To see the other types of publications on this topic, follow the link: Video Watermarking.

Journal articles on the topic 'Video Watermarking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Video Watermarking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yu, Xiaoyan, Chengyou Wang, and Xiao Zhou. "A Survey on Robust Video Watermarking Algorithms for Copyright Protection." Applied Sciences 8, no. 10 (2018): 1891. http://dx.doi.org/10.3390/app8101891.

Full text
Abstract:
With the development and popularization of the Internet and the rise of various live broadcast platforms, digital videos have penetrated into all aspects of people’s life. At the same time, all kinds of pirated videos are also flooding the Internet, which seriously infringe the rights and interests of video copyright owners and hinder the healthy development of the video industry. Therefore, robust video watermarking algorithms for copyright protection have emerged as these times require. In this paper, we review robust video watermarking algorithms for copyright protection based on original videos and compressed videos. Basic models and properties of video watermarking algorithms are described, and the evaluation indexes corresponding to each property are also introduced. To help researchers understand various existing robust watermarking algorithms quickly, some basic information and the quantitative estimation of several performances are analyzed and compared. Finally, we discuss the challenges in the research of robust video watermarking algorithms, and give possible development directions for the future.
APA, Harvard, Vancouver, ISO, and other styles
2

Kulkarni, Nishad P., Aditya A. Patil, and Dr M. A. Gangarde. "Time-Domain Video Watermarking Algorithm for Data Security and Content Authentication." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 7485–95. http://dx.doi.org/10.22214/ijraset.2023.53489.

Full text
Abstract:
Abstract: Video watermarking is an essential method employed to invisibly and reliably incorporate information into digital videos. Its primary purposes include copyright protection, content authentication, and ownership verification. With the increasing prevalence of digital media and the ease of video sharing online, safeguarding intellectual property rights and ensuring video content integrity have become crucial. Video watermarking is an essential method employed to invisibly and reliably incorporate information into digital videos. Its primary purposes include copyright protection, content authentication, and ownership verification. With the increasing prevalence of digital media and the ease of video sharing online, safeguarding intellectual property rights and ensuring video content integrity have become crucial. Robustness is a crucial aspect of video watermarking, as watermarked videos may be subjected to various attacks or modifications. Robust video watermarking techniques employ error correction codes, spread spectrum modulation, or cryptographic algorithms to ensure the resilience of watermarks against attacks such as compression, filtering, and geometric transformations. Various aspects and performance characteristics must be taken into account while developing an algorithm. It is necessary to evaluate performance indicators like NCC, PSNR, BER, WER, SSIM, VIFP, VMAF, and many more.
APA, Harvard, Vancouver, ISO, and other styles
3

Takale, Swapnil, and Dr Altaaf Mulani. "Video Watermarking System." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 105–7. http://dx.doi.org/10.22214/ijraset.2022.40539.

Full text
Abstract:
Abstract: Advanced video watermarking may be a procedure for inserting extra information beside video flag. Inserted information is utilized for copyright proprietor recognizable proof. A number of video watermarking techniques are proposed. These methods misuse distinctive ways in arrange to implant a strong watermark and to preserve the first video flag constancy. In this paper, Computerized video watermarking strategies and assaults on watermarks are displayed.
APA, Harvard, Vancouver, ISO, and other styles
4

Hussein Tuama Hazim, Nawar Alseelawi, and Haider TH Salim ALRikabi. "A Novel Method of Invisible Video Watermarking Based on Index Mapping and Hybrid DWT-DCT." International Journal of Online and Biomedical Engineering (iJOE) 19, no. 04 (2023): 155–73. http://dx.doi.org/10.3991/ijoe.v19i04.37581.

Full text
Abstract:
Watermarking is widely used in multimedia preservation and communication, which comprises, and is therefore not limited to, data security and validation. Security, readability, imperceptibility, and resilience are some of the key advantages of this technology. However, there are still certain issues that need to be addressed, such as the ability to withstand a variety of assaults without substantially affecting the quality and value of embedded data. Based on its operational domain, the watermarking technology may be divided into two groups: spatial and frequency watermarking. An index mapping-based watermarking approach for copyright protection of multi-media color videos is presented in this paper. We offer a hybrid discrete wavelet transform and discrete cosine transform (DCT) watermarking algorithm for digital video watermarking of a color video watermark. Peak signal to noise ratio (PSNR), similarity structure index measure (SSIM), have been used to analyze the distortion produced by watermarking. It is suggested that the proposed video watermarking method provides greater imperceptibility in conjunction with each other with the human visual system and it offers higher robustness against different attacks.
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Cheng Zhong, and Xiao Shi Zheng. "A Video Characteristics Watermarking Algorithm Based on Bees Evolutional Computation." Applied Mechanics and Materials 571-572 (June 2014): 796–802. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.796.

Full text
Abstract:
Digital video watermarking is an efficient way of copyright protection. A robust watermarking was proposed that ccording to the video features using the evolutional method of video image classification processing, suitable for video performance and human visual characteristics of video watermarking, and put forward a kind of using Bees evolutional algorithm for video image classification processing of video watermarking algorithm. All the key frame numbers are converts to a binary matrix after data transformation. At last the binary image is produced. From this, the watermarking image reflects the video’s features, so it is effective to resist the watermark copy attack.
APA, Harvard, Vancouver, ISO, and other styles
6

Takale, Swapnil, and Dr Altaaf Mulani. "DWT-PCA based Video Watermarking." Journal of Electronics,Computer Networking and Applied Mathematics, no. 26 (November 17, 2022): 1–7. http://dx.doi.org/10.55529/jecnam.26.1.7.

