SlideShare a Scribd company logo
1 of 6
Download to read offline
Ankitha.A.Nayak et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.39-44
www.ijera.com 39 | P a g e
A Survey and Comparative Study on Video Watermarking
Techniques with Reference to Mobile Devices
Ankitha.A.Nayak *, Venugopala P S **, Dr. H.Sarojadevi***, Dr.Niranjan.N.
Chiplunkar****
*( PG Scholor, Department of Computer Science, NMAMIT, Nitte)
** (Asst.Professor, Department of Computer Science, NMAMIT, Nitte)
*** (HOD, Department of Computer Science, NMAMIT, Nitte)
**** (Principal, NMAMIT, Nitte)
ABSTRACT
During the last few years’ mobile devices like smart phone and tablet witnessed a random growth in terms of
hardware and software. The increased growth of apps, sharing data, videos, images through internet need
security and intellectual property right. Developing a watermarking technique for data protection and
authentication on shared data in mobile internet within the limited memory and significant battery consumption
is one of the current challenging fields. In this paper we have performed a survey on available video
watermarking techniques and a feasibility study on video watermarking techniques for mobile devices. Also the
comparative study on features of watermarking with different video watermarking algorithm is performed.
Keywords - DCT, DFT, DWT, LSB, Mobile Devices, SVD
I. INTRODUCTION
Due to the advancement in technology, digital
document data like videos, images, text messages
are shared easily using mobile devices and can be
copied without owner’s permission. This leads to a
new challenge of protecting the multimedia data.
Watermarking is a technique of embedding
copyright information into the host data to protect
the intellectual right and the originality of data.
Video watermarking technique is an extension of
watermarking concept. The collection of consecutive
still images is considered as digital video and the
amount of watermark data inserted in video is called
as payload. Video watermarking provide few attacks
like frame dropping, frame swapping which
applicable only to video and to be addressed to
achieve the security in watermarking. In this paper
section II discuss about Video watermarking, section
III is the survey on video watermarking, section IV
is the survey on video watermarking on mobile
devices, section V is the Comparative analysis and
conclusion is given in section VI.
II. VIDEO WATERMARKING
2.1 General Properties of Video Watermarking
The properties we discus here plays a very
important role in video watermarking process.
2.1.1 Imperceptibility
The embedded watermark should not change,
effect or damage the quality of original data.
A watermark should be imperceptible that human
cannot find the difference between the original and
the watermarked data [1].
2.1.2 Robustness
When a video is shared usually there will be some
distortion. The watermark should be robust against
all innocent and malicious attack. Even if the video
changes copy right data should not get affect [3][5].
2.1.3 Capacity and Payload
The amount of data to be embedded in cover work is
called Capacity. The number of watermark bits in
host data is payload. The payload varies from one
application to other[3][4].
2.1.4 Security
The Watermark and original data should be
accessible only to the authorized user. The hackers
and unknown user must be unable to extract the
watermark and the original data should not effect by
any attacks [1][3].
2.1.5 Computational Cost and Time Complexity
The cost to embed watermark into host data and to
extract watermark should be reliable. It is very
important to pick a suitable complexity
watermarking algorithm to avoid high complexity
problems like more software and hardware
resources. Time taken by watermarking algorithm
should be less to increase the efficiency [1].
2.2 Classification of Video Watermarking Attacks
The video watermarking technique mainly faces
two type of attack
2.2.1 Innocent Attack
Innocent attack is unintentional and coincidence
attack like smoothening and compressing image [8].
2.2.2 Malicious Attack
These are intentional attack like deleting and
desynchronizing attack [8].
RESEARCH ARTICLE OPEN ACCESS
Ankitha.A.Nayak et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.39-44
www.ijera.com 40 | P a g e
2.3 Classification of Video Watermarking
Technique
Depending upon perception and insertion domain
video watermarking classified as shown in Fig 1
[3][8].
Fig.1. Classification of Video Watermarking
2.3.1 Spatial Domain Method
The spatial domain method, embed the
watermark by modifying the pixel value of the host
video [1][2]. Spatial domain method is faster
compared to Frequency domain with simplicity and
less computational complexity [3]. The method is
less robust to geometric distortion and less resistant
to noise, compression and low pass filtering [5].
 Least Significant Bit
A simplest watermarking technique, watermark
is embedded by changing lower order bit of each
pixel. The payload of LSB technique is very less and
restricted [7].
 Correlation -Based Technique
It is a straight forward approach to embed
watermark by adding pseudorandom noise pattern to
luminance value of video pixel. The pseudorandom
noise (MN) pattern i.e. A(y, z) is added to cover
image B(y, z) the outcome is watermarked image
BA(y, z).Here (y, z) represent position of watermark.
BA(y, z) = B(y, z) + k* A(y, z)
k represent gain factor. The spatial method can
provide better robustness and average payload if
image is decomposed into blocks and multiple
watermarks is embedded in blocks by optimal
watermarking technique [5].
2.3.2 Frequency Domain Method
The watermark is embedded in frequency
domain instead of spatial domain[1]. Watermark is
spread out to entire image so it is more efficient,
robust and secure compared spatial domain[5].
 Discrete Fourier Transform
In this approach, watermark is embedded only in
first frame of group of pictures. The full DFT
technique is applied to identify frame to be
watermarked and magnitude of coefficient is
calculated. This method is robust against linear/non
linear filtering, sharpening and resist geometric
transformation like scaling rotation and cropping [5].
2.3.3 Spatio-Frequency Domain Method
The watermark is embedded by changing coefficient
of applied video transform.
 Singular Value Decomposition
SVD is a numerical watermarking technique, used to
get diagonalized matrices. The watermark is
embedded in singular value of original image. The
length and coefficient of watermark effect
watermarking technique [6].
SVD is mathematical tool to analyze matrices. A
square matrices A of M x N size is decomposed into
