SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 4, Ver. I (Jul - Aug .2015), PP 34-38
www.iosrjournals.org
DOI: 10.9790/2834-10413438 www.iosrjournals.org 34 | Page
Digital Watermarking: a Technical Overview
Surajit Sur1
, Rabel Guha Roy2
, Subhro Chakraborty3
, Anshuman Khan4
1,4
(Asst. Prof.,Ece Dept.,University Of Engineering & Management,Jaipur,India)
2
(Asst. Prof.,Cse Dept.,University Of Engineering & Management,Jaipur,India)
3
(Asst. Prof.,Civil Dept.,University Of Engineering & Management,Jaipur,India)
Abstract. Digital watermarking technology has been playing an important role in protecting copyrights in
images, audio and video. these can be accurately copied and arbitrarily distributed more easily. Watermarking
algorithm has good robustness against the attacks like rotation, image compression, noise addition, filtering
and MP4 compression etc. The most popular algorithm in spatial domain is LSB methods. In transform domain
watermarking algorithms based on DCT,DWT, discrete Hadamard transform, singular value decomposition and
discrete Fourier transform all are discusses this literature. Digital watermarking is the process of embedding
information into a digital signal in a way that it difficult to remove.
Keywords: DWT,DCT,DHT, patchwork, alpha blending, invisible image watermarking, audio and video
watermarking.
I. Introduction
The growth of high speed computer networks and that of the internet has explored. Cryptography is an
effective solution for distribution problem, but in most cases has to tied to specialized-and costly-hard-ware to
create tamper-proof devices to avoid direct access to data in digital format. most cryptographic protocols are
concerned with secured communications. Access control in set-top-boxes used for digital television
demodulation and decoding succeed in avoiding unauthorized access to programs that are being broadcast in
scrambled from[1]but fail to including further storage and illegal dissemination actions. Digital watermark
completely characterizes by the person who applies it and, therefore, marks it as being his intellectual
property.The imperceptibility and robustness are desirable characteristics of watermark.The statistical analysis
should not produce any advantage from theattacking point of view. Finally, the watermark should withstand
multiple watermarking to facilitate traitor tracing[2]. There are many shift in transform technique like DCT to
wavelet based image compression methods, Watermarking schemes operating in wavelet transform domain[4]
have become more interesting. A transparent and robust watermark should be such that the watermark is
detectable in the host image. The proper selection of the frequency transform is dependent on the fact which is
better in image transform approximates properties[5] of the HVS(Human Visual System) the easier is to put
more energy in the embedded signal without causing perceptible distortion. DWT more effective for embedding
and decoding technique. Here are so many attacks on digital watermarking like intentional and unintentional
attacks against security of watermarking system. The attacks are categorized as geometrical, cryptographically
and protocol attacks. However the estimation based attack on estimated data which sorts of attacks are newborn
on research area
II. History Of Digital Watermarking
The secrete communication based on steganographic methods which invented by Greek philosopher
Herodotus.He ia the father of steganographic history[7]. The earliest allusion to secret writing in the West
appears in Homer’s llaid [6]. From literature of Ovid in his “Art of love” stenography [8],[9] is an important
technique to hide sympathetic links using milk to write invisibly. Chemically affected sympathetic links were
developed in World Wars 1and 2.The origin of steganography is biological and physiological which use in
1500’s after the appearance of Trithemius’ book on the subject “steganographia”.The “semagrams” and the
“open code”[8],[10] are used in Linguistic steganography which is the branch of steganography which consists
of linguistic or language form of hidden writing. A semagram is a secret message .watermarking technique has
developed from steganography. It used in old paper manufacturing company[11].
III. Classification Of Watermarking
Digital Watermarking techniques can be classified as Text Watermarking, Image Watermarking, Audio
Watermarking, and Video Watermarking. In other way, the digital watermarks can be divided into three
different type’s as follows visible watermark, Invisible-Robust watermark, Invisible-Fragile watermark, Dual
watermark.
Digital Watermarking: a Technical Overview
DOI: 10.9790/2834-10413438 www.iosrjournals.org 35 | Page
IV. Techniques Of Watermarking
IV. A.Frequency Domain Watermarking
In these methods selected frequencies can be altered. Because high frequencies will be lost by
compression or scaling so that the watermark signal is applied to lower frequencies that containing important
elements of the original picture.These techniques are like Fourier Transform,DTFT,DFT,DCT,DWT etc.
IV.B. Spread Spectrum
This technique can be used for both spatial domain and frequency domain. The spread spectrum
method has the advantage that the watermark extraction is possible without using the original unmarked image
IV.C.Spatial Domain
Techniques in spatial domain class generally share the following characteristics like The watermark is
applied in the pixel domain, No transforms are applied to the host signal during watermark embedding,
Combination with the host signal is based on simple operations, in the pixel domain.
V. Working Methods
V.A. Image Watermarking
V.A.a Spatial Domain Analysis
Spatial domain watermarking is performed by modifying values of pixel color samples. The most
common algorithm using spatial domain watermarking in LSB[12] bit for hiding image by the technique of
artificial intelligence. the least-significant bit plane of a grayscale cover image and replaces it with binary
watermark. Since that watermark is smaller than the cover image, we need several copies of you watermark
together in order to achieve the correct size[13]. In a digital image, information can be inserted directly into
every bit of image information or the more busy areas of an image can be calculated so as to hide such messages
in less perceptible parts of an image [14]. Hao Luo et al [15], proposed a self-embedding watermarking scheme
for digital images.They proposed algorithm used the cover image as a watermark. It generates the watermark by
halftoning the host image into a halftone image. The watermark is retrieved from the LSB of the suspicious
image and inverse permuted. Wen-Chao Yang et al [16] used the PKI (Public-Key Infrastructure), Public-Key
Cryptography and watermark techniques to design a novel testing and verifying method of digital images and
Also Hong Jie He et al [17], proposed a wavelet-based fragile watermarking scheme for secure image
authentication. Sung-Cheal
Byun et al [18], proposed a fragile watermarking scheme for authentication of images. They used
singular values of singular value decomposition (SVD) of images to check the integrity of images. Gil-Je Lee et
al [19] presented a new LSB digital watermarking scheme by using random mapping function. Saeid Fazli et al
presented imperceptibility and robustness of LSB watermarking using SSIM Quality Metrics. The new
watermarking scheme[20] based on log-average luminance. It introduce a monochrome image of 1024 bytes is
used as the watermark. If the byte of the watermark image represented white color (255) a value a is added to
the image pixel luminance value, if it is black (0) the a is subtracted from the luminance value. To extract the
watermark, the selected blocks are chosen by difference between the luminance value of the watermarked image
pixel and the original image pixel is greater than 0, the watermark pixel is supposed to be white, otherwise it
supposed to be black. It efficient against changing the watermarked image to grayscale. Debjyoti Basu et al
proposed Bit Plane Index Modulation (BPIM) based fragile watermarking scheme for authenticating RGB color