Full text
Abstract:
Progressed watermarking video may be a methodology for embedding additional data another to video salute. Embedded data is utilized for proprietor copyright or recognizable affirmation. It added up to approach for watermarking is shown in this System, by utilizing Discrete Wavelet Alter (DWT) and Crucial Component Examination (PCA). There are a number of watermarking strategies like DCT, DWT, and DWT-SVD, but there's a downside inside the watermarking to stand up to attacks. In this way the cutting edge progressed picture watermarking calculation is proposed which provide solid watermarking with insignificant whole of bending in case of ambushes. DWT offers flexibility and PCA makes a distinction in diminishing relationship among the wavelet coefficients.
APA, Harvard, Vancouver, ISO, and other styles
7

Mr., K. Sai Krishna1 &. Mr. G. V. Vinod2. "PERFORMANCE EVALUATION OF VIDEO WATERMARKING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 4 (2018): 279–86. https://doi.org/10.5281/zenodo.1218551.

Full text
Abstract:
A digital watermark is added to a image/frame, is a more or less visible information in the form of a text, logo, audio etc. that has been added to the original image, audio or video. The added information can be more or less transparent to make it either easy or hard to recognize the watermark. Video watermarking is relatively an innovative tool that has been proposed to solve the problem of illegal manipulation and sharing of digital video. It is the process of embedding copyright information into video watermarking. In this paper, we use DWT (discrete wavelet transforms) and SVD (single vapour decomposition) for embedding video watermarking algorithm and then we use IDWT (inverse discrete wavelet transforms) for extracting the video watermarking. For this video embedded and extraction of watermarking process we include image watermarking to get easy video watermarking and better understanding. The performance of the proposed algorithm is analyzed by using MSE, PSNR by adding attacks.
APA, Harvard, Vancouver, ISO, and other styles
8

Lin, Guo Qian, Ning Li, and Li Ni Ma. "H.264-Based Video Watermarking Algorithm." Applied Mechanics and Materials 411-414 (September 2013): 954–59. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.954.

Full text
Abstract:
Based on the research of image watermarking embedding, we extend our research to deal with the video watermarking. The H.264 standard is used widely and the latest video coding standard at the present. Make good use of the advantages of H.264, such as high compression rate etc., we proposed a low complexity video watermarking algorithm based on H.264. In the proposed algorithm, to weaken the attack of noise, we deal the watermarking image with DWT. And then, we use the Arnold technology to improve the security of watermarking detection. Because of not any modification is done to the data stream of video, only for the division of macro block model, so the quality of video is without of any influence by the algorithm we proposed. By the use of the algorithm, which not only is beneficial to the realization in real time, but also improve the robustness of watermarking, we can easily extract the watermarking image. The experimental results show that the suggested image watermarking algorithm and video watermarking algorithm have good invisibility and strong robustness, and the certain reference value to the actual application.
APA, Harvard, Vancouver, ISO, and other styles
9

Prof. Rutika Patel. "A Compressed Domain Robust Video Watermarking Resists Geometric Attack." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 5 (2024): 712–20. http://dx.doi.org/10.32628/cseit241051060.

Full text
Abstract:
The widespread utilization of mobile devices and the proliferation of video content, facilitated by communication networks, has unfortunately led to issues such as data piracy, illegal usage, and unauthorized sharing. To address these challenges, digital watermarking emerges as a crucial tool, serving purposes such as authentication, maintaining integrity, and identifying rightful owners. In the realm of video watermarking, two primary categories exist: watermarking in the compressed domain and watermarking in the uncompressed domain. Compressed domain watermarking involves expedited data processing through partial video decoding, whereas uncompressed domain watermarking requires more time. This article proposes a novel video watermarking methodology designed specifically to withstand geometric attacks. The proposed method aims to dynamically embed watermarks within video content, thereby enhancing resilience against various geometric distortions. Geometric attacks, including scaling, rotation, cropping, and translation, pose significant challenges in digital watermarking and are thus a focal point of this research. The objective is to integrate this approach with complex video coding standards, leveraging compression domain techniques to fortify resistance against geometric attacks. Tests show that the suggested video watermarking system works well. Not only does it excel in safeguarding against geometric attacks, but it also mitigates perceptual quality degradation, thus ensuring a balance between robustness and visual fidelity. As the prevalence of video content continues to grow, robust watermarking techniques like the one presented here play a vital role in preserving intellectual property rights and ensuring the integrity of multimedia content in the digital age.
APA, Harvard, Vancouver, ISO, and other styles
10

Joseph, Irene, and Jyothi Mandala. "Comprehensive Review on Video Watermarking Security Threats, Challenges, and Its Applications." ECS Transactions 107, no. 1 (2022): 13833–38. http://dx.doi.org/10.1149/10701.13833ecst.

Full text
Abstract:
Data is a crucial resource for every business, and it must be protected both during storage and transmission. One efficient way of securing data and transferring it is through digital watermarking, where data is hidden inside a medium like text, audio, or video. Video watermarking is visible or invisible embedded data on a video in a logo, text, or video copyright disclaimer. In this proposed paper, the goal is to analyze the characteristics of video watermarking algorithms and the different metrics used for them. It deals with the extent to which the different requirements can be fulfilled, taking into consideration the conflicts between them and the practical challenges of video watermarking in terms of attacks like geometric attacks and non-geometric attacks. It also focuses on the process of watermarking a video. Recent advances in data security indicate that employing a video watermarking technology to transmit private data will be an effective method of transmitting sensitive data.
APA, Harvard, Vancouver, ISO, and other styles
11

Fan, Yisheng, Jiandong Li, and Limin Yan. "P‐5.5: An Optimized Robust Watermarking Algorithm for Video Based on Spatio‐temporal Feature Fusion." SID Symposium Digest of Technical Papers 55, S1 (2024): 908–13. http://dx.doi.org/10.1002/sdtp.17233.

