SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5


                               Digital Video Watermarking Using Discrete Cosine
                                     Transform And Perceptual Analaysis

                                             1
                                                 B.R.Darshan, 2R.Triveni
                             Department of Ece, Madanapalle Institute of Technology & Sciences
                                                      Madanapalle

Abstract
         Due to the extensive use of digital media applications, multimedia security and copyright protection has gained
tremendous importance. Digital Watermarking is a technology used for the copyright protection of digital applications. In this
paper, a comprehensive approach for watermarking digital video is introduced. We propose a hybrid digital video
watermarking scheme based on Discrete Cosine Transform (DCT) The video frames are first decomposed using DCT and the
binary watermark is embedded In this paper, we describe a visible watermarking scheme that is applied into the host video in
the DCT domain. A mathematical model has been developed for that purpose. We have also proposed a modification of the
algorithm to make the watermark more robust.

Introduction
           The popularity of digital video based applications [1] is accompanied by the need for copyright protection to prevent
illicit copying and distribution of digital video. Copyright protection inserts authentication data such as ownership information
and logo in the digital media without affecting its perceptual quality. In case of any dispute, authentication data is extracted
from the media and can be used as an authoritative proof to prove the ownership. As a method of copyright protection, digital
video watermarking [2, 3] has recently emerged as a significant field of interest and a very active area of research.
Watermarking is the process that embeds data called a watermark or digital signature into a multimedia object such that
watermark can be detected or extracted later to make an assertion about the object. The object may be an image or audio or
video. For the purpose of copyright protection digital watermarking techniques must meet the criteria of imperceptibility as
well as robustness against all attacks [4-6] for removal of the watermark.

        Many digital watermarking schemes have been proposed for still images and videos [7]. Most of them operate on
Uncompressed videos, while others embeded watermarks directly into compressed videos. The work on video specific
watermarking can be further found in [08-10].

         Video watermarking introduces a number of issues not present in image watermarking. Due to inherent redundancy
between video frames, video signals are highly susceptible to attacks such as frame averaging, frame dropping, frame
swapping and statistical analysis. Video watermarking approaches can be classified into two main categories based on the
method of hiding watermark bits in the host video. The two categories are: Spatial domain watermarking where embedding
and detection of watermark are performed by directly manipulating the pixel intensity values of the video frame.Transform
domain techniques, on the other hand, alter spatial pixel values of the host video according to a pre-determined transform and
are more robust than spatial domain techniques since they disperse the watermark in the spatial domain of the video frame
making it difficult to remove the watermark through malicious attacks like cropping, scaling, rotations and geometrical
attacks. The commonly used transform domain techniques are Discrete Fourier Transform (DFT), the Discrete Cosine
Transform (DCT), and the Discrete Wavelet Transform (DWT).

         Digital watermarking is defined as a process of embedding data (watermark) into a multimedia object to help to
protect the owner's right to that object. The embedded data (watermark) may be either visible or invisible. In visible
watermarking of Video, a secondary image (the watermark) is embedded in a primary (host) video such that watermark is
intentionally perceptible to a human observer whereas in the case of invisible watermarking the embedded data is not
perceptible, but may be extracted/detected by a computer program.




Issn 2250-3005(online)                                         September| 2012                               Page 1324
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5



Some of the desired characteristics of visible watermarks are listed below .
    A visible watermark should be obvious in both color and monochrome images.
    The watermark should spread in a large and important area of the image in order to prevent its deletion by clipping.
    The watermark should be visible yet must not significantly obscure the image details beneath it.
    The watermark must be difficult to remove, rather removing a watermark should be more costly and labor intensive
        than purchasing the image from the owner.
    The watermark should be applied automatically with little human intervention and labor.

There are very few visible watermarking techniques available in current literature.
The IBM Digital Library Organization has used a visible watermarking technique to mark digitized pages of manuscript form
the Vatican archive. Rajmohan proposes a visible watermarking technique in DCT domain. He divides the image into different
blocks, classifies these blocks by perceptual classification methods as proposed in [5] and modifies the DCT coefficients of
host image as follows.
                          X’n = αn Xn + βn Wn                                                  (1.1)

The αn and βn coefficients are different for different classes of blocks. Xn are the DCT coefficient of the host image blocks
and Wn are the DCT co-efficients of the watermark image block. Here, we propose a visible watermarking scheme that
modifies gray values of each pixel of the host image. The modification is based on the local as well as global statistics of the
host image. The characteristics of the Human Visual System (HVS) are taken into consideration so that the perceptual quality
of the frame is not very much affected.
 1. Proposed Watermarking Technique




                                      Figure 1.0 Schematic representation of visible watermarking
The steps for watermark insertion are discussed below.
     The original Frame I (one to be watermarked) and the watermark image W are divided into blocks (both the images
          may not be of equal size, but blocks should be of equal size).
     and the global mean and variance of the image I are computed.
    For each block the local statistics mean n and variance n are computed.
     Let in denote the nth block of original image I ,and wn denote the nth block of
          watermark image W. Denoting the nth block of watermarked image by in’,

we have,

                                                                                                          (1.2)
where αn and βn are scaling and embedding factors respectively for each bloc Computed as described below.




Issn 2250-3005(online)                                         September| 2012                              Page 1325
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5




Fig.1.0 gives the schematic representation of the insertion process.

The choice of αn’s and βn’s are governed by certain characteristics of Human Visual System (HVS) which for watermark
images can be translated into following requirements .

        The edge blocks should be least altered to avoid significant distortion of the image. So one can add only small
         amount of watermark gray value in the edge block of host image.
        This means that scaling factor αn should be close to αmax , (the maximum value of the scaling factor) and embedding
         factor βn should be close to βmin (the minimum value of the embedding factor).
         It also pointed out that blocks with uniform intensity ( having low variance) are more sensitive to noise than the
              s
         blocks with non-uniform intensity (having high variance). So one can add less to the blocks with low variance and
         add more to the blocks with high variance. We assume the scaling factor αn is inversely proportional to variance
         whereas βn directly proportional to variance.
        Yet another characteristic of HVS is that the blocks with mid-intensity are more sensitive to noise than that of low
         intensity blocks as well as high intensity blocks. This means that the αn should increase with local mean gray value
         up to mid gray value and again decrease with local mean gray value. The variation of αn with mean block gray value
         is assumed to be gaussian in nature. The variation βn with mean gray value is reverse to that of αn .

  Basing on the above discussion we propose the following mathematical model.




For other blocks
Where,
αmin and αmax are respectively minimum and maximum values of scaling factor,
βmin and βmax are respectively minimum and maximum values of embedding factor,
σmin and σmax are respectively minimum and maximum values of block variances,
μn and σn are respectively normalized mean and variance of each block, and
μ and σ are respectively normalized mean & variances of the frame.




Issn 2250-3005(online)                                          September| 2012                            Page 1326
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5




2. Results




             Figure 2.1 original frame                                      Figure 2.2 watermarked image




                                     Figure 2..3 watermarked at different positions

          A video clip of size 176X144 is used in our experiments and the watermarked logo can be the variable size. The
experiments are done on a desktop computer with Pentium 4 CPU 2.00GHz and 1GB RAM.
          The proposed algorithm is applied to a sample video sequence “sea.avi” using a variable watermark logo. Fig 2.1
represents the original video frame is embedded with watermark logo of Fig 2.2 and the resultant watermarked frame obtained
at Fig 2.3 respectively. In the Fig 2.3 represents the watermarked logo is embedded at different positions of the frame.




Issn 2250-3005(online)                                      September| 2012                             Page 1327
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5




3. Conclusions
A visible watermarking technique has been proposed here in DCT domain. A mathematical model is developed for this
purpose exploiting the texture sensitivity of the HVS. The typical values of αmin , αmax , βmin, and βmax are 0.95, 0.98, 0.05 and
0.17 respectively. . For more robustness watermark should not be publicly available, the watermark should be used in
different sizes and should be put in different portions for different frames. The watermark may find application in digital TV,
digital libraries and e-commerce.

References
[1]     Yeo and M.M. Yeung, “Analysis and synthesis for new digital video applications,” icip, International Conference on
        Image Processing (ICIP'97),vol. 1, pp.1,1997.
[2]     M. Natarajan , G. Makhdumi1,“Safeguarding the Digital Contents: Digital Watermarking,” DESIDOC Journal of
        Library & Information Technology, Vol. 29, May 2009, pp. 29-35.
[3]     C.I. Podilchuk, E.J. Delp “Digital watermarking: algorithms and applications,” Signal Processing Magazine, Vol
        18,pp. 33-46, IEEE, July 2001.
[4]     G. Doërr, J.L. Dugelay, “Security Pitfalls of Frame-by-Frame Approaches toVideo Watermarking,” Signal Processing,
        IEEE Transactions, vol. 52, pp. 2955 – 2964, 2004.
[5]     M. K. Thakur, V. Saxena, J. P.Gupta, “A Performance Analysis of Objective Video Quality Metrics for Digital Video
        Watermarking,” Computer Science and Information Technology
        (ICCSIT), 2010, 3rd IEEE International Conference ,Vol. 4, pp. 12- 17,2010.
[6]     S. Voloshynovskiy, S. Pereira, T. Pun, “Watermark attacks,” Erlangen Watermarking Workshop 99, October 1999.
[7]     G. Langelaar, I. Setyawan, and R. Lagendijk, "Watermarking Digital Image and Video Data: A State of - Art
        Overview," IEEE Signal Processing Magazine, vol. , pp. 20-46, Sep. 2000.
[8]     F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Processing, 1998,vol. 66,
        no. 3,pp. 283-301.
[9]     T. Khatib, A. Haj, L. Rajab, H. Mohammed, “ A Robust Video Watermarking Algorithm”, Journal of Computer
        Science, vol. 4, pp. 910-915, 2008.
[10]    T. Tokar, T. Kanocz, D. Levicky, “Digital watermarking of uncompressed video in spatial domain,” 9th International
        Conference on Radioelectronica, IEEE, pp. 319-322, 2009.




Issn 2250-3005(online)                                          September| 2012                               Page 1328

More Related Content

What's hot

Hybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video WatermarkingHybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video WatermarkingIJSRD
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—aAgnianbu Wrong
 
Colored Image Watermarking Technique Based on HVS using HSV Color Model
Colored Image Watermarking Technique Based on HVS using HSV Color ModelColored Image Watermarking Technique Based on HVS using HSV Color Model
Colored Image Watermarking Technique Based on HVS using HSV Color ModelIDES Editor
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkeSAT Publishing House
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...
A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...
A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...IDES Editor
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
DCT based Image Watermarking
DCT based Image WatermarkingDCT based Image Watermarking
DCT based Image WatermarkingNisarg Shah
 
Novel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesNovel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesIDES Editor
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
 
Lect2 scan convertinglines
Lect2 scan convertinglinesLect2 scan convertinglines
Lect2 scan convertinglinesBCET
 

What's hot (18)

ieee title
ieee titleieee title
ieee title
 
F010413438
F010413438F010413438
F010413438
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Hybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video WatermarkingHybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video Watermarking
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—a
 
Colored Image Watermarking Technique Based on HVS using HSV Color Model
Colored Image Watermarking Technique Based on HVS using HSV Color ModelColored Image Watermarking Technique Based on HVS using HSV Color Model
Colored Image Watermarking Technique Based on HVS using HSV Color Model
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...
A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...
A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
DCT based Image Watermarking
DCT based Image WatermarkingDCT based Image Watermarking
DCT based Image Watermarking
 
Novel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesNovel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital images
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
 
dwm
dwmdwm
dwm
 
Lect2 scan convertinglines
Lect2 scan convertinglinesLect2 scan convertinglines
Lect2 scan convertinglines
 
E04122330
E04122330E04122330
E04122330
 

Viewers also liked

Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTEditor IJMTER
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESIJERD Editor
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

Viewers also liked (6)

Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWT
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AES
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
 
11
1111
11
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similar to DCT and Perceptual Analysis for Video Watermarking

Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarkingijceronline
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domainpaperpublications3
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkeSAT Journals
 
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...IJERA Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyIOSR Journals
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...researchinventy
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithmijsrd.com
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithmeSAT Journals
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithmeSAT Publishing House
 
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...cscpconf
 

Similar to DCT and Perceptual Analysis for Video Watermarking (20)

Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
 
50120140506015
5012014050601550120140506015
50120140506015
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domains
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
H3602056060
H3602056060H3602056060
H3602056060
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithm
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithm
 
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

DCT and Perceptual Analysis for Video Watermarking

  • 1. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 Digital Video Watermarking Using Discrete Cosine Transform And Perceptual Analaysis 1 B.R.Darshan, 2R.Triveni Department of Ece, Madanapalle Institute of Technology & Sciences Madanapalle Abstract Due to the extensive use of digital media applications, multimedia security and copyright protection has gained tremendous importance. Digital Watermarking is a technology used for the copyright protection of digital applications. In this paper, a comprehensive approach for watermarking digital video is introduced. We propose a hybrid digital video watermarking scheme based on Discrete Cosine Transform (DCT) The video frames are first decomposed using DCT and the binary watermark is embedded In this paper, we describe a visible watermarking scheme that is applied into the host video in the DCT domain. A mathematical model has been developed for that purpose. We have also proposed a modification of the algorithm to make the watermark more robust. Introduction The popularity of digital video based applications [1] is accompanied by the need for copyright protection to prevent illicit copying and distribution of digital video. Copyright protection inserts authentication data such as ownership information and logo in the digital media without affecting its perceptual quality. In case of any dispute, authentication data is extracted from the media and can be used as an authoritative proof to prove the ownership. As a method of copyright protection, digital video watermarking [2, 3] has recently emerged as a significant field of interest and a very active area of research. Watermarking is the process that embeds data called a watermark or digital signature into a multimedia object such that watermark can be detected or extracted later to make an assertion about the object. The object may be an image or audio or video. For the purpose of copyright protection digital watermarking techniques must meet the criteria of imperceptibility as well as robustness against all attacks [4-6] for removal of the watermark. Many digital watermarking schemes have been proposed for still images and videos [7]. Most of them operate on Uncompressed videos, while others embeded watermarks directly into compressed videos. The work on video specific watermarking can be further found in [08-10]. Video watermarking introduces a number of issues not present in image watermarking. Due to inherent redundancy between video frames, video signals are highly susceptible to attacks such as frame averaging, frame dropping, frame swapping and statistical analysis. Video watermarking approaches can be classified into two main categories based on the method of hiding watermark bits in the host video. The two categories are: Spatial domain watermarking where embedding and detection of watermark are performed by directly manipulating the pixel intensity values of the video frame.Transform domain techniques, on the other hand, alter spatial pixel values of the host video according to a pre-determined transform and are more robust than spatial domain techniques since they disperse the watermark in the spatial domain of the video frame making it difficult to remove the watermark through malicious attacks like cropping, scaling, rotations and geometrical attacks. The commonly used transform domain techniques are Discrete Fourier Transform (DFT), the Discrete Cosine Transform (DCT), and the Discrete Wavelet Transform (DWT). Digital watermarking is defined as a process of embedding data (watermark) into a multimedia object to help to protect the owner's right to that object. The embedded data (watermark) may be either visible or invisible. In visible watermarking of Video, a secondary image (the watermark) is embedded in a primary (host) video such that watermark is intentionally perceptible to a human observer whereas in the case of invisible watermarking the embedded data is not perceptible, but may be extracted/detected by a computer program. Issn 2250-3005(online) September| 2012 Page 1324
  • 2. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 Some of the desired characteristics of visible watermarks are listed below .  A visible watermark should be obvious in both color and monochrome images.  The watermark should spread in a large and important area of the image in order to prevent its deletion by clipping.  The watermark should be visible yet must not significantly obscure the image details beneath it.  The watermark must be difficult to remove, rather removing a watermark should be more costly and labor intensive than purchasing the image from the owner.  The watermark should be applied automatically with little human intervention and labor. There are very few visible watermarking techniques available in current literature. The IBM Digital Library Organization has used a visible watermarking technique to mark digitized pages of manuscript form the Vatican archive. Rajmohan proposes a visible watermarking technique in DCT domain. He divides the image into different blocks, classifies these blocks by perceptual classification methods as proposed in [5] and modifies the DCT coefficients of host image as follows. X’n = αn Xn + βn Wn (1.1) The αn and βn coefficients are different for different classes of blocks. Xn are the DCT coefficient of the host image blocks and Wn are the DCT co-efficients of the watermark image block. Here, we propose a visible watermarking scheme that modifies gray values of each pixel of the host image. The modification is based on the local as well as global statistics of the host image. The characteristics of the Human Visual System (HVS) are taken into consideration so that the perceptual quality of the frame is not very much affected. 1. Proposed Watermarking Technique Figure 1.0 Schematic representation of visible watermarking The steps for watermark insertion are discussed below.  The original Frame I (one to be watermarked) and the watermark image W are divided into blocks (both the images may not be of equal size, but blocks should be of equal size).  and the global mean and variance of the image I are computed. For each block the local statistics mean n and variance n are computed.  Let in denote the nth block of original image I ,and wn denote the nth block of watermark image W. Denoting the nth block of watermarked image by in’, we have, (1.2) where αn and βn are scaling and embedding factors respectively for each bloc Computed as described below. Issn 2250-3005(online) September| 2012 Page 1325
  • 3. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 Fig.1.0 gives the schematic representation of the insertion process. The choice of αn’s and βn’s are governed by certain characteristics of Human Visual System (HVS) which for watermark images can be translated into following requirements .  The edge blocks should be least altered to avoid significant distortion of the image. So one can add only small amount of watermark gray value in the edge block of host image.  This means that scaling factor αn should be close to αmax , (the maximum value of the scaling factor) and embedding factor βn should be close to βmin (the minimum value of the embedding factor).  It also pointed out that blocks with uniform intensity ( having low variance) are more sensitive to noise than the s blocks with non-uniform intensity (having high variance). So one can add less to the blocks with low variance and add more to the blocks with high variance. We assume the scaling factor αn is inversely proportional to variance whereas βn directly proportional to variance.  Yet another characteristic of HVS is that the blocks with mid-intensity are more sensitive to noise than that of low intensity blocks as well as high intensity blocks. This means that the αn should increase with local mean gray value up to mid gray value and again decrease with local mean gray value. The variation of αn with mean block gray value is assumed to be gaussian in nature. The variation βn with mean gray value is reverse to that of αn . Basing on the above discussion we propose the following mathematical model. For other blocks Where, αmin and αmax are respectively minimum and maximum values of scaling factor, βmin and βmax are respectively minimum and maximum values of embedding factor, σmin and σmax are respectively minimum and maximum values of block variances, μn and σn are respectively normalized mean and variance of each block, and μ and σ are respectively normalized mean & variances of the frame. Issn 2250-3005(online) September| 2012 Page 1326
  • 4. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 2. Results Figure 2.1 original frame Figure 2.2 watermarked image Figure 2..3 watermarked at different positions A video clip of size 176X144 is used in our experiments and the watermarked logo can be the variable size. The experiments are done on a desktop computer with Pentium 4 CPU 2.00GHz and 1GB RAM. The proposed algorithm is applied to a sample video sequence “sea.avi” using a variable watermark logo. Fig 2.1 represents the original video frame is embedded with watermark logo of Fig 2.2 and the resultant watermarked frame obtained at Fig 2.3 respectively. In the Fig 2.3 represents the watermarked logo is embedded at different positions of the frame. Issn 2250-3005(online) September| 2012 Page 1327
  • 5. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 3. Conclusions A visible watermarking technique has been proposed here in DCT domain. A mathematical model is developed for this purpose exploiting the texture sensitivity of the HVS. The typical values of αmin , αmax , βmin, and βmax are 0.95, 0.98, 0.05 and 0.17 respectively. . For more robustness watermark should not be publicly available, the watermark should be used in different sizes and should be put in different portions for different frames. The watermark may find application in digital TV, digital libraries and e-commerce. References [1] Yeo and M.M. Yeung, “Analysis and synthesis for new digital video applications,” icip, International Conference on Image Processing (ICIP'97),vol. 1, pp.1,1997. [2] M. Natarajan , G. Makhdumi1,“Safeguarding the Digital Contents: Digital Watermarking,” DESIDOC Journal of Library & Information Technology, Vol. 29, May 2009, pp. 29-35. [3] C.I. Podilchuk, E.J. Delp “Digital watermarking: algorithms and applications,” Signal Processing Magazine, Vol 18,pp. 33-46, IEEE, July 2001. [4] G. Doërr, J.L. Dugelay, “Security Pitfalls of Frame-by-Frame Approaches toVideo Watermarking,” Signal Processing, IEEE Transactions, vol. 52, pp. 2955 – 2964, 2004. [5] M. K. Thakur, V. Saxena, J. P.Gupta, “A Performance Analysis of Objective Video Quality Metrics for Digital Video Watermarking,” Computer Science and Information Technology (ICCSIT), 2010, 3rd IEEE International Conference ,Vol. 4, pp. 12- 17,2010. [6] S. Voloshynovskiy, S. Pereira, T. Pun, “Watermark attacks,” Erlangen Watermarking Workshop 99, October 1999. [7] G. Langelaar, I. Setyawan, and R. Lagendijk, "Watermarking Digital Image and Video Data: A State of - Art Overview," IEEE Signal Processing Magazine, vol. , pp. 20-46, Sep. 2000. [8] F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Processing, 1998,vol. 66, no. 3,pp. 283-301. [9] T. Khatib, A. Haj, L. Rajab, H. Mohammed, “ A Robust Video Watermarking Algorithm”, Journal of Computer Science, vol. 4, pp. 910-915, 2008. [10] T. Tokar, T. Kanocz, D. Levicky, “Digital watermarking of uncompressed video in spatial domain,” 9th International Conference on Radioelectronica, IEEE, pp. 319-322, 2009. Issn 2250-3005(online) September| 2012 Page 1328