International Conference on Computing, Communication &Amp; Automation 2015
DOI: 10.1109/ccaa.2015.7148559
|View full text |Cite
|
Sign up to set email alerts
|

Copyright protection using blind video watermarking algorithm based on MPEG-2 structure

Abstract: Video watermarking plays a key role in copyright protection domain of today's world. In the following paper, a blind watermarking algorithm is being proposed in which the watermark information is being embedded by little alteration of some of the value of DCT coefficients of luminance part of video during encoding it in MPEG-2 style. It is obvious that for any type of watermarking the three parameters, robustness, perceptibility and payload capacity must be simulated in order to provide better results . But un… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Little enhancing the controlfeature, extremely degrade the quaity of watermarked video. Ahuja et al [16] stretched the work by exploiting the MPEG2 structure to cover the above limitations. They also focused on efficiency of the watermark scheme by calculating the elapsed time.…”
Section: Related Workmentioning
confidence: 99%
“…Little enhancing the controlfeature, extremely degrade the quaity of watermarked video. Ahuja et al [16] stretched the work by exploiting the MPEG2 structure to cover the above limitations. They also focused on efficiency of the watermark scheme by calculating the elapsed time.…”
Section: Related Workmentioning
confidence: 99%
“…Some examples of low resistance to rotation attacks are obviously reported in [8,9,10,11,12,13,14]. In these works the watermark after rotation attack was difficult to be accurately extracted and the data was mostly lost.…”
Section: Related Workmentioning
confidence: 99%
“…Table 1 summarizes some of the reported result in the case of rotation attacks. [8] 0.73 -L. Agilandeeswari et al [9] 0.80 9.33 Ta Minh Thanh et al [10] Nasrin M. Makbol [11] -0.50 Zhao et al [12] 0.86 -Jiansheng et al [13] 0.50 -Lusson et al [14] 0.65 -Some approaches were proposed to recover images into their original states after rotation attacks occur. In [15] they proposed a rotation estimation and recovery algorithm using image alignment, Radial Tchebichef moments or Fourier descriptors.…”
Section: Related Workmentioning
confidence: 99%
“…Ahuja et al have focused on a video watermarking scheme using a MPEG-2 coding style which used for the application of copyright protection and it applied various attacks on watermarked video and measured parameters like robustness, perceptibility, EC along with one more issue 'elapsed time', a serious concern in video watermarking. For testing the performance of a video watermarking algorithm and also suggested to apply more video processing attacks like frame insertion, frame deletion, frame averaging and compression attacks (Ahuja and Bedi, 2015). Su et al have introduced the new blind watermark algorithm which embedded the binary watermark image into the blue component of an RGB image in the spatial domain to resolve the problem of protecting copyright.…”
Section: Introductionmentioning
confidence: 99%