A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application

(emultimedia technologies are gaining a lot of popularity these days.Many unauthorized persons are gaining the access ofmultimedia such as videos, audios, and images.(e transmission ofmultimedia across the Internet by unauthorized person has led to the problem of illegal distribution.(e problem arises when copyrighted data is getting accessed without the knowledge of copyright owner.(e videos are themost attacked data during COVID-19 pandemic. In this paper, the frame selection video watermarking technique is proposed to tackle the issue.(e proposedwork enlightens frame selection followed bywatermarking embedding and testing of the technique against various attacks. (e embedding of the watermark is done on selected frames of the video. (e additional security feature Hyperchaotic Encryption is applied on watermark before embedding. Watermark embedding is done using graph-based transform and singularvalued decomposition and the performance of the technique is further optimized using hybrid combination of grey wolf optimization and genetic algorithm.Many researchers face the challenge of quality loss after embedding of watermark. Proposed technique will aim to overcome those challenges. A total of 6 videos (Akiyo, Coastguard, Foreman, News, Bowing, and Pure Storage) are used for carrying out research work. (e performance evaluation of the proposed technique has been carried out after processing it against practical video processing attacks Gaussian noise, sharpening, rotation, blurring, and JPEG compression.


Introduction
e widespread of the Internet has led to the distribution of multimedia data, i.e., images, videos, and audios everywhere. e access to multimedia has become possible thus maintaining the confidentiality of the need of an hour. e illegal distribution and copying of multimedia data such as videos and images has lead to the design and development of watermarking technique. Many of the illegal users are getting the access of the real-time videos from various sources such as NETFLIX, Amazon Prime, and various OTT Platforms, and thus, illegal distribution is done. ese videos are available in compressed domain. A watermark is a digital data that can be used like text, audio, and image and can be embedded in the multimedia, videos and images, so that it can be detected or extracted later so as to identify illegal use of multimedia media data [1]. An efficient watermarking scheme is characterized by four properties [2]: (a) Imperceptibility: this property calculates the degree of invisibility of the hidden signal to the user, so the watermark should be targeted in those locations where watermark signal is unnoticeable (b) Robustness: this property verifies the ability of watermark to survive attacks such as cropping, resizing, and additional noise (c) Capacity: it identifies the total amount of data that can be hidden in the multimedia data (d) Security: it identifies the addition of cipher to watermark that can be embedded in multimedia data Real-time videos are the most part utilized interactive media information accessible now days. e illegal use by unauthorized personnel has propelled researchers to develop various video watermarking techniques [3]. e video watermarking techniques has many constraints regarding extraction of frames [4], selection of frames [5], types of videos [1], and codes of video [6].
ere are 2 types of videos where watermark can be embedded, raw videos and compressed videos [7]. Raw videos are the videos that can be obtained using TV capture card or satellite that has huge bit rate and quality is never compromised in those, whereas compressed videos are processed in compressed domain where the bit rate is less and this watermarking scheme is faster, and it allows low computation cost for processing the watermark [8].
e increasing use of real-time video-based applications such as videos on demand [9], set top box, and online streaming such as Netflix and Amazon Prime are demanding high compression to meet the requirements of bandwidth for certain users along with maintaining best quality of videos [6]. For the real-time videos to be available with best codec, different video codecs have been mentioned in [6] so as to meet requirement of users in today's world. Some of them are H.264/AVC (advanced video codec), XVID, and WMV, but since H.264 is the codec used nowadays, so the proposed watermarking scheme will be applicable to the same. e major challenge in watermarking in real-time videos is the selection of extracted frames and finding the best suitable frames from the video to embed watermark, and many frame selection mechanisms have been proposed in [10]. Our proposed technique will give optimal results in comparison to these. After the frames are selected, the next challenge is to select areas of frame to be watermarked. e research has been done of various techniques by various researchers [11]. e major challenge is the addition of watermark in the frames of the video poses the loss of quality [12] by affecting the video bit rate of the video [13], so the research is being carried out to focus on realtime requirements such as downscaling; quality loss of the video after watermark is added to the video, and our proposed work intends to solve these issues. Video watermarking techniques have been classified into following types based on domain [6]. In spatial or pixel domain methods, watermark is embedded directly on pixel positions; the best example of this method is LSB (Least Significant Bit) modification, although this is the fast method but lacks in achieving imperceptibility [6]. In frequency domain methods, host signal is converted to frequency signal [14]. e techniques are mentioned in Figure 1. e proposed technique deals with a transform named as graph-based transform that transforms signals in the form of graphs (V, E). e technique is coupled with SVD. e validity of watermarking scheme is dependent upon values of peak signal-tonoise ratio (PSNR) after applying attacks such as rotation, Gaussian noise, and compression attack on the proposed watermarking scheme. Further sections explain the research work carriec out in this area followed by the proposed technique.

