SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org
Page | 18
Paper Publications
Performance Analysis of Digital Watermarking Of
Video in the Spatial Domain
Dr. Ashish M. Kothari1
, Dr. Ved Vyas Dwivedi2
1
Assistant Professor, Atmiya Institute of Technology & Science, Rajkot, (Gujarat) India
2
Pro Vice Chancellor, C.U. Shah University, Wadhvan, (Gujarat) India
Abstract: In this paper, we have suggested the spatial domain method for the digital video watermarking for both
visible and invisible watermarks. The methods are used for the copyright protection as well as proof of ownership. In
this paper we first extracted the frames from the video and then used spatial domain characteristics of the frames
where we directly worked on the pixel value of the frame according to the watermark and calculated different
parameters.
Keyword: Digital video watermarking, copyright protection, spatial domain watermarking, Least Significant bit
substitution
I. Introduction
Digital watermarking includes a number of techniques that are used to imperceptibly convey information by embedding it
into the cover data. Here the cover data taken is a video sequence and the watermarking is thus called the Video
Watermarking. Video watermarking is a field that is rapidly evolving in the area of multimedia and interest of the people in
this field is increasing day by day because of the major factors as stated below.
 Privacy of the digital data is required and because the copying of a video is comparatively very easy.
 Fighting against the “Intellectual property rights breach”
 Tempering of the digital video must be conceled.
 Copyright protection must not be eroded.
The figure 1 shows the idea of the video watermarking at the sending end where first of all frames is extracted from the video
sequence. The next step is to divide frame into its Red, Green and Blue part. Each part is then individually given to the
embedding algorithm block where the other input is a watermark that is to be embedded. After each part is watermarked the
next frame is taken and the procedure is repeated untill the last frame. After the watermark is embedded in every frame, all
frames are mixed to make the watermarked video which is then transmitted in the channel. The figure 2 shows the idea of the
video watermarking at the receiver end the watermarked video is divided into the frames which are divided into Red, Green
and Blue part from where the watermark is extracted. This Procedure is repeated for all frames so as to recover the
watermark.
II. Visual Quality Matrices
We have mainly used the following visual quality metrics for the sake of comparison of degradation after the watermark is
added to video.
𝑀𝑆𝐸 =
1
𝑀 × 𝑁
{(𝑓 𝑥, 𝑦 − 𝑓′
(𝑥, 𝑦))^2}
𝑁
𝑦=1
𝑀
𝑥=1
(1)
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org
Page | 19
Paper Publications
𝑃𝑆𝑁𝑅 = 10 × log
2552
𝑀𝑆𝐸
(2)
Here MSE – Mean Square Error
PSNR – Peak Signal Signlal to noise Ratio
f(x,y) – Original Frame of the video
f’(x,y) – Watermarked Frame of the Video.
The phrase peak signal-to-noise ratio, often abbreviated PSNR, is an engineering term for the ratio between the maximum
possible power of a signal and the power of corrupting noise that affects the fidelity of its representation. Because many
signals have a very wide dynamic range, PSNR is usually expressed in terms of the logarithmic decibel scale. A higher PSNR
would normally indicate that the reconstruction is of higher quality at the receiver end.
PSNR is most easily defined via the Mean Square Error(MSE) which for two m×n Frame f and f’ where one of the Frames
is considered a noisy approximation of the other.
(a)
(b)
Fig. 1 Idea of Video watermarking - Embedding a watermark
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org
Page | 20
Paper Publications
(a)
(b)
Fig. 2 Idea of Video watermarking - Extracting a watermark
III. Visible watermarking
Visible watermarking schemes are used to protect digital images that have to be released for some purposes, such as the
contents used in learning websites or digital libraries, while illegal copying or reproduction is prohibited. A visible watermark
is a secondary translucent overlay on the primary video and appears visible to a viewer on careful inspection.
Visibly watermarked videos often contain recognizable but unremarkable copyright patterns indicating the identity of
intellectual property rights (IPR) owners. The main advantage of using visible watermarks is that it conveys an immediate
claim of ownership. It also prevents or at least discourages unauthorized use of copyrighted high quality images. A functional
visible watermarking scheme should meet the following requirements:
1. Perceptibility of host video details: all the details in the original host videos should remain perceptible after watermark
embedding.
2. Visibility of watermark patterns: the embedded watermark should be easily recognized from the watermarked video by
the naked eye.
3. Adaptive spreading over host video: the visible watermark should be adaptively spread over a large or important area of
host video to prevent its deletion by clipping.
4. Robustness: embedded watermarks should be difficult or impossible to remove unless exhaustive and costly human
interventions are involved.
5. Efficiency: the watermark patterns should be applied automatically with little human labor.
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org
Page | 21
Paper Publications
A. Embedding Algorithm
In the actual embedding algorithm we have gone through the following steps.
