Digital Watermark is class of marker or symbol secretly embedded in a multimedia signal such as Audio, Image or Video. It
is used to identify the ownership of the multimedia signal. Video watermarking is an emerging area for various applications like copy
control broadcast monitoring, video authentication, copyright protection and enhanced video coding. The main objective of this paper
is to present survey and comparisons of various available techniques on video watermarking based on copyright protection and
identification. Comparative study of various technologies gives the significant information about the PSNR, payload, quality factor
and also the various attacks used in video watermarking techniques. The best techniques in various scenarios are discussed in this
paper which will help the research scholars in field of video watermarking.
The proposed scheme embedded the watermark during the differential pulse code modulation process and extracted through decoding the entropy details. This technique utilize the moving picture expert groups standard (MPEG-2) in which discrete cosine transform coefficients are adjusted from selected instantaneous decoder refresh frames for watermarking purpose. The subsets of frames as candidate I-frames are chosen to achieve better perceptibility and robustness. A secret key based cryptographic technique is used to select the candidate frames. Three more keys are required to extract the watermark whereas one of the key is used to stop the extraction process and the remaining two are used to display the scrambled watermark. The toughness is evaluated by testing spatial and temporal synchronization attacks. High sturdiness is achieved against video specific attacks frequently occurs in the real world. Even a single frame can accommodate thousand of watermark bits which reflect that high watermark capacity can be obtained.
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style IJECEIAES
The proposed scheme implemented a semi blind digital watermarking method for video exploiting MPEG-2 standard. The watermark is inserted into selected high frequency coefficients of plain types of discrete cosine transform blocks instead of edge and texture blocks during intra coding process. The selection is essential because the error in such type of blocks is less sensitive to human eyes as compared to other categories of blocks. Therefore, the perceptibility of watermarked video does not degraded sharply. Visual quality is also maintained as motion vectors used for generating the motion compensated images are untouched during the entire watermarking process. Experimental results revealed that the scheme is not only robust to re-compression attack, spatial synchronization attacks like cropping, rotation but also strong to temporal synchronization attacks like frame inserting, deleting, swapping and averaging. The superiority of the anticipated method is obtaining the best sturdiness results contrast to the recently delivered schemes.
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...researchinventy
Digital watermarking refers to embedding watermarks in a multimedia documents and files in order to protect them from illegal copying and identifying manipulations. We proposed a technique is Hybrid DWTSVD method for digital video watermarking. This paper presents a robust and secure watermarking algorithm for video sequence. Proposed scheme divide the video in to frames and then blue channel is used for watermarking insertion. Discrete wavelet transform is used for watermark embedding. Watermark is inserted in to mid frequency component for better resistance to video manipulation operation. PSNR and MSE are computed for testing the proposed method
Digital watermarking is used for data authentication and copyright protection of digital media files.
Original host files required to recover the watermark operation in non-blind watermark system, which increases
system resources overhead. It also doubles memory capacity and communication band-width. This system uses a
robust video multiple watermarking technique which is based on image interlacing. In this system, a watermark
embedding/extracting is done by using three-level discrete wavelet transform (DWT), Arnold transform is used as
a watermark encryption/ decryption method, and gray image, color image, and video are used as watermarks.
Geometric, noising, format compression, and image processing attacks are used to test this system.
Keywords — Digital watermarking, Image interlacing, Arnold transform, Three level DWT, Authentication,
Security.
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
Digital Watermarking is the process of embedding data called watermark or signature or label or tag into a multimedia object (image or audio or video) so that the watermark can be extracted for ownership verification or authentication. A visible watermark is a secondary translucent image overlaid into the primary image and appears visible to a viewer on a careful inspection. The invisible watermark is embedded in such a way that the modification made to the pixel value is perceptually not noticed and it can be recovered only with an appropriate decoding mechanism. Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party.
A Novel Digital Watermarking Technique for Video Copyright Protection cscpconf
Due to the rapid growth of internet and technology, protecting digital data is becoming very
urgent. In this paper a novel watermarking technique is proposed where both visible and invisible watermarks are embedded in a video. Digital data can be copied easily without any degradation in quality, so the protection of the data is necessary. Digital watermarking is a technology to embed additional information into the host signal to ensure security and protection of multimedia data. The video frames contain both the watermarks, so it is more robust to attacks. The watermarking scheme described here deals with embedding and extraction of the watermarks. Discrete Wavelet transform (DWT) is used to embed the invisible watermark and Peak Signal to Noise Ratio (PSNR) is calculated to measure efficiency of this method.
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...IJERA Editor
During the last few years’ mobile devices like smart phone and tablet witnessed a random growth in terms of hardware and software. The increased growth of apps, sharing data, videos, images through internet need security and intellectual property right. Developing a watermarking technique for data protection and authentication on shared data in mobile internet within the limited memory and significant battery consumption is one of the current challenging fields. In this paper we have performed a survey on available video watermarking techniques and a feasibility study on video watermarking techniques for mobile devices. Also the comparative study on features of watermarking with different video watermarking algorithm is performed.
The proposed scheme embedded the watermark during the differential pulse code modulation process and extracted through decoding the entropy details. This technique utilize the moving picture expert groups standard (MPEG-2) in which discrete cosine transform coefficients are adjusted from selected instantaneous decoder refresh frames for watermarking purpose. The subsets of frames as candidate I-frames are chosen to achieve better perceptibility and robustness. A secret key based cryptographic technique is used to select the candidate frames. Three more keys are required to extract the watermark whereas one of the key is used to stop the extraction process and the remaining two are used to display the scrambled watermark. The toughness is evaluated by testing spatial and temporal synchronization attacks. High sturdiness is achieved against video specific attacks frequently occurs in the real world. Even a single frame can accommodate thousand of watermark bits which reflect that high watermark capacity can be obtained.
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style IJECEIAES
The proposed scheme implemented a semi blind digital watermarking method for video exploiting MPEG-2 standard. The watermark is inserted into selected high frequency coefficients of plain types of discrete cosine transform blocks instead of edge and texture blocks during intra coding process. The selection is essential because the error in such type of blocks is less sensitive to human eyes as compared to other categories of blocks. Therefore, the perceptibility of watermarked video does not degraded sharply. Visual quality is also maintained as motion vectors used for generating the motion compensated images are untouched during the entire watermarking process. Experimental results revealed that the scheme is not only robust to re-compression attack, spatial synchronization attacks like cropping, rotation but also strong to temporal synchronization attacks like frame inserting, deleting, swapping and averaging. The superiority of the anticipated method is obtaining the best sturdiness results contrast to the recently delivered schemes.
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...researchinventy
Digital watermarking refers to embedding watermarks in a multimedia documents and files in order to protect them from illegal copying and identifying manipulations. We proposed a technique is Hybrid DWTSVD method for digital video watermarking. This paper presents a robust and secure watermarking algorithm for video sequence. Proposed scheme divide the video in to frames and then blue channel is used for watermarking insertion. Discrete wavelet transform is used for watermark embedding. Watermark is inserted in to mid frequency component for better resistance to video manipulation operation. PSNR and MSE are computed for testing the proposed method
Digital watermarking is used for data authentication and copyright protection of digital media files.
Original host files required to recover the watermark operation in non-blind watermark system, which increases
system resources overhead. It also doubles memory capacity and communication band-width. This system uses a
robust video multiple watermarking technique which is based on image interlacing. In this system, a watermark
embedding/extracting is done by using three-level discrete wavelet transform (DWT), Arnold transform is used as
a watermark encryption/ decryption method, and gray image, color image, and video are used as watermarks.
Geometric, noising, format compression, and image processing attacks are used to test this system.