three matrices X,Y,Z such that A=XYZT
. ZT
transpose of Z, X, Y are orthogonal matrix and z is
square diagonal [7].
 Discrete courier Transform
It is a spread spectrum communication method in
this; the data is represented in terms of frequency
[4]. Embedding of watermark is done in first k
highest magnitude of DCT coefficient of image. The
result obtained after applying DCT coefficient will
be an image of sum of varying magnitude and
frequency. Horizontal frequencies vary from left to
right and vertical frequencies top to bottom.
Watermark in mid band gives better robustness and
imperceptibility [1][5].
 Discrete Wavelet Transform
The transform in this technique is based on wavelets,
with varying frequency with respect to duration.
Multi-resolution decomposition of image and frames
is possible in DWT. The wavelet is divided into 4
sub bands LL, LH, HL, HH. The first letter in sub
band refers to frequency applied for rows and second
letter refers to filter applied to columns [13].
Watermarking in each band provide different
advantage, watermarking in LL provide resistance
against compression, watermarking in LH, HL and
HH robustness against noise and filters
Fig.2. 2-levels DWT Scheme
The comparative analysis of different standard
watermarking technique with respect to some
important features of video watermarking technique
is tabulated in Table 1. The terminologies used in the
table are as follows: R: Robustness, IP:
Imperceptibility, S: Security, P: payload, C:
Computational Cost, T: Time Complexity, RE:
Reliability.
Ankitha.A.Nayak et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.39-44
www.ijera.com 41 | P a g e
Table.1. Comparative analysis of Video Watermarking
Techniques
III. SURVEY ON VIDEO
WATERMARKING
In [8], wiem Trablesi et al. designed a new
Watermarking technique aims at three important
features of video watermarking like robustness,
capacity and invisibility. After comparative study of
existing watermarking system, spatial domain,
frequency domain, Spatio-frequency domain they
claimed Spatio-frequency is better.
In proposed system frames are extracted from given
video. Moving object or background of moving object
is taken as region of interest. SVD watermarking
technique is applied. Video is reconstructed, mosaic
image is extracted from reconstructed video, ROI is
detected and second watermark is applied. This
proposed method proved robust for several attacks with
better invisibility and capacity.
In [9], Gui Feng et al. proposed new Zero
Watermarking Technique based on intra prediction of
DCT coefficient character for robustness and time
stamp mechanism. The IPR database stores copy
righted watermark.
H.264 video coding standard is used in this paper.
The proposed method mainly focuses on luminance DC
coefficients of 4x4 sub blocks in I frame. Binary
Sequence is generated by formula (1)
Xi = 1 if DC>=0 (1)
Xi =0 if DC<0
Generated binary sequence is encrypted and zero
watermark is added. When the watermark video is
received comparison is done with original watermark
stored in IPR database so proposed system proved
robust and helps in time stamp mechanism.
Mrs. Anita Jadhav et al. proposed a dynamic 3D
DCT in [10] to overcome drawbacks of static 3D DCT
which works well only for correlated videos. The Otsu
Thresholding method is used for scene change
detection and dynamic 3D DCT is applied for different
length frames identified by scene change detection.
Extracted RGB frames are converted into YCbCr
frames. Watermark is applied in Y components and 3D
IDCT operation is performed on watermarked videos.
The conclusion is given that, the dynamic 3D DCT is
more suitable only for high motion activity video to
avoid distortion.
In [11], Jiali Bao et al. proposed robust
watermarking method for ROI in H.264 scalable video
coding. The frame is divided into 9 blocks by flexible
macro block ordering. Moving object in frame is
detected by Gaussian mixture model and water mark is
embedded only in ROI. Each macro block is
represented by Slice id. Different watermark is added
in different ROI block by finding luminance part of
DCT matrix. Arnold transformation is applied to
improve robustness. The proposed provides high
security for ROI and robustness for many malicious
attacks.
Venugopala P S et al. proposed scene change based
watermarking in [12]. The proposed method
decompose watermark gray image into 8 multiple bit
plane image, all frames of same scene is embedded
with same single bit plane image. For different scene
different bit plane image is embedded.
The frame of selected video is divided into 8X8
block size, with 7 triple group luminance value A to G.
1 bit watermark from gray scale bit plane image is
added to selected luminance value of video frame by
adjusting pixel value and it is concluded proposed
scheme is robust against frame dropping and temporal
shift attack and noise adding.
In [13], Hitesh Panchal et al. gave approach of
watermarking for uncompressed video key frames. The
original video is decomposed into frames by X2
histogram matching method. The R G B component are
extracted from selected frames and 4 level DWT is
applied, R G B component of color video is taken as
watermark and watermark is embedded in LH or HL
sub band with secret key generation. It is concluded
water mark is done in less time and method is robust
against frame dropping and frame averaging attacks.
The comparative study of different proposed video
watermarking technique with respect to some important
features of video watermarking technique is showed in
Table 2.
The Table 2 is represented with few terminologies. R:
Robustness, IP: Imperceptibility, P: payload, T: Time
Complexity.
Ankitha.A.Nayak et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.39-44
www.ijera.com 42 | P a g e
IV. SURVEY ON VIDEO
WATERMARKING ON
MOBILE DEVICES
In [14], Arun Kejariwal et al have proposed an
algorithm for watermark embedding, extraction and
to protect copy right of the image with detailed study
of energy and performance on mobile devices. The
proposed system consist 3 components server,
mobile and proxy server. Server handles client
request and database, mobile acts as client and proxy
server is best powerful server. Mobile device
communicates with proxy server for security,
message delivery and quality of service and proxy
server communicate with server for raw data
requested by the client. The experiment is carried
out in Sharp Zarus PDA with intel 400MHz XScale.
11 image watermarking algorithms like
Bruyundonckx, corvi, cox, durgad,
Survey
Methods
Techniqu
e
R IP P T
Multi-
Signature
robust
video
watermarki
ng[8]
SVD Good Good

