FPGA Implementation of Digital Video
Watermarking Techniques using Co-Design
Approach: Comparative Study
Noureddine AISSAOUI
´
Ecole Militaire Polytechnique
Laboratoire Syst`
emes
´
Electroniques et Num´
eriques
Alger, Alg´
erie 16111
aissaouifn@gmail.com
Redouane KAIBOU ID
´
Ecole Militaire Polytechnique
Laboratoire Syst`
emes
´
Electroniques et Num´
eriques
Alger, Alg´
erie 16111
kaibouredouane@gmail.com
Mohamed Salah AZZAZ ID
´
Ecole Militaire Polytechnique
Laboratoire Syst`
emes
´
Electroniques et Num´
eriques
Alger, Alg´
erie 16111
ms.azzaz@gmail.com
Abstract—This paper presents a Genesys-2 FPGA implemen-
tation of three video watermarking techniques in both spatial and
frequency domains followed by a comparative analysis. The video
acquisition is realized using OV7670 camera used for real-time
watermarking with each technique both in visible and invisible
schemes with Video Graphics Adapter (VGA) display validations.
The techniques implemented are based on Least Significant bit
(LSB), additive spatial and additive frequency watermarking.
All implementations have been realized in Software/Hardware
(SW/HW) co-design using Vivado-HLS tool achieving low area,
high speed of up to 130 MHz and low power consumption
that did not exceed 827 mw all along with good watermarking
performances of imperceptibility with fairly good robustness for
most of the geometric and image processing attacks.
KeywordsWatermarking, FPGA, DWT, Vivado, Image Auten-
tichation.
I. INTRODUCTION
At present, the excessive use of multimedia has made the
tasks of protecting information more difficult, in particular,
to ensure confidentiality and guarantee the authenticity of the
information [1]. Hence, more focus has been put on securing
the content of digital media such as video conferencing, mili-
tary surveillance, pay-per-view TV (PPV), multimedia systems
of industry and broadcast monitoring to name a few [2].
Watermarking and Encryption are being implemented both in
separate and combined algorithms to achieve this goal. The
integration of these algorithms is made possible as more plat-
form alternatives are being released in an accelerated pace. This
evolution of the hardware is accompanied by an outstanding
development of methods with a tendency of going for higher-
level languages that combine the advantages of both hardware
and software implementations [3].
As raw video signal is composed of several frames, real-time
watermarking becomes a hard task to realize in addition to
the increasing computational burden. In this context, several
methods are being investigated to meet this requirement and
others both in spatial and transform domains. Among which
transparency, resistance, security, and capacity are the main
parameters that define a given watermarking scheme efficiency
[4]. However, implementation complexity is an additional
parameter acting in the opposite direction that needs to be
carefully considered. This latter is made more tangible in
live video broadcasting applications where latency effect can
influence the quality of transmission [5].
Embedding a watermark as being the core principle of wa-
termarking can fall into two categories in terms of human
perception visible such as TV channel logo or invisible such
as fingerprint or signature [6]. Bearing in mind that both
techniques are implemented in VLSI configurations that fit
in multiple purposes, more than one application can be con-
cretized in a single platform that can integrate ideally an
encryption scheme to increase the watermarking security [7].
II. RELATED PREVIOUS WORKS
Recently, several digital watermarking systems have been
implemented on FPGA hardware platforms, where a num-
ber of researchers adopt a co-design approach with different
techniques in spatial and frequency domains. Bhaisare et al.
[8] presented an FPGA hardware implementation of a digi-
tal watermarking system. The implementation uses invisible
and semi-fragile watermarks into compressed video streams
in real-time in the discrete cosine transform (DCT) domain
on Xilinx Spartan3. The results showed that the proposed
algorithm has a very good hidden invisibility, good security and
robustness for a lot of hidden attacks. Tamilvabnan et al. [9]
proposed Discrete Wavelet Transform (DWT) to authenticate
the multimedia image and it can convert the image from
spatial domain to frequency domain. This system has been
developed on Xilinx Spartan3 FPGA device. The proposed
algorithm gave good reults in terms of imperceptibility and
security. Das et al. [10] implemented a Reversible Contrast Map
algorithm (RCM) using OV7670 camera through Zedboard
FPGA. The gray scaled video watermarking has achieved high
performances in a pipeline structure reaching a speed of 150
MHz and a latency of 876.626 ns with a throughput 62.328
Mbps. Shivdeep et al. [11] proposed FPGA implementation
of Reversible Image Watermarking (RIW) with Difference
Expansion (DE) algorithm using HLS implementation. The
design achieved good performances in terms of area ressources
consumption compared to existing RIW based architectures.
The rest of the paper is organized as follows. Section 3 presents
the proposed work that consists of three different watermark-
ing techniques. Section 4 presents their FPGA synthesis and
implementation results. Section 5 evaluates the implemented
techniques in terms of imperceptibility, robustness and com-
plexity. The paper is concluded in Section 6.
978-1-6654-8042-0/22$31.00 ©2022 IEEE
III. PROPOSED WORK
The sequence of the elaborated work as shown in the
overall diagram is illustrated in Figure (1). It consists of FPGA
implementation of three digital watermarking systems applied
on real-time video input, namely LSB spatial watermarking,
additive spatial watermarking and additive frequency water-
marking.















