1999
DOI: 10.1117/12.344662
|View full text |Cite
|
Sign up to set email alerts
|

<title>Robust 3D DFT video watermarking</title>

Abstract: This paper proposes a new approach for digital watermarking and secure copyright protection of videos, the principal aim being to discourage illicit copying and distribution of copyrighted material. The method presented here is based on the discrete Fourier transform (DFT) of three dimensional chunks of video scene, in contrast with previous works on video watermarking where each video frame was marked separately, or where only intra-frame or motion compensation parameters were marked in MPEG compressed videos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
41
0
1

Year Published

2000
2000
2011
2011

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 111 publications
(42 citation statements)
references
References 11 publications
0
41
0
1
Order By: Relevance
“…Scanning to generate the histogram for 1 frame = n 1 x n 2 Create histogram = n 1 x n 2 Compare the histogram = 64 x 64 Total running time = [2(n 1 x n 2 ) + 64] x T = O (n 1 n 2 T)…”
Section: = O(logm)+o(1) + O(max[(m1m2) M]) + O(m) =O(max[(m1m2) M])mentioning
confidence: 99%
See 1 more Smart Citation
“…Scanning to generate the histogram for 1 frame = n 1 x n 2 Create histogram = n 1 x n 2 Compare the histogram = 64 x 64 Total running time = [2(n 1 x n 2 ) + 64] x T = O (n 1 n 2 T)…”
Section: = O(logm)+o(1) + O(max[(m1m2) M]) + O(m) =O(max[(m1m2) M])mentioning
confidence: 99%
“…The owner of the digital content, desires to ensure that all access to the content is authorized under the rules of a license (conditional access), unauthorized reproductions cannot be easily made (copy protection), and any illegal copies that are created can be detected and traced (authentication and content tracking). Without solving these security issues, digital multimedia products and services cannot take-off in an ecommerce setting [2].…”
Section: Introductionmentioning
confidence: 99%
“…12 There are also approaches that take into account the temporal dimension such as the watermarking in the histogram average frames luminance 16,20 or the watermarking on a frequency volume such as the 3D-DFT. 18 Before the quantization phase, one may modify the luminance DCT coefficients, taking care to have an embedding strength parameter which is function of the quantization parameter chosen by the user. We can cite the clever proposal of Golikeri et al 7 that embeds 1 bit per macro block, uses a psychovisual mask, and combines a spreading and a quantization watermarking technique (the watermarking technique is the ST-SCS quantization approach).…”
Section: Sequence Of Imagesmentioning
confidence: 99%
“…However both these methods exploit the properties of log-polar-maps (LPM) and can only be used to detect changes of rotation and scale. Similarly the loglog-map (LLM) [4] has also been proposed as a means of detecting changes in aspect ratio. However, once again general transformations cannot be recovered.…”
Section: Introductionmentioning
confidence: 99%