Good Better
Zero
watermarki
ng[9] DCT Good
Good
Better

Better

Dynamic
3D DCT
watermarki
ng[10] DCT
Good Better

Better
Good,
Only for
High
motion
activity
video
Robust
SVC
watermarki
ng for
ROI[11]
DCT
Good Good Good
Better

Scene
change
based
video
watermarki
ng[12]
New
approach Good
Good Good Good
Watermark
ing on
extracted
key frames
from
compresse
d color
video[13]
4 level
DWT
Good Good Good Poor
Table.2. Comparative Analysis of Proposed Video
Watermarking Techniques Based on Survey
fridrich, kim, Koch, wang, xia, xie, zhu discussed in
[15] are carried out for embedding, extraction and
copy right protection of watermark and they
concluded extraction require more energy than
embedding.
Jin Li et al proposed a statistical model in [16]. This
model improves encoding process of 3D DCT, the
paper mainly aimed at getting zero quantized
coefficients from 3D DCT by taking 8X8X8 pixel
cube as input. The proposed system over comes the
drawbacks of Baseline Encoding Method by
avoiding redundant calculation of ZQDCT
coefficient.
Laplacian distribution is applied to handle
distribution of residual pixel and obtain ZQDCT by
this redundant calculation is reduced, visual quality
degradation improves, battery life time is increased
and less time taken.
Daniela Stanescu et al. proposed a method to
introduce stenography in mobile devices by using
LSB watermarking method in [17]. Stenography is a
process of hiding a secret text or image in a
message. The proposed method is tested in three
architecture ARM7 based micro controller, RISC
Architecture and multi core processor, ISSAC. Three
stenographic algorithms are used. First 2 bit LSB
method, hiding most significant bit of secret
message in least significant bit, second YUV
method, RGB is converted to YUV format before
applying LSB method and last KLT method, does
not hide the values of color component of secret
message in host message but hides the resulted
parameter after KLC transform. All three algorithms
are tested in every architecture and they concluded
ISSAC processor is more suitable for stenography in
Mobile using KLT algorithm.
Raffaele Pizzolante et al. developed a tool to embed
visible and invisible watermark in mobile with
Android OS in [18]. The data for watermarking is
taken from the USB drive, SD card. The tool
supports JPG, BMP and PNG files.
The visible Watermark algorithm, watermark text is
converted to bitmap image and merged with bitmap
image derived from host image in random position.
The invisible watermark is developed using
modified Langelaar DCT based algorithm. Seed is
an ID which is used to embed and extract watermark
and threshold to indicate robustness of embedded
watermark. This tool improves copy right protection
and execution time.
V. COMPARATIVE ANALYSIS OF
WATERMARKING ON
MOBILE DEVICES
The comparison of different proposed
watermarking technique with respect to some
important features of mobile device video
watermarking is showed in Table 3.
The Table has few terminologies. R: Robustness, B:
Battery life, E: Efficiency, ET: Execution Time, S:
Security, BRD: Bruyundonckx, COR: corvi, DUR:
Ankitha.A.Nayak et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.39-44
www.ijera.com 43 | P a g e
durgad, FRI: fridrich, KOC: Koch, WAN: wang,
ZDCT: ZQDCT coefficient, LDCT: Langelaar DCT
KLT: Karahunen-Loeve Transform, ALG: Proposed
Algorithms and goodness is measured in terms of
Good(G), Better(B), Poor(P).
Method
ALG
R B E ET S
LSB BRD G G G

G P
2-BIT
LSB
P B P G P
YUV B B B G B
KLT G G G G G
DCT
COX
B B B B B
FRI
G P P P G
KOC B B G G P
ZDCT B B P P G
LDCT G G B B G
DWT
COR B B B B B
DUR B B B B B
KIM B B B B B
XIA B B B B B
XIE G B P G G
ZHU G G B G G
Table.3. Comparative Analysis of Proposed
Watermarking Techniques Based on Mobile Devices.
VI. CONCLUSION
This paper has discussed different video
watermarking technique and video watermarking on
mobile devices that are proposed in the literature.
The comparison analysis is performed under
important video watermarking features like
robustness, imperceptibility and capacity. It is
observed Spatio- frequency method like DWT, SVD
is better watermarking approach. The survey papers
on watermarking on mobile devices is carried out for
images and it is observed DWT is better approach
and KLT LSB method is better for stenography in
mobile devices. SVD and DFT watermarking
method is not yet implemented on mobile devices.
Ideas of image watermarking algorithms on mobile
devices can extended for video watermarking, by
dividing videos into frames.
REFERENCES
[1] Prabhishek Singh, R S Chadha “A Survey of
Digital Watermarking Techniques,
Applications and Attacks” International
Journal of Engineering and Innovative
Technology (IJEIT), March 2013.
[2] Mustafa Osman Ali and Rameshwar Rao,
“Digital Image Watermarking Basics, and
Hardware Implementation”, International
Journal of Modeling and Optimization, Vol.
2, No. 1, February 2012.
[3] Sourav Bhattacharya, T. Chattopadhyay,
Arpan Pal, “A Survey on Different Video
Watermarking Techniques and Comparative
Analysis with Reference to H.264/AVC”,
IEEE 2006.
[4] Dr.V.Seenivasagam, S.Subbulakshmi,
S.Radhamani, “A Survey on Video
Watermarking and Its Applications”,
International Journal of Advanced Research
in Computer Science and Software
Engineering, Volume 4, Issue 3, March 2014
ISSN: 2277 128X
[5] Gopika V Mane, G. G. Chiddarwar, “Review
Paper on Video Watermarking Techniques”,
International Journal of Scientific and
Research Publications, Volume 3, Issue 4,
April 2013 1 ISSN 2250-3153
[6] Dinesh Gupta, Pardeep Singh, Nivedita,
Sugandha Sharma, “A comparative study of
image compression between Singular value
decomposition, Block truncating coding,
Discrete cosine transform and Wavelet”,
International Journal of Computer Science
and Network Security, VOL.12 No.2,
February 2012.
[7] Y.J.Song, T.N.Tan “Comparison of Four
Different Digital Watermarking
Techniques”, Proceedings of ICSP2000.
[8] Wiem Trabelsi, Mohamed Heny Selmi,
“Multi-signature robust video watermarking”
1st International Conference on Advanced
Technologies for Signal and Image
Processing , Sousse, Tunisia, March 2014.
[9] Gui Feng, Kai Huang “H.264 Video
Standard Based Zero Watermarking
Technology”, project supported by the
Natural Science Foundation of Fujian
Province of China.
[10] Mrs. Anita Jadhav, Mrs. Megha Kolhekar,
“Digital Watermarking in Video for Copy
Right Protection”, International Conference
on Electronic Systems, Signal Processing
and Computing Technologies,2014.
[11] Jiali Bao, Jie Guo “A Robust Watermarking
Scheme for Region of Interest in H.264
Scalable Video Coding”, 2nd International
Symposium on Instrumentation and
Ankitha.A.Nayak et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.39-44
www.ijera.com 44 | P a g e
Measurement, Sensor Network and
Automation,2013.
[12] Venugopala P S, Dr. H. Sarojadevi, Dr.
Niranjan N, Vani Bhat, “Video
Watermarking by Adjusting the Pixel Values
and Using Scene Change Detection”, Fifth
International Conference on Signals and
Image Processing,2014.
[13] Hitesh Panchal,Kunal Acharya, Pradip
Panchal, Naimish Thakar “Digital
Watermarking on Extracted Key Frames
from Uncompressed Color Video using 4-
Level DWT” , 3rd International Conference
on Computer Engineering and
Technology,2010.
[14] Arun Kejariwal, Sumit Gupta, Alexandru
Nicolau, Nikil Dutt, Rajesh Gupta, “Energy
Analysis of Multimedia Watermarking on
Mobile Handheld Devices”, IEEE 2006.
[15] Arun Kejariwal, Sumit Gupta, Alexandru
Nicolau, Nikil D. Dutt, Rajesh Gupta,
“Energy Efficient Watermarking on Mobile
Devices Using Proxy-Based Partitioning”,
IEEE Transactions On Very Large Scale
Integration (Vlsi) Systems, Vol. 14, No. 6,
June 2006 625
[16] Jin Li, Moncef Gabbouj, Jarmo Takala,
Hexin Chen, “Simplified Video Coding for
Digital Mobile Devices”, ICSP2008
Proceedings.
[17] Daniela Stanescu, Valentin Stangaciu,
Mircea Stratulat, “Steganography on new
generation of mobile phones with image and
video processing abilities”, IEEE
International Joint Conferences on
Computational Cybernetics and Technical
Informatics (ICCC-CONTI 2010) • May 27-
29, 2010 • Timisora, Romania.
[18] Raffaele Pizzolante, Bruno Carpentieri,
"Copyright Protection for Images on
Mobile Devices", Sixth International
Conference on Innovative Mobile and
Internet Services in Ubiquitous Computing,
978-0-7695-4684-1/12 IEEE, 2012.

