Filters








340 Hits in 3.3 sec

Video watermarking using motion compensated 2D+t+2D filtering

Deepayan Bhowmik, Charith Abhayaratne
2010 Proceedings of the 12th ACM workshop on Multimedia and security - MM&Sec '10  
An improved MCTF is used by modifying the MCTF update step to follow the motion trajectory in hierarchical temporal decomposition by using direct motion vector fields in the update step and implied motion  ...  decompositions, compared to the existing frame-by-frame and t+2D domain video watermarking.  ...  imperceptibility of the watermarked video.  ... 
doi:10.1145/1854229.1854254 dblp:conf/mmsec/BhowmikA10 fatcat:st3giovrqnhsramhsgef57ce7u

Video Watermarking Technique using Visual Sensibility and Motion Vector [chapter]

Mariko Nakano-Miyatake, Hector Perez-Me
2010 Visual Servoing  
Kang et al. applied singular value decomposition (SVD) to each frame of video data, and then embedded the watermark signal into the singular values.  ...  The proposed algorithm uses three criteria based on deficiency of the Human Visual System (HVS) to embed robust watermark, while preserving its imperceptibility.  ...  An example of the block classification using second criterion The figure 3 shows an example of block classification using the above algorithm (Tong and Venetsanopoulos, 1998) .  ... 
doi:10.5772/8552 fatcat:6jsrph6a7naxxojl7kvdk655ba

AN INVESTIGATION OF DIFFERENT VIDEO WATERMARKING TECHNIQUES

B. Sridhar
2017 International Journal on Smart Sensing and Intelligent Systems  
It is the art of hiding the copyright information into host such that the embedded data is imperceptible. The covers in the forms of digital multimedia object, namely image, audio and video.  ...  Also, comprehensive review of the literature on the evolution of various video watermarking techniques to achieve robustness and to maintain the quality of watermarked video sequences.  ...  The two new watermarking schemes which seem to offer a high degree of imperceptibility and efficient tamper detection.  ... 
doi:10.21307/ijssis-2017-217 fatcat:wamzxdqkifgc7l7f4k2y6ihsxa

A Novel Blind and Robust Video Watermarking Technique in Fast Motion Frames Based on SVD and MR-SVD

Imen Nouioua, Nouredine Amardjia, Sarra Belilita
2018 Security and Communication Networks  
In this work, a novel and efficient digital video watermarking technique based on the Singular Value Decomposition performed in the Multiresolution Singular Value Decomposition domain is proposed.  ...  While most of the existing watermarking schemes embed the watermark in all the video frames, which is time-consuming and also affects the perceptibly of the video quality, the proposed method chooses only  ...  In this work, we propose a novel video watermarking scheme in fast motion frames using Singular Value Decomposition in the Multiresolution Singular Value Decomposition (MR-SVD) domain.  ... 
doi:10.1155/2018/6712065 fatcat:ratmc5fcmvgytgdz4q6f5oe6ia

2D+t Wavelet Domain Video Watermarking

Deepayan Bhowmik, Charith Abhayaratne
2012 Advances in Multimedia  
The MCTF is improved by modifying the update step to follow the motion trajectory in the hierarchical temporal decomposition by using direct motion vector fields in the update step and implied motion vectors  ...  Robustness performances against scalable content adaptation, such as Motion JPEG 2000, MC-EZBC, or H.264-SVC, are reviewed for various combinations of motion compensated 2D + t + 2D using the proposed  ...  imperceptibility of the watermarked video.  ... 
doi:10.1155/2012/973418 fatcat:u6teloxft5fkxfwt7gst344yqa

Global motion compensated visual attention-based video watermarking

Matthew Oakes, Deepayan Bhowmik, Charith Abhayaratne
2016 Journal of Electronic Imaging (JEI)  
This paper proposes a unique video watermarking algorithm that offers a fine balance between imperceptibility and robustness using motion compensated wavelet-based visual attention model (VAM).  ...  The proposed VAM outperforms the state-of-the-art video visual attention methods in joint saliency detection and low computational complexity performance.  ...  Acknowledgments We acknowledge the support of the UK Engineering and Physical Research Council (EPSRC), through a Dorothy Hodgkin Postgraduate Award and a Doctoral Training Award at the University of Sheffield  ... 
doi:10.1117/1.jei.25.6.061624 fatcat:q7gic5pm5rerjls4elofkwuu5q

Digital Watermarking Properties, Classification and Techniques

2020 International Journal of Engineering and Advanced Technology  
The protection of digital content is currently the main responsibility of the content owner since piracy is evident in all levels of multimedia industry.  ...  Considerable quantities of multimedia content are printed, edited or distributed unlawfully without the legal consent of the owner.  ...  video stream I and compresses it using the motion vectors.  ... 
doi:10.35940/ijeat.c5773.029320 fatcat:fp4kqh7atbgexofyim6zz7gcva

An Overview of Digital Watermarking [chapter]

N. Liu, P. Amin, A. Ambalavanan, K.P. Subbalakshmi
2006 Multimedia Security Technologies for Digital Rights Management  
Digital watermarking is the process of embedding information into a digital signal in a way that it difficult to remove.  ...  Digital watermarking technology has been playing an important role in protecting copyrights in images, audio and video. these can be accurately copied and arbitrarily distributed more easily.  ...  They used singular values of singular value decomposition (SVD) of images to check the integrity of images.  ... 
doi:10.1016/b978-012369476-8/50009-9 fatcat:d5lgxojarrehvlpmfe6zy2rpru

Digital Video Watermarking Techniques: A Review

Arti Bhardwaj
2017 International Journal Of Engineering And Computer Science  
We survey on properties of video watermarking, classification of video marking techniques, application and watermark attacks.  ...  In this paper, we discuss about digital video watermarking techniques, robustness and also present the application where the uses of watermarking techniques and for better performance of video watermarking  ...  These frequency of wavelet varying with respect to time. Multi-resolution decomposition of image and frames of given video is possible in DWT.  ... 
doi:10.18535/ijecs/v6i5.23 fatcat:22fgkdnxdjemhbql3oftonnw2i

Digital Watermarking Algorithm for Color Images

Mr.P.B. Khatkale
2013 IOSR Journal of Engineering  
Digital watermarking methods describe the technologies that allow hiding of information in digital media such as images, video and audio.  ...  Watermarking techniques embed information in images by introducing changes that are imperceptible to the human eye but recoverable by a computer program.  ...  The use of semi-fragile property helps to detect the location of fraud in the image.  ... 
doi:10.9790/3021-03330109 fatcat:5dyz23q6j5akbfygjqf4muwbkq

Transcoding resilient video watermarking scheme based on spatio-temporal HVS and DCT

Antonio Cedillo-Hernandez, Manuel Cedillo-Hernandez, Mireya Garcia-Vazquez, Mariko Nakano-Miyatake, Hector Perez-Meana, Alejandro Ramirez-Acosta
2014 Signal Processing  
The quantization index modulation (QIM) algorithm is used to embed and detect the watermark in 2D-Discrete Cosine Transform (2D-DCT) domain.  ...  Video transcoding is a legitimate operation widely used to modify video format in order to access the video content in the end-user's devices, which may have some limitations in the spatial and temporal  ...  support of this work.  ... 
doi:10.1016/j.sigpro.2013.08.019 fatcat:aaegaujkmjaurb6krblrzqg4ni

Mitigation of Geometrical Attack in Digital Image Watermarking using Different Transform Based Functions

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
The digital watermarking techniques provide copyright protection and increase the value of brands — Watermarking techniques used in various fields such as image, video, audio, and text.  ...  The piracy of digital data loss the brand value of documents and products. For the prevention of piracy used the digital watermarking technique.  ...  COMPARATIVE ANALYSIS OF  Problems of video denoising and video WATERMARKING METHODS enhancement.  The problem of large size address than  Get the watermarks using backup by simply discussion whether  ... 
doi:10.35940/ijitee.g5975.078919 fatcat:gcy6g7hpkvhs7hyrg63yjptvv4

Catalogue of Hybrid Video Watermarking Techniques

Manoj Kumar, Sandeep Gupta, Arnold Hensman
2016 International Journal of Computer Applications  
Authentication and copyright protection of digital data is a matter of big concern in the present times. As forgery techniques are becoming more sophisticated day by day,  ...  Video watermarking is required to protect the user identity. The classification of different techniques is given here.  ...  Video watermarking is quite similar to image watermarking because video is composed of frames. These video frames are used for hiding the watermarked data within them.  ... 
doi:10.5120/ijca2016910336 fatcat:v52lqb7mqrgqpgm6xzduulfpmi

A Recent Survey on the Applications of Genetic Programming in Image Processing [article]

Asifullah Khan, Aqsa Saeed Qureshi, Noorul Wahab, Mutawara Hussain, Muhammad Yousaf Hamza
2020 arXiv   pre-print
Genetic Programming (GP) has been primarily used to tackle optimization, classification, and feature selection related tasks.  ...  The widespread use of GP is due to its flexible and comprehensible tree-type structure.  ...  This technique was used for detecting motion from the video, so the first two-dimensional array of size 20 x 20 was captured as video frames from different locations of videos.  ... 
arXiv:1901.07387v3 fatcat:l5bwxel4azcs7pfv4gztrvnsxe

An Improved Hybrid Color Image Watermarking under Various Attacks
IJARCCE - Computer and Communication Engineering

C. N. Sujatha, P. Satyanarayana
2015 IJARCCE  
In this algorithm, SV"s of transformed coefficients of RGB planes of host image using DCT and DWT are modified with that of color logo image at chosen scaling factors.  ...  Simulation results illustrate the good imperceptibility and robustness.  ...  Invisible watermarks can be detected by an authorized person, such watermarks are used for owner authentication and detecting unauthorized copying.  ... 
doi:10.17148/ijarcce.2015.4382 fatcat:qb2yzg2v4vgidmkyl7mmwe6mo4
« Previous Showing results 1 — 15 out of 340 results