Full text
Abstract:
In recent years, there has been an increase in video piracy. One potential solution that has been suggested is to add watermarks to videos as a means of encryption. The current robust watermarking algorithms for video based on deep learning have the problems of poor spatio‐temporal feature extraction ability as well as poor temporal consistency and imperceptibility. Thus, this paper proposes an optimized robust watermarking algorithm for video based on spatio‐temporal feature fusion. For the problem of poor spatio‐temporal feature extraction ability of traditional convolutional neural network for carrier video, we improve the 3D‐UNet framework by utilizing the ResNet residual connection and EAM, and design a codec with 3D Res‐EAM UNet structure, which enhances the network's ability of extracting spatio‐temporal features of video. For the problem of poor temporal consistency and imperceptibility of watermarked video, we propose an optimized robust watermarking optimization algorithm for video based on temporal and spatial feature fusion. For the problem of poor temporal consistency and imperceptibility of watermarked video, we propose a multi‐scale discriminator, which helps to extract complete watermark information from the video by generating antagonistic effects with the codec. The experiments prove that this algorithm works well and effectively improves the robustness of the video watermarking algorithm and the ability to resist time synchronization attacks.
APA, Harvard, Vancouver, ISO, and other styles
12

Al-Boeridi, Omar N., Hong Ren Wu, and Ron Van Schyndel. "Three-Dimensional Video Watermarking – A Review and Open Challenges." International Journal of Information, Communication Technology and Applications 2, no. 1 (2016): 47–65. http://dx.doi.org/10.17972/ijicta20162122.

Full text
Abstract:
Intellectual property (IP) protection of three-dimensional (3-D) media is an important issue for both academic and wider communities to combat the illegal distribution and pirating of this visual medium. Digital watermarking has been used to address various challenges in media IP protection. The challenge central to 3-D video as well as other audio-visual signal watermarking is that given a fixed level of perceptual transparency, a watermarking system cannot simultaneously achieve a high degree of robustness and a high watermark payload. The majority of published research reports in this field try to introduce new embedding methodologies to increase the watermark robustness with highest possible visual media quality. This paper reviews the current state-of-the-art in 3-D video watermarking and assesses various watermarking techniques in the field. Some of 3-D video watermarking techniques are directly inherited from video watermarking, stereo image watermarking or 3-D mesh watermarking, and therefore the relevant techniques in these fields are reviewed in this paper as well. Key performances of various embedding algorithms are examined and compared in this review to identify a benchmark for future development and performance evaluation of new 3-D video watermarking techniques.
APA, Harvard, Vancouver, ISO, and other styles
13

Hou, Jong-Uk. "MPEG and DA-AD Resilient DCT-Based Video Watermarking Using Adaptive Frame Selection." Electronics 10, no. 20 (2021): 2467. http://dx.doi.org/10.3390/electronics10202467.

Full text
Abstract:
We present a robust video watermarking scheme and report the detailed robustness of the video watermarking assessed based on standard criteria obtained from Information Hiding and its Criteria (IHC) Committee. Using discrete cosine transform domain spread-spectrum watermarking, our system achieves robustness under various non-hostile video processing techniques, including MPEG compression and digital/analog–analog/digital (DA-AD) conversion. The proposed system ensures that a 16-bit embedded sequence can be extracted through adaptive frame selection in any 15-s interval, even with a long video clip. To evaluate the performance of the proposed watermarking scheme, we conducted robustness tests under a DA-AD conversion environment, based on the MPEG-4 part 10 (H.264) codec. The experiment results obtained indicate that, in addition to being robust against non-hostile video processes, the proposed method achieves invisibility. The assessment of the developed watermarking scheme also satisfies the third edition of the IHC video watermarking evaluation criteria.
APA, Harvard, Vancouver, ISO, and other styles
14

THIRUSENTHIL KUMARAN, P., R. KIRUBA, N. KEERTHANA, and I. AGALYA. "VIDEO IMAGE WATERMARKING USING HYBRID WATERMARKING TECHNIQUES." i-manager’s Journal on Software Engineering 15, no. 4 (2021): 24. http://dx.doi.org/10.26634/jse.15.4.18232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Yang, Cheng Zhong, Xiao Shi Zheng, and Yuan Yu Ding. "Watermarking Algorithm Based on Video Features." Advanced Materials Research 532-533 (June 2012): 1805–9. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.1805.

Full text
Abstract:
A variety of video watermarking algorithm is not rare. But the connection of watermarking algorithm and video feature is a completely new field. This algorithm attempts to generate the watermarking image based the number of video’s key frames. All the key frame numbers are converts to a binary matrix after data transformation, at last the binary image is produced. According to those steps, the watermarking image reflects the video’s features, so it is easy to resist the watermark copy attack.
APA, Harvard, Vancouver, ISO, and other styles
16

Gao, Zhan Wei, Yong Mei Zhang, Cong Liu, Jie Geng, and De Kai Ba. "Dual Video Watermarking Scheme Based on Transform Domain." Applied Mechanics and Materials 155-156 (February 2012): 815–19. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.815.

Full text
Abstract:
The single watermark algorithms always merely have single function. In order to overcome the drawback, this paper proposed a dual video watermarking scheme based on transform domain. To implement the video copyright and integrality authentication, this paper embedded robust watermarking and fragile watermark. At the same time, this scheme made good use of the wavelet transform to embed the two different kinds of watermarking in the same video respectively. The fragile watermarking is to serve the robust watermarking. Experiments demonstrate this scheme can not only protect the copyright of the video effectively, but also protect against some attacks, such as shearing attack, JPEG lossy compression attack, noise attack etc. This scheme has better robustness and invisibility.
APA, Harvard, Vancouver, ISO, and other styles
17

Md., Anwar Hussain, and Bora Popi. "Integrated Partial Encryption and Watermarking Technique for Digital Video using Chaos and Support Images." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 264–373. https://doi.org/10.35940/ijeat.D6485.049420.