Related Work
A number of research studies related to watermark embedding using DWT as a transform domain has been carried out by Chaudhary et al. [3] which embeds watermark on the selected frame. High frequency subbands are selected on the areas where watermark embedding is present [15]. e research frequency domain achieves more level of robustness compared to spatial domain but is not efficient to handle various attack scenarios. e combination of DWT and SVD was also applied by various researchers [16]. e improvement of results based on values of PSNR was obtained against image processing attack scenarios. e particle swarm optimization methods [13] based on Dither modulation optimizes the results of PSNR by optimizing various factors (optimal frequency set) for embedding watermark. Applying optimization algorithm on combination of DWT and SVD has also produced high values of PSNR. e same has been listed in the work done by Mishra et al. [17]. Here, combination of DWT and SVD is carried out with firefly algorithm where multiple scaling factors were optimized using firefly algorithm. Cheung [10] proposed the scheme, depth map coding, using graph-based transform and transform domain scarification to counter the problems faced by discrete cosine transform method considering its inability to code block that contains arbitrarily shaped edges. e proposed scheme Agarwal et al. [18] also extended work by using hybrid fuzzy-BPN architecture to embed binary watermark in gray scale images, and the proposed scheme achieves good results in real-time scenarios. Rajpal et al. [19] extended the work done by Agarwal et al. [18] by applying novel fuzzy frame selection technique using bidirectional extreme learning machine on videos. e proposed scheme by [20] addresses fast mechanism to select frames. Masoumi and Amiri [4] proposed a method of video watermarking by applying BWT (biorthogonal wavelet transform) and SVD by using artificial bee optimization algorithm. Tabassum and Islam [3] proposed a method of identical frame extraction, and using frame difference method, identification and selection of appropriate frames is done to embed watermark inside them. e method is improved by Masoumi and Amiri [4] where motioned part of video is detected using the technique proposed in [21] by applying 3D wavelet transformation coefficients of different subbands which are selected for embedding. Venugopala et al. [11] listed key areas of feature selection for watermarking embedding by adjusting the pixel values and using scene change detection mechanism. Research carried out by Kumar and Rewani [8] also featured secured watermarking technique by encrypting watermark using rail fence cipher before embedding to randomly selected frames, and Mansouri and Amiri [21] have also proposed secured video watermarking in compressed domain by proposing new content-based key to select particular regions for embedding watermark. Araghi and Manaf [22] proposed a secured watermarking scheme by employing DWT with 2D SVD, thus eliminating the challenges of dependencies of watermarked image with cover images along with the use of 2 level-authentication systems to be applied on watermark extraction. is method increases the dimensionality of the image space, which increases the efficiency of the algorithm and makes it easier to implement in real-time application. Egilmez et al. [23] applied a concept of graph-based transform on video compression considering graph-based transform designs and edge adaptive design for video encoding and decoding. Gu et al. [24] proposed a large-scale optimization technique to solve large-scale global optimization problems by introducing hybrid grey wolf optimization with genetic algorithm. Cao and Wang [25] proposed a secure watermarking technique based on hyperchaotic encryption on binary watermark to add additional security mechanism on the watermark. e proposed scheme achieved high values of PSNR, NC, and SSIM against various attacks. Sharma et al. [26] conducted the research by using graph-based transform, singular-valued decomposition, and hyperchaotic encryption on selected frames of video. e results were good, but the addition of optimization can still improve it.