More Related Content

What's hot

A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...researchinventy
 
Adaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality EstimationAdaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality Estimationpaperpublications3
 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
 
A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection cscpconf
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
Hybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video WatermarkingHybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video WatermarkingIJSRD
 
Digital video watermarking using modified lsb and dct technique
Digital video watermarking using modified lsb and dct techniqueDigital video watermarking using modified lsb and dct technique
Digital video watermarking using modified lsb and dct techniqueeSAT Publishing House
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domainpaperpublications3
 

What's hot (18)

A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
 
Adaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality EstimationAdaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality Estimation
 
H017524854
H017524854H017524854
H017524854
 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...
 
A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
1820 1824
1820 18241820 1824
1820 1824
 
20120140505013
2012014050501320120140505013
20120140505013
 
Hybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video WatermarkingHybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video Watermarking
 
Digital video watermarking using modified lsb and dct technique
Digital video watermarking using modified lsb and dct techniqueDigital video watermarking using modified lsb and dct technique
Digital video watermarking using modified lsb and dct technique
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
 
robust image watermarking
robust image watermarkingrobust image watermarking
robust image watermarking
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
 

Viewers also liked

Maldiv adalari ulke_raporu_2013
Maldiv adalari ulke_raporu_2013Maldiv adalari ulke_raporu_2013
Maldiv adalari ulke_raporu_2013UlkeRaporlari2013
 
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...IJERA Editor
 
Non-life claims reserves using Dirichlet random environment
Non-life claims reserves using Dirichlet random environmentNon-life claims reserves using Dirichlet random environment
Non-life claims reserves using Dirichlet random environmentIJERA Editor
 
A New Model of H-Bridge Multilevel Inverter for Reduced Harmonics Distortion
A New Model of H-Bridge Multilevel Inverter for Reduced Harmonics DistortionA New Model of H-Bridge Multilevel Inverter for Reduced Harmonics Distortion
A New Model of H-Bridge Multilevel Inverter for Reduced Harmonics DistortionIJERA Editor
 
ความก้าวหน้าของ RBL T.W
ความก้าวหน้าของ RBL T.Wความก้าวหน้าของ RBL T.W
ความก้าวหน้าของ RBL T.WBoom Nori
 
Effect of Hand Transmitted Vibration through Tractor during Ploughing Field
Effect of Hand Transmitted Vibration through Tractor during Ploughing FieldEffect of Hand Transmitted Vibration through Tractor during Ploughing Field
Effect of Hand Transmitted Vibration through Tractor during Ploughing FieldIJERA Editor
 
A Wind driven PV- FC Hybrid System and its Power Management Strategies in a Grid
A Wind driven PV- FC Hybrid System and its Power Management Strategies in a GridA Wind driven PV- FC Hybrid System and its Power Management Strategies in a Grid
A Wind driven PV- FC Hybrid System and its Power Management Strategies in a GridIJERA Editor
 
Valjastan sidosryhmäni sidosresursseiksi
Valjastan sidosryhmäni sidosresursseiksiValjastan sidosryhmäni sidosresursseiksi
Valjastan sidosryhmäni sidosresursseiksiLeijonaksi
 
Plant location selection by using MCDM methods
Plant location selection by using MCDM methodsPlant location selection by using MCDM methods
Plant location selection by using MCDM methodsIJERA Editor
 
о внесении изменений в постановление
о внесении изменений в постановлениео внесении изменений в постановление
о внесении изменений в постановлениеpatriot29
 
社内サーバー購入禁止令から出戻りリモートワークまでの一部始終 20150114 DevLOVE仙台
社内サーバー購入禁止令から出戻りリモートワークまでの一部始終 20150114 DevLOVE仙台社内サーバー購入禁止令から出戻りリモートワークまでの一部始終 20150114 DevLOVE仙台
社内サーバー購入禁止令から出戻りリモートワークまでの一部始終 20150114 DevLOVE仙台Seiji Akatsuka
 
Performance and evaluation of desiccant based air conditioning system.
Performance and evaluation of desiccant based air conditioning system.Performance and evaluation of desiccant based air conditioning system.
Performance and evaluation of desiccant based air conditioning system.IJERA Editor
 
ความสำคัญของคอมพิวเตอร์ 2222
ความสำคัญของคอมพิวเตอร์ 2222ความสำคัญของคอมพิวเตอร์ 2222
ความสำคัญของคอมพิวเตอร์ 2222aomhongoingkad
 

Viewers also liked (19)

Meksika ulke raporu_2013
Meksika ulke raporu_2013Meksika ulke raporu_2013
Meksika ulke raporu_2013
 
Maldiv adalari ulke_raporu_2013
Maldiv adalari ulke_raporu_2013Maldiv adalari ulke_raporu_2013
Maldiv adalari ulke_raporu_2013
 
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...
 