Keywords — Digital watermarking, Image interlacing, Arnold transform, Three level DWT, Authentication,
Security.
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
Digital Watermarking is the process of embedding data called watermark or signature or label or tag into a multimedia object (image or audio or video) so that the watermark can be extracted for ownership verification or authentication. A visible watermark is a secondary translucent image overlaid into the primary image and appears visible to a viewer on a careful inspection. The invisible watermark is embedded in such a way that the modification made to the pixel value is perceptually not noticed and it can be recovered only with an appropriate decoding mechanism. Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party.
A Novel Digital Watermarking Technique for Video Copyright Protection cscpconf
Due to the rapid growth of internet and technology, protecting digital data is becoming very
urgent. In this paper a novel watermarking technique is proposed where both visible and invisible watermarks are embedded in a video. Digital data can be copied easily without any degradation in quality, so the protection of the data is necessary. Digital watermarking is a technology to embed additional information into the host signal to ensure security and protection of multimedia data. The video frames contain both the watermarks, so it is more robust to attacks. The watermarking scheme described here deals with embedding and extraction of the watermarks. Discrete Wavelet transform (DWT) is used to embed the invisible watermark and Peak Signal to Noise Ratio (PSNR) is calculated to measure efficiency of this method.
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...IJERA Editor
During the last few years’ mobile devices like smart phone and tablet witnessed a random growth in terms of hardware and software. The increased growth of apps, sharing data, videos, images through internet need security and intellectual property right. Developing a watermarking technique for data protection and authentication on shared data in mobile internet within the limited memory and significant battery consumption is one of the current challenging fields. In this paper we have performed a survey on available video watermarking techniques and a feasibility study on video watermarking techniques for mobile devices. Also the comparative study on features of watermarking with different video watermarking algorithm is performed.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Image Authentication Using Digital Watermarkingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image,
which is overlaid on the host image, and provides a means of protecting the image. In order to provide high quality watermarked
image, the watermarked image should be imperceptible. This paper presents different techniques of digital image watermarking based
on spatial & frequency domain, which shows that spatial domain technique provides security & successful recovery of watermark
image and higher PSNR value compared to frequency domain.
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionIJERA Editor
Now a days there is use of digital multimedia applications are increased. Digital image watermarking techniques can be classified into spatial or transform domains. The spatial domain methods are the simplest watermarking techniques but have low robustness against different attacks, unlike the transform domains watermarking methods are more complex and have high robustness against various attacks. Most commonly used methods of watermarking are discrete cosine transform (DCT), discrete wavelet transform (DWT).A hybrid digital video watermarking scheme based on Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA). These transform domain technique always give more robust output than DCT and DWT The video frames are first decomposed using DWT and the binary watermark is embedded in the principal components of the low frequency wavelet coefficients Here in order to improve the robustness of water mark Haar filtering must be used in order to get PSNR as much as possible Experimental result shows no visible difference between the watermarked frames and original frame. It shows robustness on the watermarked video against various attacks. Peak signal to noise ratio (PSNR) is calculated to measure efficiency of this all methods. And this value must be increased up to the level.
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
Digital watermarking is an essential technique to add hidden copyright notices or secret messages to digital audio, image, or image forms. In this paper we introduce a new approach for digital image watermarking for real time applications. We have successfully implemented the digital watermarking technique on digital images based on 2-level Discrete Wavelet Transform and compared the performance of the proposed method with Level-1 and Level-2 and Level-3 Discrete Wavelet Transform using the parameter peak signal to noise ratio. To make the watermark robust and to preserve visual significant information a 2-Level Discrete wavelet transform used as transformation domain for both secret image and original image. The watermark is embedded in the original image using Alpha blending technique and implemented using Matlab Simulink.
Reversible color video watermarking scheme based on hybrid of integer-to-inte...IJECEIAES
Unauthorised redistribution and illegal copying of digital contents are serious issues which have affected numerous types of digital contents such as digital video. One of the methods which have been suggested to support copyright protectionis to hide digital watermark within the digital video. This paper introduces a new video watermarking system which based on a combination of Arnold transform and integer wavelet transforms (IWT). IWT is employed to decompose the cover video frames whereby Arnold transform is used to scramble the watermark which is a grey scale image. Scrambling the watermark before the concealment makes the transmission more secure by disordering the information. The system performance was benchmarked against related video watermarking schemes, in which the evaluation processes consist of testing against several video operations and attacks. Consequently, the scheme has been demonstrated to be perfectly robust.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IRJET-A study of video watermarking techniques based on energy modelIRJET Journal
Anchal Gupta,Rimanpal kaur,, "A study of video watermarking techniques based on energy model", International Research Journal of Engineering and Technology (IRJET), Vol2,issue-01 March 2015. p-ISSN:2395-0056, e-ISSN:2395-0072. www.irjet.net
Abstract
Recent years have witnessed rapid development in Digital video watermarking. Security and copyright protection are getting to be imperative issues in media applications and administrations. Video watermarking is relatively a new technology that has been proposed to solve the problem of illegal manipulation and distribution of digital video. It is the process of embedding copyright information in video bit streams. Most of the proposed video watermarking schemes are based on the techniques of image watermarking. But video watermarking introduces some issues not present in image watermarking. In this paper, we perform a survey on available video watermarking techniques and it provides a critical review on various available techniques.
A Quick Glance over the Digital Watermarkingijsrd.com
Digital watermarking is a process for modifying physical or electronic media to embed a machine-readable code into the media. The media may be modified such that the embedded code is imperceptible or nearly imperceptible to the user, yet may be detected through an automated detection process. Watermarking is the art of imperceptibly embedding a message into a work. More than 700 years ago in Fabriano (Italy), paper watermarks appeared in handmade paper, in order to identify its provenance, format, and quality. In this context, the watermark is a kind of invisible signature that allows identifying the creator or the owner of a document, and to detect possible copyright violations, and especially non-authorized copying [1]. More recently, different watermarking techniques and strategies have been proposed in order to solve a number of problems, ranging from the detection of content manipulations, to information hiding (steganography), to document usage tracing. In particular, the insertion of multiple watermarks to trace a document during its lifecycle is a very interesting and challenging application [1]. The main property of the proposed method is that it allows the insertion of multiple watermarks by different users, who sequentially come into play one after the other and do not need any extra information besides the public keys. This characteristic makes the present approach more attractive than previously available solutions.
Survey on Different Methods of Digital Audio WatermarkingIJERA Editor
The significant progress of the technology gives the full access to the digital data for retransmitting and reproduction with comfort. Since the benefits of such progress is easily available, they equally immune to some illegal manipulation of data. So there is necessity arises for the protection of digital data from unauthorized users. The digital audio watermarking technique is new technology among different watermarking techniques which provides successful solutions to problems occurred from some digital attacks. Basically watermarking is the scheme in which binary information is embedded into the original signal. The major concern of the audio watermarking scheme is to provide the proof of ownership to the owner and to provide protection for embedded data. This paper provides concise analysis of different existing audio water.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Image Authentication Using Digital Watermarkingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image,
which is overlaid on the host image, and provides a means of protecting the image. In order to provide high quality watermarked
image, the watermarked image should be imperceptible. This paper presents different techniques of digital image watermarking based
on spatial & frequency domain, which shows that spatial domain technique provides security & successful recovery of watermark
image and higher PSNR value compared to frequency domain.