Fig. 1: Elaborated Work Sequence.
A. Video Acquisition
The input video has been acquired from a low-cost camera
type OV7670 using Genesys-2 Pmod connections in VHDL.
The camera module is an image capturing device which is
designed for use in embedded systems. It supplies a real-time
video of a 640 ×480 frames resolution. Figure 2 illustrates the
used camera.
Fig. 2: OV7670 used Camera.
B. Watermarking Techniques
The proposed watermarking techniques with the algorithm
of each one are described as follows:
1) LSB Spatial Watermarking: The process of watermark
embedding/extraction in the LSB spatial domain consists of
embedding a black and white watermark into the video pixels
frames blue component LSB in using a reversible XOR op-
eration. Extraction uses the same algoritm in reverse order as
illustrated in Figure (3)
2) Additive Spatial Watermarking: The embedding phase
in this scheme consists of embedding RGB components of the
watermark in the corresponding RGB components of the video
frames using a visibility factor α. The algorithm is illustrated
in Figure (4)(a).























(a) Embedding






  






(b) Extraction
Fig. 3: LSB Spatial Watermarking Process.





 
  




(a) Embedding




  








 

(b) Extraction
Fig. 4: Additive Spatial Watermarking Process.
3) Additive Frequency Watermarking: The scheme of this
process performs the watermark embedding in the frequency
domain. After applying the DWT to the watermark and the
video frames, the embedding process is performed in the Low-
Low (LL) subframe, then the IDWT is applied to reconstruct
the watermarked video. It consists of applying the reverse
procedure of the embedding process as shown in Figure (5).