Proposed Work
e contribution to the research is done in 3 phases.
(i) Frame extraction and selection (ii) Embedding watermarking procedure (iii) Watermark extraction procedure (iv) Performance evaluation

Frame Extraction and Selection.
e first phase in the proposed work is finding the suitable number of frames from extracted frames. e process of finding suitable frames in real time is carried out using scene change detection. e proposed work has applied frame selection technique on the video based on compressed domain which is used in various real-time applications such as broadcasting. e watermark cannot be embedded in all extracted frames because adding watermark will significantly increase the bit rate of video and thus will affect the processing time and increase complexity of code. So, frame selection is a very crucial step to decide which frames are selected from the set of extracted frames. Frame selection will depend on motion and motionless frames, and the selection criteria for a frame depend upon variations in the video. e significant changes in the video will have higher number of frames getting selected. Frame selection using a key has been conducted in most of the studies, but it does not serve as the best method as frame selection [27]. In the proposed work, an advanced approach with temporal sampling is done on Sobel-Feldman algorithm which can be used to identify the frame from the set of similar and different frames of video. e comparison of adjacent frames is done with one another to find frame difference which is calculated in equation (1). e value of the frame difference will decide whether the frame will be considered as the part of the same group or a different group. If the difference is large, then it will be considered as part of a different group. e parameter of decision will be taken as threshold which is calculated in equation (2); if frame difference is higher than threshold, the next frame will be the part of next group. e temporal sampling is performed which enhances the process of frame selection that gives better results compared to [3]. After different frames have been taken as part of different groups, the random key generator is used to select one similar image out of similar images. e work gives better results in comparison to Gu et al. [28] where random frame selection was carried out [29]. Frame difference can be represented as histogram difference which can be expressed as where F k is representing frame difference, H k is the histogram value of k th frame of level m, and T is the number of levels of the histogram. e proposed work focuses on the value of histogram difference; the selection of frames is carried out on the basis of difference represented in equation (1), and the frames with less difference compared to threshold cannot be chosen, but the frames representing the large histograms difference value are selected in the next group. e grouping of similar images is based on scene change detection. e threshold is maintained to detect intensity histogram difference to calculate sudden transition amongst frames (in order to find larger frame difference).
is scenario is expressed as where M b � threshold value, s and μ are the mean and standard deviation value of selected frame intensity histogram difference, And α is the factor that varies from 2 to 6, and in our research, we have taken this value as 2.5. e temporal sampling has also enhanced the process of frame selection. For the video with higher number of motioned frames, the given proposed algorithm will give better results in terms of frame selection, and the process is optimized by temporal sampling. e frame selection is always followed by frame extraction which can be done randomly by extracting frames after the timeline of certain seconds. e process is Mathematical Problems in Engineering carried by applying a timer on the given video for selection of frames that runs till the end of the video. e criteria of frame selection depend on the comparison of F k with M b . e algorithm is given Algorithm 1. e frame selection procedure is represented in Figure 2, where the number of frames gets extracted from the video. e grouping is done based on frame difference. e single frame is selected from a group, and after that the watermark embedding process is carried out. Algorithm 1 provides frame selection procedure which is the crucial part of research.