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionIJERA Editor
Now a days there is use of digital multimedia applications are increased. Digital image watermarking techniques can be classified into spatial or transform domains. The spatial domain methods are the simplest watermarking techniques but have low robustness against different attacks, unlike the transform domains watermarking methods are more complex and have high robustness against various attacks. Most commonly used methods of watermarking are discrete cosine transform (DCT), discrete wavelet transform (DWT).A hybrid digital video watermarking scheme based on Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA). These transform domain technique always give more robust output than DCT and DWT The video frames are first decomposed using DWT and the binary watermark is embedded in the principal components of the low frequency wavelet coefficients Here in order to improve the robustness of water mark Haar filtering must be used in order to get PSNR as much as possible Experimental result shows no visible difference between the watermarked frames and original frame. It shows robustness on the watermarked video against various attacks. Peak signal to noise ratio (PSNR) is calculated to measure efficiency of this all methods. And this value must be increased up to the level.
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
Digital watermarking is an essential technique to add hidden copyright notices or secret messages to digital audio, image, or image forms. In this paper we introduce a new approach for digital image watermarking for real time applications. We have successfully implemented the digital watermarking technique on digital images based on 2-level Discrete Wavelet Transform and compared the performance of the proposed method with Level-1 and Level-2 and Level-3 Discrete Wavelet Transform using the parameter peak signal to noise ratio. To make the watermark robust and to preserve visual significant information a 2-Level Discrete wavelet transform used as transformation domain for both secret image and original image. The watermark is embedded in the original image using Alpha blending technique and implemented using Matlab Simulink.
Reversible color video watermarking scheme based on hybrid of integer-to-inte...IJECEIAES
Unauthorised redistribution and illegal copying of digital contents are serious issues which have affected numerous types of digital contents such as digital video. One of the methods which have been suggested to support copyright protectionis to hide digital watermark within the digital video. This paper introduces a new video watermarking system which based on a combination of Arnold transform and integer wavelet transforms (IWT). IWT is employed to decompose the cover video frames whereby Arnold transform is used to scramble the watermark which is a grey scale image. Scrambling the watermark before the concealment makes the transmission more secure by disordering the information. The system performance was benchmarked against related video watermarking schemes, in which the evaluation processes consist of testing against several video operations and attacks. Consequently, the scheme has been demonstrated to be perfectly robust.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IRJET-A study of video watermarking techniques based on energy modelIRJET Journal
Anchal Gupta,Rimanpal kaur,, "A study of video watermarking techniques based on energy model", International Research Journal of Engineering and Technology (IRJET), Vol2,issue-01 March 2015. p-ISSN:2395-0056, e-ISSN:2395-0072. www.irjet.net
Abstract
Recent years have witnessed rapid development in Digital video watermarking. Security and copyright protection are getting to be imperative issues in media applications and administrations. Video watermarking is relatively a new technology that has been proposed to solve the problem of illegal manipulation and distribution of digital video. It is the process of embedding copyright information in video bit streams. Most of the proposed video watermarking schemes are based on the techniques of image watermarking. But video watermarking introduces some issues not present in image watermarking. In this paper, we perform a survey on available video watermarking techniques and it provides a critical review on various available techniques.
A Quick Glance over the Digital Watermarkingijsrd.com
Digital watermarking is a process for modifying physical or electronic media to embed a machine-readable code into the media. The media may be modified such that the embedded code is imperceptible or nearly imperceptible to the user, yet may be detected through an automated detection process. Watermarking is the art of imperceptibly embedding a message into a work. More than 700 years ago in Fabriano (Italy), paper watermarks appeared in handmade paper, in order to identify its provenance, format, and quality. In this context, the watermark is a kind of invisible signature that allows identifying the creator or the owner of a document, and to detect possible copyright violations, and especially non-authorized copying [1]. More recently, different watermarking techniques and strategies have been proposed in order to solve a number of problems, ranging from the detection of content manipulations, to information hiding (steganography), to document usage tracing. In particular, the insertion of multiple watermarks to trace a document during its lifecycle is a very interesting and challenging application [1]. The main property of the proposed method is that it allows the insertion of multiple watermarks by different users, who sequentially come into play one after the other and do not need any extra information besides the public keys. This characteristic makes the present approach more attractive than previously available solutions.
Survey on Different Methods of Digital Audio WatermarkingIJERA Editor
The significant progress of the technology gives the full access to the digital data for retransmitting and reproduction with comfort. Since the benefits of such progress is easily available, they equally immune to some illegal manipulation of data. So there is necessity arises for the protection of digital data from unauthorized users. The digital audio watermarking technique is new technology among different watermarking techniques which provides successful solutions to problems occurred from some digital attacks. Basically watermarking is the scheme in which binary information is embedded into the original signal. The major concern of the audio watermarking scheme is to provide the proof of ownership to the owner and to provide protection for embedded data. This paper provides concise analysis of different existing audio water.
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
This project addresses authenticity and integrity of medical images using watermarking. Watermarking can be seen as an additional tool for security measures. As the medical tradition is very strict with the quality of biomedical images, the watermarking method must be reversible or if not, region of Interest (ROI) needs to be defined and left intact. Watermarking should also serve as an integrity control and should be able to authenticate the medical image.
A Brief Survey on Robust Video Watermarking Techniquestheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
The embedding of a digital signature, or tag data is carried out in the frequency domain. The
high frequency varieties are chosen by any LH and HL in the wavelet domain which are to be
applicable in DCT. Coefficients are changed mid-frequency DCT coefficients such transactions by a
low frequency of the watermark to be embedded. Watermark can be recovered from the video by
selecting a random watermark of any reference framework. The proposed techniques are more
secure, robust and are efficient due to the use of static DCT. Watermark techniques uses a bands HL
and LH for adding watermark where the movement does not impact the quality the extracted
watermark until if the video displays for different types of malware attacks.
In this work we have taken three video watermarking techniques i.e. BIT GET (spatial),
DWT, DCT and one video formats ie.MPEG video to perform a comparative analysis of different
techniques using single video formats, to obtain the best performing technique for video
watermarking. Such that to increase robustness of the video and decrease the embedding time
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Secured Video Watermarking Based On DWTEditor IJMTER
Copy right protection and Claiming the digital rights is the major problem for the content
developers. Content like video, images, audio, etc., are prone to violation of protection under many
circumstances in the digital world. In this paper we propose a method that proves copyright of the
video by embedding watermarking on selected frames and ensures that the frames is not modified by
performing hashing and then modifying the frame based on Discrete Wavelet Transformations . This
method protects the video from many types of attacks like frame-edit
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
Copyright protection has become a need in today’s world. To achieve a secure copyright protection we embedded some information in images and videos and that image or video is called copyright protected. The embedded information can’t be detected by human eye but some attacks and operations can tamper that information to breach protection. So in order to find a secure technique of copyright protection, we have analyzed image processing techniques i.e. Spatial Domain (Least Significant Bit (LSB)), Transform Domain (Discrete Cosine Transform (DCT)), Discrete Wavelet Transform (DWT) and there are numerous algorithm for watermarking using them. After having a good understanding of the same we have proposed a novel algorithm named as Stage Staffing Algorithm that generates results with high effectiveness, additionally we can use self extracted-watermark technique to increase the security and automate the process of watermark image. The proposed algorithm provides protection in three stages. We have implemented the algorithm and results of the simulations are shown. The various factors affecting spatial domain watermarking are also discussed.
Digital watermarking knowledge is a leading edge research field and it mainly focuses on the
intellectual property rights, hides data and embedded inside an image to show authenticity or proof
of ownership, discovery and authentication of the digital media to protect the important documents.
Digital watermarking can help to verify ownership, to recognize a misappropriate person and find the
marked documents. One of the significant technological actions of the last two decades was the
attack of digital media in a complete range of everyday life aspects.
Digital data can be stored efficiently with a very high quality and it can be manipulated very
easily using computers. In addition digital data can be transmitted in a fast and inexpensive way
through data communication networks without losing quality. According to the necessary study of
digital image watermarking, the digital watermarking model consists of two modules, which are
watermark embedding module and watermark extraction and detection module.