1. The Video is converted into the number of frames.
2. When there is a black pixel (00000000) i.e non transperent part of the message, the corresponding pixel of the frame is
replaced with the black pixel so as to have a visual perception.
3. When there is a white pixel (11111111) i.e transperent part of the message, the corresponding pixel of the frame is kept as
it is.
4. Next frame is taken and step 2 and 3 is repeated untill the last frame comes.
5. All watermarked frames are combined so as to have the watermarked video.
Fig. 3 Video with visible Watermark
IV. Invisible watermarking
The most straight-forward method of watermark embedding would be to embed the watermark into the least-significant-bits
of each frame in the video.
Consider one of the MxN frames of the video where M shows number of rows and N shows number of columns. In this
frame each pixel value is represented by a decimal number in the range determined by the number of bits used. In a gray-
scale frame, with 8 bit precision per pixel, each pixel assumes a value between [0, 255] and each positive number β10 can be
represented by:
β10 = b0 + b1*G1 + b2*G2 + ….… where G = 2 (3)
This property allows the decomposition of an image into a collection of binary images by separating the bi into n bit planes.
Figure 4 shows LSB decomposition of one Pixel.
Fig. 4 LSB decomposition of one pixel
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org
Page | 22
Paper Publications
Here we have first divided the video into frames and then each frame is divided into red, green and blue parts. Each of the
part is considered to be a greyscale frame and the above said method can be applicable to each frame.
Fig. 5 Bit Plane Representation of the first frame of the video
A. Embedding Algorithm
From the fundamentals we can say that the LSB part of the image is least important compare to the MSB and here in the
invisible watermarking using least significant bit we have make use of this fundamental. We replace the LSB of each pixel of
every frame with the MSB of the watermark so that the most important information of the watermark is embedded into the
least important information of the frame and hence the video.
Following are the stepwise representation of what we have done to achieve the invisible watermarking of video.
1. The Video is converted into the number of frames.
2. Since the watermark image has only two values [0 and 255] and its binary representations are 00000000 and 11111111
respectively. So here we can replace the MSB of the message image with the LSB of the frame so that there is almost no
visual degradation observed in the frame.
3. Next frame is taken and step 2 is repeated untill the last frame comes.
Figure 6 shows the graphical representation of the method.
(a) Binary Watermark to be embedded
(b) First frame is divided into R,G, and B frames
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org
Page | 23
Paper Publications
(c) LSB of the frames are replaced with MSB of the watermark
(d) Resultant Frames
(e) Watermarked Frame 1 of the video
Fig. 6 Graphical Representation of the LSB method of invisible video watermarking
Following table shows the visual quality metrices for the first six frames.
Table I
Visual Quality Matrices Value
Frame No. MSE PSNR (dB)
1 0.50059 51.136
2 0.49598 51.1762
3 0.50201 51.1237
4 0.49937 51.1466
5 0.49882 51.1514
6 0.49913 51.1486
Here we can also embed different message in the different frames so as to have a complete sentence of the message.
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org
Page | 24
Paper Publications
B. Extraction Algorithm
We have used the following steps to extract the watermark from the video.
1. The Video is converted into the number of frames.
2. Extract the last bit and apply the following condition.
3. If the extracted bit is 1, we would place a gray level of 255(White) in the respective place.
4. If the extracted bit is 0, we would place a gray level of 0(Black) in the respective place.
5. Next frame is taken and step 2 is repeated until the last frame comes.
Figure shows the extracted message.
Fig. 7 Extracted Messages
V. Conclusion
The main advantage of such a technique is that the modification of the LSB plane does not affect the human perception of the
overall video quality. Also the LSB method of invisible watermarking is robust against cropping attack.
REFERENCES
[1] Ingemar J. Cox, Mathew L. Miller, Jeffery A. Bloom, Jessica Fridrich, Ton Kalker, “Digital Watermarking &
Steganography Second Edition” Published by Morgan Kaufman Publishers Elsevier 2007.
[2] Michael Arnold, Martin Schmucker, Stephen D. Wolthusen, “Theory and Applications of Digital Watermarking and
Content Protection”, Published by Artech House Computer Security Service.
[3] Rafael C. Gonzalez, Richard E. Woods, Steven L. Eddins, “Digital Image Processing Using MATLAB”, Published by
Pearson Education, Inc.
[4] D. P. Mukherjee, S. Maitra, and S. T. Acton, “Spatial Domain Digital Watermarking of Multimedia Objects for Buyer
Authentication” IEEE Transactions on Multimedia, vol. 6, no. 1, pp. 1-15, Feb. 2004
[5] M. Kutter & F.A.P.Petitcolas, “A fair benchmark for image watermarking systems”, Electronic Imaging '99. Security
and Watermarking of Multimedia Contents, vol. 3657, Sans Jose, CA, USA, 25-27 January 1999.
[6] Christine I. Podilchuk, and Edward J. Delp, “Digital Watermarking algorithms & applications” IEEE SIGNAL
PROCESSING MAGAZINE, July 2001.
[7] F. Hartung, M. Kutter, "Multimedia watermarking techniques" Proceedings of the IEEE, vol. 87, issue 7, pp. 1079-
1107, Jul 1999.