Full text
Abstract:
Encryption and Watermarking are image processing tools that are used mostly separately. Encrypting a document completely obscures it and watermarking is applied mostly for copy right protection. For entertainment type videos, partial encryption and watermarking may be integrated such that both objectives are attained. We report in this paper a novel combined partial encryption and watermarking algorithm for digital videos using chaotic system and support image. Watermarks are generated by using iris information of the authentic user or the authentic producer of the digital video. Watermarks of full size and half size are embedded in the luminance frame (s) of the video using simple LSB steganography. A sequence of color frames is watermarked in two phases, and partially encrypted in two layers, the watermarks considered are encrypted before embedding. The luminance frame (s) is (are) preprocessed before embedding with the watermarks to defy stega-analysis. Chaotic logistic map and a gray level support digital image is used for obtaining unique row/column sequences as well as for generating robust random binary sequences. A support color digital image is used in the first layer encryption of the digital video. Modified Rabinovich 4 dimensional hyper-chaotic system is used for second layer encryption. Encryption algorithm is applied in R, G, B frames separately. The technique may also be applied for integrated encryption and watermarking of digital images.
APA, Harvard, Vancouver, ISO, and other styles
18

Chhikara, Khushboo, and Prof Manoj Kumar. "EFFICIENT WATERMARK EMBEDDING IN VIDEO FILES USING KEY FRAME DETECTION AND ENCRYPTION." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 07 (2024): 1–3. http://dx.doi.org/10.55041/ijsrem36403.

Full text
Abstract:
Digital video and information authentication and IP protection need video watermarking. Due to video watermarking systems' efficiency and speed, real-time applications and large-scale video processing typically create significant challenges. This work improves video watermarking systems by dramatically reducing their operation time. This study focuses on improving current strategies to embed and remove watermarks faster without losing resilience or perceptual quality. The proposed technique simplifies watermarking utilizing new computational approaches and algorithmic improvements. It will be more feasible for real-time applications including secure content sharing, VOD, (Video on demand) and live streaming. Using efficient data structures, novel heuristics, and parallel processing architectures reduces computer overhead. The study also uses sophisticated signal processing and machine learning to make embedded watermarks more resistant to compression, noise addition, and geometric alterations. This ensures content authenticity in various operating settings. Experimental benchmark datasets and performance measurements including computational complexity, watermark imperceptibility, and embedding capacity will test the recommended enhancements. Results will demonstrate that better approaches reduce operation time while maintaining or improving perceptual quality and robustness. This work improves video watermarking technology by increasing its practical use in current digital media ecosystems and addressing performance restrictions. Secure multimedia information distribution and protection industries think the recommended ways will be widely used since they enhance efficiency without compromising security. Keywords: - Video watermarking, Deep learning, digital, Wavelet transform. VOD, (Video on demand), digital video
APA, Harvard, Vancouver, ISO, and other styles
19

Yang, Cheng Zhong, and Xiao Shi Zheng. "Based on Artificial Bee Colony Video Feature Classification of Video Watermarking Algorithm." Applied Mechanics and Materials 321-324 (June 2013): 1186–90. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.1186.

Full text
Abstract:
This paper according to the video features using the method of evolution of video image classification processing, suitable for video performance and human visual characteristics of video watermarking, and put forward a kind of using artificial swarm evolution algorithm for video image classification processing of video watermarking algorithm, improve the watermark performance.
APA, Harvard, Vancouver, ISO, and other styles
20

PRITAM, R. DURGULE, and D.G. CHOUGULE PROF. "VIDEO ENCODING WITH AUTHENTICATION USING MULTIWAVELET TRANSFORM." JournalNX - A Multidisciplinary Peer Reviewed Journal 2, no. 7 (2016): 1–5. https://doi.org/10.5281/zenodo.1469385.

Full text
Abstract:
 Video watermarking is the practice of inserting an encode information known as the watermark, into an original video in an imperceptible manner. The watermark encodes or represents information that can protect the watermarked video, typically identifying the owner (source) or the intended recipient (destination) of the video. The embedded watermark may be detected by using a watermark detector, which enables an application to react to the presence (or absence) of the watermark in a video. However, the watermarked video may be processed, or attacked, prior to watermark detection. Attacks may remove the embedded watermark or make the watermark more difficult to detect. Most watermark detectors will fail to detect the watermark embedded in the attacked video unless the position of the watermark can be identified. In order to overcome this limitation, a new multi-wavelet based video watermarking in tutorial videos has been proposed. Embedding and detection models are proposed that encompass the behaviour of many video watermarking techniques. The multi-wavelet transform uses two transformations such as Haar transform and Doubchies transform. The work is done with the help of designed user interface. This method extracts the secret message correctly and this provides better performance. https://journalnx.com/journal-article/20150090
APA, Harvard, Vancouver, ISO, and other styles
21

Saini, Anuradha, Sushil Bhardwaj, Rachit Garg, and Tarandeep Kaur. "Systematic comparison of digital video watermarking aspects with techniques and algorithm designing issue." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 3 (2024): 999–1010. http://dx.doi.org/10.47974/jdmsc-1646.

Full text
Abstract:
With the coming of innovation, verification and security have turned into the principle perspective during communication over the enormous distance. Unlawful dispersal of digital video is the principal peril to the entertainment world. With the advancement of web access, copied duplicates of digitized video might be essentially scattered to globalized watchers. A few applications of video watermarking in copyright insurance, security, fingerprinting, duplicate control, and comment are tremendously expanding. Consequently, a likely technique for confining such sort of digitalized theft is Digital Video Watermarking. At present, watermarking has arisen as a huge strategy to recognize the legitimacy and validation of the proprietor and to ensure the copyrights. The watermarking approach is used by the analysts to hide the secret data that might be apparent or dark according to the client’s need. This paper will outfit the disparate tendencies continued in the space of digital watermarking. Also, a point by point outline of digital video watermarking and writing review is talked about in an even arrangement which can give the bearings to forthcoming scientists to seek after their research in this field.
APA, Harvard, Vancouver, ISO, and other styles
22

Che, Sheng Bing, Jin Kai Luo, and Bin Ma. "Quasi-Blind Adaptive Video Watermarking Algorithm Based on Human Visual System." Advanced Materials Research 179-180 (January 2011): 103–8. http://dx.doi.org/10.4028/www.scientific.net/amr.179-180.103.