image. By embedding R, G, B component of watermarking image in the R, G, B component of original image,
embedding distortion is minimized by taking least significant bit (LSB). An image watermarking method based
on the human visual system. The new classes of embedding methods, termed quantization index modulation
(QIM) and distortion-compensated QIM (DC-QIM).it realizations technique in the form of dither modulation.
These include both additive white Gaussian noise (AWGN)[21] channels, which may be good models for hybrid
transmission applications such as digital audio broadcasting, and mean-square-error-constrained attack[22]
channels that model private-key watermarking applications. In invisible image watermarking median filter
algorithm [23,24] is implemented for the de-noising of highly corrupted images and edge preservation. Mean,
Median and improved mean filter is used for the noise detection[25].
V.A.b Frequency Domain or Transform Domain Technique
In this process firstly the gray scale host image is taken and 2D DWT (Discrete Wavelet Transform
)[26]is applied to the image which decomposes image into four components low frequency approximation, high
frequency diagonal, low frequency horizontal ,low frequency vertical components. In the same technique DWT
is also applied to the watermark image which is to be embedded in the host image. The technique used here for
inserting the watermark is alpha blending[27]. In this technique the decomposed components of the host image
and the watermark which are obtained by applying DWT[28] to both the images are multiplied by a scaling
Digital Watermarking: a Technical Overview
DOI: 10.9790/2834-10413438 www.iosrjournals.org 36 | Page
factor and are added. During the embedding process the size of the watermark should be smaller than the host
image but the frame size of both the images should be made equal. Since the watermark embedded in this paper
is perceptible in nature or visible, it is embedded in the low frequency approximation component of the host
image and also we can used DCT domain[29] both invisible and visible watermarking technique. A digital
watermarking-based image quality evaluation method[30] that can accurately estimate image quality[31,32] in
terms of the classical objective metrics, such as peak signal-to-noise ratio (PSNR), weighted PSNR (wPSNR).
watermark is embedded into the discrete wavelet transform (DWT) domain of the original image using a
quantization method. This paper proposed a new statistical approach for watermarking mesh representations of
3-D graphical objects[33,34]. A robust digital watermarking method has to requirements of watermark
invisibility, robustness, embedding capacity and key security. In this method embedding is performed by
changing the normalized distribution of local geodesic distances from within each region[36]. Two different
embedding methods are used by changing the mean or the variance of geodesic distance distributions and also
used 3-D triangular mesh technique[35].
V.B Audio Watermarking
The audio watermark should be inaudible, statistically unnoticeable to prevent unauthorized removal.
self-clocking is to detect in the presence of time scale modification attack. The audio watermarking can be
classified into temporal watermarking and spectral watermarking, based on the domain where watermarks are
embedded. Temporal watermarking hides watermarks directly into digital audio signals in the time domain, and
spectral watermarking methods [37,38]where FFT(Fast Fourier Transform), DCT(Discrete Cosine Transform),
and DWT(Discrete Wavelet Transform), etc. are commonly used. The temporal audio watermarking is relatively
easy to implement and requires less computing resources, as compared with the spectral watermarking. But the
temporal watermarking is weaker than the spectral watermarking against general signal processing attacks.
V.B.a Time Domain And Frequency Domain or Transform Domain Technique
Least Significant Bit substitution (LSB) and echo hiding techniques both are Time-domain analysis
[39]. LSB embeds the watermark information in the least significant bits of the audio sample values by
overwriting the original bits [40] to overcome the quantization error. To make echo watermarking embed
information embed into the repeated version of component of original discrete audio signal with small offset
value. initially amplitude and decay rate to make it imperceptible [41]. Frequency domain audio watermarking
techniques apply on human perceptual properties and frequency masking characteristics of the human auditory
system [42]. In these techniques, the phase and amplitude of the transform domain coefficients are modified.
such as Discrete Fourier Transform (DFT), the Discrete Cosine Transform (DCT), and the Discrete Wavelets
Transform (DWT). From this literature using patchwork algorithm to implement audio watermarking,
artificially modifies the difference(we call this patch value ) between estimated sums of samples in two
randomly chosen and prescribed index subsets. Thus the modified patch value is many deviation. The artificial
modification can be detected, with a high probability by comparing the observed patch value with the expected
one. The new approach of watermarking algorithm based on the wavelet transform (WT) and the complex
cepstrum transform (CCT) by combining with human auditory model and using the masking effect of human
ears. This algorithm create binary image watermark into the audio signal and improved the imperceptibility of
watermarks. The complex cepstral analysis is a homomorphic mapping and is the most effective extraction
method in audio identification. the advantage of cepstral transform (CCT) is that the coefficients of the complex
cepstral transform are much decorrelation. the audio watermarks embedding algorithm with the cepstral
transform, a digital watermark was inserted into the cepstral components of the audio signal using a technique
by spread spectrum communications to hiding a narrow band signal in a wideband channel. In this method, a
pseudo-random sequence was used to watermark the audio signal. The watermark is then weighted in the
cepstrum domain according to the distribution of cepstral coefficients and the frequency masking characteristics
of HAS. In frequency domain C.T.Hsith and P.Y.Tsou[43] discussed the detection of audio blind watermarking
in cepstrum domain using the concepts of energy characteristic radix. Audio watermarking scheme using direct
sequence spread spectrum (DSSS) method enhance an audio signal imperceptibly.
V.C Video Watermarking
There are compressed and uncompressed watermarking techniques. To robust video watermarking
method is presented to embeds data to the specific bands in the wavelet domain using motion estimation
approach. Using random Gaussian distribution in video sequences on different types of video (compressed DVD
quality movie and uncompressed digital camera movie). The proposed watermarking method in frequency
domain has strong robustness against some attacks such as frame dropping, frame filtering. video watermarking
techniques need to meet new difficulties such as large volume of inherently redundant data between frames, the
unbalance between the motion and motionless regions, real-time requirements in the video broadcasting etc.
Digital Watermarking: a Technical Overview
DOI: 10.9790/2834-10413438 www.iosrjournals.org 37 | Page
Watermarked video sequences are susceptible to pirate attacks such as frame averaging, frame swapping,
statistical analysis, digital-analog (AD/DA) conversion, and lossy compressions, Copy control [44].Value added
applications like legacy system enhancement, database linking, video tagging, digital video broadcast
monitoring , Media Bridge etc. Video watermarking algorithms should directed on localized detection, real time
algorithm complexity, synchronization recovery, effects of floating point representation, power dissipation
etc.The main advantages of using pixel domain techniques are that they are conceptually simple to understand
and the time complexity of these techniques are low which favours real time implementations. But these
techniques generally lacks in providing adequate robustness and imperceptibility requirements. This paper
represents a method to detect video tampering[45] and distinguish it from common video processing operations,
such as recompression, noise, and brightness increase, using a practical watermarking scheme for real-time
authentication of digital video[46].
VI. Conclusions
Watermarking is emerging tropic in new era of science. but not only in science it penetrate human
civilization to enrich watermarking in high sky. Since 1990s it has been modified yet it not have proper
modified technique. In watermarking there are so many field not to be developed in best limiting value. The
fragile and semi fragile watermarking techniques have some serious disadvantages like increased use of
resources, higher area requirements and high power consumption.
References
[1]. A. Herrigel et al., “Secure copyright protection techniques for digital images,” in Information hiding,vol.1525 ,pp.169-190,Springer
Verlag,1998.
[2]. Ravi K. Sharma, and Steve Decker, “Practical Challenges For Digital Watermarking Applications”, IEEE, 2001
[3]. E. Brannocket et al., “Watermarking with Wavelets simplicity leads to Robustness”, IEEE, 2008.
[4]. A.K. Goyal, N.Agrawal, S.Verma, “Robust Watermarking in Transform domain using edge detection technique”, IEEE, 2007.
[5]. Yusof Yusnita and Khalifa, O. Othman“Digital Watermarking For Digital Images Using Wavelet Transform”, IEEE, 2007.
[6]. Kahn. David, ”Codebreakers : Story of Secret Writting”, Macmillan 1967.
[7]. Homer, ”The Iliad” (trans. R. Fragels), Middlesex, England: Penguin 1972.
[8]. Kahn.David, ”The History of Steganography”, Proc. of First Int. Workshop on Information Hiding, Cambridge, UK, May30-June1,
Lecture notes in Computer Science, Vol.1174, Ross Anderson(Ed.), pp.1-7,1996.
[9]. F.A.P.Petitcolas, et al.,”Information Hiding - A Survey”, Proceedings of the IEEE, Vol.87, No.7, July 1999, pp.1062-1078.
[10]. B.Pfitzmann, ”Information Hiding Terminology”, Proc. of First Int. Workshop on Information Hiding, Cambridge, UK, May30-
June1, 1996, Lecture notes in Computer Science, Vol.1174, Ross Anderson(Ed.), pp.347-350.
[11]. Hal Berghel, ”Watermarking Cyberspace”, Communications of the ACM, Nov.1997, Vol.40, No.11, pp.19 - 24.
[12]. Kaur et al., “International Journal of Advanced Research in Computer Science and Software Engineering 3(4)”,April - 2013, pp.
858-861.
[13]. C. Rey and JL. Dugelay, “A survey of watermarking algorithms for image authentication”. EURASIP Journal on Applied Signal
Processing, 6:613–621, 2002.
[14]. Lee, G. J., Yoon, E. J. and Yoo, K. Y., “A new LSB based Digital Watermarking Scheme with Random Mapping Function”, in
2008 IEEE DOI 10.1109/UMC.2008.33.
[15]. H. Luo, S. Chu, H. and Lu, Z. M., “Self Embedding Watermarking Using Halftoning Technique, Circuits Syst Signal Process”
(2008) 27: 155–170.
[16]. W. Yang, C., Wen, C. Y. and Chen, C. H., (2008), “Applying Public-Key Watermarking Techniques in Forensic Imaging to
Preserve the Authenticity of the Evidence”. Springer-Verlag Berlin Heidelberg 2008.
[17]. He, H. J., Zhang, J. S. and Tai, H. M., (2006), A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication.
Springer-Verlag Berlin Heidelberg 2006
[18]. Byun, S. C., et al. (2003), A SVD-Based Fragile Watermarking Scheme for Image Authentication. Springer-Verlag Berlin
Heidelberg 2003
[19]. Lee, G. J., Yoon, E. J. and Yoo, K. Y. (2008), “A new LSB based Digital Watermarking Scheme with Random Mapping Function”,
in 2008 IEEE DOI 10.1109/UMC.2008.33
[20]. Fazli, S. and Khodaverdi, G (2009), Trade-off between Imperceptibility and Robustness of LSB Watermarking using SSIM Quality
Metrics, in 2010 IEEE DOI 10.1109/ICMV.2009.68
[21]. A. Cohen and A. Lapidoth, “On the Gaussian watermarking game,” in Proc. IEEE Int. Symp. Information Theory, Sorrento, Italy,
June 2000, p. 48.
[22]. N. Merhav, “On random coding error exponents of watermarking systems,” IEEE Trans. Inform. Theory, vol. 46, pp. 420–430,
Mar. 2000.
[23]. Pei-Eng Ng and Kai-Kuang Ma, “A Switching Median Filter with BDND for Extremely Corrupted Images”, IEEE Trans Image
Processing, Vol. 15, No. 6, PP. 1506-1516, June 2006
[24]. Jafar Ramadhan Mohammed, “An Improved Median Filter Based on Efficient Noise Detection for High Quality Image
Restoration,”,IEEE Int. Conf ,PP. 327 – 331, . May 2008
[25]. Xiaoyin Xu, Eric L. Miller, Dong bin Chen and Mansoor Sarhadi, “ Adaptive Two-Pass Rank Order Filter to Remove Impulse
Noise in Highly Corrupted Images”, IEEE Trans Image Processing,Vol.13,No.2, PP.238-247, February 2004
[26]. Zhu Xi’an, (2008), A Semi-Fragile Digital Watermarking Algorithm in Wavelet Transform Domain Based on Arnold Transform,
ICSP Proceedings
[27]. Bo Shen, Iihwar K. Sethi and Vasudev Bhaskaran, (1998) DCT Domain Alpha Blending, IEEE
[28]. Y. Hu and S. Kwong, "Wavelet domain adaptive visible watermarking", Electron. Lett., vol. 37, 2001
[29]. S. P. Mohanty, J. R. Ramakrishnan, and M. S. Kankanhalli, "A DCT domain visible watermarking technique for images", ICME
2000,
Digital Watermarking: a Technical Overview
DOI: 10.9790/2834-10413438 www.iosrjournals.org 38 | Page
[30]. T. M. Kusuma and H.-J. Zepernick "A reduced-reference perceptual quality metric for in-service image quality assessment", Proc.
Joint First Workshop Mobile Future Symp. Trends Commun., pp.71 -74 2003
[31]. S. Wang , J. Zhao , W. J. Tam and F. Speranza "Image quality measurement by using digital watermarking based on discrete
wavelet transform", Proc. 22nd Biennial Symp. Commun., pp.210 -212 2004
[32]. D. Zheng , J. Zhao , W. J. Tam and F. Speranza "Image quality measurement by using digital watermarking", Proc. IEEE Int.
Workshop Haptic, Audio, Vis. Environ. Applicat., pp.65 -70 2003
[33]. G. Bors "Watermarking mesh-based representations of 3-D objects using local moments", IEEE Trans. Image Process., vol. 15,
no. 3, pp.687 -701 2006
[34]. K. Wang , G. Lavou & eacute ; , F. Denis and A. Baskurt "A comprehensive survey on three-dimensional mesh watermarking",
IEEE Trans. Multimedia, vol. 10, no. 8, pp.1513 -1527 2008
[35]. F. Cayre and B. Macq "Data hiding on 3-D triangle meshes", IEEE Trans. Signal Process., vol. 51, no. 4, pp.939 -949 2003
[36]. M. Luo and A. G. Bors "Principal component analysis of spectral coefficients for mesh watermarking", Proc. IEEE Int. Conf.
Image Process., pp.441 -444 2008
[37]. D. Kirovski and H. Malvar, “ Robust spread-spectrum audio watermarking”, 2001 IEEE International Conference on Acoustics,
Speech, and Signal Processing, Vol. 3, 2001, pp. 1345-1348.
[38]. I.-K. Yeo, and H. J. Kim,“Modified Patchwork Algorithm: a novel audio watermarking scheme”, International Conference on
information Technology: Coding and Computing,2001,pp.237-242.
[39]. P. Bassia and I. Pitas, “Robust Audio Watermarking in the Time Domain ,” IEEE Transactions on Multimedia, vol. 3, no. 2, pp.
232-241, 2001.
[40]. N. Cvejic and T. Seppänen, “Increasing the Capacity of LSB-Based Audio Steganography,” in Proceedings of the IEEE
International Workshop on Multimedia Signal Processing, pp. 336-338, 2002.
[41]. H. Kim and Y. Choi, “A Novel Echo-hiding Scheme with backward and Forward Kernels,” IEEE Transactions on Circuits and
Systems for Video Technology; vol. 13, no. 8, pp. 885-889, 2003.
[42]. S. Katzenbeisser and F. Petitcolsd, “Information Hiding Techniques for Steganography and Digital Watermarking,” Artech House,
Boston, USA, 2000.
[43]. Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin “A Digital Audio Watermark Embedding Algorithm”, International
Journal of Information Technology, Vol. 11, No.12 ,2005
[44]. Sang-Kwang Lee, Yo-Sung Ho, “Digital Audio Watermarking in the Cepstrum Domain”. IEEE trans. on Consumer Electronics,
vol.46 (3) , pp.744-750, 2000.
[45]. S. Chen and H. Leung "Chaotic watermarking for video authentication in surveillance applications", IEEE Trans. Circuits Syst.
Video Technol., vol. 18, pp.704 -709,(2008)
[46]. P.-C. Su , C.-S. Wu , I.-F. Chen , C.-Y. Wu and Y.-C. Wu "A practical design of digital video watermarking in H.264/AVC for
content authentication", Signal Process, Image Commun., vol. 26, no. 8â?“9, pp.413 -426 ,2011

More Related Content

What's hot

robust image watermarking
robust image watermarkingrobust image watermarking
robust image watermarkingsravanthi mandala
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
 
Robust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS BasedRobust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS BasedCSCJournals
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarkingijceronline
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domainpaperpublications3
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesEditor IJMTER
 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...IJERA Editor
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096IJERA Editor
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESijma
 
Paper id 21201457
Paper id 21201457Paper id 21201457
Paper id 21201457IJRAT
 

What's hot (19)

robust image watermarking
robust image watermarkingrobust image watermarking
robust image watermarking
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
H017524854
H017524854H017524854
H017524854
 
Robust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS BasedRobust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS Based
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniques
 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
1918 1923
1918 19231918 1923
1918 1923
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 
E04122330
E04122330E04122330
E04122330
 
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
 
Paper id 21201457
Paper id 21201457Paper id 21201457
Paper id 21201457
 

Viewers also liked

Evaluation of titanium in hydrochloric acid solutions containing corrosion in...
Evaluation of titanium in hydrochloric acid solutions containing corrosion in...Evaluation of titanium in hydrochloric acid solutions containing corrosion in...
Evaluation of titanium in hydrochloric acid solutions containing corrosion in...IOSR Journals
 

Viewers also liked (20)

H017365863
H017365863H017365863
H017365863
 
F010612830
F010612830F010612830
F010612830
 
G1303074851
G1303074851G1303074851
G1303074851
 
D013112636
D013112636D013112636
D013112636
 
J012518692
J012518692J012518692
J012518692
 
H1302034856
H1302034856H1302034856
H1302034856
 
R130403115130
R130403115130R130403115130
R130403115130
 
F012312934
F012312934F012312934
F012312934
 
R01232147152
R01232147152R01232147152
R01232147152
 
K010418290
K010418290K010418290
K010418290
 
B012630608
B012630608B012630608
B012630608
 
E012513749
E012513749E012513749
E012513749
 
I017355767
I017355767I017355767
I017355767
 
E011122530
E011122530E011122530
E011122530
 
I017525560
I017525560I017525560
I017525560
 
F017663344
F017663344F017663344
F017663344
 
Evaluation of titanium in hydrochloric acid solutions containing corrosion in...
Evaluation of titanium in hydrochloric acid solutions containing corrosion in...Evaluation of titanium in hydrochloric acid solutions containing corrosion in...
Evaluation of titanium in hydrochloric acid solutions containing corrosion in...
 
H017315053
H017315053H017315053
H017315053
 
F017323439
F017323439F017323439
F017323439
 
P180203105108
P180203105108P180203105108
P180203105108
 

Similar to F010413438

A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...prjpublications
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...CSCJournals
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithmijsrd.com
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
A New Wavelet based Digital Watermarking Method for Authenticated Mobile Signals
A New Wavelet based Digital Watermarking Method for Authenticated Mobile SignalsA New Wavelet based Digital Watermarking Method for Authenticated Mobile Signals
A New Wavelet based Digital Watermarking Method for Authenticated Mobile SignalsCSCJournals
 
Digital Image Watermarking Using Different Levels of Intermediate Significant...
Digital Image Watermarking Using Different Levels of Intermediate Significant...Digital Image Watermarking Using Different Levels of Intermediate Significant...
Digital Image Watermarking Using Different Levels of Intermediate Significant...CSCJournals
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESijma
 
Visible watermarking using spread spectrum
Visible watermarking using spread spectrumVisible watermarking using spread spectrum
Visible watermarking using spread spectrumIAEME Publication
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingEditor IJMTER
 
Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image WatermarkingIJERA Editor
 

Similar to F010413438 (20)

[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
1918 1923
1918 19231918 1923
1918 1923
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A New Wavelet based Digital Watermarking Method for Authenticated Mobile Signals
A New Wavelet based Digital Watermarking Method for Authenticated Mobile SignalsA New Wavelet based Digital Watermarking Method for Authenticated Mobile Signals
A New Wavelet based Digital Watermarking Method for Authenticated Mobile Signals
 
Digital Image Watermarking Using Different Levels of Intermediate Significant...
Digital Image Watermarking Using Different Levels of Intermediate Significant...Digital Image Watermarking Using Different Levels of Intermediate Significant...
Digital Image Watermarking Using Different Levels of Intermediate Significant...
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
Visible watermarking using spread spectrum
Visible watermarking using spread spectrumVisible watermarking using spread spectrum
Visible watermarking using spread spectrum
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 
Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image Watermarking
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
D011121524
D011121524D011121524
D011121524
 
C011121114
C011121114C011121114
C011121114
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

F010413438

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 4, Ver. I (Jul - Aug .2015), PP 34-38 www.iosrjournals.org DOI: 10.9790/2834-10413438 www.iosrjournals.org 34 | Page Digital Watermarking: a Technical Overview Surajit Sur1 , Rabel Guha Roy2 , Subhro Chakraborty3 , Anshuman Khan4 1,4 (Asst. Prof.,Ece Dept.,University Of Engineering & Management,Jaipur,India) 2 (Asst. Prof.,Cse Dept.,University Of Engineering & Management,Jaipur,India) 3 (Asst. Prof.,Civil Dept.,University Of Engineering & Management,Jaipur,India) Abstract. Digital watermarking technology has been playing an important role in protecting copyrights in images, audio and video. these can be accurately copied and arbitrarily distributed more easily. Watermarking algorithm has good robustness against the attacks like rotation, image compression, noise addition, filtering and MP4 compression etc. The most popular algorithm in spatial domain is LSB methods. In transform domain watermarking algorithms based on DCT,DWT, discrete Hadamard transform, singular value decomposition and discrete Fourier transform all are discusses this literature. Digital watermarking is the process of embedding information into a digital signal in a way that it difficult to remove. Keywords: DWT,DCT,DHT, patchwork, alpha blending, invisible image watermarking, audio and video watermarking. I. Introduction The growth of high speed computer networks and that of the internet has explored. Cryptography is an effective solution for distribution problem, but in most cases has to tied to specialized-and costly-hard-ware to create tamper-proof devices to avoid direct access to data in digital format. most cryptographic protocols are concerned with secured communications. Access control in set-top-boxes used for digital television demodulation and decoding succeed in avoiding unauthorized access to programs that are being broadcast in scrambled from[1]but fail to including further storage and illegal dissemination actions. Digital watermark completely characterizes by the person who applies it and, therefore, marks it as being his intellectual property.The imperceptibility and robustness are desirable characteristics of watermark.The statistical analysis should not produce any advantage from theattacking point of view. Finally, the watermark should withstand multiple watermarking to facilitate traitor tracing[2]. There are many shift in transform technique like DCT to wavelet based image compression methods, Watermarking schemes operating in wavelet transform domain[4] have become more interesting. A transparent and robust watermark should be such that the watermark is detectable in the host image. The proper selection of the frequency transform is dependent on the fact which is better in image transform approximates properties[5] of the HVS(Human Visual System) the easier is to put more energy in the embedded signal without causing perceptible distortion. DWT more effective for embedding and decoding technique. Here are so many attacks on digital watermarking like intentional and unintentional attacks against security of watermarking system. The attacks are categorized as geometrical, cryptographically and protocol attacks. However the estimation based attack on estimated data which sorts of attacks are newborn on research area II. History Of Digital Watermarking The secrete communication based on steganographic methods which invented by Greek philosopher Herodotus.He ia the father of steganographic history[7]. The earliest allusion to secret writing in the West appears in Homer’s llaid [6]. From literature of Ovid in his “Art of love” stenography [8],[9] is an important technique to hide sympathetic links using milk to write invisibly. Chemically affected sympathetic links were developed in World Wars 1and 2.The origin of steganography is biological and physiological which use in 1500’s after the appearance of Trithemius’ book on the subject “steganographia”.The “semagrams” and the “open code”[8],[10] are used in Linguistic steganography which is the branch of steganography which consists of linguistic or language form of hidden writing. A semagram is a secret message .watermarking technique has developed from steganography. It used in old paper manufacturing company[11]. III. Classification Of Watermarking Digital Watermarking techniques can be classified as Text Watermarking, Image Watermarking, Audio Watermarking, and Video Watermarking. In other way, the digital watermarks can be divided into three different type’s as follows visible watermark, Invisible-Robust watermark, Invisible-Fragile watermark, Dual watermark.
  • 2. Digital Watermarking: a Technical Overview DOI: 10.9790/2834-10413438 www.iosrjournals.org 35 | Page IV. Techniques Of Watermarking IV. A.Frequency Domain Watermarking In these methods selected frequencies can be altered. Because high frequencies will be lost by compression or scaling so that the watermark signal is applied to lower frequencies that containing important elements of the original picture.These techniques are like Fourier Transform,DTFT,DFT,DCT,DWT etc. IV.B. Spread Spectrum This technique can be used for both spatial domain and frequency domain. The spread spectrum method has the advantage that the watermark extraction is possible without using the original unmarked image IV.C.Spatial Domain Techniques in spatial domain class generally share the following characteristics like The watermark is applied in the pixel domain, No transforms are applied to the host signal during watermark embedding, Combination with the host signal is based on simple operations, in the pixel domain. V. Working Methods V.A. Image Watermarking V.A.a Spatial Domain Analysis Spatial domain watermarking is performed by modifying values of pixel color samples. The most common algorithm using spatial domain watermarking in LSB[12] bit for hiding image by the technique of artificial intelligence. the least-significant bit plane of a grayscale cover image and replaces it with binary watermark. Since that watermark is smaller than the cover image, we need several copies of you watermark together in order to achieve the correct size[13]. In a digital image, information can be inserted directly into every bit of image information or the more busy areas of an image can be calculated so as to hide such messages in less perceptible parts of an image [14]. Hao Luo et al [15], proposed a self-embedding watermarking scheme for digital images.They proposed algorithm used the cover image as a watermark. It generates the watermark by halftoning the host image into a halftone image. The watermark is retrieved from the LSB of the suspicious image and inverse permuted. Wen-Chao Yang et al [16] used the PKI (Public-Key Infrastructure), Public-Key Cryptography and watermark techniques to design a novel testing and verifying method of digital images and Also Hong Jie He et al [17], proposed a wavelet-based fragile watermarking scheme for secure image authentication. Sung-Cheal Byun et al [18], proposed a fragile watermarking scheme for authentication of images. They used singular values of singular value decomposition (SVD) of images to check the integrity of images. Gil-Je Lee et al [19] presented a new LSB digital watermarking scheme by using random mapping function. Saeid Fazli et al presented imperceptibility and robustness of LSB watermarking using SSIM Quality Metrics. The new watermarking scheme[20] based on log-average luminance. It introduce a monochrome image of 1024 bytes is used as the watermark. If the byte of the watermark image represented white color (255) a value a is added to the image pixel luminance value, if it is black (0) the a is subtracted from the luminance value. To extract the watermark, the selected blocks are chosen by difference between the luminance value of the watermarked image pixel and the original image pixel is greater than 0, the watermark pixel is supposed to be white, otherwise it supposed to be black. It efficient against changing the watermarked image to grayscale. Debjyoti Basu et al proposed Bit Plane Index Modulation (BPIM) based fragile watermarking scheme for authenticating RGB color image. By embedding R, G, B component of watermarking image in the R, G, B component of original image, embedding distortion is minimized by taking least significant bit (LSB). An image watermarking method based on the human visual system. The new classes of embedding methods, termed quantization index modulation (QIM) and distortion-compensated QIM (DC-QIM).it realizations technique in the form of dither modulation. These include both additive white Gaussian noise (AWGN)[21] channels, which may be good models for hybrid transmission applications such as digital audio broadcasting, and mean-square-error-constrained attack[22] channels that model private-key watermarking applications. In invisible image watermarking median filter algorithm [23,24] is implemented for the de-noising of highly corrupted images and edge preservation. Mean, Median and improved mean filter is used for the noise detection[25]. V.A.b Frequency Domain or Transform Domain Technique In this process firstly the gray scale host image is taken and 2D DWT (Discrete Wavelet Transform )[26]is applied to the image which decomposes image into four components low frequency approximation, high frequency diagonal, low frequency horizontal ,low frequency vertical components. In the same technique DWT is also applied to the watermark image which is to be embedded in the host image. The technique used here for inserting the watermark is alpha blending[27]. In this technique the decomposed components of the host image and the watermark which are obtained by applying DWT[28] to both the images are multiplied by a scaling
  • 3. Digital Watermarking: a Technical Overview DOI: 10.9790/2834-10413438 www.iosrjournals.org 36 | Page factor and are added. During the embedding process the size of the watermark should be smaller than the host image but the frame size of both the images should be made equal. Since the watermark embedded in this paper is perceptible in nature or visible, it is embedded in the low frequency approximation component of the host image and also we can used DCT domain[29] both invisible and visible watermarking technique. A digital watermarking-based image quality evaluation method[30] that can accurately estimate image quality[31,32] in terms of the classical objective metrics, such as peak signal-to-noise ratio (PSNR), weighted PSNR (wPSNR). watermark is embedded into the discrete wavelet transform (DWT) domain of the original image using a quantization method. This paper proposed a new statistical approach for watermarking mesh representations of 3-D graphical objects[33,34]. A robust digital watermarking method has to requirements of watermark invisibility, robustness, embedding capacity and key security. In this method embedding is performed by changing the normalized distribution of local geodesic distances from within each region[36]. Two different embedding methods are used by changing the mean or the variance of geodesic distance distributions and also used 3-D triangular mesh technique[35]. V.B Audio Watermarking The audio watermark should be inaudible, statistically unnoticeable to prevent unauthorized removal. self-clocking is to detect in the presence of time scale modification attack. The audio watermarking can be classified into temporal watermarking and spectral watermarking, based on the domain where watermarks are embedded. Temporal watermarking hides watermarks directly into digital audio signals in the time domain, and spectral watermarking methods [37,38]where FFT(Fast Fourier Transform), DCT(Discrete Cosine Transform), and DWT(Discrete Wavelet Transform), etc. are commonly used. The temporal audio watermarking is relatively easy to implement and requires less computing resources, as compared with the spectral watermarking. But the temporal watermarking is weaker than the spectral watermarking against general signal processing attacks. V.B.a Time Domain And Frequency Domain or Transform Domain Technique Least Significant Bit substitution (LSB) and echo hiding techniques both are Time-domain analysis [39]. LSB embeds the watermark information in the least significant bits of the audio sample values by overwriting the original bits [40] to overcome the quantization error. To make echo watermarking embed information embed into the repeated version of component of original discrete audio signal with small offset value. initially amplitude and decay rate to make it imperceptible [41]. Frequency domain audio watermarking techniques apply on human perceptual properties and frequency masking characteristics of the human auditory system [42]. In these techniques, the phase and amplitude of the transform domain coefficients are modified. such as Discrete Fourier Transform (DFT), the Discrete Cosine Transform (DCT), and the Discrete Wavelets Transform (DWT). From this literature using patchwork algorithm to implement audio watermarking, artificially modifies the difference(we call this patch value ) between estimated sums of samples in two randomly chosen and prescribed index subsets. Thus the modified patch value is many deviation. The artificial modification can be detected, with a high probability by comparing the observed patch value with the expected one. The new approach of watermarking algorithm based on the wavelet transform (WT) and the complex cepstrum transform (CCT) by combining with human auditory model and using the masking effect of human ears. This algorithm create binary image watermark into the audio signal and improved the imperceptibility of watermarks. The complex cepstral analysis is a homomorphic mapping and is the most effective extraction method in audio identification. the advantage of cepstral transform (CCT) is that the coefficients of the complex cepstral transform are much decorrelation. the audio watermarks embedding algorithm with the cepstral transform, a digital watermark was inserted into the cepstral components of the audio signal using a technique by spread spectrum communications to hiding a narrow band signal in a wideband channel. In this method, a pseudo-random sequence was used to watermark the audio signal. The watermark is then weighted in the cepstrum domain according to the distribution of cepstral coefficients and the frequency masking characteristics of HAS. In frequency domain C.T.Hsith and P.Y.Tsou[43] discussed the detection of audio blind watermarking in cepstrum domain using the concepts of energy characteristic radix. Audio watermarking scheme using direct sequence spread spectrum (DSSS) method enhance an audio signal imperceptibly. V.C Video Watermarking There are compressed and uncompressed watermarking techniques. To robust video watermarking method is presented to embeds data to the specific bands in the wavelet domain using motion estimation approach. Using random Gaussian distribution in video sequences on different types of video (compressed DVD quality movie and uncompressed digital camera movie). The proposed watermarking method in frequency domain has strong robustness against some attacks such as frame dropping, frame filtering. video watermarking techniques need to meet new difficulties such as large volume of inherently redundant data between frames, the unbalance between the motion and motionless regions, real-time requirements in the video broadcasting etc.
  • 4. Digital Watermarking: a Technical Overview DOI: 10.9790/2834-10413438 www.iosrjournals.org 37 | Page Watermarked video sequences are susceptible to pirate attacks such as frame averaging, frame swapping, statistical analysis, digital-analog (AD/DA) conversion, and lossy compressions, Copy control [44].Value added applications like legacy system enhancement, database linking, video tagging, digital video broadcast monitoring , Media Bridge etc. Video watermarking algorithms should directed on localized detection, real time algorithm complexity, synchronization recovery, effects of floating point representation, power dissipation etc.The main advantages of using pixel domain techniques are that they are conceptually simple to understand and the time complexity of these techniques are low which favours real time implementations. But these techniques generally lacks in providing adequate robustness and imperceptibility requirements. This paper represents a method to detect video tampering[45] and distinguish it from common video processing operations, such as recompression, noise, and brightness increase, using a practical watermarking scheme for real-time authentication of digital video[46]. VI. Conclusions Watermarking is emerging tropic in new era of science. but not only in science it penetrate human civilization to enrich watermarking in high sky. Since 1990s it has been modified yet it not have proper modified technique. In watermarking there are so many field not to be developed in best limiting value. The fragile and semi fragile watermarking techniques have some serious disadvantages like increased use of resources, higher area requirements and high power consumption. References [1]. A. Herrigel et al., “Secure copyright protection techniques for digital images,” in Information hiding,vol.1525 ,pp.169-190,Springer Verlag,1998. [2]. Ravi K. Sharma, and Steve Decker, “Practical Challenges For Digital Watermarking Applications”, IEEE, 2001 [3]. E. Brannocket et al., “Watermarking with Wavelets simplicity leads to Robustness”, IEEE, 2008. [4]. A.K. Goyal, N.Agrawal, S.Verma, “Robust Watermarking in Transform domain using edge detection technique”, IEEE, 2007. [5]. Yusof Yusnita and Khalifa, O. Othman“Digital Watermarking For Digital Images Using Wavelet Transform”, IEEE, 2007. [6]. Kahn. David, ”Codebreakers : Story of Secret Writting”, Macmillan 1967. [7]. Homer, ”The Iliad” (trans. R. Fragels), Middlesex, England: Penguin 1972. [8]. Kahn.David, ”The History of Steganography”, Proc. of First Int. Workshop on Information Hiding, Cambridge, UK, May30-June1, Lecture notes in Computer Science, Vol.1174, Ross Anderson(Ed.), pp.1-7,1996. [9]. F.A.P.Petitcolas, et al.,”Information Hiding - A Survey”, Proceedings of the IEEE, Vol.87, No.7, July 1999, pp.1062-1078. [10]. B.Pfitzmann, ”Information Hiding Terminology”, Proc. of First Int. Workshop on Information Hiding, Cambridge, UK, May30- June1, 1996, Lecture notes in Computer Science, Vol.1174, Ross Anderson(Ed.), pp.347-350. [11]. Hal Berghel, ”Watermarking Cyberspace”, Communications of the ACM, Nov.1997, Vol.40, No.11, pp.19 - 24. [12]. Kaur et al., “International Journal of Advanced Research in Computer Science and Software Engineering 3(4)”,April - 2013, pp. 858-861. [13]. C. Rey and JL. Dugelay, “A survey of watermarking algorithms for image authentication”. EURASIP Journal on Applied Signal Processing, 6:613–621, 2002. [14]. Lee, G. J., Yoon, E. J. and Yoo, K. Y., “A new LSB based Digital Watermarking Scheme with Random Mapping Function”, in 2008 IEEE DOI 10.1109/UMC.2008.33. [15]. H. Luo, S. Chu, H. and Lu, Z. M., “Self Embedding Watermarking Using Halftoning Technique, Circuits Syst Signal Process” (2008) 27: 155–170. [16]. W. Yang, C., Wen, C. Y. and Chen, C. H., (2008), “Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence”. Springer-Verlag Berlin Heidelberg 2008. [17]. He, H. J., Zhang, J. S. and Tai, H. M., (2006), A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication. Springer-Verlag Berlin Heidelberg 2006 [18]. Byun, S. C., et al. (2003), A SVD-Based Fragile Watermarking Scheme for Image Authentication. Springer-Verlag Berlin Heidelberg 2003 [19]. Lee, G. J., Yoon, E. J. and Yoo, K. Y. (2008), “A new LSB based Digital Watermarking Scheme with Random Mapping Function”, in 2008 IEEE DOI 10.1109/UMC.2008.33 [20]. Fazli, S. and Khodaverdi, G (2009), Trade-off between Imperceptibility and Robustness of LSB Watermarking using SSIM Quality Metrics, in 2010 IEEE DOI 10.1109/ICMV.2009.68 [21]. A. Cohen and A. Lapidoth, “On the Gaussian watermarking game,” in Proc. IEEE Int. Symp. Information Theory, Sorrento, Italy, June 2000, p. 48. [22]. N. Merhav, “On random coding error exponents of watermarking systems,” IEEE Trans. Inform. Theory, vol. 46, pp. 420–430, Mar. 2000. [23]. Pei-Eng Ng and Kai-Kuang Ma, “A Switching Median Filter with BDND for Extremely Corrupted Images”, IEEE Trans Image Processing, Vol. 15, No. 6, PP. 1506-1516, June 2006 [24]. Jafar Ramadhan Mohammed, “An Improved Median Filter Based on Efficient Noise Detection for High Quality Image Restoration,”,IEEE Int. Conf ,PP. 327 – 331, . May 2008 [25]. Xiaoyin Xu, Eric L. Miller, Dong bin Chen and Mansoor Sarhadi, “ Adaptive Two-Pass Rank Order Filter to Remove Impulse Noise in Highly Corrupted Images”, IEEE Trans Image Processing,Vol.13,No.2, PP.238-247, February 2004 [26]. Zhu Xi’an, (2008), A Semi-Fragile Digital Watermarking Algorithm in Wavelet Transform Domain Based on Arnold Transform, ICSP Proceedings [27]. Bo Shen, Iihwar K. Sethi and Vasudev Bhaskaran, (1998) DCT Domain Alpha Blending, IEEE [28]. Y. Hu and S. Kwong, "Wavelet domain adaptive visible watermarking", Electron. Lett., vol. 37, 2001 [29]. S. P. Mohanty, J. R. Ramakrishnan, and M. S. Kankanhalli, "A DCT domain visible watermarking technique for images", ICME 2000,
  • 5. Digital Watermarking: a Technical Overview DOI: 10.9790/2834-10413438 www.iosrjournals.org 38 | Page [30]. T. M. Kusuma and H.-J. Zepernick "A reduced-reference perceptual quality metric for in-service image quality assessment", Proc. Joint First Workshop Mobile Future Symp. Trends Commun., pp.71 -74 2003 [31]. S. Wang , J. Zhao , W. J. Tam and F. Speranza "Image quality measurement by using digital watermarking based on discrete wavelet transform", Proc. 22nd Biennial Symp. Commun., pp.210 -212 2004 [32]. D. Zheng , J. Zhao , W. J. Tam and F. Speranza "Image quality measurement by using digital watermarking", Proc. IEEE Int. Workshop Haptic, Audio, Vis. Environ. Applicat., pp.65 -70 2003 [33]. G. Bors "Watermarking mesh-based representations of 3-D objects using local moments", IEEE Trans. Image Process., vol. 15, no. 3, pp.687 -701 2006 [34]. K. Wang , G. Lavou & eacute ; , F. Denis and A. Baskurt "A comprehensive survey on three-dimensional mesh watermarking", IEEE Trans. Multimedia, vol. 10, no. 8, pp.1513 -1527 2008 [35]. F. Cayre and B. Macq "Data hiding on 3-D triangle meshes", IEEE Trans. Signal Process., vol. 51, no. 4, pp.939 -949 2003 [36]. M. Luo and A. G. Bors "Principal component analysis of spectral coefficients for mesh watermarking", Proc. IEEE Int. Conf. Image Process., pp.441 -444 2008 [37]. D. Kirovski and H. Malvar, “ Robust spread-spectrum audio watermarking”, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 3, 2001, pp. 1345-1348. [38]. I.-K. Yeo, and H. J. Kim,“Modified Patchwork Algorithm: a novel audio watermarking scheme”, International Conference on information Technology: Coding and Computing,2001,pp.237-242. [39]. P. Bassia and I. Pitas, “Robust Audio Watermarking in the Time Domain ,” IEEE Transactions on Multimedia, vol. 3, no. 2, pp. 232-241, 2001. [40]. N. Cvejic and T. Seppänen, “Increasing the Capacity of LSB-Based Audio Steganography,” in Proceedings of the IEEE International Workshop on Multimedia Signal Processing, pp. 336-338, 2002. [41]. H. Kim and Y. Choi, “A Novel Echo-hiding Scheme with backward and Forward Kernels,” IEEE Transactions on Circuits and Systems for Video Technology; vol. 13, no. 8, pp. 885-889, 2003. [42]. S. Katzenbeisser and F. Petitcolsd, “Information Hiding Techniques for Steganography and Digital Watermarking,” Artech House, Boston, USA, 2000. [43]. Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin “A Digital Audio Watermark Embedding Algorithm”, International Journal of Information Technology, Vol. 11, No.12 ,2005 [44]. Sang-Kwang Lee, Yo-Sung Ho, “Digital Audio Watermarking in the Cepstrum Domain”. IEEE trans. on Consumer Electronics, vol.46 (3) , pp.744-750, 2000. [45]. S. Chen and H. Leung "Chaotic watermarking for video authentication in surveillance applications", IEEE Trans. Circuits Syst. Video Technol., vol. 18, pp.704 -709,(2008) [46]. P.-C. Su , C.-S. Wu , I.-F. Chen , C.-Y. Wu and Y.-C. Wu "A practical design of digital video watermarking in H.264/AVC for content authentication", Signal Process, Image Commun., vol. 26, no. 8â?“9, pp.413 -426 ,2011