2014
DOI: 10.1007/978-3-319-13461-1_13
|View full text |Cite
|
Sign up to set email alerts
|

Highly Secured Multilayered Motion Vector Watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
5

Relationship

2
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…In any case, the proposed method can be combined with the conventional semantic based techniques to achieve a more complete authentication scheme, including those that manipulate syntax elements in audio (e.g., scale factor, MDCT coefficients in MP3 [31]) and video (e.g., prediction mode [32], [33], coefficients [34], motion vectors [35], quantization parameters [36]). For example, the proposed method can be utilized as the first layer of authentication, while the conventional authentication methods for audio [2] and video [4] can be applied to localized modified part of the audio and/or video.…”
Section: Discussionmentioning
confidence: 99%
“…In any case, the proposed method can be combined with the conventional semantic based techniques to achieve a more complete authentication scheme, including those that manipulate syntax elements in audio (e.g., scale factor, MDCT coefficients in MP3 [31]) and video (e.g., prediction mode [32], [33], coefficients [34], motion vectors [35], quantization parameters [36]). For example, the proposed method can be utilized as the first layer of authentication, while the conventional authentication methods for audio [2] and video [4] can be applied to localized modified part of the audio and/or video.…”
Section: Discussionmentioning
confidence: 99%
“…In motion estimation, motion vectors [176][177][178][179][180] are determined to represent the transformation through adjacent 2D image frames in a video sequence [181]. Motion vectors are computed in two ways [182]-pixel-based methods or direct method, and feature-based methods or indirect method.…”
Section: Motion Estimationmentioning
confidence: 99%
“…Rule generation of rough sets theories enables fuzzy threshold values of gray level with specific limit (Roy et al, 2014). Digital watermarking (Hassanien et al, 2014) is another classic example for rough sets application to address the uncertainty during the identifications of the exact features. Apart from that, wireless sensor networks also utilize the rough sets for vehicle communications .…”
Section: Literature Reviewmentioning
confidence: 99%