Full text
Abstract:
A quasi-blind adaptive video watermarking algorithm in uncompressed video wavelet domain based on human visual system is proposed in this paper. This algorithm established a visual model according to the human visual masking and the characteristics of wavelet coefficients. It did not require the scene segmentation of the video, choosing the video frames which used for embedding watermarking by the key, and embedding different watermarking which processed by Arnold scrambling into different frame, so it is robust to statistical analysis, frame crop and so on. To ensure the spatial synchrony when extracting the watermark information, zero-watermarking method and chaotic system are used to generate the synchronization information. The quantized central limit theorem is applied to adjust the low frequency coefficients, it makes the extracted watermark information keeps invariant when its element value changed in robust region. A new correlation detection method of watermarking information was put forward. Watermark detection does not require original video. It realized the quasi-blind watermark detection.
APA, Harvard, Vancouver, ISO, and other styles
23

Tumula, Sridevi. "A Novel Video Watermarking Algorithm using DTCWT." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 1629–34. http://dx.doi.org/10.22214/ijraset.2021.35324.

Full text
Abstract:
In this paper a new novel color video watermarking algorithm has been proposed using Dual Tree Complex Wavelet Transform (DTCWT). Digital watermarking is an emerging technology for copyright protection for digital multimedia data. Now-a-days a lot of digital data are exchanged in the internet, so to protect the digital multimedia data, digital watermarking is used, the data may be an image or video or an audio data. The main objective of this paper is to maintain perceptivity of digital video and design a robust watermarking algorithm and maintaining the tradeoff between robustness and perceptivity.
APA, Harvard, Vancouver, ISO, and other styles
24

Tran, Thu Ha *. Tran Quang Duc and Tran Minh Son. "A NEW SYSTEM FOR INSERTING A MARK PATTERN INTO H264 VIDEO." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 8 (2016): 715–20. https://doi.org/10.5281/zenodo.60121.

Full text
Abstract:
Watermarking seems to be an exclusive method to discourage the illegal content sharing. This Watermarking officially selected as a requirement to be able to redistribute Hollywood movies [8], research on an efficient Watermarking technique remains a challenge to experts on the domain. The current work proposes a new technique to insert a visible watermarking into the video encoded with the latest video compression standard H264 /H265. The mark insertion is performed in the compressed domain with simply superposing the unique visible pattern onto the compressed syntax elements. The technique proves to be a light complexity but ensuring high security integration in video distributing chain.
APA, Harvard, Vancouver, ISO, and other styles
25

Fan, Di, Xiao Zhang, Wenshuo Kang, Huiyuan Zhao, and Yingjun Lv. "Video Watermarking Algorithm Based on NSCT, Pseudo 3D-DCT and NMF." Sensors 22, no. 13 (2022): 4752. http://dx.doi.org/10.3390/s22134752.

Full text
Abstract:
Video watermarking is an important means of video and multimedia copyright protection, but the current watermarking algorithm is difficult to ensure high robustness under various attacks. In this paper, a video watermarking algorithm based on NSCT, pseudo 3D-DCT and NMF has been proposed. Combined with NSCT, 3D-DCT and NMF, the algorithm embeds the encrypted QR code copyright watermark into the NMF base matrix to improve the anti-attack ability of the watermark under the condition of invisibility. The experimental results show that the algorithm ensures the invisibility of the watermark with a high signal-to-noise ratio of the video, and meanwhile has high ability and robustness against common single and combined attacks, such as filtering, noise, compression, shear, rotation and so on. The issue that the video watermarking algorithm has poor resistance to various attacks, especially the shearing attack, has been solved in this paper; thus, it can be used for digital multimedia video copyright protection.
APA, Harvard, Vancouver, ISO, and other styles
26

Hummad, Taiser N., and Nidaa F. Hassan. "Survey of Recent Video Watermarking Techniques." Engineering and Technology Journal 39, no. 1B (2021): 165–74. http://dx.doi.org/10.30684/etj.v39i1b.1950.

Full text
Abstract:
With the development of the Internet coupled with expanding the accessibility of multimedia, various copyright issues have resulted. Several researchers have been working on watermarks to provide the security, durability, and a perception of multimedia. This paper a review of some recent works is presented related to video watermarking techniques, this study focuses on the pros and cons of recent video watermarking, areas of application, and the different types and attacks that are standing against these watermarking techniques. The results obtained from this study showed that watermark techniques based on the transfer domain, are more popular than those of the spatial domain.
APA, Harvard, Vancouver, ISO, and other styles
27

Pratama Yusuf, Ajif Yunizar, and Rakhmat Purnomo. "Metode DCT-Transformasi dalam Watermarking Video dengan Konsep 3-Dimensi." PROSIDING 3 (July 15, 2023): 35–40. http://dx.doi.org/10.59134/prosidng.v3i.292.

Full text
Abstract:
Watermarking adalah suatu metode yang digunakan dalam pengamanan hak otentikasi suatu gambar atau video. Oleh karena semakin meningkatnya jumlah pengiriman atau penggandaan suatu karya gambar atau video melalui internet, menyebabkan timbulnya permasalahan baru yaitu bagaimana membuktikan hak kepemilikan dari suatu citra digital (gambar atau video). Pada penelitian ini diterapkan suatu metode yang aman dalam menerapkan watermarking pada video dengan menggunakan Discrete Cosine Transform (DCT) pada domain frekuensi. Video merupakan susunan dari sejumlah frame, dimana setiap frame dianggap sebagai suatu citra tak bergerak (gambar). Penanaman watermark pada video memiliki tantangan tersendiri, dimana watermark di tanamkan ke beberapa atau semua frame yang ada pada video. Adapun konsep 3-Dimensi yang diterapkan memberikan efisiensi dalam menanamkan watermark pada seluruh frame dari suatu video bahkan dengan durasi yang sangat panjang sekalipun. Hasil penelitian ini menunjukkan bahwa metode watermarking video dengan konsep 3-dimensi dapat menjadi salah satu opsi untuk mengamankan hak otentikasi dari suatu video.
APA, Harvard, Vancouver, ISO, and other styles
28

Aditya, B. P., U. G. K. Avaneesh, K. Adithya, Akshay Murthy, R. Sandeep, and B. Kavyashree. "Invisible Semi-Fragile Watermarking and Steganography of Digital Videos for Content Authentication and Data Hiding." International Journal of Image and Graphics 19, no. 03 (2019): 1950015. http://dx.doi.org/10.1142/s0219467819500153.