(a) Embedding









(b) Extraction
Fig. 5: Frequency Watermarking Process.
IV. FPGA SYNTHESIS AND IMPLEMENTATION
The FPGA Implementation results of the three techniques
have been synthesised using Vivado and validated using 640 ×
480 Video Graphics Adapter (VGA) display. The video acqui-
sition has been conducted using OV7670 camera input. Visual
results are shown in Figure 6.
(a) (b)
(c) (d)
(e) (f) (g)
Fig. 6: Watermarking Implementaion Visual Results: (a-b) LSB
(c-d) Spatial (e-g) Frequency.
The synthesis results after optimization of the three water-
marking techniques are summarized in terms of resources used,
maximum operating frequencies and power consumption in
Tables (I), (II) and (III). For additive frequency watermarking,
DWT/IDWT IP-Cores has been synthesized and simulated
under the Vivado-XSim simulator. After verification and opti-
mization of the design, the generated RTL-IP will be included
in the catalog of IPs of the Vivado library. These IP-Cores
are integrated within the hardware project of the watermarking
system. The simulation results are shown in Figure (7) for the
two IP-Cores of DWT/IDWT. The generated IP-Cores are use
in the additive frequency watermarking system. The DWT and
IDWT IP-Cores modules are illustrated in Figure 8.
TABLE I: LSB Spatial Watermarking Implementation Results.
Ressources Utilisation Available Utilisation (%)
LUTs 663 203800 0.32
Registers 279 407600 0.08
FF 552 407600 0.24
Slice 324 150950 0.21
BRAM 176 445 39.55
IOB 47 500 9.40
IBUFDS 1 480 0.21
BUFGCRTL 6 32 18.75
MMCM 2 10 20.00
Maximum Frequency 130.68 MHz
Total On-Chip Power 0.311W
Efficiency [Fmax/Sclice] 0.40
TABLE II: Additive Spatial Watermarking Implmementation
Results.
Resources Utilisation Available Usage (%)
LUTs 1205 203800 0.59
Registers 337 407600 0.70
FF 968 407600 2.03
Slice 623 150950 0.41
BRAM 352 445 79.10
IOB 45 500 9.00
IBUFDS 1 480 0.20
BUFGCRTL 6 32 18.75
MMCM 2 10 20.00
Maximum Frequency 129.86 MHz
Total On-Chip Power 0.423W
Efficiency [Fmax/Slice] 0.20
TABLE III: Additive Frequency Watermarking Implementation
Results.
Ressource Utilisation Available Utilisation (%)
LUTs 16538 203800 8.11
Registers 25 407600 0.006
FF 1861 407600 0.46
Slice 754 150950 0.50
BRAM 402 445 90.34
IOB 65 500 13.00
IBUFDS 1 480 0.20
BUFGCRTL 6 32 18.75
MMCM 2 10 20.00
Maximum Frequency 123.36 MHz
Total On-Chip Power 0.827W
Efficiency [Fmax/Slice] 0.16
Fig. 7: DWT/IDWT IP-Cores Vivado-XSim Simulation Results.
(a) DWT (b) IDWT
Fig. 8: DWT/IDWT IP-Cores Modules.
RTL Architecture of the additive Frequency Watermarking
is presented in Figure 9. The decomposition of the video frames
and the watermark are ensured using customized DWT IP-Core
integrated in the design.
Fig. 9: Additive Frequency Watermarking RTL Architecture.
V. P ERFORMANCES EVALUATION
The performance evaluation results of the proposed wa-
termarking system are conducted in terms of imperceptibility,
robustness and ressources concumption.
A. Imperceptibility Assessment
Imperceptibility assessment has been conducted by studying
visibility factor influence and histograms comparisong between
original and watermarked video as the following:
1) Visibility Factor Influence: According to the results
obtained, shown in Figure (10), we notice a fairly significant
degradation in the watermark visibility for higher values of α.
(a) α=0.05 (b) α=0.15 (c) α=0.5(d) α=0.8.
Fig. 10: Visibility Factor Influence on the Watermarked Video.
Table (IV) presents the results of objective evaluation of the
watermarking system in the DWT domain for some values
of the visibility factor α, several imperceptibility metrics have
been performed in order to better characterize the robustness
of these proposed watermarking systems.
Highest PSNR values for smaller values of the visibility factor
as presented in Figure 11.
2) Histogram: According to Figure (12), we notice that the
watermark embedding does not influence in a significant way
the distribution of the watermarked video histograms.
TABLE IV: Proposed System Imperceptibility Evaluation.
Metrics\αα=0.01 α=0.05 α=0.1 α=0.5 α=0.9
PSNR(dB) 50.4680 45.4886 39.4680 25.4866 20.3830
NCC 0.7198 0.8127 0.9354 0.9996 0.9998
SSIM 0.9981 0.9180 0.8715 0.8515 0.8411
0 0.2 0.4 0.6 0.8 1
9LVLELOLW\)DFWRU
20
25
30
35
40
45
50
55
PSNR(dB)
(a) PSNR vs Visibility Factor.
0 0.2 0.4 0.6 0.8 1
9LVLELOLW\FactRr
0.7
0.75
0.8
0.85
0.9
0.95
1
NCC
SSIM
(b) NCC and SSIM vs Visibility Factor.
Fig. 11: Proposed Watermarking System Imperceptibility Eval-
uation.
B. Robustness Assessment
Robustness tests have been conducted against rotation,
compression, median filter and Gaussian noise. Results have
been as shown in Figure 13.
Four attacks types have been applied on the watermarked
video in order to assess the robustness of the watermarking im-
plmenentation namely Rotation, Compression, Gaussian Noise
and Median Filter. Table (V) presents the robustness evaluation
results of the additive frequency watermarking system for
maximum reached values of 2angle, 20% quality factor, 0.1








