Professional Documents
Culture Documents
discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/284367928
CITATIONS READS
0 75
3 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Leelavathy Narkedamilly on 24 November 2015.
Cryptography [1] is an art or science of developing various At the detection or extraction of watermarking stage, the
algorithms and techniques that are used to convert plain text presence of previously known watermark or the watermark
to cipher text which is not readable to unauthorised users. itself is retrieved.
24
International Journal of Computer Applications (0975 8887)
Volume 104 No.7, October 2014
25
International Journal of Computer Applications (0975 8887)
Volume 104 No.7, October 2014
26
International Journal of Computer Applications (0975 8887)
Volume 104 No.7, October 2014
27
International Journal of Computer Applications (0975 8887)
Volume 104 No.7, October 2014
The video watermarking algorithms which use DCT are very invisibility. Nevertheless applying different
prominent in literature. Many digital video watermarking watermarks in each frame also presents a invisibility
algorithms embed the watermark into DCT domain as most of problem where there is little or no motion area in the
the video compression standards are based on DCT transforms video. These regions can be statistically compared and
and these algorithms show good sustainability against averaged to remove the watermark [44].
compression. DCT was considered in many watermarking
algorithms [29, 30] where some added the DCT coefficients iii. There are more possible attacks than compared to still
of watermark to the DCT coefficients of host video and / or images like both hostile and non-hostile processing
some algorithms modified video DCT coefficients according where frame averaging, frame dropping, frame
to watermark or features of the HVS can be integrated into the swapping, transcoding, frame rate changes, lossy
embedding process. compression, re-sampling, video editing, etc. have to
be considered [45].
Present research is concentrated in DWT domain. A multi
resolution approximation can be obtained with perfect iv. As the cover video has lot of embedding capacity
more information can be embedded without
reconstruction using DWT. Most of the algorithms [31-33]
divide the video into time frames and perform discrete compromising on its quality.
wavelet transform on those frames. The proposed methods Hence, a scene analysis is done to choose motion objects or
utilized various features like texture, edges, motion, etc. for scenes where the HVS is less sensitive to achieve perceptual
finding the embedding strength and a spread spectrum or invisibility. The other way, the common compression
quantization techniques are incorporating for embedding the algorithms remove the motionless area of the video to achieve
watermark into the feature or non-feature blocks. higher compression rates, therefore, the embedding of the
A very few papers have reported the use of multiwavelet watermark is done in the motion area to resist various attacks.
The various schemes proposed in the literature are [44, 46-
transform for video watermarking. The multiwavelet
transform proposed by Vasily Strela in [34] shows that 52].
construction of a multiwavelet is a nontrivial design
problem. It is a natural generalization of scalar wavelets with
5. CONCLUSION AND FUTURE
additional characteristics like orthogonality, short support, DIRECTIONS
vanishing moments, and symmetry simultaneous. These In the present scenario, a very wide range of watermarking
characteristics are properly utilized to design robust algorithms has been proposed. The research on current robust
watermarking algorithms [35-39]. watermarking techniques concludes that the choice of location
either in spatial domain or frequency domain where the
4.2.3 Hybrid domain watermarking watermark is embedded is a primary requirement. Further, it
Hybrid domain video watermarking can be differentiated from must use the human visual system to optimise the location and
hybrid domain image watermarking algorithms. The strength of embedding. The signal embedding techniques
combination of audio and video can be considered to develop employed are either adaptive or non-adaptive and moreover,
a hybrid domain video watermarking algorithm for better redundancy must be involved. Inclusions of error detection
performance and robustness [40-43]. In [40], Chan et al. have and correction methods are also expected. The watermark
proposed an audio-video watermarking algorithm where error detection or extraction methods in blind retrieval are more
correction code is developed from the watermark and is challenging.
embedded into the audio channel of the video. This provides
error detection and correction capability. These hybrid 6. REFERENCES
techniques also provide video synchronization which [1] Rivest, Ronald L. "Cryptology". In J. Van Leeuwen.
enhances the security against cropping and rotation attacks. In Handbook of Theoretical Computer Science: Algorithms
[43], Qiu et al. have proposed using a combination of DCT and complexity, (1990) Volume 1.
transform and motion vectors to provide copyright protection
[2] Bender, Walter, Daniel Gruhl, Norishige Morimoto, and
in addition to authentication. However, the complexity of the
Anthony Lu. "Techniques for data hiding." IBM systems
hybrid domain techniques is increased to achieve better
journal 35, no. 3.4 (1996): 313-336.
performance.
