2010
DOI: 10.22201/icat.16656423.2010.8.03.454
|View full text |Cite
|
Sign up to set email alerts
|

A Blind Video Watermarking Scheme Robust To Frame Attacks Combined With MPEG2 Compression

Abstract: In this paper, we propose a robust digital video watermarking scheme with completely blind extraction process where the original video data, original watermark or any other information derivative of them are not required in order to retrieve the embedded watermark. The proposed algorithm embeds 2D binary visually recognizable patterns such as company trademarks and owner’s logotype, etc., in the DWT domain of the video frames for copyright protection.Before the embedding process, only two numerical keys are re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 19 publications
0
13
0
Order By: Relevance
“…Conventional encryption algorithms permit only authorized users to access encrypted digital data. Once such data are decrypted, however, there is no way in prohibiting its illegal copying and distribution [13].…”
Section: Important Aspects Of Video Watermarkingmentioning
confidence: 99%
“…Conventional encryption algorithms permit only authorized users to access encrypted digital data. Once such data are decrypted, however, there is no way in prohibiting its illegal copying and distribution [13].…”
Section: Important Aspects Of Video Watermarkingmentioning
confidence: 99%
“…The performance of the algorithm is measured with fidelity and compression ratio. Cruz-Ramos et al [16] developed a blind video watermarking algorithm where 2-D binary patterns are embedded such as company trademarks, and logo in wavelet co-efficient of video frames to have copyright protection. The scheme is robust against common video attacks and has low computational complexity.…”
Section: Software Watermarkingmentioning
confidence: 99%
“…Therefore, in this study, we will divide out of U a diagonal matrix D, which is made up entirely of the d n coefficients, as shown in Eq. (2).…”
Section: Related Workmentioning
confidence: 99%
“…Apart from copy control and copyright protection, broadcast monitoring, fingerprinting, indexing, medical applications, and content authentication are other application areas of digital watermarking. For the purpose of designing and developing a new watermarking algorithm in those application areas, the most important properties are robustness and invisibility [2], which are the main points of this study.…”
Section: Introductionmentioning
confidence: 99%