    
(a) Original video frame





    
(b) Watermarked video frame
Fig. 12: Watermarking Histogram Distribution
(a) 2Rotation (b) Compression (c) Median Filter (d) Gaussian Filter
(e) 2Rotation (f) Compression (g) Median Filter (h) Gaussian Filter
Fig. 13: Proposed System Robustness Visual Evaluation.
and 0.05 densities for the used attacks respectively beyond
which robustness is lost.
TABLE V: Proposed System Robustness Objective Evaluation.
Metric No Attack Rotation Compression Gaussian Noise Median Filter
PSNR(dB) 50.4680 3.9856 2.4141 10.9691 5.1875
SSIM 0.9981 0.0821 0.0221 0.2336 0.1796
From the results of Table (V), we find that the proposed
DWT-based additive watermarking system design approach is
not resistant to geometric and compression attacks. On the
other hand, the latter presents a strong robustness against image
processing attacks such as the median filter and the Gaussian
noise.
C. Resources consumption
The three techniques LSB spatial watermarking, additive
spatial watermarking and additive frequency watermarking in-
terms of resources usage are contrasted in Figure (14).
It is noted that the DWT additive watermarking consumes
the most resources of the FPGA platform Genesys-2 compared
to the two other watermarking systems because of the DWT
IP-Core implementation.
Table (VI) presents a summary of the maximum power and
frequency consumption for the three watermarking techniques:


