Makao ulke raporu_2013
Makao ulke raporu_2013Makao ulke raporu_2013
Makao ulke raporu_2013
 
Non-life claims reserves using Dirichlet random environment
Non-life claims reserves using Dirichlet random environmentNon-life claims reserves using Dirichlet random environment
Non-life claims reserves using Dirichlet random environment
 
A New Model of H-Bridge Multilevel Inverter for Reduced Harmonics Distortion
A New Model of H-Bridge Multilevel Inverter for Reduced Harmonics DistortionA New Model of H-Bridge Multilevel Inverter for Reduced Harmonics Distortion
A New Model of H-Bridge Multilevel Inverter for Reduced Harmonics Distortion
 
ความก้าวหน้าของ RBL T.W
ความก้าวหน้าของ RBL T.Wความก้าวหน้าของ RBL T.W
ความก้าวหน้าของ RBL T.W
 
Effect of Hand Transmitted Vibration through Tractor during Ploughing Field
Effect of Hand Transmitted Vibration through Tractor during Ploughing FieldEffect of Hand Transmitted Vibration through Tractor during Ploughing Field
Effect of Hand Transmitted Vibration through Tractor during Ploughing Field
 
A Wind driven PV- FC Hybrid System and its Power Management Strategies in a Grid
A Wind driven PV- FC Hybrid System and its Power Management Strategies in a GridA Wind driven PV- FC Hybrid System and its Power Management Strategies in a Grid
A Wind driven PV- FC Hybrid System and its Power Management Strategies in a Grid
 
Kosova ulke raporu_2013
Kosova ulke raporu_2013Kosova ulke raporu_2013
Kosova ulke raporu_2013
 
Valjastan sidosryhmäni sidosresursseiksi
Valjastan sidosryhmäni sidosresursseiksiValjastan sidosryhmäni sidosresursseiksi
Valjastan sidosryhmäni sidosresursseiksi
 
Plant location selection by using MCDM methods
Plant location selection by using MCDM methodsPlant location selection by using MCDM methods
Plant location selection by using MCDM methods
 
о внесении изменений в постановление
о внесении изменений в постановлениео внесении изменений в постановление
о внесении изменений в постановление
 
社内サーバー購入禁止令から出戻りリモートワークまでの一部始終 20150114 DevLOVE仙台
社内サーバー購入禁止令から出戻りリモートワークまでの一部始終 20150114 DevLOVE仙台社内サーバー購入禁止令から出戻りリモートワークまでの一部始終 20150114 DevLOVE仙台
社内サーバー購入禁止令から出戻りリモートワークまでの一部始終 20150114 DevLOVE仙台
 
Rubenmajano
RubenmajanoRubenmajano
Rubenmajano
 
Performance and evaluation of desiccant based air conditioning system.
Performance and evaluation of desiccant based air conditioning system.Performance and evaluation of desiccant based air conditioning system.
Performance and evaluation of desiccant based air conditioning system.
 
Mali ulke raporu_2013
Mali ulke raporu_2013Mali ulke raporu_2013
Mali ulke raporu_2013
 
ความสำคัญของคอมพิวเตอร์ 2222
ความสำคัญของคอมพิวเตอร์ 2222ความสำคัญของคอมพิวเตอร์ 2222
ความสำคัญของคอมพิวเตอร์ 2222
 
Usługi sieci internet cz i 2014
Usługi sieci internet cz i   2014Usługi sieci internet cz i   2014
Usługi sieci internet cz i 2014
 

Similar to Video Watermarking Techniques Mobile Devices

A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...Editor IJCATR
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkeSAT Journals
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...IOSRJVSP
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTEditor IJMTER
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518IJRAT
 
Reversible color video watermarking scheme based on hybrid of integer-to-inte...
Reversible color video watermarking scheme based on hybrid of integer-to-inte...Reversible color video watermarking scheme based on hybrid of integer-to-inte...
Reversible color video watermarking scheme based on hybrid of integer-to-inte...IJECEIAES
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesEditor IJMTER
 
Hardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked videoHardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked videoIAEME Publication
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingEditor IJMTER
 
A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...Iftikhar Ahmad
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...IRJET Journal
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...IRJET Journal
 

Similar to Video Watermarking Techniques Mobile Devices (20)

A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...
 
B010510613
B010510613B010510613
B010510613
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWT
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518
 
Reversible color video watermarking scheme based on hybrid of integer-to-inte...
Reversible color video watermarking scheme based on hybrid of integer-to-inte...Reversible color video watermarking scheme based on hybrid of integer-to-inte...
Reversible color video watermarking scheme based on hybrid of integer-to-inte...
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniques
 
Hardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked videoHardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked video
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 
F010413438
F010413438F010413438
F010413438
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
[IJET-V1I6P5] Authors: Tawde Priyanka, Londhe Archana, Nazirkar Sandhya, Khat...
[IJET-V1I6P5] Authors: Tawde Priyanka, Londhe Archana, Nazirkar Sandhya, Khat...[IJET-V1I6P5] Authors: Tawde Priyanka, Londhe Archana, Nazirkar Sandhya, Khat...
[IJET-V1I6P5] Authors: Tawde Priyanka, Londhe Archana, Nazirkar Sandhya, Khat...
 
