Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32579
Digital Cinema Watermarking State of Art and Comparison

Authors: H. Kelkoul, Y. Zaz


Nowadays, the vigorous popularity of video processing techniques has resulted in an explosive growth of multimedia data illegal use. So, watermarking security has received much more attention. The purpose of this paper is to explore some watermarking techniques in order to observe their specificities and select the finest methods to apply in digital cinema domain against movie piracy by creating an invisible watermark that includes the date, time and the place where the hacking was done. We have studied three principal watermarking techniques in the frequency domain: Spread spectrum, Wavelet transform domain and finally the digital cinema watermarking transform domain. In this paper, a detailed technique is presented where embedding is performed using direct sequence spread spectrum technique in DWT transform domain. Experiment results shows that the algorithm provides high robustness and good imperceptibility.

Keywords: Digital cinema, watermarking, wavelet, spread spectrum, JPEG2000.

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1081


[1] M. Alghoniemy and A. Tewfik, “Geometric distortion correction in image watermarking,” in Proc. SPIE Security and Watermarking of Multimedia Contents II, vol. 3971, Jan. 2000, pp. 82–89.
[2] Cinema Initiatives, LLC, Member. Representatives Committee, 9 July 2016.
[3] Boxin Shi, Lin Liu, Chao Xu State Key Laboratory of Machine Perception “Comparison between jpeg2000 and h.264 for digital cinema”.
[4] Ingemar J. Cox, Joseph J. Kilian, Talal G. Shamoon “Secure spread spectrum watermarking for multimedia data” Volume: 6, Issue: 12, Dec 1997E.
[5] Nidhi Bisla, Prachi Chaudhary Electronics and communication engineering Department, DCRUST, Murthal, Haryana, India.
[6] N. Cvejic, “Algorithms for audio watermarking and steganography,” Ph.D. dissertation, Department of Electrical and Information Engineer- ing, Information Processing Laboratory, University of Oulu, 2004.
[7] M. Yiping and H. Jiqin, “Audio watermark in DCT domain: Strategy and algorithm,” Chinese Journal Electronics, pp. 1260–1264, 2003.
[8] D. J. LeGall, “MPEG: A Video Compression Standard for Multimedia Applications,’’ Communications of the ACM, Vol. 34, No.4, April 1991, pp. 47–58.
[9], 20 January 2017
[10] Brian Larkin “Degraded Images, Distorted Sounds: Nigerian Video and the Infrastructure of Piracy“ volume 16, Number 2, Spring 2004 pp. 289-314
[11] Akio, Miyazaki, “Digital Watermarking for images”. IEICE Transactions. Fundamentals, Vol.E85-A, NO.3 March 2002, pp. 2
[12] N. J. Mathai, D. Kundur and A. Sheikholeslami, "HW Implementation Perspectives of Digital Video Watermarking," IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 925-938, April 2003
[13] Hisashi. Inoue, “A Digital Watermark method using the Wavelet Transform for Video Data”, IEICE Trans. Fundamentals, Vol.E83-A,No.1 Jan2000
[14] Hou Zhi-yu et. al. “Integrity authentication scheme of color video based on the fragile watermarking”. IEEE 2011.
[15] Tamanna Tabassum, S.M. Mohidul Islam, “A Digital Video Watermarking Technique based on identical frame extraction in 3-level DWT”, IEEE, 2012.
[16] D.Santa Cruz T. Ebrahimi, "A study of JPEG2000 still image coding versus other standards" in Proceeding of the Xeuropean Signal Processing Conference (EUSIPCO), Tampere, Finland, September 58, vol.2, 2000, pp.673–676.
[17] D. J. LeGall, “MPEG: A Video Compression Standard for Multimedia Applications, Communications of the ACM, Vol. 34, No.4, April 1991, pp. 47–58.
[18] Hanane H. Mirza, Hien D. Thai, Yasunori Nagata and Zensho Nakao” Digital Video Watermarking Based on Principal Component Analysis” in Department of Electrical and Electronics Engineering, University of the Ryukyus Okinawa 9030213, Japan, 2011.
[19] Salwa A.K Mostafa, A. S. Tolba, F. M. Abdelkader, Hisham M. Elhindy, “Video Watermarking Scheme Based on Principal Component Analysis and Wavelet Transform‟‟ IJCSNS International Journal of Computer Science and Network Security, vol.9 No.8, August 2009
[20] Xilinx Corp, “Digital Cinema Applications” August 2007.
[21] J. O ́ Ruanaidh and T. Pun, “Rotation, scale and translation invariant digital image watermarking,” in Proc. IEEE Int. Conf. on Image Process. 1997 (ICIP 97), 1, pp. 536–539, Santa Barbara, CA, USA, October 1997.
[22] M. Kutter, “Watermarking resisting to translation, rotation and scaling,” in Proc. of SPIE, 3528, pp. 423–431, Boston, USA, November 1998.
[23] D. Delannay, J. Delaigle, B. Macq, and M. Barlaud, “Compensation of geometrical deformations for watermark extraction in the digital cinema application,” in Proc. SPIE Security and Watermarking of Multimedia Contents III, Jan. 2003, vol. 4314, pp. 149–157.
[24] B. Chupeau, A. Massoudi, and F. Lefébvre, “In-theater piracy: Finding where the pirate was,” in Proc. SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, Jan. 2008, vol. 6819, pp. 68190T1–10
[25] G.C. Langelaar, I. Setyawan, R.I. Lagendijik, Watermarking digital image and video data, IEEE Signal Processing Magazine 17 (5) (2000) 20–46.
[26] Li. Xiang, Yu. Chansu, “Physical Layer Watermarking of Direct Sequence Spread Spectrum Signals,” Beijing University of Posts and Telecommunications May, 2013.
[27] A. Leest, J. Haitsma, and T. Kalker, “On digital cinema and watermarking” in Proc. SPIE, 2001, vol. 5020, pp. 526–535.
[28] S. Vural, H. Tomii, and H. Yamauchi, “Robust digital cinema watermarking,” International Journal of Information Technology, vol. 1, no. 1, pp. 255–259, April 2005.
[29] J. Lubin, J. Bloom, and H. Cheng, “Robust content dependent, high fidelity watermark for tracking in digital cinema” in Proc. SPIE, 2003, vol. 5020, pp. 536–545.
[30] Min-Jeong Leea, Kyung-Su Kima, Hae-Yeoun Leeb “Robust Watermark Detection Against D-A/A-D Conversion For Digital Cinema Using Local Auto-Correlation Function” Proceedings/ICIP4711782 International Conference on Image Processing, November 2008.
[31] Lubin, J., Bloom, J. A. and Cheng, H., "Robust, Content-Dependent, High-Fidelity Watermark for Tracking in Digital Cinema," Proc. SPIE, 5020, 536-545 (2003).
[32] B.G. Haskell, A. Puri, A.N. Netravali "Digital Video: An Introduction to MPEG-2" 2002, XIV, 441 p.
[33] Prachi V. Powar, S.S.Agrawal "Design of Digital Video Watermarking Scheme Using MATLAB Simulink" Volume: 02 Issue: 05 | May-2013.
[34] M. Adimoolam A. John Assistant Professor "Anti-Piracy for Movies using Forensic Watermarking" Vol 63 No.4, February 2013.
[35] Elo Leung and Wing Wong "A Study of Digital Watermarking System"CS265 Section 2 Spring 2004.
[36] Guoyan Liu, Hongjiun "Wavelet-Based Color Pathological Image Watermark through Dynamically Adjusting the Embedding Intensity" Volume 2012 (2012), Article ID 406349, 10 pages.