 !
"
Fig. 14: Video Watermarking Techniques Resources Consump-
tion Comparison.
TABLE VI: Implemented Watermarking Techniques Compari-
son.
LSB
Spatial
Additive
Spatial
Additive
DWT
Maximum Frequency (MHz) 130.68 129.86 123.36
Power Consumed (W) 0.311 0.423 0.827
D. Comparison with Similar works
TABLE VII: Proposed System Comparison with Similar Works.
Proposed
Work [10] [12] [13]
Used
Technique DWT Spatial DCT DCT/DWT
Design Approach C/VHDL VHDL VHDL VHDL
FPGA Plateform Genesys-2 Zynq-7000 Xilinx
XC5VLX330T -
Frequency 123.36MHz 150MHz 113.61MHZ 98.96MHz
Robustness -Median Filter
-Gaussian Noise --Rotation
-Compression
-Rotation
-Gaussian Filter
-Gaussian Noise
It can be concluded that the proposed work making using
af a HW/SW co-design approach has achieved comparable
results to the purely hardware implemented approaches with
more flexibility in algorithm coding. This can be considered as
valuable asset in favor of the HW/SW co-design approach and
validates its adoption real-time applications.
VI. CONCLUSION
In this work, a real-time OV7670 camera video watermark-
ing has been implemented on the FPGA platform Genesys-2
of three techniques namely LSB spatial watermarking, additive
spatial watermarking and additive frequency watermarking.
The design approach adopted has been a (SW/HW) co-design
approach in VHDL and C++ under the high-level synthesis
tool HLS-Xilinx, which allowed to design the IP-cores. The
proposed architectures are then validated using VGA displays.
The synthesis and implementation results of the proposed sys-
tem in terms of resource consumption, Timing, and power con-
sumption show that the proposed architectures present a good
compromise between performance and power consumption.
The subjective and objective evaluations of the implementations
show that watermarking in the transformed domain is more
resistant to certain attacks. And finally, a comparative analysis
between the three techniques and with similar works have been
achieved making them adaptable to several future applications.
REFERENCES
[1] A. Basu and S. K. Sarkar, “On the implementation of robust copyright
protection scheme using visual attention model,” Information Security
Journal: A Global Perspective, vol. 22, no. 1, pp. 10–20, 2013.
[2] F. Y. Shih, Digital watermarking and steganography: fundamentals and
techniques. CRC press, 2017.
[3] M. S. Azzaz, A. Maali, R. Kaibou, I. Kakouche, S. Mohamed, and
H. Hamil, “Fpga hw/sw codesign approach for real-time image process-
ing using hls,” in 2020 1st International Conference on Communications,
Control Systems and Signal Processing (CCSSP). IEEE, 2020, pp. 169–
174.
[4] R. Kaibou, M. S. Azzaz, M. Benssalah, D. Teguig, H. Hamil, A. Merah,
and M. T. Akrour, “Real-time fpga implementation of a secure chaos-
based digital crypto-watermarking system in the dwt domain using co-
design approach,” Journal of Real-Time Image Processing, vol. 18, no. 6,
pp. 2009–2025, 2021.
[5] M. J. Garrido, F. Pescador, M. Chavarr´
ıas, P. J. Lobo, and C. Sanz, “A
high performance fpga-based architecture for the future video coding
adaptive multiple core transform, IEEE Transactions on Consumer
Electronics, vol. 64, no. 1, pp. 53–60, 2018.
[6] M. L. Benseddik, K. Zebbiche, M. S. Azzaz, and S. Sadoudi, “Efficient
interpolation-based reversible watermarking for protecting fingerprint
images,” in 2021 International Conference on Networking and Advanced
Systems (ICNAS). IEEE, 2021, pp. 1–6.
[7] J. Guo, P. Zheng, and J. Huang, “Secure watermarking scheme against
watermark attacks in the encrypted domain,” Journal of Visual Commu-
nication and Image Representation, vol. 30, pp. 125–135, 2015.
[8] A. S. Bhaisare, A. Karode, and S. Suralkar, “Implementation of real
time digital watermarking system for video authentication using fpga,”
in 2016 International Conference on Global Trends in Signal Processing,
Information Computing and Communication (ICGTSPICC). IEEE,
2016, pp. 358–362.
[9] K. Tamilvanan and R. Selvakumar, “Fpga implementation of digital
watermarking system,” International Journal of Computer Science and
Mobile Computing (IJCSMC), vol. 3, no. 4, pp. 1321–1327, 2014.
[10] S. Das, A. K. Sunaniya, R. Maity, and N. P. Maity, “Efficient fpga
implementation of corrected reversible contrast mapping algorithm for
video watermarking,” Microprocessors and Microsystems, vol. 76, p.
103092, 2020.
[11] A. Biswas, S. Ghosh, T. Nag, S. P. Maity, H. Rahaman et al., “Hls based
implementation of modified de-riw algorithm on fpga and p-soc,” in
2020 IEEE 1st International Conference for Convergence in Engineering
(ICCE). IEEE, 2020, pp. 439–443.
[12] W. S. ElAraby, A. H. Madian, M. A. Ashour, and A. M. Wahdan,
“Hardware realization of dc embedding video watermarking technique
based on fpga,” in 2010 International Conference on Microelectronics.
IEEE, 2010, pp. 463–466.
[13] A. Agarwal, R. Bhadana, and S. Chavan, “A robust video watermarking
scheme using dwt and dct,” IJCSIT) International Journal of Computer
Science and Information Technologies, vol. 2, no. 4, pp. 1711–1716,
2011.
... The most interesting approach to this issue has been proposed in 2022 by [3]. The authors suggested implementing three real-time video watermark techniques on the FPGA circuit in both spatial and frequency domains. ...
... The results show that the amount of resources in terms of slice and LUT usage used by the proposed scheme is relatively small, as revealed in Table 6. The results of comparison with old and new existing hardware video WM schemes (Table 7) show that the proposed scheme takes less resources compared to [3,19]. In fact, the number of registers used is of about 22% out of 178.176, and only 36% of input LUTs are used. ...
... Figure 4 represents a comparative study with other watermarking schemes. The proposed scheme generates low power consumption compared with the most recent scheme proposed in [3]. Table 8 illustrates the comparison results of the time complexity of the proposed algorithm with other existing algorithm. ...
Article
Full-text available