[3] Yeung, Minerva M., and Fred Mintzer. "An invisible
4.3 Classification of video watermarking watermarking technique for image verification."
algorithms based on motion sensitivity In Image Processing, 1997. Proceedings., International
Many factors have to be considered to differentiate video Conference on, vol. 2, pp. 680-683. IEEE, (1997).
from an image. There are several peculiarities that contribute
[4] Joo, Sanghyun, Youngho Suh, Jaeho Shin, and Hisakazu
in the design of an video watermarking algorithm. Early Kikuchi. "A new robust watermark embedding into
algorithms were just an extension of image watermarking wavelet DC components." ETRI journal 24, no. 5 (2002):
which used frame by frame analysis to embed the watermark 401-404.
robustly. But due to following reasons, video watermarking
algorithms have shifted towards Group Of Pictures (GOP) and [5] El-Taweel, G. S., H. M. Onsi, M. Samy, and M. G.
scene based algorithms. Some aspects are- Darwish. "Secure and non-blind watermarking scheme
for color images based on DWT." GVIP Journal 5, no. 4
i. The content viewed in the video is dynamic. The
(2005): 1-5.
human attention cannot be focused on each and every
area of the video played simultaneously. Generally, [6] Lin, Wei-Hung, Yuh-Rau Wang, Shi-Jinn Horng, Tzong-
the foreground object attracts and more focus is on Wann Kao, and Yi Pan. "A blind watermarking method
foreground than background. using maximum wavelet coefficient quantization."Expert
Systems with Applications 36, no. 9 (2009): 11509-
ii. The same watermark placed in each frame may lead 11516.
to difficulty of maintaining statistical and perceptual
28
International Journal of Computer Applications (0975 8887)
Volume 104 No.7, October 2014
[7] Eggers, Joachim J., and Bernd Girod. "Blind [20] Ling, Hefei, Liyun Wang, Fuhao Zou, Zhengding Lu,
watermarking applied to image authentication." and Ping Li. "Robust video watermarking based on affine
In Acoustics, Speech, and Signal Processing, 2001. invariant regions in the compressed domain."Signal
Proceedings.(ICASSP'01). 2001 IEEE International Processing 91, no. 8 (2011): 1863-1875.
Conference on, vol. 3, pp. 1977-1980. IEEE, 2001.
[21] Liu, Zina, Huaqing Liang, Xinxin Niu, and Yixian Yang.
[8] Cox, Ingemar J., and Matt L. Miller. "Electronic "A robust video watermarking in motion vectors."
watermarking: the first 50 years." In Multimedia Signal In Signal Processing, 2004. Proceedings. ICSP'04. 2004
Processing, 2001 IEEE Fourth Workshop on, pp. 225- 7th International Conference on, vol. 3, pp. 2358-2361.
230. IEEE, 2001. IEEE, 2004.
[9] Wang, Zhou, Alan C. Bovik, Hamid R. Sheikh, and Eero [22] Noorkami, Maneli, and Russell M. Mersereau.
P. Simoncelli. "Image quality assessment: from error "Improving Perceptual Quality in Video watermarking
visibility to structural similarity." Image Processing, using motion estimation." In Image Processing, 2006
IEEE Transactions on 13, no. 4 (2004): 600-612. IEEE International Conference on, pp. 1389-1392. IEEE,
2006.
[10] Schimmel, Steven. "Motion Sensitive Video
Watermarking." Notlab, Philips, Tech. Rep (2001). [23] Wu, Da-Chun, and Wen-Hsiang Tsai. "A steganographic
method for images by pixel-value differencing." Pattern
[11] Wolfgang, Raymond B., Christine I. Podilchuk, and Recognition Letters 24, no. 9 (2003): 1613-1626
Edward J. Delp. "Perceptual watermarks for digital
images and video." Proceedings of the IEEE 87, no. 7 [24] Preda, Radu Ovidiu, Cristina Oprea, Ionu Pirnog, and
(1999): 1108-1126. Lucian Andrei Perioar. "Robust Digital Video
Watermarking in the Spatial and Wavelet Domain."
[12] Jung, Han-Seung, Young-Yoon Lee, and Sang Uk Lee. InICDT 2012, The Seventh International Conference on
"RST-resilient video watermarking using scene-based
Digital Telecommunications, pp. 78-83. 2012.
feature extraction." EURASIP Journal on Advances in
Signal Processing 2004, no. 14 (1900): 2113-2131. [25] Hartung, Frank, and Bernd Girod. "Watermarking of
uncompressed and compressed video." Signal
[13] Goel, Bhavna, and Charu Agarwal. "A Novel Un- processing 66, no. 3 (1998): 283-301.
compressed Video Watermarking in Wavelet Domain
Using Fuzzy Inference System." In Advanced [26] Kalker, Ton, Geert Depovere, Jaap Haitsma, and
Computing, Networking and Informatics-Volume 2, pp. Maurice J. Maes. "Video watermarking system for
295-305. Springer International Publishing, 2014. broadcast monitoring." In Electronic Imaging'99, pp.