Full text
Abstract:
In the current digital age, the piracy of digital media content has become rampant. Illegal distribution of movies and video clips on a global scale causes a significant loss to the media industry. To prevent such theft and distribution of content, we use a watermarking technique for videos where copyright information is hidden inside the original video in the form of a watermark video. Using a video as the watermark facilitates the user in hiding a large amount of information. The watermarking scheme used in this paper is semi-fragile, such that tampering of videos can be detected with relative ease. To improve the robustness of the watermark, we embed the watermark in frequency domain, where we use DWT+DCT+SVD to embed the watermark. The original video and watermark video are transformed by using the DWT and DCT sequentially, then the singular values of the watermark with some embedding strength are added to the singular values of the original video thus obtaining a watermarked video. Some detection tools which are available today cannot detect the watermark video inside the original video. This method equalizes the frames of the watermark and original video to reduce time consumed as well as complexity. The effects of various attacks on the watermarked video have been analyzed using the calculated PSNR values.
APA, Harvard, Vancouver, ISO, and other styles
29

Bhowmik, Deepayan, and Charith Abhayaratne. "2D+t Wavelet Domain Video Watermarking." Advances in Multimedia 2012 (2012): 1–19. http://dx.doi.org/10.1155/2012/973418.

Full text
Abstract:
A novel watermarking framework for scalable coded video that improves the robustness against quality scalable compression is presented in this paper. Unlike the conventional spatial-domain (t + 2D) water-marking scheme where the motion compensated temporal filtering (MCTF) is performed on the spatial frame-wise video data to decompose the video, the proposed framework applies the MCTF in the wavelet domain (2D + t) to generate the coefficients to embed the watermark. Robustness performances against scalable content adaptation, such as Motion JPEG 2000, MC-EZBC, or H.264-SVC, are reviewed for various combinations of motion compensated 2D + t + 2D using the proposed framework. The MCTF is improved by modifying the update step to follow the motion trajectory in the hierarchical temporal decomposition by using direct motion vector fields in the update step and implied motion vectors in the prediction step. The results show smaller embedding distortion in terms of both peak signal to noise ratio and flickering metrics compared to frame-by-frame video watermarking while the robustness against scalable compression is improved by using 2D + t over the conventional t + 2D domain video watermarking, particularly for blind watermarking schemes where the motion is estimated from the watermarked video.
APA, Harvard, Vancouver, ISO, and other styles
30

Hassan, Nidaa Flaih, Akbas Ezaldeen Ali, Teaba Wala Aldeen, and Ayad Al-Adhami. "Video mosaic watermarking using plasma key." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 619–28. https://doi.org/10.11591/ijeecs.v22.i2.pp619-628.

Full text
Abstract:
Video watermarking is one of the most widespread techniques amongst the many watermarking techniques presently are used; this is because the extreme existences of copyright abuse and misappropriation occur for video content. In this paper, a new watermarking algorithm is proposed to embed logo in digital video for copyright protection. To make the watermarks more robust to attack, host frame and host embedding indices must be changeable. A new algorithm is proposed to determined host frames by plasma function, Host location indices in frames are also determined by another plasma function. Logo is divided using the mosaic principle, the size of mosaic blocks is determined initially according to the degree of protection, whenever the size of mosaic blocks is small, it leads to safe embedding, and vice versa. Digital watermarks are embedded easily without any degradation for video quality, In the other side, the watermarked is retrieved by applying the reverse of proposed embedding algorithm and extracted watermark is still recognizable. The experimental results confirm that watermark is robust against three types of attacks which are addition of gaussian noise, JPEG compression, and rotation process.
APA, Harvard, Vancouver, ISO, and other styles
31

Meng, Yifei, Ke Niu, Yingnan Zhang, Yucheng Liang, and Fangmeng Hu. "Robust Reversible Watermarking Scheme in Video Compression Domain Based on Multi-Layer Embedding." Electronics 13, no. 18 (2024): 3734. http://dx.doi.org/10.3390/electronics13183734.

Full text
Abstract:
Most of the existing research on video watermarking schemes focus on improving the robustness of watermarking. However, in application scenarios such as judicial forensics and telemedicine, the distortion caused by watermark embedding on the original video is unacceptable. To solve this problem, this paper proposes a robust reversible watermarking (RRW)scheme based on multi-layer embedding in the video compression domain. Firstly, the watermarking data are divided into several sub-secrets by using Shamir’s (t, n)-threshold secret sharing. After that, the chroma sub-block with more complex texture information is filtered out in the I-frame of each group of pictures (GOP), and the sub-secret is embedded in that frame by modifying the discrete cosine transform (DCT) coefficients within the sub-block. Finally, the auxiliary information required to recover the coefficients is embedded into the motion vector of the P-frame of each GOP by a reversible steganography algorithm. In the absence of an attack, the receiver can recover the DCT coefficients by extracting the auxiliary information in the vectors, ultimately recovering the video correctly. The watermarking scheme demonstrates strong robustness even when it suffers from malicious attacks such as recompression attacks and requantization attacks. The experimental results demonstrate that the watermarking scheme proposed in this paper exhibits reversibility and high visual quality. Moreover, the scheme surpasses other comparable methods in the robustness test session.
APA, Harvard, Vancouver, ISO, and other styles
32