Watermark Embedding Procedure.
e next step after selection of frames is to embed the encrypted watermark. e watermark is not applied directly on the frame; the transformation of the frame has to be done using a transform.
e embedding of watermark on selected frames imposes the challenge of quality loss. Every selected frame has its own property, so the target is to embed the watermark so as to obtain high values of PSNR. e watermark is not embedded directly as the image is required to be transformed before embedding is done. Mostly research is done on DWT and DCT for transforming the frame [30], and the proposed technique focuses on transforming the frame into graph-based transform followed by SVD. e embedding factor to embed a watermark is calculated using equation (11). e combined technique of GBT-SVD does provide good values of the embedding factor which results in good values of PSNR but the same can be improved by adding optimization to the embedding factor, where the target value of PSNR is further improved, which results in less loss of quality after the watermark is embedded to the selected frame. e performance of the proposed technique is always tested when attacks are applied to the watermarked frame. High values of PSNR always indicate the good performance of the technique. Most of the research on embedding of watermark is carried out using discrete wavelet transform and discrete cosine transform. However, the proposed technique presented in the paper is hybrid combination of GBT-SVD-GWO-GA. e target is to get higher values of PSNR after embedding of watermark. e same can be addressed in the following sections. e proposed work applies graph-based transform followed by singular value decomposition on selected frames. Graph-based transform (GBT) is a transform the uses signal in the form of graph and produces better results in terms of adapting in signal structure of an image. is section introduces novel embedding technique based on the combination of GBT and SVD, further optimized by hybrid algorithm of grey wolf optimization and genetic algorithm. e additional security feature given in Section 3.2.3 based on hyperchaotic encryption adds to the functionality of proposed technique. e embedding of encrypted watermark is proposed in further sections.

Embedding Technique.
Graph-based transform is a newly formed transform that is represented as G � {V, E, s}, where V and E are the vertices and edges of the graph and s represents the frame signal for graph G: where m i,j represents the weight of the edge. e degree matrix D ∈ N × N is a diagonal matrix: en, the Laplacian graph matrix L would be defined as where the operator L is also known as Kirchhoff operator, which is represented as adjacency matrix A. Eigenvalue decomposition is done to a set of real nonnegative eigenvalues which are represented by Λ � λ 1 , λ 2 , . . . , λ N , and orthogonal eigenvectors are represented by Decorrelation of the signal defined on the graph is done using eigenvectors:

Incremental Optimization Method for Embedding
Factor. e embedding factor in equation (11) is optimized using an incremental approach to grey wolf optimization. e major part in embedding is to take care of PSNR after embedding of watermark. e embedding factor of GBT and SVD calculated in equation (10) was taken as 0.02, and the quality loss is addressed after applying certain attacks. e proposed scheme in the given research achieves good results in terms of PSNR by optimizing the embedding factor by using the combined approach of grey wolf optimization and genetic algorithm. e grey wolf optimization model [11] optimizes the factor by finding the fitness value from the position of 3 wolves α, β, and δ which provides the best solution, 2nd best solution, and 3rd best solution. e approach is to find a prey which is referred as PSNR in the watermarking scheme, thus in order to get the fittest solution. e whole process is the search of prey, gradually updating the position so as to capture the prey faster. α is the leader of the pack and rest of the wolves follow it. e position of grey wolves is updated by using formula given in equation (11) and the following equation: where M �→ � distance between grey wolf and a prey, � coefficient vector, t � number of iterations, S → p � position vector of prey, S → � position vector of wolf, and F → � balance convergence coefficient between prey and wolf. e calculation of coefficient vectors F → , L → is done by equation (13) and the following equation: where a → linearly decreases from 2 to 0, r → and q → are random vectors, and F → decreases with decrease in a → . It means the wolf is very much near to the prey to be attacked. e grey wolves will update the positions by moving within search space to find optimal solution. e location updating is done by following equations (16)- (22): where �→ δ � distance amongst wolves, α, β, and δ are wolves and the prey, S → 1, S → 2, and S → 3 represent parameters that determine position w.r.t to α, β, and δ wolves, and S → (t + 1) � the positional vector after updating grey wolf.
Steps of GWO model of optimization: (1) First step is to generate the initial set of population randomly and initialize parameters a → , F → , L → Improved algorithm of global exploration improves convergence speed. e value of a improves efficiency of algorithm. e value of a does not impact any local convergence, thus solving large-scale multimodel problems will be hard. So, the improvement in the value of a will improve optimal solution and the same is listed as Read (T) and store in variables (4) Compute the difference amongst frames and store in F k (5) if (F k > M b ) (6) { (7) Select and group them (8) Apply random key amongst frames from different groups (9) Write frames to the disk (10) } (11) } End ALGORITHM 1: Frame selection algorithm.

