ABSTRACT
MGTV recently organized a pioneering Invisible Video Watermark Challenge, inviting participants to create a framework capable of embedding invisible watermarks into videos and extracting them from watermarked content.
The invisible watermark serves as a discrete digital signature within the media data, imperceptible to the human eye. This technique safeguards the ownership and authenticity of multimedia content. While convolutional neural networks have demonstrated remarkable efficacy in image and video processing, the discourse on invisible watermarking remains limited. This challenge, therefore, presents an opportune moment to advance the field of invisible watermarking.
Furthermore, to support this endeavor, we curated the comprehensive MGTV_WM dataset, encompassing diverse video types. For further details, please refer to our official website (https://challenge.ai.mgtv.com/\#/track/18?locale=en).
- Shehzeen Hussain, Nojan Sheybani, Paarth Neekhara, Xinqiao Zhang1, and Javier Duarte. 2022. FastStamp: Accelerating Neural Steganography and Digital Watermarking of Images on FPGAs. arXiv preprint arXiv:2209.12391 (2022).Google Scholar
- Saurav Joshi, Jeetendra Pande, and B. K. Singh. 2018. Watermarking of audio signals using iris data for protecting intellectual property rights of multiple owners. International Journal of Information Technology 10 (2018), 559--566.Google ScholarCross Ref
- J. Lee, H. Kim, Y. Yoon, and H. Kim. 2011. DCT-based invisible watermarking for image authentication. IEEE Transactions on Consumer Electronics 57, 2 (2011), 539--545.Google Scholar
- Jae-Eun Lee, Young-Ho Seo, and Dong-Wook Kim. 2020. Convolutional neural network-based digital image watermarking adaptive to the resolution of image and watermark.Google Scholar
- Y. Liu, S. Tang, R. Liu, L. Zhang, and Z. Ma. 2018. Secure and robust digital image watermarking scheme using logistic and RSA encryption. 95--105.Google Scholar
- Rachna Patel, Kalpesh Lad, Mukesh Patel, and Madhavi Desai. 2021. An efficient dct-sbpm based video steganography in compressed domain. International Journal of Information Technology 13 (2021), 1073--1078.Google ScholarCross Ref
- Priya Porwal, Ratnesh N. Chaturvedi, Tanvi Ghag, Nikita Poddar, and Ankita Tawde. 2014. Digital Video Watermarking Using Least Significant Bit (LSB) Technique. International Journal of Engineering Research & Technology (IJERT) 3, 1 (January 2014), 2491--2496.Google Scholar
- Sanjana Sinha, Prajnat Bardhan, Swarnali Pramanick, Ankul Jagatramka, Dipak K. Kole, and Aruna Chakraborty. 2011. Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis. International Journal of Wisdom Based Computing 1, 2 (August 2011), 7--12.Google Scholar
- Ke Sun, Bin Xiao, Dong Liu, and Jingdong Wang. 2019. Deep High-Resolution Representation Learning for Human Pose Estimation. In CVPR.Google Scholar
- Alireza Tavakoli, Zahra Honjani, and Hedieh Sajedi. 2022. Convolutional Neural Network-Based Image Watermarking using Discrete Wavelet Transform. arXiv preprint arXiv:2210.06179 (2022).Google Scholar
- Yuexin Xiang, Tiantian Li, Wei Ren, and Tianqing Zhu. 2022. Generating Image Adversarial Examples by Embedding Digital Watermarks. arXiv preprint arXiv:2009.05107 (2022).Google Scholar
- Jin Xun and Jong-Weon Kim. 2018. Robust Digital Watermarking for High- definition Video using Steerable Pyramid Transform, Two Dimensional Fast Fourier Transform and Ensemble Position-based Error Correcting. KSII Transactions on Internet and Information Systems 12, 7 (July 2018), 3438--3454. https: //doi.org/10.3837/tiis.2018.07.024Google ScholarCross Ref
- Kevin Alex Zhang, Lei Xu, Alfredo Cuesta-Infante, and Kalyan Veeramachaneni. 2019. Robust Invisible Video Watermarking with Attention. (2019). arXiv:1909.01285 [cs.MM]Google Scholar
- Richard Zhang, Phillip Isola, Alexei A Efros, Eli Shechtman, and Oliver Wang. 2018. The Unreasonable Effectiveness of Deep Features as a Perceptual Metric. In CVPR.Google Scholar
- Han Fang Zhaoyang Jia and Weiming Zhang. 2021. MBRS: Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compression. In arXiv:2108.08211.Google Scholar
Index Terms
- ACM Multimedia 2023 Grand Challenge Report: Invisible Video Watermark
Recommendations
Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks
This article presents a novel invisible robust watermarking scheme for embedding and extracting a digital watermark in an image. The novelty lies in determining a perceptually important subimage in the host image. Invisible insertion of the watermark is ...
A new region aware invisible robust blind watermarking approach
The multimedia revolution has made a strong impact on our society. The explosive growth of Internet access to this digital information has generated new opportunities and challenges. The ease of editing and duplicating information in the digital domain ...
Adaptive image data hiding using transformation and error replacement
Watermarking is popular method for effective copyright protection of digital data. The invisible image watermarking is a type of watermarking which is used to conceal secret information in a cover image. In any watermarking system, there is a trade-off ...
Comments