103-112. International Society for Optics and Photonics,
[14] Cedillo-Hernandez, Antonio, Manuel Cedillo-Hernandez,
1999.
Mireya Garcia-Vazquez, Mariko Nakano-Miyatake,
Hector Perez-Meana, and Alejandro Ramirez-Acosta. [27] Cappellini, V., A. de Rosa, A. Piva, F. Bartolini, R.
"Transcoding resilient video watermarking scheme based Caldelli, and M. Barni. "Robust Frame-Based
on spatio-temporal HVS and DCT." Signal Watermarking for Digital Video." In 12th International
Processing 97 (2014): 40-54. Workshop on Database and Expert Systems Applications,
p. 0825. Published by the IEEE Computer Society, 2001.
[15] Zhu, Hongliu, Rangding Wang, Dawen Xu, and
Xingxing Zhou. "Information Hiding Algorithm for H. [28] Deguillaume, Frederic, Gabriela Csurka, Joseph J.
264 Based on the predition difference of Intra_4 4." O'Ruanaidh, and Thierry Pun. "Robust 3D DFT video
InImage and Signal Processing (CISP), 2010 3rd watermarking." In Electronic Imaging'99, pp. 113-124.
International Congress on, vol. 1, pp. 487-490. IEEE, International Society for Optics and Photonics, 1999.
2010.
[29] Cox, Ingemar J., Joe Kilian, F. Thomson Leighton, and
[16] Alattar, Adnan M., Eugene T. Lin, and Mehmet Utku Talal Shamoon. "Secure spread spectrum watermarking
Celik. "Digital watermarking of low bit-rate advanced for multimedia." Image Processing, IEEE Transactions
simple profile MPEG-4 compressed video." Circuits and on 6, no. 12 (1997): 1673-1687.
Systems for Video Technology, IEEE Transactions on 13,
no. 8 (2003): 787-800. [30] Koch, Eckhard, and Jian Zhao. "Towards robust and
hidden image copyright labeling." In IEEE Workshop on
[17] Jiang, Ming, Zhao-feng Ma, Xin-xin Niu, and Yi-xian Nonlinear Signal and Image Processing, pp. 452-455.
Yang. "Video watermarking scheme based on MPEG-2 Neos Marmaras, Greece, 1995.
for copyright protection." Procedia Environmental
Sciences 10 (2011): 843-848. [31] Agarwal, Charu, Anurag Mishra, Arpita Sharma, and
Girija Chetty. "A Novel Scene Based Robust Video
[18] Chung, Yuk Ying, and Fang Fei Xu. "A secure digital Watermarking Scheme in DWT Domain Using Extreme
watermarking scheme for MPEG-2 video copyright Learning Machine." In Extreme Learning Machines
protection." In Video and Signal Based Surveillance, 2013: Algorithms and Applications, pp. 209-225.
2006. AVSS'06. IEEE International Conference on, pp. Springer International Publishing, 2014.
84-84. IEEE, 2006.
[32] Ko, Chien-Chuan, Yung-Lung Kuo, Jeng-muh Hsu, and
[19] Langelaar, Gerrit C., and Reginald L. Lagendijk. Bo-Zhi Yang. "A multiresolution video watermarking
"Optimal differential energy watermarking of DCT scheme integrated with feature detection."Journal of the
encoded images and video." Image Processing, IEEE Chinese Institute of Engineers 36, no. 7 (2013): 878-889.
Transactions on 10, no. 1 (2001): 148-158.
29
International Journal of Computer Applications (0975 8887)
Volume 104 No.7, October 2014
[33] Wassermann, Jakob. "New Robust Video Watermarking 264/AVC video." In Pattern Recognition, 2004. ICPR
Techniques Based on DWT Transform and Spread 2004. Proceedings of the 17th International Conference
Spectrum of Basis Images of 2D Hadamard Transform." on, vol. 4, pp. 865-868. IEEE, 2004.
In Multimedia Communications, Services and Security,
pp. 298-308. Springer Berlin Heidelberg, 2013. [44] Swanson, Mitchell D., Bin Zhu, and Ahmed H. Tewfik.