More Related Content

What's hot

Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image WatermarkingIJERA Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Wavelet video processing tecnology
Wavelet video processing tecnologyWavelet video processing tecnology
Wavelet video processing tecnologyPrashant Madnavat
 
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...IDES Editor
 
Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...eSAT Journals
 
EFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODEC
EFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODECEFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODEC
EFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODECSwisscom
 
nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)ijceronline
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
 
Depth estimation do we need to throw old things away
Depth estimation do we need to throw old things awayDepth estimation do we need to throw old things away
Depth estimation do we need to throw old things awayNAVER Engineering
 
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...IDES Editor
 
Dual-layer Digital Image Watermarking for Intellectual Property Right Protection
Dual-layer Digital Image Watermarking for Intellectual Property Right ProtectionDual-layer Digital Image Watermarking for Intellectual Property Right Protection
Dual-layer Digital Image Watermarking for Intellectual Property Right ProtectionIDES Editor
 
Iaetsd wavelet transform based latency optimized image compression for
Iaetsd wavelet transform based latency optimized image compression forIaetsd wavelet transform based latency optimized image compression for
Iaetsd wavelet transform based latency optimized image compression forIaetsd Iaetsd
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...researchinventy
 
A Fusion Based Visibility Enhancement of Single Underwater Hazy Image
A Fusion Based Visibility Enhancement of Single Underwater Hazy ImageA Fusion Based Visibility Enhancement of Single Underwater Hazy Image
A Fusion Based Visibility Enhancement of Single Underwater Hazy ImageIJAAS Team
 
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKINGAPPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKINGsipij
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithmijsrd.com
 

What's hot (20)

H017524854
H017524854H017524854
H017524854
 
G0523444
G0523444G0523444
G0523444
 
Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image Watermarking
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Wavelet video processing tecnology
Wavelet video processing tecnologyWavelet video processing tecnology
Wavelet video processing tecnology
 
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
 
Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...
 
EFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODEC
EFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODECEFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODEC
EFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODEC
 
nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Depth estimation do we need to throw old things away
Depth estimation do we need to throw old things awayDepth estimation do we need to throw old things away
Depth estimation do we need to throw old things away
 
robust image watermarking
robust image watermarkingrobust image watermarking
robust image watermarking
 
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
 
Dual-layer Digital Image Watermarking for Intellectual Property Right Protection
Dual-layer Digital Image Watermarking for Intellectual Property Right ProtectionDual-layer Digital Image Watermarking for Intellectual Property Right Protection
Dual-layer Digital Image Watermarking for Intellectual Property Right Protection
 
Iaetsd wavelet transform based latency optimized image compression for
Iaetsd wavelet transform based latency optimized image compression forIaetsd wavelet transform based latency optimized image compression for
Iaetsd wavelet transform based latency optimized image compression for
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
 
A Fusion Based Visibility Enhancement of Single Underwater Hazy Image
A Fusion Based Visibility Enhancement of Single Underwater Hazy ImageA Fusion Based Visibility Enhancement of Single Underwater Hazy Image
A Fusion Based Visibility Enhancement of Single Underwater Hazy Image
 
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKINGAPPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
 

Viewers also liked

A Study on Performance Analysis of Nestle India Limited with Specific Referen...
A Study on Performance Analysis of Nestle India Limited with Specific Referen...A Study on Performance Analysis of Nestle India Limited with Specific Referen...
A Study on Performance Analysis of Nestle India Limited with Specific Referen...paperpublications3
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASICDesign and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASICpaperpublications3
 
The Impact of Key Performance Indicators (KPIs) on Talent Development
The Impact of Key Performance Indicators (KPIs) on Talent DevelopmentThe Impact of Key Performance Indicators (KPIs) on Talent Development
The Impact of Key Performance Indicators (KPIs) on Talent Developmentpaperpublications3
 
TALENT ACQUISITION PROCEDURE OF HR PROCESS: A CASE OF HCL INFOSYSTEM PVT LTD.
TALENT ACQUISITION PROCEDURE OF HR PROCESS: A CASE OF HCL INFOSYSTEM PVT LTD.TALENT ACQUISITION PROCEDURE OF HR PROCESS: A CASE OF HCL INFOSYSTEM PVT LTD.
TALENT ACQUISITION PROCEDURE OF HR PROCESS: A CASE OF HCL INFOSYSTEM PVT LTD.paperpublications3
 
