2021
DOI: 10.3390/electronics10141655
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Video Watermarking against Scaling Attacks Based on Quantization Index Modulation

Abstract: Video watermarking plays a vital role in protecting the video copyright. The quantization-based methods are widely used in the existing watermarking algorithms, owing to their low computational complexity and completely blind extraction. However, most of them work poorly in resisting scaling attacks, by which the quantization value may fall outside the original quantization interval. For addressing this issue, an adaptive quantization index modulation method is proposed. The property that is associated with th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 33 publications
(133 reference statements)
0
6
0
Order By: Relevance
“…The definition of the inverse discrete fourier transform (IDFT) is shown in Equation ( 2). The linear property is one important property of 2D-DFT, which is shown in Equation (3), where G(u, v) is the corresponding 2D-DFT of g(x, y).…”
Section: Property Of 2d-dftmentioning
confidence: 99%
See 3 more Smart Citations
“…The definition of the inverse discrete fourier transform (IDFT) is shown in Equation ( 2). The linear property is one important property of 2D-DFT, which is shown in Equation (3), where G(u, v) is the corresponding 2D-DFT of g(x, y).…”
Section: Property Of 2d-dftmentioning
confidence: 99%
“…Consequently, we can first design two binary sequences in the 2D-DFT domain, called the zero-template and one-template, to represent watermark bits 0 and 1, respectively. Then, we can calculate the spatial mask corresponding to the watermark template by using Equation (3). Finally, watermark embedding can be conducted by adding the spatial mask to the pixel value of the cover video frame.…”
Section: Watermark Template Constructionmentioning
confidence: 99%
See 2 more Smart Citations
“…The embedded secret information bits are obtained according to the partition index values of the output codewords. As an information hiding algorithm in compressed domain, QIM steganography is widely popularized to other various streaming media including speeches, such as, images [35], audios [36], videos [37], etc.. In view of of the QIM-based speech steganography, Xiao et al [29] proposed the complementary neighbor vertices (CNV) QIM-based algorithm for information embedding during the VQ process of LPC for the first time.…”
Section: Introductionmentioning
confidence: 99%