An Efficient Code-word Substitution Method for Data Embedding Technique in Encrypted H.264/AVC Video Streams Anisha Jose – PG Scholar,
Anu K Kuriakose – Assistant Professor,
Department of Electronics and Communication,
Federal Institute of Science and Technology, Ernakulam, India
A complete introduction and comparison of various watermarking techniques along with applications, architecture, features, attacks and an implemented example.
Report on Digital Watermarking Technology vijay rastogi
Digital watermarking is the process of embedding information into digital multimedia content such that the information (which we call the watermark) can later be extracted or detected for a variety of purposes including copy prevention and control.
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Similar to A Survey on Video Watermarking Technologies based on Copyright Protection and Authentication (20)
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
A Survey on Video Watermarking Technologies based on Copyright Protection and Authentication
1. International Journal of Computer Applications Technology and Research
Volume 5– Issue 5, 295 - 303, 2016, ISSN:- 2319–8656
www.ijcat.com 295
A Survey on Video Watermarking Technologies based
on Copyright Protection and Authentication
Hedayath Basha Shaik
Assistant Professor, ECE Dept.
R.M.K. College of Engineering
and Technology
Chennai, India
Gangatharan. N
Professor and Head of the
Department ECE
R.M.K. College of Engineering
and Technology
Chennai, India
Tamilchelvan. R
CEO
Vidhara Secure Com Company
Chennai, India
Abstract: Digital Watermark is class of marker or symbol secretly embedded in a multimedia signal such as Audio, Image or Video. It
is used to identify the ownership of the multimedia signal. Video watermarking is an emerging area for various applications like copy
control broadcast monitoring, video authentication, copyright protection and enhanced video coding. The main objective of this paper
is to present survey and comparisons of various available techniques on video watermarking based on copyright protection and
identification. Comparative study of various technologies gives the significant information about the PSNR, payload, quality factor
and also the various attacks used in video watermarking techniques. The best techniques in various scenarios are discussed in this
paper which will help the research scholars in field of video watermarking.
Keywords: authentication; copyright protection; video attacks; psnr; payload.
1. INTRODUCTION
Broadly the digital data is managed using the digital rights
management (DRM) technologies where the DRM systems
possess the following techniques they are a) encryption b)
digital Certificates c) watermarking d) access control e) secure
communication protocols f) fingerprinting g) rights
specification language h) trust infrastructure and i) hashing.
So the watermarking technique is one of the subset of DRM
techniques.
Due to the enormous growth of digital multimedia
technologies the use of digital signals incredibly increases, so
the attention to the field of digital authentication is increasing.
Digital watermarking is documented as an efficient measure
for copyright protection of digital multimedia signals. The
digital watermarking is classified in terms of three categories
they are a) spatial domain watermarking b) frequency domain
watermarking and c) feature domain watermarking. In spatial
domain watermarking techniques the watermarking is done
directly modifying the pixel values of the host multimedia
signal. One of the simplest techniques is least significant bit
(LSB) modification, where the human visual system (HVS)
cannot be able to detect the changes in the original host signal.
In transform domain the spatial domain host multimedia
signal is transformed into frequency domain using discrete
cosine transform (DCT), discrete wavelet transform (DWT)
and other available transforms as required by the user. The
watermarking is done on the transformed signal where the
HVS cannot be able to detect the watermark and it will be
completely invisible. In feature domain the watermarking is
done on any one of the features of the host multimedia signal.
The host multimedia feature is chosen by the user to embed
the watermark where the features or entire host signal will be
processed by filters like high pass filters. By selecting the
edges of the host signal or the feature the embedding process
will be carried out for the better authentication and copyright
protection.
2. WATERMARKING SYSTEM
Audio, image and video watermarking methods uses the
exclusive generic building blocks, they are a) watermark
embedding system and b) watermark recovery system. The
below figure. 1 and figure. 2 shows the watermarking
embedding and recovery systems.
Figure 1 Generic digital watermarking system
Figure 2 Generic digital watermark recovery system
Here, ‘W’ is the watermark used to embed in the original data
(I), ‘K’ is the public or private key defined by the user and Ĩ is
the watermarked data.
Table 1 shows the information regarding different multimedia
signals, watermarking types and three different domains. In
which frequency domain is mostly used where the user can
able to meet certain required criterions.
Table 2 gives the information about various watermarking
applications and the various requirements for the user. There
is a tradeoff between the robustness, capacity and
imperceptibility which is shown in the below figure 3. The
watermarked data may likely to undergo either intentional or
2. International Journal of Computer Applications Technology and Research
Volume 5– Issue 5, 295 - 303, 2016, ISSN:- 2319–8656
www.ijcat.com 296
unintentional modifications two groups of distortion can be
distinguished. The first one contains distortions which can be
considered as additive noise to the data whereas the distortion
in the second group are due to modifications of the spatial or
temporal data geometry with the intent to introduce a
mismatch between the watermark and the key used for
embedding.
Figure 3 Tradeoff triangle in watermarking system
In the video watermarking process after watermark
embedding the watermarked video is send through the channel
where the video can under go various attacks.
The watermarked data may likely to undergo either intentional
or unintentional modifications two groups of distortion can be
distinguished. The first one contains distortions which can be
considered as additive noise to the data whereas the distortion
in the second group are due to modifications of the spatial or
temporal data geometry with the intent to introduce a
mismatch between the watermark and the key used for
embedding [2]
Table 1. Watermarking domains and types
Multimedia
Signals used
for
watermarking
Watermarking
Domains
Types of
Watermarking
Text
Documents
or
Audio Files
or
Image Files
or
Video Signals
a. Spatial
Domain
Watermarking
b. Frequency
domain
Watermarking
c. Feature
domain
Watermarking
a. Private
Watermarking
(also called Non
– Blind
Watermarking)
b. Semiprivate
Watermarking
(also called
Semi-Blind
Watermarking)
c. Public
Watermarking
(also called as
Blind or
Oblivious
Watermarking)
Table 2. Watermarking applications and requirement
Watermarking
Applications
Watermarking
Requirements
Watermarking for
Copyright Protection
Fingerprinting for
Traitor Tracking
Watermarking for Copy
Protection
Watermarking for
Image and Video
Authentication
Recovery with or without the
original data.
Extraction or Verification of a
given watermark
Robustness
Imperceptibility
Security issues and use of
keys
3. VIDEO WATERMARKING SYSTEMS
Video is referred as moving still images or moving frames,
video watermarking is done by watermarking each still image
using the image watermarking algorithms. It is obviously
known that video data is massive in size, for an example if a
digital video where each frame is of 720 X 480 pixels with
color data i.e. (24 bits per pixel) then 30 frames/ second has a
rate of 248 Mbps. Due to the high rate extension of image
watermarking techniques and architectures may be inefficient
to handle video watermarking. This is one of the reason by
which researchers got motivated to design low complex and
efficient hardware implementation [3].
Digital video can be copied frequently exclusive of quality
loss. Thereby copyright protection of video is one of the
significant issues in digital video transmitting networks than it
was with analog TV broadcast. Frank Hartung and Bernd
Girod proposed robust watermarking of MPEG 2 encoded
video. This scheme is possessing lower complexity comparing
with decoding process with watermarking and re-encoding. In
this scheme ‘C’ Programming is used to take input and the
DCT is applied to the parts of bit stream which contains DC
and AC coefficients and are replaced by DC and AC
coefficients with watermark. This method is very robust
against un-attempted and attempted attacks. It can be applied
to MPEG -1, ITU – T H.261 or ITU – T H.263 video coding
schemes; the embedded watermark is robust against linear and
nonlinear operations like cropping, filtering and quantization
in pixel or frequency domain [4].