Jaleel, Hanan Qassim, and Jane Jaleel Stephan. "Video Watermarking Using Wavelet Transform." International Journal of Current Research and Academic Review 5, no. 3 (2016): 1–15. http://dx.doi.org/10.20546/ijcrar.2016.403.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Shelke, Poonam Uttam. "Survey on Digital Video Watermarking." International Journal for Research in Applied Science and Engineering Technology 6, no. 5 (2018): 369–76. http://dx.doi.org/10.22214/ijraset.2018.5061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Leelavathy, N., E. V Prasad, and S. Srinivas Kumar. "Video Watermarking Techniques: A Review." International Journal of Computer Applications 104, no. 7 (2014): 24–30. http://dx.doi.org/10.5120/18215-9199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Al-Khatib, Tahani, Ali Al-Haj, Lama Rajab, and Hiba Mohammed. "A Robust Video Watermarking Algorithm." Journal of Computer Science 4, no. 11 (2008): 910–15. http://dx.doi.org/10.3844/jcssp.2008.910.915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Farnaz Arab, Salwani Mohd Daud, Siti Zaiton Mohd Hashim, Azizah Abdul Manaf, and Suwaibah Shubli. "Evaluation of Video Watermarking Techniques." International Journal of Digital Content Technology and its Applications 7, no. 5 (2013): 484–91. http://dx.doi.org/10.4156/jdcta.vol7.issue5.58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Chiou-Ting Hsu and Ja-Ling Wu. "DCT-based watermarking for video." IEEE Transactions on Consumer Electronics 44, no. 1 (1998): 206–16. http://dx.doi.org/10.1109/30.663749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Reddy, D. Venkata, A. Damodaram, and S. Bhargavi Latha. "Video watermarking using neural networks." International Journal of Information and Computer Security 14, no. 1 (2021): 40. http://dx.doi.org/10.1504/ijics.2021.10034316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Latha, S. Bhargavi, D. Venkata Reddy, and A. Damodaram. "Video watermarking using neural networks." International Journal of Information and Computer Security 14, no. 1 (2021): 40. http://dx.doi.org/10.1504/ijics.2021.112207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Lin, E. T., and E. J. Delp. "Temporal Synchronization in Video Watermarking." IEEE Transactions on Signal Processing 52, no. 10 (2004): 3007–22. http://dx.doi.org/10.1109/tsp.2004.833866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Deljavan Amiri, Mehran, Ali Amiri, and Majid Meghdadi. "HVS-based scalable video watermarking." Multimedia Systems 25, no. 4 (2019): 273–91. http://dx.doi.org/10.1007/s00530-019-00604-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Koz, Alper, Cevahir Cigla, and A. Aydin Alatan. "Watermarking of Free-view Video." IEEE Transactions on Image Processing 19, no. 7 (2010): 1785–97. http://dx.doi.org/10.1109/tip.2010.2045024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Sarma, Angshumi, and Amrita Ganguly. "Entropy based Video Watermarking Scheme." International Journal of Computer Applications 50, no. 7 (2012): 32–37. http://dx.doi.org/10.5120/7785-0882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Hasnaoui, Marwen, and Mihai Mitrea. "Multi-symbol QIM video watermarking." Signal Processing: Image Communication 29, no. 1 (2014): 107–27. http://dx.doi.org/10.1016/j.image.2013.07.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Liu, Yanwei, Jinxia Liu, Antonios Argyriou, Siwei Ma, Liming Wang, and Zhen Xu. "360-Degree VR Video Watermarking Based on Spherical Wavelet Transform." ACM Transactions on Multimedia Computing, Communications, and Applications 17, no. 1 (2021): 1–23. http://dx.doi.org/10.1145/3425605.

Full text
Abstract:
Similar to conventional video, the increasingly popular 360 virtual reality (VR) video requires copyright protection mechanisms. The classic approach for copyright protection is the introduction of a digital watermark into the video sequence. Due to the nature of spherical panorama, traditional watermarking schemes that are dedicated to planar media cannot work efficiently for 360 VR video. In this article, we propose a spherical wavelet watermarking scheme to accommodate 360 VR video. With our scheme, the watermark is first embedded into the spherical wavelet transform domain of the 360 VR video. The spherical geometry of the 360 VR video is used as the host space for the watermark so that the proposed watermarking scheme is compatible with the multiple projection formats of 360 VR video. Second, the just noticeable difference model, suitable for head-mounted displays (HMDs), is used to control the imperceptibility of the watermark on the viewport. Third, besides detecting the watermark from the spherical projection, the proposed watermarking scheme also supports detecting watermarks robustly from the viewport projection. The watermark in the spherical domain can protect not only the 360 VR video but also its corresponding viewports. The experimental results show that the embedded watermarks are reliably extracted both from the spherical and the viewport projections of the 360 VR video, and the robustness of the proposed scheme to various copyright attacks is significantly better than that of the competing planar-domain approaches when detecting the watermark from viewport projection.
APA, Harvard, Vancouver, ISO, and other styles
46

WANG, CHIA-JEN, SHWU-HUEY YEN, and PATRICK S. WANG. "A MULTIMEDIA WATERMARKING TECHNIQUE BASED ON SVMs." International Journal of Pattern Recognition and Artificial Intelligence 22, no. 08 (2008): 1487–511. http://dx.doi.org/10.1142/s0218001408006934.