The security of applications that run over limited resources such as the Internet of Things becomes a new challenge for researchers. Digital watermarking (WM) is among the favorable solutions used to ensure the security for this type of applications, since it allows the integration of a message in a multimedia document without adding an overheard, as in classic encryption. This paper presents a software and hardware implementation WM scheme based on motion vectors to ensure copyright protection for a video sequence. To preserve the robustness of the proposed WM scheme, two security techniques are used: the digital WM to insert a watermark in the video and the scrambling technique for overall video protection. The watermark insertion is processed in the motion vectors. These vectors are generated during the motion estimation task using the four-step search block-matching algorithm. As a watermark, we use a binary sequence where only one bit is embedded into the horizontal and vertical components of the even motion vectors. The experimental results show that the proposed architecture preserves keeps the video quality with an average PSNR deviation rate of about 0.21dB and operates with low power consumption that did not exceed 119 mw and a maximum frequency of about 41.42 MHz.
... Currently, a new design approach has been introduced integrating a C/C++ language, HLS (High Level Synthesis) as one of the most used tools to directly transform a C description into hardware IP-Core, described on Verilog or VHDL (RTL: Register-Transfer Level) with a performance comparable to that of manually coded RTL in terms of processing time and resources (Liu et al., 2019). In addition, the development time is generally very short compared to the hardware description based design (Azzaz et al., 2020a;Kaibou et al., 2021;Aissaoui et al., 2022). We will use the HLS tool to design our encryption key generator in the form of an IP-Core ready to be exported to Vivado and be used later in an encryption algorithm. ...
... Over the long term, the behavior of these systems is unpredictable, while its components are governed by simple, established and deterministic rules. Such properties make the reproduction of the model impossible for anyone who does not know the exact parameters from which it is derived [6]. Finally, the critical characteristics of chaos, namely its erratic character and its high sensitivity to initial conditions, can be exploited for encryption purposes because, although completely deterministic, the resulting signals have spectral and statistical properties similar to those of a white noise (broad spectrum and reduced auto-correlation) [7]. ...
Conference Paper
Full-text available
This paper presents a two Nexys FPGAs implementation of a Least Significant Bit (LSB) watermarking applied on real-time speech signals over a serial communication system. The watermarking technique has been strengthened by means of a chaos-based encryption scheme for the used watermark image. The speech acquisition is performed using FPGA inbuilt microphone while the recovery has been realized through a loudspeaker as output device for the watermarked signal and VGA monitor for the watermark image respectively. The transmission of the watermarked signal has been implemented using Universal Asynchronous Receiver Transmitter (UART) serial protocol between two FPGA boards. The LSB IP-Cores developed and integrated in the watermarking prototype have been synthesized by means of a co-design approach using Vivado-HLS. The realized prototype has required performances of 1132 LUT area using a speed of 130 Mhz and a power consumption of no more than 159 mW. Lastly, good results have been obtained of watermarking imperceptibility and security with low robustness performances against signal processing and geometric cryptanalysis attacks.
Article
Full-text available
In this paper a new approach for designing invisible non-blind full crypto-watermarking system targeting images security on FPGA platform is presented. This new design is based on the Hardware-Software co-design approach using the High-Level Synthesis (HLS) tool of Xilinx which allows a good compromise between development time and performances. For a better authentication and robustness of the proposed system, the Discrete Wavelet Transform (DWT) is employed. To more enhance the security level, a new chaos-based generator proposed is integrated into a stream cipher algorithm in order to encrypt and decrypt the watermark during the insertion and extraction phases.This approach allows a better secure access at the positions of the watermark and to distribute the watermark evenly throughout the image. Three novel customized Intellectual Property (IP) cores designed under HLS tool, implementing Haar DWT and the new chaos-based key generator, have been generated, tested, and validated. The generated Register Transfer Level-IP (RTL-IP) cores are integrated into a Vivado library that achieves real-time secured watermarking operations for both embedding and extraction processes. The system has been evaluated using the main metrics in terms of imperceptibility of the produced watermarked images achieving a Peak Signal to Noise Ratio (PSNR) of 47 dB, robustness against most geometric and image processing attacks achieving a Normalized Cross-Correlation (NCC) of 0.99. The proposed crypt-watermarking system allows a good solution against brute force attack which produce a huge key-space of 2768. Finally, the implementation offers a good efficiency value of 0.19 MHz/LUT in terms of FPGA resource consumption and speed, making the system a reliable choice for real sensitive embedded applications.
Article
Full-text available
Future Video Coding (FVC) will be the next generation video coding standard. Yet in the first stages of the standardization process, it is expected to replace HEVC beyond 2020. One of the enhancements in discussion is the Adaptive Multiple Core Transform, which uses five different types of 2D Discrete Sine/Cosine transforms (DCT-II, DCT-V, DCT-VIII, DST-I and DST-VII) and up to 64×64 Transform Unit sizes. This schema, increases the computational complexity of both, encoder and decoder. In this paper, a deeply pipelined high performance architecture to implement the five transforms for 4×4, 8×8, 16×16 and 32×32 sizes is proposed. The design has been described in VHDL and it has been synthesized for different FPGA chips, being able to process up 729 fps@3840×2160 for 4×4 transform sizes. Up the best of our knowledge, this is the first implementation of an architecture for the FVC Adaptive Multiple Core Transform supporting 4×4, 8×8, 16×16 and 32×32 sizes.