Effect of Mobile Banking on Customer Satisfaction in Selected Banks in Trans-...
Effect of Mobile Banking on Customer Satisfaction in Selected Banks in Trans-...Effect of Mobile Banking on Customer Satisfaction in Selected Banks in Trans-...
Effect of Mobile Banking on Customer Satisfaction in Selected Banks in Trans-...paperpublications3
 
Factors Influencing Implementation of Strategic Plans in Non-Governmental Org...
Factors Influencing Implementation of Strategic Plans in Non-Governmental Org...Factors Influencing Implementation of Strategic Plans in Non-Governmental Org...
Factors Influencing Implementation of Strategic Plans in Non-Governmental Org...paperpublications3
 
THE IMPACT OF SERVICE QUALITY AND BRAND AWARENESS ON BRAND LOYALTY: (A STUDY ...
THE IMPACT OF SERVICE QUALITY AND BRAND AWARENESS ON BRAND LOYALTY: (A STUDY ...THE IMPACT OF SERVICE QUALITY AND BRAND AWARENESS ON BRAND LOYALTY: (A STUDY ...
THE IMPACT OF SERVICE QUALITY AND BRAND AWARENESS ON BRAND LOYALTY: (A STUDY ...paperpublications3
 
Role of Procurement on the Completion of Projects in the Energy Sector in Kenya
Role of Procurement on the Completion of Projects in the Energy Sector in KenyaRole of Procurement on the Completion of Projects in the Energy Sector in Kenya
Role of Procurement on the Completion of Projects in the Energy Sector in Kenyapaperpublications3
 
EFFECTS OF SUPPLIER EFFICIENCY ON PROCUREMENT PERFORMANCE IN KENYA SEED COMPA...
EFFECTS OF SUPPLIER EFFICIENCY ON PROCUREMENT PERFORMANCE IN KENYA SEED COMPA...EFFECTS OF SUPPLIER EFFICIENCY ON PROCUREMENT PERFORMANCE IN KENYA SEED COMPA...
EFFECTS OF SUPPLIER EFFICIENCY ON PROCUREMENT PERFORMANCE IN KENYA SEED COMPA...paperpublications3
 
Determinants of Public Procurement Procedures Implementation in Universities:...
Determinants of Public Procurement Procedures Implementation in Universities:...Determinants of Public Procurement Procedures Implementation in Universities:...
Determinants of Public Procurement Procedures Implementation in Universities:...paperpublications3
 
DETERMINANTS OF SERVICE DELIVERY IN PUBLIC PRIMARY SCHOOLS IN WEST POKOT COUNTY
DETERMINANTS OF SERVICE DELIVERY IN PUBLIC PRIMARY SCHOOLS IN WEST POKOT COUNTYDETERMINANTS OF SERVICE DELIVERY IN PUBLIC PRIMARY SCHOOLS IN WEST POKOT COUNTY
DETERMINANTS OF SERVICE DELIVERY IN PUBLIC PRIMARY SCHOOLS IN WEST POKOT COUNTYpaperpublications3
 
MAXIMUM POWER POINT TRACKING TECHNIQUES: A REVIEW
MAXIMUM POWER POINT TRACKING TECHNIQUES: A REVIEWMAXIMUM POWER POINT TRACKING TECHNIQUES: A REVIEW
MAXIMUM POWER POINT TRACKING TECHNIQUES: A REVIEWpaperpublications3
 
Organizational Efficiency and Internal Customer Satisfaction: A Case Study of...
Organizational Efficiency and Internal Customer Satisfaction: A Case Study of...Organizational Efficiency and Internal Customer Satisfaction: A Case Study of...
Organizational Efficiency and Internal Customer Satisfaction: A Case Study of...paperpublications3
 
PS2O, Hybrid Evolutionary-Conventional Algorithm, Genetical Swarm Optimizatio...
PS2O, Hybrid Evolutionary-Conventional Algorithm, Genetical Swarm Optimizatio...PS2O, Hybrid Evolutionary-Conventional Algorithm, Genetical Swarm Optimizatio...
PS2O, Hybrid Evolutionary-Conventional Algorithm, Genetical Swarm Optimizatio...paperpublications3
 
Dwindling of real power loss by using Improved Bees Algorithm
Dwindling of real power loss by using Improved Bees AlgorithmDwindling of real power loss by using Improved Bees Algorithm
Dwindling of real power loss by using Improved Bees Algorithmpaperpublications3
 
Hybrid Quantum Genetic Particle Swarm Optimization Algorithm For Solving Opti...
Hybrid Quantum Genetic Particle Swarm Optimization Algorithm For Solving Opti...Hybrid Quantum Genetic Particle Swarm Optimization Algorithm For Solving Opti...
Hybrid Quantum Genetic Particle Swarm Optimization Algorithm For Solving Opti...paperpublications3
 