Chiou – Ting Hsu and Ja – Ling Wu proposes DCT based
watermarking for video to hide covert information into signals
to protect the authentication and copyright of the digital
MPEG videos. Here the watermark is embedded in intra and
non-intra frame with dissimilar residual masks. This method
is robust to cropping operation and MPEG compression [5].
Frank Hartung and Bernd Girod propose additive spread
spectrum methods for embedding watermarks into un-
compressed video and compressed MPEG2 video. It is
important practically to work on encoded rather than un-
encoded video. Here the watermark is embedded in entropy
coded DCT coefficients [6].
Mitchell D. Swanson et. al. presented a video watermarking
method to enable copyright protection into a digital video in
which it is based on multi resolution scene based and video
dependent watermarking. This method provides imperceptible
watermarking and there are two pseudorandom keys used.
The watermarking procedure is very robust to several
distortions and degradation [7].
Tae – Yun Chung et. al., proposes video watermarking
technique by extending the direct spread spectrum on MPEG2
3. International Journal of Computer Applications Technology and Research
Volume 5– Issue 5, 295 - 303, 2016, ISSN:- 2319–8656
www.ijcat.com 297
video. In their proposed technique they increases the video
perception quality of the embedded watermarked video by
controlling the parameters like strength and area of
embedding with respect to the characteristics of the video.
The average PSNR value for the three different experimental
videos is 29.5 dB for 4Mbps, 30.6dB for 5Mbps, 31.6dB for
6Mbps and 32.1dB for 7Mbps, the watermark detection rate is
above 97% for every bit rated MPEG2 video signal [8].
Christoph Busch et. al., proposes modified Koch – Zhao
algorithm for video watermarking and observing video
streams in a TV broadcasting environment which survives
attacks like MPEG2 video compression. The algorithm is
well suited for digital video watermarking video streams such
as sporting events or movies [9].
Wenwu Zhu et. al., presents a unique approach for Images and
video watermarking, their approach is based on 2D and 3D
DWT. For images SPIHT algorithm is used for compression
and the PSNR values between watermarked and original is
about 42.77dB. In concerned with video the watermark is
embedded in Group of Pictures (GOP) 16 frames of QCIF
foreman sequence 3D wavelet based SPIHT video coder is
used for compressing video, the PSNR of original and
watermarked frames is 29.99dB and 29.46dB [10].
Gerhard C. Langelaar et. al., gives a overview of digital and
video data watermarking, concerned with video data DCT
transform with pseudo random noise is discussed and it is
stated that the “Robustness of a watermark is improved by
improving the energy of the watermark” also stated that “ In
the real time environment computational complexity and
robustness play very significant role” [11].
Xiamu Niu et. al., team projected a multi-resolution
watermarking technique where a gray scale image is
embedded into a digital video, 2D and 3D of the video signals
are used for embedding watermark. The Hamming code, 2D
and 3D Discrete Wavelet Transform (DWT) is used for the
signal processing. This watermark is robust against attacks
like lossy compression, averaging and frame dropping [12].
T. Brandao et. al., team proposes an analysis on the effects of
signal mixture techniques in video watermark detection.
Spread spectrum video watermarking is used and various
common error correction codes such as BCH, Reed –
Solomon, with multilevel signaling, Binary Convolution
Codes (BCC) with Viterbi decoding is done to improve results
[13].
Emmanuel Garcia et. al., introduced a novel framework on
texture based watermarking of 3D video objects. To main
objective is to obtain the information hidden in the texture
image without degrading the visual perception. Here blind
watermarking is proposed using EUREMARK algorithm [14].
Shih – Wel Sun and Pao – Chi Chang presents a new
approach based on temporal synchronization. Video
watermarking is done through matching the profile statistics.
It is given that by position mean and variance in the X and Y
directions of the frame is send to the receiver to check the
received data. The accuracy of frame detection is from
72.41% to 98.15% [15].
Gwenael Doerr and Jean – Luc Dugelay done four approaches
in the video watermarking based on spread spectrum (SS)
technique.
a) Every frame is embedded with different watermark
with embedding strength parameter ‘α’, and secret
key ‘K’. (Uncorrelated watermark embedding) (SS
system), Wt(K) is the inserted watermark has
normal distribution with zero mean and unit
varience.
b) Only one watermark is used to embed into the video
frames (Redundant watermark embedding) (SS-1
System)
c) Embedding different watermarks randomly in the
video frames (SS-N)
d) SS-α
Previous works have mainly focused on robustness i.e.
resilience against non-malicious attacks. For example, for
applications such as broadcast monitoring, video
authentication or data hiding, the watermark has to undergo
some signal processing e.g. noise addition, filtering, lossy
compression. However, for fingerprinting or copy-control
applications, the embedded watermark has also to survive in a
hostile environment with malicious users. In this context,
security issues have to be addressed [16].
Eugene T. Lin et. al., developed a state machine key generator
which help the user to detect the watermark even if
synchronization of the video signal is lost. This blind
watermarking technology is used to establish and maintain
temporal synchronization. It is very resilient against temporal
synchronization attacks [17].
Mauro Barni et. al., team members confidently proposed a
method to watermark MPEG-4 video objects in a very
efficient manner. The proposed method embeds the
watermark in each video object by posing a particular
relationship between some predefined pairs of quantized DCT
coefficients in the luminance block. Watermark is equally
embedded into Inter and Intra macro blocks of the video [18] .
Satyen Biswas et. al., team works on uncompressed video and
also on the compressed video sequences. The main theme is to
improve the authentication of multimedia objects and it is
done using watermarking in the GOP. Drift Compensation
method is used to predict the changes between successive
frames in the video clips. Blind detection of watermark is
done using estimation technique and it is very robust to
attacks [19].
Karen Su et. al., presents a hypothetical structure for the linear
collusion analysis of digital video watermarking, derive new
statistical invisibility theorem, collusion – resistance theorem
and practical design rules. Here the design of a copyright
protection system for MPEG2 videos and attacks of multiple
frames linear collusion like a) Linear Collusion, b) Statistical
Invisibility are also discusses [20].
Yulin Wang and Alan Pearmain, presents MPEG2 video blind
watermarking and this is very robust to geometric attaks. The
proposed method is not restricted to MPEG2 alone it can be
suited for DCT based coding videos [21].
Jing Zhang et. al., presents a robust video watermarking of
H.264/AVC where pre – processing of the gray scale
watermark is done to obtain the 1D output sequence. This
obtained pattern is embedded into a compressed video. It
achieves high robustness to various signal processing attacks
and good visual quality [22].
Maneli Noorkami and Russell M. Mersereau, introduced a
structure of robust video watermarking of H.264 video to
4. International Journal of Computer Applications Technology and Research
Volume 5– Issue 5, 295 - 303, 2016, ISSN:- 2319–8656
www.ijcat.com 298
provide copyright protection and authentication. In this work
the authors uses 4X4 DCT to increase the payload of the
watermark and also uses a key dependent algorithm to have a
visual watermarking capacity. This work provides good
robustness to various attacks [23].
Alper Loz and Aydin Alatan, compares their work named
spatio – temporal watermarking of video by using HVS with
the other two algorithms i.e. first one is based on spatial
sensitivity of HVS and the other uses only the HVS
characteristics. It is present that the robustness of the
watermark can be improved by integrating temporal
characteristics. This work is robust against common temporal
signal processing operations [24].
Siyue Chen and Henry Leung, presents disordered semi
fragile watermarking for video authentication used in scrutiny
applications, here they used raw video data for processing.
Mapping is carried on GOP and frame index separately. This
method is robust to common spatial processing [25].
Lino E. Coria et. al., discourage camcorder in theater to avoid
the piracy of the videos. The team developed a system using
dual tree complex wavelet transform for watermarking, the
video watermarking is performed such that if the watermark is
displayed the video will not be played in a player it is very
robust to geometric distortions and lossy compressions [26].
Young-Yoon Lee et. al., presents two different temporal
feature modulation algorithms where in the first one is the
watermark is embedded in skipping selected frames and the
second is to find the centers of gravity in the blocks to embed
the watermark. It is robust to compression and temporal
attacks [27].
R. Reyes et. al., proposes a video watermarking system where
the watermark is logo image of the owner. In this work the
video sequences are segmented in every frame and the
watermark logo is embedded into the frames randomly. The
security is increased by using a logo binary pattern mapped to
a noise like binary pattern before embedding this process is
robust against several attacks [28].
Alper Koz et. al., team presents watermarking of free view
video in which the watermark is embedded with three
different factors where the first one global scaling factor,
second one is image processed through high pass filter and the
last watermark sequence with zero mean and unit variance.
The watermark is embedded in every frame of the video and it
is robust to geometric and compression attacks [29].
Min – Jeong et. al., presents a very good approach to avoid
the pirates copying the digital cinema using camcorder, this
technique provides robust watermark recognition in
opposition to camcorder capture and also to extract data about
the place and time of piracy. It helps to find out the persons
performing pirates by using position estimate model approach
[30].
Liyun Wang et. al., proposes real time video watermarking
scheme on compressed videos like MPEG1, MPEG2 and it
can be applied for MPEG4 and H.264 because DWT domain
could directly acquired from block DCT’s of any size. This
work is very robust to geometric attacks and also used for
hiding of data [31].
Andras Boho et. al., presents video security and tackles
cryptography and signal processing operations each other. It
uses little encryption techniques in tradeoff between preserved
functionality and security. The encryption of data sets in
H.264/AVC and HEVC achieves consistently low SSIM
values. The watermark is robust against signal processing
operations and transcoding. It achieves better tradeoff
between robustness, perceptibility and payload [32].
Mehdi Fallahpour et. al., presents a sensible system of digital
video watermarking for tamper detection of compressed
videos and authentication. The embedding is done in LNZ
DCT blocks and extracting of watermarks are integrated with
the coding and decoding of video codec. The cryptography
technique is used to improve the security of the system [33].
Md. Asikuzzaman et. al., team presents three different
versions of robust blind video watermarking based on DT –
CWT. First the watermark is embedded in the level of three
coefficient of a three level DT – CWT decomposition of
chrominance channel to make robust to geometric attacks
[34].
In Table 3 and 4 the detailed information of the existing video
watermarking techniques in terms of videos been used,
watermarking domains, attacks and experimental results.
4. STATISTICS OF VIDEO
WATERMARKING SYSTEM
The below figures 4, 5 and 6 shows the statistics of the video
watermarking systems been used in research where the
compressed videos utilization is more compared with the
uncompressed video or raw videos. The main reason is when
the raw video is processed with watermark embedding process
the data is getting effected and the quality decreases as such
psnr value is decreased. In figure 5 the type of domain usage
statistics is performed and in figure 6 psnr of various systems
are discussed.
Figure 4 Percentage of Video formats used
5. International Journal of Computer Applications Technology and Research
Volume 5– Issue 5, 295 - 303, 2016, ISSN:- 2319–8656
www.ijcat.com 299
Table 3. Detailed video watermarking domains
S.No Authors Type of video
used
Video
Watermarking
Domain
1 Frank
Hartung and
Bernd Girod
[4].
Compressed
MPEG2 Video
Spatial and
Frequency
Domain: DCT
2 Chiou – Ting
Hsu and Ja –
Ling Wu [5]
Compressed
MPEG Video
Frequency
domain: DCT
3 Frank
Hartung and
Bernd Girod
[6]
Raw video and
Compressed
MPEG2 Video
Spatial and
Frequency
domain:DCT
4 Mitchell D.
Swanson et.
al. [7]
Compressed
Video data
Spatial and
Frequency domain
5 Tae – Yun
Chung et.
al.,[8]
Compressed
MPEG2 Video
Frequency
domain: DCT
6 Christoph
Busch et.
al.,[9].
Compressed
MPEG2 Video
Spatial and
Frequency
domain: Modified
Koch – Zhao
Algorithm (New
DCT & IDCT
Algorithms)
7 Wenwu Zhu
et. al.,[10]
JPEG Image
and MPEG2
Video
Frequency
Domain: DWT
8 Xiamu Niu
et. al., [12]
Compressed
MPEG Video
Frequency
domain: DWT
9 T. Brandao
et. al., [13]
Compressed
MPEG2 Video
Spatial domain:
Spread Spectrum
10 Emmanuel
Garcia et. al.
[14].
3D Objects Spatial Domain:
Pseudorandom
noise is added as
watermark
11 Shih – Wel
Sun and Pao
– Chi Chang
[15]
Uncompressed
Video
Spatial Domain
12 Gwenael
Doerr and
Jean – Luc
Dugelay,
[16].
MPEG2
Compressed
Video
Spatial Domain
13 Eugene T.
Lin et.
al.,[17]
Uncompressed
Video
Spatial Domain
14 Mauro Barni
et. al. [18]
Compressed
MPEG-4 video
Transform domain
15 Satyen Biswas
et. al., [19]
Uncompressed
(DAVI) and
Compressed
MPEG2 Video
Spatial domain
&
Transform
domain (DCT)
16 Yulin Wang and
Alan Pearmain,
[21]
Compressed
MPEG2 video
Transform
domain: DCT
17 Jing Zhang et.
al. [22]
Compressed
Video
H.264/AVC
Transform
domain: DCT
18 Maneli
Noorkami and
Russell M.
Mersereau, [23]
Compressed
Video H.264
Transform
Domain: DCT
19 Alper Loz and
Aydin Alatan,
[24]
Compressed
video ITU H.263
Spatial and
Transform
domain: DCT
20 Siyue Chen and
Henry Leung,
[25]
Raw video (AVI) Transform
domain: DCT
21 Lino E. Coria
et. al., [26]
Standard Video
files of QCIF
(176 X 144)
Transform
domain DT-
CWT and
DWT.
22 Young-Yoon
Lee et. al,[27]
Compressed
Video
H.264/AVC
Spatial domain
23 R. Reyes et.
al.,[28]
Compressed
Video
Transform
domain:DWT
24 Alper Koz et.
al.,[29]
TV Video Signal Spatial domain
25 Min – Jeong et.
al., [30]
Watermarking the
Pirates camcorder
Spatial Domain
26 Liyun Wang et.
al.,[31]
MPEG1 and
MPEG2 Videos
Frequency
domain: DCT
& DWT
27 Andras Boho et.
al., [32]
H.264/AVC and
HEVC video
formats
Spatial and
Frequency
domains
28 Mehdi
Fallahpour et.
al., [33]
H.264/AVC video
formats
Spatial and
Frequency
domain
29 Md.
Asikuzzaman et.
al.,[34]
MPEG video
formats
Frequency
domain: DT
CWT
Figure 5 Percentage of used Domains
6. International Journal of Computer Applications Technology and Research
Volume 5– Issue 5, 295 - 303, 2016, ISSN:- 2319–8656
www.ijcat.com 300
Table 4 Video Watermarking Attacks and Results
S.No Authors Attacks
performed
Experimental
Results
1 Frank
Hartung and
Bernd Girod
[4].
Robust against
Un-attempted
and Attempted
attacks
15 to 30% of
DCT coefficients
are altered.
2 Chiou – Ting
Hsu and Ja –
Ling Wu [5]
Robust to
Cropping and
MPEG
Compression
PSNR is
44.63dB
NC=1
3 Frank
Hartung and
Bernd Girod
[6]
Robust to
temporal attacks
and MPEG
compression
Chip Rate is
633,600
Error is 0.0194
4 Mitchell D.
Swanson et.
al. [7]
Robust to
several Video
degradation and
distortion.
Avg. PSNR is
36.9dB
5 Tae – Yun
Chung et.
al.,[8]
Robust to
Cropping and
MPEG
Compression
Watermark
Extraction
Accuracy is 97%
Avg. PSNR is
32.5
6 Christoph
Busch et.
al.,[9].
Robust against
MPEG2
encoding
Restricted to
some well of
geometric
attacks
Transparent
Watermarking is
attained
Data Rates are
4Mbps and
6Mbps
Percentage of
Corrected bits is
above 90%
7 Wenwu Zhu
et. al.,[10]
Robust to
Image/ Video
compression and
digital
halftoning.
PSNR(Image) is
42.77dB
PSNR(Image)
after SPIHT
compression is
33.48dB
PSNR of Video
first frame is
29.99dB
Computational
saving is 87.5%
8 Xiamu Niu
et. al., [12]
Robust to Frame
dropping,
averaging and
lossy
compression
PSNR values of
original and
waternarked
frames of size
352X240 is
32.49
9 T. Brandao
et. al., [13]
Robust to
compression
attack
Presents a good
Performance vs.
simplicity trade
off.
10 Emmanuel
Garcia et. al.
[14].
Robust to
geometric
disturbances
Better tradeoff
between capacity
and robustness is
achieved.
Blind
Watermarking is
done
11 Shih – Wel
Sun and Pao
– Chi Chang
[15]
Robust to
temporal attacks
like transposition,
dropping and
insertion.
The accuracy of
frame detection is
from72.41% to
98.15%.
12 Gwenael
Doerr and
Jean – Luc
Dugelay,
[16].
Robustness is
achieved for every
attack step by step
Four modules are
developed in
spread spectrum
13 Eugene T.
Lin et.
al.,[17]
Robust against
temporal
Synchronization
attacks
Developed a state
machine key
generator.
Flicker is
generated in the
video due to
watermark
14 Mauro Barni
et. al. [18]
Robust against Bit
rate decreasing,
Frame dropping,
Synchronization is
achieved.
Confidence values
are high when
wrong key is used.
15 Satyen
Biswas et.
al., [19]
Robust against
Spatial and
temporal Attacks
Average NC =
0.95 and decreases
with increase in
frame dropping.
16 Yulin Wang
and Alan
Pearmain,
[21]
Robust to
geometric attacks
Q Step is 6, 8 and
12.
Error rate is below
1.7%
17 Jing Zhang
et. al. [22]
Robust to
Transcoding and
Signal processing
Attacks like
Gaussian low pass
filtering
Additive Gaussian
Noise(Variance is
0.75)
Circular averaging
filter
Unsharp Contrast
enhancement
Correlation values
for watermarked
video is 0.93,
Correlation after
transcoding (1/3rd
Bit rate) is 0.50
Correlation after
Circular filtering is
0.87
Correlation after
Contrast
enhancement is
083
Correlation after
Gaussian Noise is
0.75
18 Maneli
Noorkami
and Russell
M.
Mersereau,
[23]
Robust to
Several common
signal processing
attacks
High Payload
Average
Correlation factor
is 0.997
19 Alper Loz
and Aydin
Alatan, [24]
Robust to
Several common
signal processing
attacks
Transcoding
attacks
Average
PSNR(Foreman)
is 39dB
Avg. PSNR
(Mother
Sequence) is
43dB.
7. International Journal of Computer Applications Technology and Research
Volume 5– Issue 5, 295 - 303, 2016, ISSN:- 2319–8656
www.ijcat.com 301
20 Siyue Chen
and Henry
Leung, [25]
Robust to JPEG
Compression
Median Filtering
Contrast
Enhancement
Data Payloads
are 32 and 1024
bits
PSNR is 42dB
21 Lino E. Coria
et. al., [26]
Robust to
Attacks
Fragile to Joint
Attack
Avg. PSNR is
41dB
22 Young-Yoon
Lee et. al,[27]
Robust against
Compression
and temporal
attacks
Frames rate is
29.977 or 23.976
fps.
PSNR is 31dB
23 R. Reyes et.
al.,[28]
Robust against
different Noisy
attacks
NC= 0.95
24 Alper Koz et.
al.,[29]
Robust to
AWGN noise
compression
Attacks
Geometric
Attacks
Best NC=0.875
Avg. Noise
PSNR is 42.11
25 Min – Jeong
et. al., [30]
Robust to
camcorder
capture
Geometric
distortions
Signal
Processing
distortions
Avg PSNR is
46.0 dB
Avg PSNR is
45dB for HD
videos
26 Liyun Wang
et. al.,[31]
Robust against
cropping and
rotation attacks
Avg. Bit Error
Rate (BER) is
almost negligible
i.e. Zero for
many attacks.
Avg. BER is 3.3
for H.264
Compression
27 Andras Boho
et. al., [32]
Robust against
Signal
Processing
attacks
Transcoding
Compression
Quantization
Index
Modulation is
employed
Avg.
H.264/AVC
PSNR is 55dB
Avg. BER is
0.011
28 Mehdi
Fallahpour et.
al., [33]
Robust to
common video
processing
operations
PSNR is 50.54
PSNR
degradation is
0.88dB
Structural
Similarity Index
Decreases is
0.0090
Bit Correct rate
is 0.71 to 0.88
29 Md.
Asikuzzaman
et. al.,[34]
Robust to
Compression
and Geometric
Attacks
Temporal
Synchronization
Attacks
SSLD, SDLD
and KDLD
methods were
proposed
Figure 6 PSNR values of Video watermarking systems
5. CONCLUSION
In this video watermarking survey [4] to [34] are using
compressed video except [14], [15], [17] and [25] where these
uses un-compressed video or raw video for video
watermarking. In [3] and [19] video watermarking is for both
Compressed and Uncompressed video formats. The best
technique for the compressed video watermarking in terms of
PSNR can be attained by using parametric lattice quantization
index modulation (QIM) proposed by Andras Boho et. al.,
[32] and also proved that Structural Similarity (SSIM) index
is considered as better parameter than that of PSNR to
calculate the quality degradation [32]. In the attempt to
provide robustness against various video attacks Keyless
Dynamic Level Detection (KDLD) method proposed by Md.
Asikuzzaman et. al.,[34] provides best robustness to the
various attacks compared with other methods. Min – Jeong et.
al., [30] gives the best position estimating model (PEM) with
a mean absolute error (MAE) to prevent pirated copies of
digital cinema captured by tripod mounted SONY HDR FX 1
camcorder in real theaters. The best technique for
uncompressed video is chaotic semi fragile watermarking
which gives PSNR of 42dB proposed by Siyue Chen and
Henry Leung [25].
6. REFERENCES
[1] Gwenael Doerr and Jean-Luc, “Security Pitfalls of Frame
by Frame Approaches to Video Watermarking”, IEEE
Transactions on Signal Processing, Supplement on
secure media, October 2004.
[2] Stefan Katzenbeisser and Fabien A.P. Petitcolas,
“Computer Security Series: Information Hiding
Techniques for Steganography and Digital
Watermarking”, Artech House Boston, London.
[3] Ali Mohammad Al – Haj, “Premier Reference Source –
Advanced Techniques in Multimedia Watermarking:
Image, Video and Audio Applications” Princess Sumaya
University for Technology, Jordan.
8. International Journal of Computer Applications Technology and Research
Volume 5– Issue 5, 295 - 303, 2016, ISSN:- 2319–8656
www.ijcat.com 302
[4] Frank Hartung and Bernd Girod, “Copyright Protection
in Video Delivery Networks by Watermarking of Pre –
Compressed Video”, Multimedia Applications, Services
and Techniques – ECMAST’ 97, Springer Lecturer
Notes in Computer Science, Vol. 1242, pp. 423 – 436.
[5] Chiou – Ting Hsu and Ja – Ling Wu, “DCT based
Watermarking for Video”, IEEE Transactions on
Consumer Electronics, Vol.44, No.1, Feb 1998, pp. 206
– 216.
[6] Frank Hartung and Bernd Girod, “Watermarking of
Uncompressed and Compressed Video”, Elsevier
Preprint, Vol. 66, No. 3, May 1998, pp. 283 – 301.
[7] Mitchell D. Swanson et. al. “Multiresolution Scene –
Based Video Watermarking using Perceptual Models”,
IEEE Journal on Selected areas in Communications, Vol.
16, No. 4, May 1998, pp. 540 – 550.
[8] Tae – Yun Chung et. al., “Digital Watermarking for
Copyright Protection of MPEG2 Compressed Video”,
IEEE Transactions on Consumer Electronics, Vol. 44,
No. 3, August 1998, pp. 895 – 901.
[9] Christoph Busch et. al., “Digital Watermarking: From
Concepts to Real time Video Applications”, Image
Security, IEEE Computer Graphics and Applications,
January/February 1999, pp. 25 – 35.
[10]Wenwu Zhu et. al., “Multiresolution Watermarking for
Images and Video”, IEEE, Transactions on Circuits and
Systems for Video Technology, Vol. 9, No. 4, June 1999,
pp. 545 – 550.
[11]Gerhard C. Langelaar et. al., “A State of the Art
Overview: Watermarking Digital Image and Video
Data”, IEEE Signal Processing Magazine, September
2000, pp. 20 – 46.
[12]Xiamu Niu et. al., “Multiresoultion Watermarking for
Video based on Gray Level Digital Watermark”, IEEE
Transaction on Customer Electronics, Vol. 46, No. 2,
May 2000, pp. 375 – 384.
[13]T. Brandao et. al., “Diversity Enhancement of Coded
Spread Spectrum Video Watermarking”, Wireless
Personal Communications, Kulwer Academic Publishers,
2002, pp. 93 – 104.
[14]Emmanuel Garcia et. al., “Texture Based Watermarking
of 3D Video Objects”, IEEE transaction on Circuits and
Systems for Video Technology, Vol. 13, No. 8, August
2003, pp. 853 – 866.
[15]Shih – Wel Sun and Pao – Chi Chang, “Video
Watermarking Synchronization based on Profile
Statistics”, IEEE A&E Systems Magazine, May 2004,
pp. 21 – 25.
[16]Gwenael Doerr and Jean – Luc Dugelay, “Security
Pitfalls of Frame by Frame Approaches to Video
Watermarking”, IEEE Transactions on Signal
Processing, Vol. 52, No. 10, October 2004, pp. 2955 –
2964.
[17]Eugene T. Lin et. al., “Temporal Synchronization in
Video Watermarking”, IEEE Transactions on Signal
Processing, Vol. 52, No. 10, October 2004, pp. 3007 –
3022.
[18]Mauro Barni et. al., “Watermarking of MPEG-4 Video
Objects”, IEEE Transactions on multimedia, Vol. 7, No.
1, February 2005, pp. 23 – 32.
[19]Satyen Biswas et. al., “An Adaptive Compressed MPEG-
2 Video Watermarking Scheme”, IEEE Transactions on
Instrumentation and Measurement, Vol. 54, No. 5,
October 2005, pp. 1853 – 1861.
[20]Karen Su et. al., “Statistical Invisibility for Collusion –
Resistant Digital Video Watermarking”, IEEE
Transactions on Multimedia, Vol. 7, No. 1, February
2005, pp 43 – 51.
[21]Yulin Wang and Alan Pearmain, “Blind MPEG2 Video
Watermarking Robust Against Geometric Attacks: A set
of Approaches in DCT domain”, IEEE Transactions on
Image Processing, Vol. 15, No. 6, June 2006, pp. 1536 –
1543.
[22]Jing Zhang et. al.,”Robust Video Watermarking of
H.264/AVC”, IEEE Transactions on Circuits and
Systems-II:Express Briefs, Vol. 54, No. 2, February
2007, pp. 205 – 209.
[23]Maneli Noorkami and Russell M. Mersereau, “A
Framework for Robust Watermarking of H.264 –
Encoded Video with Controllable Detection
Performance”, IEEE Transactions on Information
Forensics and Security, Vol. 2, No. 1, March 2007, pp.
14 – 23.
[24]Alper Loz and Aydin Alatan, “Oblivious Spatio –
Temporal Watermarking of Digital Video by Exploiting
the Human Visual System”, IEEE Transactions on
Circuits and Systems for Video Technology, Vol. 18, No.
3, March 2008, pp. 326 – 337.
[25]Siyue Chen and Henry Leung, “Chaotic Watermarking
for Video Authentication in Surveillance Applications”,
IEEE Transactions on Circuits and Systems for Video
Technology”, Vol. 18, No. 5, May 2008, pp. 704 – 709.
[26]Lino E. Coria et. al., “A Video Watermarking Scheme
based on the Dual Tree Complex Wavelet Transform”,
IEEE Transactions on Information Forensics and
Security, Vol. 3, No. 3, September 2008, pp. 466 – 474.
[27]Young-Yoon Lee et. al, “Temporal Feature Modulation
for Video Watermarking”, IEEE Transactions on Circuits
and Systems for Video Technology, Vol. 19, No. 4, April
2009, pp. 603 – 608.
[28]R. Reyes et. al., “Digital Video Watermarking in DWT
Domain using Chaotic Mixtures”, IEEE Latin America
Transactions, Vol. 8, No. 3, June 2010, pp. 304 – 310.
9. International Journal of Computer Applications Technology and Research
Volume 5– Issue 5, 295 - 303, 2016, ISSN:- 2319–8656
www.ijcat.com 303
[29]Alper Koz et. al., “Watermarking of Free – View Video”,
IEEE Transactions on Image Processing, Vol. 19, No. 7,
July 2010, pp. 1785 – 1797.
[30]Min – Jeong et. al., “Digital Cinema Watermarking for
Estimating the Position of the Pirate”, IEEE Transactions
on Multimedia, Vol. 12, No. 7, November 2010, pp. 605
– 621.
[31]Liyun Wang et. al., “Real Time Compressed Domain
Video Watermarking Resistance to Geometric
Distortions”, IEEE Multimedia in Forensics, Security
and Intelligence, Computer society, January – March
2012, pp. 70 – 79.
[32]Andras Boho et. al., “End to End Security for Video
Distribution”, IEEE Signal Processing Magazine, March
2013, pp. 97 – 107.
[33]Mehdi Fallahpour et. al., “Tampering Detection in
Compressed Digital Video Using Watermarking” IEEE
Transactions on Instrumentation and Measurement, Vol.
63, No. 5, May 2014, pp. 1057 – 1072.
[34]Md. Asikuzzaman et. al., “Imperceptible and Robust
Blind Video Watermarking using Chrominance
Embedding: A set of Approaches in the DT CWT
Domain” IEEE Transactions on Information Forensics
and Security, Vol. 9, No. 9, September 2014, pp. 1502 –
1517.