Full text
Abstract:
In this paper we present an improved support vector machines (SVMs) watermarking system for still images and video sequences. By a thorough study on feature selection for training SVM, the proposed system shows significant improvements on computation efficiency and robustness to various attacks. The improved algorithm is extended to be a scene-based video watermarking technique. In a given scene, the algorithm uses the first h' frames to train an embedding SVM, and uses the trained SVM to watermark the rest of the frames. In the extracting phrase, the detector uses only the center h frames of the first h' frames to train an extracting SVM. The final extracted watermark in a given scene is the average of watermarks extracted from the remaining frames. Watermarks are embedded in l longest scenes of a video such that it is computationally efficient and capable to resist possible frames swapping/deleting/duplicating attacks. Two collusion attacks, namely temporal frame averaging and watermark estimation remodulation, on video watermarking are discussed and examined. The proposed video watermarking algorithm is shown to be robust to compression and collusion attacks, and it is novel and practical for SVM-applications.
APA, Harvard, Vancouver, ISO, and other styles
47

Niu, Yaqing, Sridhar Krishnan, and Qin Zhang. "Spatio-Temporal Just Noticeable Distortion Model Guided Video Watermarking." International Journal of Digital Crime and Forensics 2, no. 4 (2010): 16–36. http://dx.doi.org/10.4018/jdcf.2010100102.

Full text
Abstract:
Perceptual Watermarking should take full advantage of the results from human visual system (HVS) studies. Just noticeable distortion (JND), which refers to the maximum distortion that the HVS does not perceive, gives a way to model the HVS accurately. An effective Spatio-Temporal JND model guided video watermarking scheme in DCT domain is proposed in this paper. The watermarking scheme is based on the design of an additional accurate JND visual model which incorporates spatial Contrast Sensitivity Function (CSF), temporal modulation factor, retinal velocity, luminance adaptation and contrast masking. The proposed watermarking scheme, where the JND model is fully used to determine scene-adaptive upper bounds on watermark insertion, allows providing the maximum strength transparent watermark. Experimental results confirm the improved performance of the Spatio-Temporal JND model. The authors’ Spatio-Temporal JND model is capable of yielding higher injected-watermark energy without introducing noticeable distortion to the original video sequences and outperforms the relevant existing visual models. Simulation results show that the proposed Spatio-Temporal JND model guided video watermarking scheme is more robust than other algorithms based on the relevant existing perceptual models while retaining the watermark transparency.
APA, Harvard, Vancouver, ISO, and other styles
48

Darwish, Saad Mohamed, Mona Mahamod Abu-Deif, and Saleh Mesbah Elkaffas. "Blockchain for video watermarking: An enhanced copyright protection approach for video forensics based on perceptual hash function." PLOS ONE 19, no. 10 (2024): e0308451. http://dx.doi.org/10.1371/journal.pone.0308451.

Full text
Abstract:
As a direct result of advancements in digital technology and the Internet, the copyright protection and information integrity of multimedia that are being published across the Internet have emerged as a major and urgent issue that needs to be addressed. The technique of digital watermarking may be used to protect intellectual property. In terms of authentication, resilience, storage, and capacity of digital watermarking information, there is still room for development. Blockchain’s potential in video copyright protection and management applications has motivated researchers. Copyright owners and consumers may now communicate directly via copyright protection apps built on the blockchain, eliminating the need for distributers and the associated fees. Nonetheless, the current blockchain–based video watermarking solutions require storing a significant number of coordinates depending on the watermark size and are susceptible to video frame attacks on the video frame texture region. This study proposes an enhanced video copyright management approach that incorporates digital watermarking, the blockchain, and a perceptual hash function. Watermark information is stored on a blockchain structure, which also acts as a timestamp for verification purposes. To verify watermark data without the source video, a perceptual hash function is employed to compute a hash value based on the structural information of video frames. The contribution is in learning how to extract a hash function from a small number of video frames that still adequately represent a large amount of video content while also reducing the number of unnecessary video frames and the amount of computation required to summarize and index that content in a blockchain. This expedites the dissemination of copyrighted works and increases their security and readability, hence facilitating their circulation on the Internet. Our experimental results demonstrate that this approach is memory efficient, as it only needs to store one key for each key frame, regardless of the size of the watermark. Additionally, the overall robustness is greatly improved by using the blockchain’s random hash function. Therefore, new and important advancements in video watermarking have been realized because of this effort.
APA, Harvard, Vancouver, ISO, and other styles
49

Wu, Ge, Chun Hui Du, and Shuang Zhang. "An Robust Video Watermarking against Collusion Attacks." Advanced Materials Research 915-916 (April 2014): 1315–19. http://dx.doi.org/10.4028/www.scientific.net/amr.915-916.1315.

Full text
Abstract:
An Video Watermarking is proposed to improve the robustness against collusion attacks. The Using this new algorithm, all video frames are first divided into several sets so that frames of each set carry the same watermarks. Then in each group of frames, watermark is estimated. it has been shown that the watermarking maker can use this algorithm to build sets of frames carrying the same watermark for avoiding collusion attacks.
APA, Harvard, Vancouver, ISO, and other styles
50

Hassan, Nidaa Flaih, Akbas Ezaldeen Ali, Teaba Wala Aldeen, and Ayad Al-Adhami. "Video mosaic watermarking using plasma key." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 619. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp619-628.

Full text
Abstract:
Video watermarking is one of the most widespread techniques amongst the many watermarking techniques presently are used; this is because the extreme existences of copyright abuse and misappropriation occur for video content. In this paper, a new watermarking algorithm is proposed to embed logo in digital video for copyright protection. To make the watermarks more robust to attack, host frame and host embedding indices must be changeable. A new algorithm is proposed to determined host frames by plasma function, Host location indices in frames are also determined by another plasma function. Logo is divided using the mosaic principle, the size of mosaic blocks is determined initially according to the degree of protection, whenever the size of mosaic blocks is small, it leads to safe embedding, and vice versa. Digital watermarks are embedded easily without any degradation for video quality, In the other side, the watermarked is retrieved by applying the reverse of proposed embedding algorithm and extracted watermark is still recognizable. The experimental results confirm that watermark is robust against three types of attacks which are addition of Gaussian noise, JPEG compression, and rotation process.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography