A Video Watermarking Algorithm Based on Chaotic and Wavelet Neural Network

This paper presented a video watermarking algorithm based on wavelet chaotic neural network. First, to enhance binary image’s security, the algorithm encrypted it with double chaotic based on Arnold and Logistic map, Then, the host video was divided into some equal frames and distilled the key frame through chaotic sequence which generated by Logistic. Meanwhile, we distilled the low frequency coefficients of luminance component and self-adaptively embedded the processed image watermark into the low frequency coefficients of the wavelet transformed luminance component with the wavelet neural network. The experimental result suggested that the presented algorithm has better invisibility and robustness against noise, Gaussian filter, rotation, frame loss and other attacks.


Authors:



References:
[1] J. Zhang, L. Zhao, S.Q. Yang. Summary of Video Watermarking Technology. Computer application, vol.25, 2015, pp.850-852.
[2] Zuo D G,Zhou S,Zhang X Y. Wavelet Neural Network.Journal of Sichuan Ordnance, vol.5,2012,pp.84-86.
[3] X. Li. The Research of Chaos Image Encryption Scheme Based on Cat Map and Logistic Map. Guangdong University of technology, vol.6, 2013. pp.35-38.
[4] X.F. Liao, D. Xiao, Y. Chen. Principle and Application of Chaotic Cryptology (m). Beijing: Science Press, vol.4, 2009, pp.44-50.
[5] H.X. Fu, H. Zhao et al. Practical Design of Application of MATLAB Neural Network. Beijing: China machine press vol.7, 2010, pp.99-106.
[6] K.Q. Ren, K. Zhang, B. Xie. Blind Adaptive Video Watermarking Algorithm Based on Low Frequency Coefficients of Wavelet Domain. TV technology, vol.36, 2012, pp.47-51.
[7] Li Y, Gao X B, Ji H B. A 3D Wavelet Based Spatial Temporal Approach for Video Watermarking(C)//Proc. of the 5th International Conf. on Computational Interlligence and Multimedia Applications. China: Computer Society Press, Xi'an, vol.4, 2003, pp.260-265.
[8] K.H. Sun, W. Cheng, Y.S. Chen. Video Watermarking Algorithm Based on Chaos and Motion Vector. Application Research of Computers, vol.28, 2011, pp.3046-3048.