Mathematical Problems in Engineering
where a max � initial value of parameter a, a min � end value of parameter a, i � iteration index, i max � maximum iterations, and g � nonlinear adjustment coefficient. e value of A from equation (12) entirely depends upon value of a, where higher value of A expands searching criteria of a better way. If |A| < 1, then the range is limited to a certain extent. e population evaluation directly impacts the efficiency of an optimized algorithm. To calculate the same, assume current population fitness is represented by Fi. Selection of individuals is done by the highest fitness values. e value of K represents total fitness and Pi represents probability of selected individual given in equations (24) and (25), respectively: Cumulative fitness value Ki is calculated till children are consistent like parent, and the same is illustrated in equation (25) Threshold

Different groups of similar images Yes No
Frame selection criteria  Mathematical Problems in Engineering To solve large-scale problems, the grey wolf optimization algorithm is combined with genetic algorithm, where entire population P is divided into t × d subpopulations P i (i � 1....t and j � 1. . ..d). Crossover is applied to increase diversity of population. Linear crossover is applied in the proposed work. A random number is generated for each individual xi for crossover population. e crossover probability is represented by P c and c11 and c21 represent children generated from parents p11 and p22, where z represents the random number that ranges from 0 to 1. e crossover operation is derived from equations (27) and (28): Mutation operator is applied on elite individuals in population.
e individuals are represented as x i with mutation probability P m . Selection of gene x k is done with probability Pm, and generation of new individuals x i 1 � based on 2 criteria: . . .
where l and u are lower and upper bounds to generate new individuals and z is a random number between 0 to 1. e hybrid optimization model is represented as follows. e proposed model of GWO-GA optimizes the embedding factor to target high values of PSNR. e results obtained by using the incremental approach not only gets high values of PSNR alone but also gets high values of PSNR when different attacks such as Gaussian noise, sharpening, rotation, blurring, and JPEG compression are applied to watermarked frames. e algorithm of the incremental approach by GWO-GA is given in Algorithm 2. e approach starts with application of grey wolf optimization to find best search agents followed by genetic algorithm to further optimize to get high values of PSNR as a target function. e same is implemented in this research and optimization is applied to the embedding factor which is done using combined transform of GBT-SVD. Although the same transform is used to embed the watermark, using the optimization model provides additional feature to target high values and provides better results. e working of the hybrid grey wolf optimization and genetic algorithm (GWO-GA) is done in 2 phases where optimization of the embedding factor is done by using grey wolf optimization followed genetic algorithm. e areas to find best fitness parameter (PSNR) is done by calculating fitness of each search agent, updating the fitness value after every iteration. e process is continued till the best fitness value is calculated followed by the incremental approach of genetic algorithm which also searches for the best fitness value (PSNR), and the higher value of PSNR is directly proportional to quality. e process of selecting subpopulation is followed by mutation if the high PSNR value is not found out which is followed by crossover; then, convergence is done to get the best fitness value. Algorithm 2 provides the optimized embedding factor. e algorithm works better when compared with alone of grey wolf optimization and genetic algorithm. e embedding of watermark is done using graph-based transform (GBT) and singular-valued decomposition (SVD). During the embedding process, the embedding factor taken in equation (11) is optimized using this incremental approach so as to aim the higher value of PSNR, and the results obtained in Section 4 are a proof of this technique being robust, and the same approach is being tested on 6 videos and higher values of PSNR is obtained in all.