A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
 
G0523444
G0523444G0523444
G0523444
 
1709 1715
1709 17151709 1715
1709 1715
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Video Watermarking Techniques Mobile Devices

  • 1. Ankitha.A.Nayak et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.39-44 www.ijera.com 39 | P a g e A Survey and Comparative Study on Video Watermarking Techniques with Reference to Mobile Devices Ankitha.A.Nayak *, Venugopala P S **, Dr. H.Sarojadevi***, Dr.Niranjan.N. Chiplunkar**** *( PG Scholor, Department of Computer Science, NMAMIT, Nitte) ** (Asst.Professor, Department of Computer Science, NMAMIT, Nitte) *** (HOD, Department of Computer Science, NMAMIT, Nitte) **** (Principal, NMAMIT, Nitte) ABSTRACT During the last few years’ mobile devices like smart phone and tablet witnessed a random growth in terms of hardware and software. The increased growth of apps, sharing data, videos, images through internet need security and intellectual property right. Developing a watermarking technique for data protection and authentication on shared data in mobile internet within the limited memory and significant battery consumption is one of the current challenging fields. In this paper we have performed a survey on available video watermarking techniques and a feasibility study on video watermarking techniques for mobile devices. Also the comparative study on features of watermarking with different video watermarking algorithm is performed. Keywords - DCT, DFT, DWT, LSB, Mobile Devices, SVD I. INTRODUCTION Due to the advancement in technology, digital document data like videos, images, text messages are shared easily using mobile devices and can be copied without owner’s permission. This leads to a new challenge of protecting the multimedia data. Watermarking is a technique of embedding copyright information into the host data to protect the intellectual right and the originality of data. Video watermarking technique is an extension of watermarking concept. The collection of consecutive still images is considered as digital video and the amount of watermark data inserted in video is called as payload. Video watermarking provide few attacks like frame dropping, frame swapping which applicable only to video and to be addressed to achieve the security in watermarking. In this paper section II discuss about Video watermarking, section III is the survey on video watermarking, section IV is the survey on video watermarking on mobile devices, section V is the Comparative analysis and conclusion is given in section VI. II. VIDEO WATERMARKING 2.1 General Properties of Video Watermarking The properties we discus here plays a very important role in video watermarking process. 2.1.1 Imperceptibility The embedded watermark should not change, effect or damage the quality of original data. A watermark should be imperceptible that human cannot find the difference between the original and the watermarked data [1]. 2.1.2 Robustness When a video is shared usually there will be some distortion. The watermark should be robust against all innocent and malicious attack. Even if the video changes copy right data should not get affect [3][5]. 2.1.3 Capacity and Payload The amount of data to be embedded in cover work is called Capacity. The number of watermark bits in host data is payload. The payload varies from one application to other[3][4]. 2.1.4 Security The Watermark and original data should be accessible only to the authorized user. The hackers and unknown user must be unable to extract the watermark and the original data should not effect by any attacks [1][3]. 2.1.5 Computational Cost and Time Complexity The cost to embed watermark into host data and to extract watermark should be reliable. It is very important to pick a suitable complexity watermarking algorithm to avoid high complexity problems like more software and hardware resources. Time taken by watermarking algorithm should be less to increase the efficiency [1]. 2.2 Classification of Video Watermarking Attacks The video watermarking technique mainly faces two type of attack 2.2.1 Innocent Attack Innocent attack is unintentional and coincidence attack like smoothening and compressing image [8]. 2.2.2 Malicious Attack These are intentional attack like deleting and desynchronizing attack [8]. RESEARCH ARTICLE OPEN ACCESS
  • 2. Ankitha.A.Nayak et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.39-44 www.ijera.com 40 | P a g e 2.3 Classification of Video Watermarking Technique Depending upon perception and insertion domain video watermarking classified as shown in Fig 1 [3][8]. Fig.1. Classification of Video Watermarking 2.3.1 Spatial Domain Method The spatial domain method, embed the watermark by modifying the pixel value of the host video [1][2]. Spatial domain method is faster compared to Frequency domain with simplicity and less computational complexity [3]. The method is less robust to geometric distortion and less resistant to noise, compression and low pass filtering [5].  Least Significant Bit A simplest watermarking technique, watermark is embedded by changing lower order bit of each pixel. The payload of LSB technique is very less and restricted [7].  Correlation -Based Technique It is a straight forward approach to embed watermark by adding pseudorandom noise pattern to luminance value of video pixel. The pseudorandom noise (MN) pattern i.e. A(y, z) is added to cover image B(y, z) the outcome is watermarked image BA(y, z).Here (y, z) represent position of watermark. BA(y, z) = B(y, z) + k* A(y, z) k represent gain factor. The spatial method can provide better robustness and average payload if image is decomposed into blocks and multiple watermarks is embedded in blocks by optimal watermarking technique [5]. 2.3.2 Frequency Domain Method The watermark is embedded in frequency domain instead of spatial domain[1]. Watermark is spread out to entire image so it is more efficient, robust and secure compared spatial domain[5].  Discrete Fourier Transform In this approach, watermark is embedded only in first frame of group of pictures. The full DFT technique is applied to identify frame to be watermarked and magnitude of coefficient is calculated. This method is robust against linear/non linear filtering, sharpening and resist geometric transformation like scaling rotation and cropping [5]. 2.3.3 Spatio-Frequency Domain Method The watermark is embedded by changing coefficient of applied video transform.  Singular Value Decomposition SVD is a numerical watermarking technique, used to get diagonalized matrices. The watermark is embedded in singular value of original image. The length and coefficient of watermark effect watermarking technique [6]. SVD is mathematical tool to analyze matrices. A square matrices A of M x N size is decomposed into three matrices X,Y,Z such that A=XYZT . ZT transpose of Z, X, Y are orthogonal matrix and z is square diagonal [7].  Discrete courier Transform It is a spread spectrum communication method in this; the data is represented in terms of frequency [4]. Embedding of watermark is done in first k highest magnitude of DCT coefficient of image. The result obtained after applying DCT coefficient will be an image of sum of varying magnitude and frequency. Horizontal frequencies vary from left to right and vertical frequencies top to bottom. Watermark in mid band gives better robustness and imperceptibility [1][5].  Discrete Wavelet Transform The transform in this technique is based on wavelets, with varying frequency with respect to duration. Multi-resolution decomposition of image and frames is possible in DWT. The wavelet is divided into 4 sub bands LL, LH, HL, HH. The first letter in sub band refers to frequency applied for rows and second letter refers to filter applied to columns [13]. Watermarking in each band provide different advantage, watermarking in LL provide resistance against compression, watermarking in LH, HL and HH robustness against noise and filters Fig.2. 2-levels DWT Scheme The comparative analysis of different standard watermarking technique with respect to some important features of video watermarking technique is tabulated in Table 1. The terminologies used in the table are as follows: R: Robustness, IP: Imperceptibility, S: Security, P: payload, C: Computational Cost, T: Time Complexity, RE: Reliability.
  • 3. Ankitha.A.Nayak et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.39-44 www.ijera.com 41 | P a g e Table.1. Comparative analysis of Video Watermarking Techniques III. SURVEY ON VIDEO WATERMARKING In [8], wiem Trablesi et al. designed a new Watermarking technique aims at three important features of video watermarking like robustness, capacity and invisibility. After comparative study of existing watermarking system, spatial domain, frequency domain, Spatio-frequency domain they claimed Spatio-frequency is better. In proposed system frames are extracted from given video. Moving object or background of moving object is taken as region of interest. SVD watermarking technique is applied. Video is reconstructed, mosaic image is extracted from reconstructed video, ROI is detected and second watermark is applied. This proposed method proved robust for several attacks with better invisibility and capacity. In [9], Gui Feng et al. proposed new Zero Watermarking Technique based on intra prediction of DCT coefficient character for robustness and time stamp mechanism. The IPR database stores copy righted watermark. H.264 video coding standard is used in this paper. The proposed method mainly focuses on luminance DC coefficients of 4x4 sub blocks in I frame. Binary Sequence is generated by formula (1) Xi = 1 if DC>=0 (1) Xi =0 if DC<0 Generated binary sequence is encrypted and zero watermark is added. When the watermark video is received comparison is done with original watermark stored in IPR database so proposed system proved robust and helps in time stamp mechanism. Mrs. Anita Jadhav et al. proposed a dynamic 3D DCT in [10] to overcome drawbacks of static 3D DCT which works well only for correlated videos. The Otsu Thresholding method is used for scene change detection and dynamic 3D DCT is applied for different length frames identified by scene change detection. Extracted RGB frames are converted into YCbCr frames. Watermark is applied in Y components and 3D IDCT operation is performed on watermarked videos. The conclusion is given that, the dynamic 3D DCT is more suitable only for high motion activity video to avoid distortion. In [11], Jiali Bao et al. proposed robust watermarking method for ROI in H.264 scalable video coding. The frame is divided into 9 blocks by flexible macro block ordering. Moving object in frame is detected by Gaussian mixture model and water mark is embedded only in ROI. Each macro block is represented by Slice id. Different watermark is added in different ROI block by finding luminance part of DCT matrix. Arnold transformation is applied to improve robustness. The proposed provides high security for ROI and robustness for many malicious attacks. Venugopala P S et al. proposed scene change based watermarking in [12]. The proposed method decompose watermark gray image into 8 multiple bit plane image, all frames of same scene is embedded with same single bit plane image. For different scene different bit plane image is embedded. The frame of selected video is divided into 8X8 block size, with 7 triple group luminance value A to G. 1 bit watermark from gray scale bit plane image is added to selected luminance value of video frame by adjusting pixel value and it is concluded proposed scheme is robust against frame dropping and temporal shift attack and noise adding. In [13], Hitesh Panchal et al. gave approach of watermarking for uncompressed video key frames. The original video is decomposed into frames by X2 histogram matching method. The R G B component are extracted from selected frames and 4 level DWT is applied, R G B component of color video is taken as watermark and watermark is embedded in LH or HL sub band with secret key generation. It is concluded water mark is done in less time and method is robust against frame dropping and frame averaging attacks. The comparative study of different proposed video watermarking technique with respect to some important features of video watermarking technique is showed in Table 2. The Table 2 is represented with few terminologies. R: Robustness, IP: Imperceptibility, P: payload, T: Time Complexity.
  • 4. Ankitha.A.Nayak et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.39-44 www.ijera.com 42 | P a g e IV. SURVEY ON VIDEO WATERMARKING ON MOBILE DEVICES In [14], Arun Kejariwal et al have proposed an algorithm for watermark embedding, extraction and to protect copy right of the image with detailed study of energy and performance on mobile devices. The proposed system consist 3 components server, mobile and proxy server. Server handles client request and database, mobile acts as client and proxy server is best powerful server. Mobile device communicates with proxy server for security, message delivery and quality of service and proxy server communicate with server for raw data requested by the client. The experiment is carried out in Sharp Zarus PDA with intel 400MHz XScale. 11 image watermarking algorithms like Bruyundonckx, corvi, cox, durgad, Survey Methods Techniqu e R IP P T Multi- Signature robust video watermarki ng[8] SVD Good Good  Good Better Zero watermarki ng[9] DCT Good Good Better  Better  Dynamic 3D DCT watermarki ng[10] DCT Good Better  Better Good, Only for High motion activity video Robust SVC watermarki ng for ROI[11] DCT Good Good Good Better  Scene change based video watermarki ng[12] New approach Good Good Good Good Watermark ing on extracted key frames from compresse d color video[13] 4 level DWT Good Good Good Poor Table.2. Comparative Analysis of Proposed Video Watermarking Techniques Based on Survey fridrich, kim, Koch, wang, xia, xie, zhu discussed in [15] are carried out for embedding, extraction and copy right protection of watermark and they concluded extraction require more energy than embedding. Jin Li et al proposed a statistical model in [16]. This model improves encoding process of 3D DCT, the paper mainly aimed at getting zero quantized coefficients from 3D DCT by taking 8X8X8 pixel cube as input. The proposed system over comes the drawbacks of Baseline Encoding Method by avoiding redundant calculation