"Multiresolution scene-based video watermarking using
[34] Strela, Vasily. "Multiwavelets: theory and applications." perceptual models." Selected Areas in Communications,
PhD diss., Massachusetts Institute of Technology, 1996. IEEE Journal on 16, no. 4 (1998): 540-550.
[35] Ghouti, Lahouari, Ahmed Bouridane, Mohammad K. [45] Carli, Marco, Patrizio Campisi, and Alessandro Neri.
Ibrahim, and Said Boussakta. "Digital image "Perceptual aspects in data hiding." Telecommunication
watermarking using balanced multiwavelets." Signal Systems 33, no. 1-3 (2006): 117-129.
Processing, IEEE Transactions on 54, no. 4 (2006):
1519-1536. [46] Masoumi, Majid, and Shervin Amiri. "A blind scene-
based watermarking for video copyright
[36] Kwon, Ki R., and Ahmed H. Tewfik. "Adaptive protection." AEU-International Journal of Electronics
watermarking using successive subband quantization and and Communications 67, no. 6 (2013): 528-535.
perceptual model based on multiwavelet transform."
In Electronic Imaging 2002, pp. 334-348. International [47] Singh, Th Rupachandra, Kh Manglem Singh, and
Society for Optics and Photonics, 2002. Sudipta Roy. "Video watermarking scheme based on
visual cryptography and scene change detection." AEU-
[37] Isac, Bibi, and V. Santhi. "A Study on Digital Image and International Journal of Electronics and
Video Watermarking Schemes using Neural Communications 67, no. 8 (2013): 645-651.
Networks." International Journal of Computer
Applications 12, no. 9 (2011): 1-6. [48] Geetamma, T., and K. Padma Raju. "Multiresolution
Scene Based Digital Video Watermarking."
[38] Leelavathy, N., Prasad, E. V., and Srinivas Kumar, S. In Proceedings of the International Conference on
"A Scene Based Video Watermarking in Discrete Frontiers of Intelligent Computing: Theory and
Multiwavelet Domain." International Journal of Applications (FICTA), pp. 659-666. Springer Berlin
Multidisciplinary Sciences and Engineering 3, no. 7 Heidelberg, 2013.
(2012).
[49] Tiwari, Dinesh, K. V. Arya, and Mukesh Saraswat.
[39] Ketcham, Mahasak, and Thittaporn Ganokratanaa. "The "Digital Video Watermarking Using Scene Detection."
Evolutionary Computation Video Watermarking Using In Proceedings of Seventh International Conference on
Quick Response Code Based on Discrete Multiwavelet Bio-Inspired Computing: Theories and Applications
Transformation." In Recent Advances in Information and (BIC-TA 2012), pp. 315-323. Springer India, 2013.
Communication Technology, pp. 113-123. Springer
International Publishing, 2014. [50] Singh, Th Rupachandra, Kh Manglem Singh, and
Sudipta Roy. "Video watermarking scheme based on
[40] Chan, Pik Wah, Michael R. Lyu, and Roland T. Chin. "A visual cryptography and scene change detection." AEU-
novel scheme for hybrid digital video watermarking: International Journal of Electronics and
approach, evaluation and experimentation."Circuits and Communications 67, no. 8 (2013): 645-651.
Systems for Video Technology, IEEE Transactions on 15,
no. 12 (2005): 1638-1649. [51] Venugopala, P. S., H. Sarojadevi, Niranjan N.
Chiplunkar, and Vani Bhat. "Video Watermarking by
[41] Dittmann, Jana, Martin Steinebach, Ivica Rimac, Stephan Adjusting the Pixel Values and Using Scene Change
Fischer, and Ralf Steinmetz. "Combined video and audio Detection." In Signal and Image Processing (ICSIP),
watermarking: Embedding content information in 2014 Fifth International Conference on, pp. 259-264.
multimedia data." In Electronic Imaging, pp. 455-464. IEEE, 2014.
International Society for Optics and Photonics, 2000.
[52] Jadhav, Anita, and Megha Kolhekar. "Digital
[42] Linnartz, Johan PMG. "Marking a digitally encoded Watermarking in Video for Copyright Protection."
video and/or audio signal." U.S. Patent 6,131,161, issued In Electronic Systems, Signal Processing and Computing
October 10, 2000. Technologies (ICESC), 2014 International Conference
on, pp. 140-144. IEEE, 2014.
[43] Qiu, Gang, Pina Marziliano, Anthony TS Ho, Dajun He,
and Qibin Sun. "A hybrid watermarking scheme for H.
IJCATM : www.ijcaonline.org 30