Motorized Tricycle Transportation Business in Catanduanes
Motorized Tricycle Transportation Business in CatanduanesMotorized Tricycle Transportation Business in Catanduanes
Motorized Tricycle Transportation Business in Catanduanespaperpublications3
 
Combination of Immune Genetic Particle Swarm Optimization algorithm with BP a...
Combination of Immune Genetic Particle Swarm Optimization algorithm with BP a...Combination of Immune Genetic Particle Swarm Optimization algorithm with BP a...
Combination of Immune Genetic Particle Swarm Optimization algorithm with BP a...paperpublications3
 
Prevalence of SHRM Practices in Operational NGOs in Kerala
Prevalence of SHRM Practices in Operational NGOs in KeralaPrevalence of SHRM Practices in Operational NGOs in Kerala
Prevalence of SHRM Practices in Operational NGOs in Keralapaperpublications3
 
A Theoretical Statistical Measurement Model Analysis on Human Capital Economi...
A Theoretical Statistical Measurement Model Analysis on Human Capital Economi...A Theoretical Statistical Measurement Model Analysis on Human Capital Economi...
A Theoretical Statistical Measurement Model Analysis on Human Capital Economi...paperpublications3
 

Viewers also liked (20)

A Study on Performance Analysis of Nestle India Limited with Specific Referen...
A Study on Performance Analysis of Nestle India Limited with Specific Referen...A Study on Performance Analysis of Nestle India Limited with Specific Referen...
A Study on Performance Analysis of Nestle India Limited with Specific Referen...
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASICDesign and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC
 
The Impact of Key Performance Indicators (KPIs) on Talent Development
The Impact of Key Performance Indicators (KPIs) on Talent DevelopmentThe Impact of Key Performance Indicators (KPIs) on Talent Development
The Impact of Key Performance Indicators (KPIs) on Talent Development
 
TALENT ACQUISITION PROCEDURE OF HR PROCESS: A CASE OF HCL INFOSYSTEM PVT LTD.
TALENT ACQUISITION PROCEDURE OF HR PROCESS: A CASE OF HCL INFOSYSTEM PVT LTD.TALENT ACQUISITION PROCEDURE OF HR PROCESS: A CASE OF HCL INFOSYSTEM PVT LTD.
TALENT ACQUISITION PROCEDURE OF HR PROCESS: A CASE OF HCL INFOSYSTEM PVT LTD.
 
Effect of Mobile Banking on Customer Satisfaction in Selected Banks in Trans-...
Effect of Mobile Banking on Customer Satisfaction in Selected Banks in Trans-...Effect of Mobile Banking on Customer Satisfaction in Selected Banks in Trans-...
Effect of Mobile Banking on Customer Satisfaction in Selected Banks in Trans-...
 
Factors Influencing Implementation of Strategic Plans in Non-Governmental Org...
Factors Influencing Implementation of Strategic Plans in Non-Governmental Org...Factors Influencing Implementation of Strategic Plans in Non-Governmental Org...
Factors Influencing Implementation of Strategic Plans in Non-Governmental Org...
 
THE IMPACT OF SERVICE QUALITY AND BRAND AWARENESS ON BRAND LOYALTY: (A STUDY ...
THE IMPACT OF SERVICE QUALITY AND BRAND AWARENESS ON BRAND LOYALTY: (A STUDY ...THE IMPACT OF SERVICE QUALITY AND BRAND AWARENESS ON BRAND LOYALTY: (A STUDY ...
THE IMPACT OF SERVICE QUALITY AND BRAND AWARENESS ON BRAND LOYALTY: (A STUDY ...
 
Role of Procurement on the Completion of Projects in the Energy Sector in Kenya
Role of Procurement on the Completion of Projects in the Energy Sector in KenyaRole of Procurement on the Completion of Projects in the Energy Sector in Kenya
Role of Procurement on the Completion of Projects in the Energy Sector in Kenya
 
EFFECTS OF SUPPLIER EFFICIENCY ON PROCUREMENT PERFORMANCE IN KENYA SEED COMPA...
EFFECTS OF SUPPLIER EFFICIENCY ON PROCUREMENT PERFORMANCE IN KENYA SEED COMPA...EFFECTS OF SUPPLIER EFFICIENCY ON PROCUREMENT PERFORMANCE IN KENYA SEED COMPA...
EFFECTS OF SUPPLIER EFFICIENCY ON PROCUREMENT PERFORMANCE IN KENYA SEED COMPA...
 
Determinants of Public Procurement Procedures Implementation in Universities:...
Determinants of Public Procurement Procedures Implementation in Universities:...Determinants of Public Procurement Procedures Implementation in Universities:...
Determinants of Public Procurement Procedures Implementation in Universities:...
 
DETERMINANTS OF SERVICE DELIVERY IN PUBLIC PRIMARY SCHOOLS IN WEST POKOT COUNTY
DETERMINANTS OF SERVICE DELIVERY IN PUBLIC PRIMARY SCHOOLS IN WEST POKOT COUNTYDETERMINANTS OF SERVICE DELIVERY IN PUBLIC PRIMARY SCHOOLS IN WEST POKOT COUNTY
DETERMINANTS OF SERVICE DELIVERY IN PUBLIC PRIMARY SCHOOLS IN WEST POKOT COUNTY
 
MAXIMUM POWER POINT TRACKING TECHNIQUES: A REVIEW
MAXIMUM POWER POINT TRACKING TECHNIQUES: A REVIEWMAXIMUM POWER POINT TRACKING TECHNIQUES: A REVIEW
MAXIMUM POWER POINT TRACKING TECHNIQUES: A REVIEW
 
Organizational Efficiency and Internal Customer Satisfaction: A Case Study of...
Organizational Efficiency and Internal Customer Satisfaction: A Case Study of...Organizational Efficiency and Internal Customer Satisfaction: A Case Study of...
Organizational Efficiency and Internal Customer Satisfaction: A Case Study of...
 
PS2O, Hybrid Evolutionary-Conventional Algorithm, Genetical Swarm Optimizatio...
PS2O, Hybrid Evolutionary-Conventional Algorithm, Genetical Swarm Optimizatio...PS2O, Hybrid Evolutionary-Conventional Algorithm, Genetical Swarm Optimizatio...
PS2O, Hybrid Evolutionary-Conventional Algorithm, Genetical Swarm Optimizatio...
 
Dwindling of real power loss by using Improved Bees Algorithm
Dwindling of real power loss by using Improved Bees AlgorithmDwindling of real power loss by using Improved Bees Algorithm
Dwindling of real power loss by using Improved Bees Algorithm
 
Hybrid Quantum Genetic Particle Swarm Optimization Algorithm For Solving Opti...
Hybrid Quantum Genetic Particle Swarm Optimization Algorithm For Solving Opti...Hybrid Quantum Genetic Particle Swarm Optimization Algorithm For Solving Opti...
Hybrid Quantum Genetic Particle Swarm Optimization Algorithm For Solving Opti...
 
Motorized Tricycle Transportation Business in Catanduanes
Motorized Tricycle Transportation Business in CatanduanesMotorized Tricycle Transportation Business in Catanduanes
Motorized Tricycle Transportation Business in Catanduanes
 
Combination of Immune Genetic Particle Swarm Optimization algorithm with BP a...
Combination of Immune Genetic Particle Swarm Optimization algorithm with BP a...Combination of Immune Genetic Particle Swarm Optimization algorithm with BP a...
Combination of Immune Genetic Particle Swarm Optimization algorithm with BP a...
 
Prevalence of SHRM Practices in Operational NGOs in Kerala
Prevalence of SHRM Practices in Operational NGOs in KeralaPrevalence of SHRM Practices in Operational NGOs in Kerala
Prevalence of SHRM Practices in Operational NGOs in Kerala
 
A Theoretical Statistical Measurement Model Analysis on Human Capital Economi...
A Theoretical Statistical Measurement Model Analysis on Human Capital Economi...A Theoretical Statistical Measurement Model Analysis on Human Capital Economi...
A Theoretical Statistical Measurement Model Analysis on Human Capital Economi...
 

Similar to Performance Analysis of Digital Watermarking Of Video in the Spatial Domain

Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkeSAT Journals
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTEditor IJMTER
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor networkeSAT Publishing House
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor networkeSAT Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
 
Effective Compression of Digital Video
Effective Compression of Digital VideoEffective Compression of Digital Video
Effective Compression of Digital VideoIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...IRJET Journal
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyIOSR Journals
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
 
Psnr value of digital image watermarking by using
Psnr value of digital image watermarking by usingPsnr value of digital image watermarking by using
Psnr value of digital image watermarking by usingeSAT Publishing House
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
 
A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSION
A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSIONA REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSION
A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSIONNancy Ideker
 

Similar to Performance Analysis of Digital Watermarking Of Video in the Spatial Domain (20)

Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWT
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor network
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor network
 
20120140505013
2012014050501320120140505013
20120140505013
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
 
Effective Compression of Digital Video
Effective Compression of Digital VideoEffective Compression of Digital Video
Effective Compression of Digital Video
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
 
Z03301550160
Z03301550160Z03301550160
Z03301550160
 
A0540106
A0540106A0540106
A0540106
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
H3602056060
H3602056060H3602056060
H3602056060
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domains
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
 
Psnr value of digital image watermarking by using
Psnr value of digital image watermarking by usingPsnr value of digital image watermarking by using
Psnr value of digital image watermarking by using
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics
 
A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSION
A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSIONA REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSION
A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSION
 

Recently uploaded

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

Performance Analysis of Digital Watermarking Of Video in the Spatial Domain

  • 1. International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org Page | 18 Paper Publications Performance Analysis of Digital Watermarking Of Video in the Spatial Domain Dr. Ashish M. Kothari1 , Dr. Ved Vyas Dwivedi2 1 Assistant Professor, Atmiya Institute of Technology & Science, Rajkot, (Gujarat) India 2 Pro Vice Chancellor, C.U. Shah University, Wadhvan, (Gujarat) India Abstract: In this paper, we have suggested the spatial domain method for the digital video watermarking for both visible and invisible watermarks. The methods are used for the copyright protection as well as proof of ownership. In this paper we first extracted the frames from the video and then used spatial domain characteristics of the frames where we directly worked on the pixel value of the frame according to the watermark and calculated different parameters. Keyword: Digital video watermarking, copyright protection, spatial domain watermarking, Least Significant bit substitution I. Introduction Digital watermarking includes a number of techniques that are used to imperceptibly convey information by embedding it into the cover data. Here the cover data taken is a video sequence and the watermarking is thus called the Video Watermarking. Video watermarking is a field that is rapidly evolving in the area of multimedia and interest of the people in this field is increasing day by day because of the major factors as stated below.  Privacy of the digital data is required and because the copying of a video is comparatively very easy.  Fighting against the “Intellectual property rights breach”  Tempering of the digital video must be conceled.  Copyright protection must not be eroded. The figure 1 shows the idea of the video watermarking at the sending end where first of all frames is extracted from the video sequence. The next step is to divide frame into its Red, Green and Blue part. Each part is then individually given to the embedding algorithm block where the other input is a watermark that is to be embedded. After each part is watermarked the next frame is taken and the procedure is repeated untill the last frame. After the watermark is embedded in every frame, all frames are mixed to make the watermarked video which is then transmitted in the channel. The figure 2 shows the idea of the video watermarking at the receiver end the watermarked video is divided into the frames which are divided into Red, Green and Blue part from where the watermark is extracted. This Procedure is repeated for all frames so as to recover the watermark. II. Visual Quality Matrices We have mainly used the following visual quality metrics for the sake of comparison of degradation after the watermark is added to video. 𝑀𝑆𝐸 = 1 𝑀 × 𝑁 {(𝑓 𝑥, 𝑦 − 𝑓′ (𝑥, 𝑦))^2} 𝑁 𝑦=1 𝑀 𝑥=1 (1)
  • 2. International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org Page | 19 Paper Publications 𝑃𝑆𝑁𝑅 = 10 × log 2552 𝑀𝑆𝐸 (2) Here MSE – Mean Square Error PSNR – Peak Signal Signlal to noise Ratio f(x,y) – Original Frame of the video f’(x,y) – Watermarked Frame of the Video. The phrase peak signal-to-noise ratio, often abbreviated PSNR, is an engineering term for the ratio between the maximum possible power of a signal and the power of corrupting noise that affects the fidelity of its representation. Because many signals have a very wide dynamic range, PSNR is usually expressed in terms of the logarithmic decibel scale. A higher PSNR would normally indicate that the reconstruction is of higher quality at the receiver end. PSNR is most easily defined via the Mean Square Error(MSE) which for two m×n Frame f and f’ where one of the Frames is considered a noisy approximation of the other. (a) (b) Fig. 1 Idea of Video watermarking - Embedding a watermark
  • 3. International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org Page | 20 Paper Publications (a) (b) Fig. 2 Idea of Video watermarking - Extracting a watermark III. Visible watermarking Visible watermarking schemes are used to protect digital images that have to be released for some purposes, such as the contents used in learning websites or digital libraries, while illegal copying or reproduction is prohibited. A visible watermark is a secondary translucent overlay on the primary video and appears visible to a viewer on careful inspection. Visibly watermarked videos often contain recognizable but unremarkable copyright patterns indicating the identity of intellectual property rights (IPR) owners. The main advantage of using visible watermarks is that it conveys an immediate claim of ownership. It also prevents or at least discourages unauthorized use of copyrighted high quality images. A functional visible watermarking scheme should meet the following requirements: 1. Perceptibility of host video details: all the details in the original host videos should remain perceptible after watermark embedding. 2. Visibility of watermark patterns: the embedded watermark should be easily recognized from the watermarked video by the naked eye. 3. Adaptive spreading over host video: the visible watermark should be adaptively spread over a large or important area of host video to prevent its deletion by clipping. 4. Robustness: embedded watermarks should be difficult or impossible to remove unless exhaustive and costly human interventions are involved. 5. Efficiency: the watermark patterns should be applied automatically with little human labor.
  • 4. International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org Page | 21 Paper Publications A. Embedding Algorithm In the actual embedding algorithm we have gone through the following steps. 1. The Video is converted into the number of frames. 2. When there is a black pixel (00000000) i.e non transperent part of the message, the corresponding pixel of the frame is replaced with the black pixel so as to have a visual perception. 3. When there is a white pixel (11111111) i.e transperent part of the message, the corresponding pixel of the frame is kept as it is. 4. Next frame is taken and step 2 and 3 is repeated untill the last frame comes. 5. All watermarked frames are combined so as to have the watermarked video. Fig. 3 Video with visible Watermark IV. Invisible watermarking The most straight-forward method of watermark embedding would be to embed the watermark into the least-significant-bits of each frame in the video. Consider one of the MxN frames of the video where M shows number of rows and N shows number of columns. In this frame each pixel value is represented by a decimal number in the range determined by the number of bits used. In a gray- scale frame, with 8 bit precision per pixel, each pixel assumes a value between [0, 255] and each positive number β10 can be represented by: β10 = b0 + b1*G1 + b2*G2 + ….… where G = 2 (3) This property allows the decomposition of an image into a collection of binary images by separating the bi into n bit planes. Figure 4 shows LSB decomposition of one Pixel. Fig. 4 LSB decomposition of one pixel
  • 5. International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org Page | 22 Paper Publications Here we have first divided the video into frames and then each frame is divided into red, green and blue parts. Each of the part is considered to be a greyscale frame and the above said method can be applicable to each frame. Fig. 5 Bit Plane Representation of the first frame of the video A. Embedding Algorithm From the fundamentals we can say that the LSB part of the image is least important compare to the MSB and here in the invisible watermarking using least significant bit we have make use of this fundamental. We replace the LSB of each pixel of every frame with the MSB of the watermark so that the most important information of the watermark is embedded into the least important information of the frame and hence the video. Following are the stepwise representation of what we have done to achieve the invisible watermarking of video. 1. The Video is converted into the number of frames. 2. Since the watermark image has only two values [0 and 255] and its binary representations are 00000000 and 11111111 respectively. So here we can replace the MSB of the message image with the LSB of the frame so that there is almost no visual degradation observed in the frame. 3. Next frame is taken and step 2 is repeated untill the last frame comes. Figure 6 shows the graphical representation of the method. (a) Binary Watermark to be embedded (b) First frame is divided into R,G, and B frames
  • 6. International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org Page | 23 Paper Publications (c) LSB of the frames are replaced with MSB of the watermark (d) Resultant Frames (e) Watermarked Frame 1 of the video Fig. 6 Graphical Representation of the LSB method of invisible video watermarking Following table shows the visual quality metrices for the first six frames. Table I Visual Quality Matrices Value Frame No. MSE PSNR (dB) 1 0.50059 51.136 2 0.49598 51.1762 3 0.50201 51.1237 4 0.49937 51.1466 5 0.49882 51.1514 6 0.49913 51.1486 Here we can also embed different message in the different frames so as to have a complete sentence of the message.
  • 7. International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org Page | 24 Paper Publications B. Extraction Algorithm We have used the following steps to extract the watermark from the video. 1. The Video is converted into the number of frames. 2. Extract the last bit and apply the following condition. 3. If the extracted bit is 1, we would place a gray level of 255(White) in the respective place. 4. If the extracted bit is 0, we would place a gray level of 0(Black) in the respective place. 5. Next frame is taken and step 2 is repeated until the last frame comes. Figure shows the extracted message. Fig. 7 Extracted Messages V. Conclusion The main advantage of such a technique is that the modification of the LSB plane does not affect the human perception of the overall video quality. Also the LSB method of invisible watermarking is robust against cropping attack. REFERENCES [1] Ingemar J. Cox, Mathew L. Miller, Jeffery A. Bloom, Jessica Fridrich, Ton Kalker, “Digital Watermarking & Steganography Second Edition” Published by Morgan Kaufman Publishers Elsevier 2007. [2] Michael Arnold, Martin Schmucker, Stephen D. Wolthusen, “Theory and Applications of Digital Watermarking and Content Protection”, Published by Artech House Computer Security Service. [3] Rafael C. Gonzalez, Richard E. Woods, Steven L. Eddins, “Digital Image Processing Using MATLAB”, Published by Pearson Education, Inc. [4] D. P. Mukherjee, S. Maitra, and S. T. Acton, “Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication” IEEE Transactions on Multimedia, vol. 6, no. 1, pp. 1-15, Feb. 2004 [5] M. Kutter & F.A.P.Petitcolas, “A fair benchmark for image watermarking systems”, Electronic Imaging '99. Security and Watermarking of Multimedia Contents, vol. 3657, Sans Jose, CA, USA, 25-27 January 1999. [6] Christine I. Podilchuk, and Edward J. Delp, “Digital Watermarking algorithms & applications” IEEE SIGNAL PROCESSING MAGAZINE, July 2001. [7] F. Hartung, M. Kutter, "Multimedia watermarking techniques" Proceedings of the IEEE, vol. 87, issue 7, pp. 1079- 1107, Jul 1999.