Encryption of Watermark before Embedding.
e watermark embedded on selected frames is encrypted using hyperchaotic encryption to add security feature to the proposed technique [25]: e value of x, y, z, and w calculated from the above equation will be used for encrypting the watermark image to be used in a frame. e standard values of a, b, and c were taken as per [25]. e second step is to convert R, S into x, y for column and row, respectively, to encrypt the watermarked frame: W1(:, n) � W1(:, y(n)), where W1 is the encrypted watermark image to be embedded. e encryption of a watermark image is represented as W (i, j) where image size is represented as m * n. e first step is generating the sequence of R and S using the Lorenz system. e security feature added here adds to the security feature by encrypting watermark before being embedded, thus making the technique more secure. Real-time applications such as broadcasting face security issues and copyright protection. e proposed technique combined with hyperchaotic encryption adds to security feature and also adds to copyright protection. In previous research done in [31], rail fence cipher is used as a security feature that is applied to binary image watermark. e watermark was ciphered with rail fence cipher so that exact retrieval of the watermark from any unauthorized person is not easy. Mostly research is carried out using transposition cipher [19] as adding higher security mechanisms such as AES and DES will increase the complexity of code. e research carried out by [25] is secure and provides better results compared to transposition ciphers. Hyperchaotic encryption is not adding to the complexity of code. Algorithm 3 provides embedding of the watermark inside selected frames using the optimized embedding factor provided by Algorithms 2 and 4 and defines the extraction of watermark. Figure 3 explains the updated embedding factor using a hybrid algorithm.

Watermark Extraction Procedure.
is section describes the watermark extraction procedure so as to recover the watermark from the watermarked video. e extraction of a watermarked from the watermarked video is a reverse process of embedding when the watermark was embedded with the help of equation (10). e extraction of frames is followed by applying GBT and SVD and the extraction is calculated as per equation (32). is is followed by inverse GBT and inverse SVD, then Input: embedding factor Output: optimized embedding factor for watermark embedding on alpha value Begin (1) Initialize parameters a, F, and L and population size N, P c , and P m (2) Initialize current population P (3) i � 0 (4) While i < i max (5) { (6) Find the fitness value of all search agents (7) S α � Best Search agent for embedding factor S β � 2 nd Best Search agent for embedding factor S δ � 3 rd Best Search agent for embedding factor (8) for i � 1 to N (9) { (10) Update search agent positions given in equation (21).
} (17) Assign P←newP2, S α (18) Generate subpopulation Ps using partitioning on P. (19) Select the individuals using crossover probability P c. (20) for Perform crossover on each search agent by equations (27) and (28).  Mathematical Problems in Engineering decryption is done using a key, and then the watermark is recovered. Figure 4 represents the watermarking embedding procedure, and Figure 5 represents the watermark extraction procedure: where W(i, j)� extracted watermark, K ′ (i, j )� watermarked frame, and K(i, j)� selected frame.

Performance Evaluation.
e performance evaluation of the watermarking technique is typically calculated in terms of quality parameters of the video and robustness against various attack scenarios such as Gaussian noise, sharpening, rotation, blurring, and JPEG compression. e parameters are as follows.
PSNR (peak signal-to-noise ratio): PSNR is a major quality parameter that differentiates the original and watermark frame on the basis of the mean square error. It is calculated by the following equation: where G and H � rows and columns of the image, AI(i, j) � selected frame, and EI(i, j)� watermarked frame.
PSNR � 10 log 10 (255 To find the similarity between the selected frame and watermarked frame, the quality parameters' NC (normalized correlation), SSIM (structural similarity index measure), and BER (bit error rate) are calculated by the following equation:   Total of 6 cif-encoded videos have been taken and frame selection mechanism is dependent on scene change detection, and using the frame selection algorithm mentioned in Section 3.1, the frames were selected from the videos. Akiyo did not have sufficient scene change detection, so the watermarking technique could not be applied on that, as the value of F k (frame difference) was not greater than M b (threshold), so no significant frames got selected from the video, and rest of the videos have significant frames selected as per frame selection algorithm in Section 3.1. Table 1 represents number of frames getting selected from the input video dataset. Pure storage video has got maximum frames selected. Some videos indicated major changes due to which more frames got selected from them. e datasets of the videos were obtained from Figures 6a-6i signify some selected frames from the dataset of videos. Along with these videos 2 binary watermarks and their encrypted versions have been shown. e compressed domain videos taken in the research are the same type of videos used in broadcast application; to remove unauthorized access to these videos, the given videos are embedded with encrypted watermark that addresses the issues faced by real-time application. e encrypted watermark not only addresses security issues but also adds to copyright protection so as to achieve ownership identification.
e experimental results were divided into certain phases. Starting with taking the input video in avi or mp4 file, this phase is followed by frame extraction. e relevant frames were selected from extracted frame which is followed by the embedding of watermark. Embedding of watermark is done using the proposed method followed by testing the validity of the technique by applying certain attacks. Higher values of PSNR and lower values of BER implicate the proposed technique to be efficient which leads to less loss in quality of output video. Every video will have different properties which mean frame selection in every video will be different. e same is demonstrated in this research, where different videos have different numbers of frames getting selected. Figures 7a-7e represent the watermarked frame after the watermarking process along with the binary watermark. Figures 8a-8d represent the plot of various videos and their respective quality parameters against no attack.

Experimental Tests for Quality Check.
e experimental tests have been carried out using 2 binary watermarks, and the results are calculated by applying the watermark on the selected frame of the video. ere are 2 types of calculation of results done: with attacks and without attacks. e following sections describe the performance of proposed techniques against both scenarios.
e value of quality parameters is taken as per comparison with original and watermarked frames. e higher value of PSNR, NC, and SSIM and lower value of BER suggests the proposed scheme is efficient when the watermark is imparted to the original host video. Table 2 compiles results of embedding of watermark 1 on selected frames. Tables 1 and 2 indicate there is not much of a difference when both watermarks are applied on the same set of videos. Binary watermark 1 is taken for carrying out the research work, and all the attacks in further sections are applied on the same watermark. e embedding technique requires iterations to the process of combined transform of GBT-SVD with GWO and GA. To formulate results, we have taken iterations' value as 10. Since the method is entirely dependent on processor speed, so taking the large value of iteration will be timeconsuming, although the higher value of iteration will give better results.  [4,8,20,21,28,32,33]. Figures 10a-10d represent plots of average values of performance parameters using watermark 2. Tables 4 and 5 compile the processing time (in seconds) required to carry out frame selection, embedding, and extraction of both watermark for given set of videos. Figure 11 represents plots for comparison of quality parameters of both watermarks. e time is entirely based on processor requirements. e total time consumed depends on selection of frames from the video. Pure storage video has got 5 frames selected and the time for every frame varies from 20 to 35 seconds for every frame. Embedding time is dependent on the number of selected frames and iterations in which optimization is applied. As a standard, 10 iterations have been taken to obtain good value of fitness, i.e., PSNR, and more iteration will lead to higher value of embedding time. Total time consumed for every video is mentioned in Tables 4 and 5, and plots of the same are represented in Figure 12. e value of embedding time is similar for both watermark 1 and watermark 2. e value of embedding time is directly proportional to the number of selected frames. Total of 5 frames got selected from pure storage video; thus, total embedding time is the highest for the same video.

Experimental Tests for Time Complexity.
Plots in Figures 13a and 13b represent the embedding time for both watermarks. It can be seen in plots that there is Pure storage 5 less difference in the values of quality parameters when both watermarks are compared. e analysis was done using watermark 2 and results were obtained which are highlighted in Table 5.

Processing Attacks.
e robustness of the proposed technique is tested against various attack scenarios such as Gaussian noise, sharpening, rotation, blurring, and JPEG compression. Series of experiments have been conducted to attack every watermarked frame to measure quality loss. e robustness of the technique entirely depends upon the values of PSNR, SSIM, NC, and BER. e proposed technique is designed to have real-time requirement in mind which is tested against these signal processing attacks. e processing attacks have been applied with some variance of the value of an attack to check robustness of the scheme. e detailed description is given as follows. e results for 0 value were obtained from Table 2. It can be identified from plots in Figures 14a-14d that values of quality parameters reduce after increasing Gaussian noise variance, although difference is less and negligible, indicating the proposed technique performs better in case of Gaussian noise.
It can be seen from plots in Figures 14a-14d as average PSNR, NC, and SSIM decrease with increase in the attack value and BER increases with increase in the attack value. e higher value of PSNR, NC, and SSIM justifies the robustness of the proposed technique. Figures 14a-14d compile plots of real-time testing by applying this attack with different values of Gaussian noise for all quality parameters using values {0, 0.0001, 0.001, 0.01} for all 5 videos taken in research work. PSNR, SSIM, NC, and BER values of all the videos are similar. e value of NA in graphs means no attack is applied and higher values of PSNR, NC, and SSIM will be obtained for NA. Lower values of BER are obtained for NA. Table 6 represents the value of quality parameters of watermarked frames after Gaussian noise with 0.0001 variance is applied to all. Results indicate the proposed technique to be robust against this attack. e value of NA in graphs means no attack is applied and higher values of PSNR, NC, and SSIM will be obtained for NA. Lower values of BER are obtained for NA. e value 0 indicates no attack is applied. e results for 0 value were obtained from Table 2. e sharpening attack is applied to highlight details of the image. e result    calculation of the watermarked frame is represented in Table 7.

Rotation Attack.
In rotation attack, a watermarked frame is rotated with an angle of {0, 1, 90, 180} using watermark 1. e value 0 indicates no attack is applied. e results for 0 value were obtained from Table 2. It can be seen from plots in Figures 16a-16d as average PSNR, NC, and SSIM deteriorate with increase in the attack value and BER increases with increase in the attack value. PSNR, SSIM, NC, and BER values of all the videos are similar. e value of NA in graphs means no attack is applied and higher values of PSNR, NC, and SSIM will be obtained for NA. Lower values of BER are obtained for NA. e result calculation of these watermarked frames after rotation attack is represented in Table 8. Table 8 represents result calculation of quality parameters of watermarked frames of input video dataset after rotation attack is applied using watermark 1.                    Result calculation of all parameters after JPEG compression is done using Table 10. Figures 19(a-d) describe plots of all the attacks applied on input dataset. e results compiled from plots in Figures 19(a-d) suggest that the proposed technique achieves good results when all 5 attacks are applied on watermarked video. Higher value of quality parameters is achieved of all videos. e proposed novel technique is robust against all attacks applied and achieves higher values against various attack scenarios.

Analysis of Compressed and Uncompressed Data.
e proposed technique was applied on both compressed and uncompressed video, but most of the analysis was done on uncompressed video as it takes less time to process using optimization algorithm. e same was analyzed with plots in

Conclusion
In this paper, (1) frame selection was implemented using scene change detection along with temporal sampling and (2) approach was done to embed the encrypted watermark using hybrid combination of graph-based transform along with singular value decomposition (SVD) combined with optimized approach of grey wolf optimization and genetic algorithm which covers various areas such as broadcasting and copyright protection. e proposed technique focuses on real-time requirements of the video such as quality loss after embedding of the watermark. e quality parameters PSNR, SSIM, NC, and BER are used to evaluate effectiveness of the scheme against various attack scenarios. e higher values of PSNR, SSIM, and NC and lower BER values indicate that the proposed embedding approach achieves good visual quality and robustness. e embedding watermarking technique was found to be robust against practical video processing attacks: Gaussian noise, sharpening, rotation, blurring, and JPEG compression. Various OTT platforms do cover compressed domain of videos and our proposed technique covers all aspects of security for broadcasting application, since the watermark was encrypted with hyperchaotic encryption and successful recovery of the watermark after extraction suggests the efficiency of watermarking. e efficiency of the technique can be improved with advanced optimization methods and machine learning models which will be addressed in future work.

Data Availability
e data used to support the findings of the study are available from the corresponding author upon request.

Conflicts of Interest
e authors declare that they have no conflicts of interest.