of ZQDCT coefficient. Laplacian distribution is applied to handle distribution of residual pixel and obtain ZQDCT by this redundant calculation is reduced, visual quality degradation improves, battery life time is increased and less time taken. Daniela Stanescu et al. proposed a method to introduce stenography in mobile devices by using LSB watermarking method in [17]. Stenography is a process of hiding a secret text or image in a message. The proposed method is tested in three architecture ARM7 based micro controller, RISC Architecture and multi core processor, ISSAC. Three stenographic algorithms are used. First 2 bit LSB method, hiding most significant bit of secret message in least significant bit, second YUV method, RGB is converted to YUV format before applying LSB method and last KLT method, does not hide the values of color component of secret message in host message but hides the resulted parameter after KLC transform. All three algorithms are tested in every architecture and they concluded ISSAC processor is more suitable for stenography in Mobile using KLT algorithm. Raffaele Pizzolante et al. developed a tool to embed visible and invisible watermark in mobile with Android OS in [18]. The data for watermarking is taken from the USB drive, SD card. The tool supports JPG, BMP and PNG files. The visible Watermark algorithm, watermark text is converted to bitmap image and merged with bitmap image derived from host image in random position. The invisible watermark is developed using modified Langelaar DCT based algorithm. Seed is an ID which is used to embed and extract watermark and threshold to indicate robustness of embedded watermark. This tool improves copy right protection and execution time. V. COMPARATIVE ANALYSIS OF WATERMARKING ON MOBILE DEVICES The comparison of different proposed watermarking technique with respect to some important features of mobile device video watermarking is showed in Table 3. The Table has few terminologies. R: Robustness, B: Battery life, E: Efficiency, ET: Execution Time, S: Security, BRD: Bruyundonckx, COR: corvi, DUR:
  • 5. Ankitha.A.Nayak et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.39-44 www.ijera.com 43 | P a g e durgad, FRI: fridrich, KOC: Koch, WAN: wang, ZDCT: ZQDCT coefficient, LDCT: Langelaar DCT KLT: Karahunen-Loeve Transform, ALG: Proposed Algorithms and goodness is measured in terms of Good(G), Better(B), Poor(P). Method ALG R B E ET S LSB BRD G G G  G P 2-BIT LSB P B P G P YUV B B B G B KLT G G G G G DCT COX B B B B B FRI G P P P G KOC B B G G P ZDCT B B P P G LDCT G G B B G DWT COR B B B B B DUR B B B B B KIM B B B B B XIA B B B B B XIE G B P G G ZHU G G B G G Table.3. Comparative Analysis of Proposed Watermarking Techniques Based on Mobile Devices. VI. CONCLUSION This paper has discussed different video watermarking technique and video watermarking on mobile devices that are proposed in the literature. The comparison analysis is performed under important video watermarking features like robustness, imperceptibility and capacity. It is observed Spatio- frequency method like DWT, SVD is better watermarking approach. The survey papers on watermarking on mobile devices is carried out for images and it is observed DWT is better approach and KLT LSB method is better for stenography in mobile devices. SVD and DFT watermarking method is not yet implemented on mobile devices. Ideas of image watermarking algorithms on mobile devices can extended for video watermarking, by dividing videos into frames. REFERENCES [1] Prabhishek Singh, R S Chadha “A Survey of Digital Watermarking Techniques, Applications and Attacks” International Journal of Engineering and Innovative Technology (IJEIT), March 2013. [2] Mustafa Osman Ali and Rameshwar Rao, “Digital Image Watermarking Basics, and Hardware Implementation”, International Journal of Modeling and Optimization, Vol. 2, No. 1, February 2012. [3] Sourav Bhattacharya, T. Chattopadhyay, Arpan Pal, “A Survey on Different Video Watermarking Techniques and Comparative Analysis with Reference to H.264/AVC”, IEEE 2006. [4] Dr.V.Seenivasagam, S.Subbulakshmi, S.Radhamani, “A Survey on Video Watermarking and Its Applications”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014 ISSN: 2277 128X [5] Gopika V Mane, G. G. Chiddarwar, “Review Paper on Video Watermarking Techniques”, International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013 1 ISSN 2250-3153 [6] Dinesh Gupta, Pardeep Singh, Nivedita, Sugandha Sharma, “A comparative study of image compression between Singular value decomposition, Block truncating coding, Discrete cosine transform and Wavelet”, International Journal of Computer Science and Network Security, VOL.12 No.2, February 2012. [7] Y.J.Song, T.N.Tan “Comparison of Four Different Digital Watermarking Techniques”, Proceedings of ICSP2000. [8] Wiem Trabelsi, Mohamed Heny Selmi, “Multi-signature robust video watermarking” 1st International Conference on Advanced Technologies for Signal and Image Processing , Sousse, Tunisia, March 2014. [9] Gui Feng, Kai Huang “H.264 Video Standard Based Zero Watermarking Technology”, project supported by the Natural Science Foundation of Fujian Province of China. [10] Mrs. Anita Jadhav, Mrs. Megha Kolhekar, “Digital Watermarking in Video for Copy Right Protection”, International Conference on Electronic Systems, Signal Processing and Computing Technologies,2014. [11] Jiali Bao, Jie Guo “A Robust Watermarking Scheme for Region of Interest in H.264 Scalable Video Coding”, 2nd International Symposium on Instrumentation and
  • 6. Ankitha.A.Nayak et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 6), December 2014, pp.39-44 www.ijera.com 44 | P a g e Measurement, Sensor Network and Automation,2013. [12] Venugopala P S, Dr. H. Sarojadevi, Dr. Niranjan N, Vani Bhat, “Video Watermarking by Adjusting the Pixel Values and Using Scene Change Detection”, Fifth International Conference on Signals and Image Processing,2014. [13] Hitesh Panchal,Kunal Acharya, Pradip Panchal, Naimish Thakar “Digital Watermarking on Extracted Key Frames from Uncompressed Color Video using 4- Level DWT” , 3rd International Conference on Computer Engineering and Technology,2010. [14] Arun Kejariwal, Sumit Gupta, Alexandru Nicolau, Nikil Dutt, Rajesh Gupta, “Energy Analysis of Multimedia Watermarking on Mobile Handheld Devices”, IEEE 2006. [15] Arun Kejariwal, Sumit Gupta, Alexandru Nicolau, Nikil D. Dutt, Rajesh Gupta, “Energy Efficient Watermarking on Mobile Devices Using Proxy-Based Partitioning”, IEEE Transactions On Very Large Scale Integration (Vlsi) Systems, Vol. 14, No. 6, June 2006 625 [16] Jin Li, Moncef Gabbouj, Jarmo Takala, Hexin Chen, “Simplified Video Coding for Digital Mobile Devices”, ICSP2008 Proceedings. [17] Daniela Stanescu, Valentin Stangaciu, Mircea Stratulat, “Steganography on new generation of mobile phones with image and video processing abilities”, IEEE International Joint Conferences on Computational Cybernetics and Technical Informatics (ICCC-CONTI 2010) • May 27- 29, 2010 • Timisora, Romania. [18] Raffaele Pizzolante, Bruno Carpentieri, "Copyright Protection for Images on Mobile Devices", Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 978-0-7695-4684-1/12 IEEE, 2012.