Conference Paper
In this paper, an efficient interpolation-based reversible watermarking scheme for protecting fingerprint images is proposed. The interpolation approach, which generates additional pixels, is adopted to ensure perfect retrieval of the original image. The aim of this scheme is to guarantee both authenticity and integrity verification of fingerprint images, by embedding two multibit watermarks into interpolated pixels. A new robust watermarking technique is proposed to embed the authenticity watermark into the Lifting Wavelet Transform (LWT) coefficients, by using an adapted perceptual model. The insertion of the integrity watermark is achieved by adapting a semi-fragile technique, which is based on the Intermediate Significant Bit Substitution (ISBS) approach and operates in the spatial domain. The integrity watermark is generated from a block checksum procedure and serves for tamper detection and localization purposes. Experimental results showed that the proposed technique offers good performances in terms of imperceptibility and robustness, and is also capable of detecting and localizing tampers on watermarked images.
Article
This paper analyses and rectifies the shortcomings of reversible contrast mapping (RCM) algorithm for invisible watermarking. The proposed corrected RCM algorithm is tested by taking a gray scaled video input. The quality of services and structural similarity index matrix (SSIM) of each frame of the input video are tested in software environment. The video is obtained by OV7670 camera through Zed-board in fully field programmable gate array (FPGA) based hardware environment. FPGA devices based corrected high level synthesis of the proposed algorithm is presented. The suggested system engages pipeline structure and practices parallelism to achieve high performance. The quality of services and SSIM are also tested using FPGA devices and the comparative results with software implementations are explained. To process thirty (640 × 480) image blocks with 150 MHz clock we obtain a latency of 876.626 ns with throughput 62.328 Mbps. The critical path for single cycle is 5.992 ns. The number of resources essential is similar for watermark decoding with an improved schedule. The results acquired after implementation on Xilinx Virtex 7-XC7V2000T and programmable system-on-chip (Zynq - XC7Z030) FPGA devices confirm the practicability of real-time use with low cost and great speed.
Book
This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Multimedia security and steganography is especially relevant due to the global scale of digital multimedia and the rapid growth of the Internet. Digital watermarking technology can be used to guarantee authenticity and can be applied as proof that the content has not been altered since insertion. Updated techniques and advances in watermarking are explored in this new edition. The combinational spatial and frequency domains watermarking technique provides a new concept of enlarging the embedding capacity of watermarks. The genetic algorithm (GA) based watermarking technique solves the rounding error problem and provide an efficient embedding approach. Each chapter provides the reader with a fundamental, theoretical framework, while developing the extensive advanced techniques and considering the essential principles of the digital watermarking and steganographic systems. Several robust algorithms that are presented throughout illustrate the framework and provide assistance and tools in understanding and implementing the fundamental principles.
Article
The homomorphic cryptosystems create a great opportunity for secure signal processing (SSP). Watermarking in the encrypted domain provides a promising solution to the security of watermarking. However, the robust performance of the watermarking scheme in the encrypted domain should be carefully considered. In this paper, we propose a robust watermarking scheme in the encrypted domain, which protects the original images from the third party embedders. The hybrid discrete wavelet transform (DWT) and discrete cosine transform (DCT) based method improves the robust performance of the encrypted domain watermarking scheme. The watermark extraction can be performed on both the plaintext and the encrypted domains. We also give an estimation of the expanding factor after watermark embedding in the encrypted domain. At last, we discuss the watermark attacks that are available in the encrypted domain. Taking Haar wavelet transform for example, we conduct the experiments on the visual quality and the robustness of our watermarking scheme, which demonstrate that the entire performance is satisfactory.
Article
Perceptual watermarking should always take full advantage of the results from human visual system (HVS) studies. Based upon visual saliency's modulation effect which incorporates visual attention's influence on visual sensitivity, this paper proposes an integrated visual saliency modulated HVS model guided least significant bit (LSB) watermarking approach for copyright protection. The proposed algorithm can embed more information into visually non-belligerent areas within the host image, determined by the visual attention model. The region of uninterested (ROU) indicates the most unimportant visible aspects of an image, so distortion within these areas will be less noticeable to any viewer. To resist common signal processing attacks, for each ROU, an improved quantization method is employed to embed the copyright information. Experimental results demonstrate that the proposed method is more robust to various image impairments while minimum effect on the image quality as verified by objective evaluations while compared with the state-of-the-art watermarking schemes. Moreover, we have evaluated the theory of Kurtosis testing to the steganalysis of the host image.