2010 2nd International Conference on Signal Processing Systems 2010
DOI: 10.1109/icsps.2010.5555632
|View full text |Cite
|
Sign up to set email alerts
|

Robust DCT based video watermarking algorithms for assorted watermarks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Therefore, although the visual quality of the video is not affected by this type of attack, this type of attack causes the destruction of the watermark. So it is advisable to be evaluate any proposed system of video watermarking versus temporal attacks [24]. Tables- (1,2) shows that the proposed watermarking algorithm's indices are highly robust against almost all types of attacks.…”
Section: Experimental Results and Comparative Analysismentioning
confidence: 99%
“…Therefore, although the visual quality of the video is not affected by this type of attack, this type of attack causes the destruction of the watermark. So it is advisable to be evaluate any proposed system of video watermarking versus temporal attacks [24]. Tables- (1,2) shows that the proposed watermarking algorithm's indices are highly robust against almost all types of attacks.…”
Section: Experimental Results and Comparative Analysismentioning
confidence: 99%
“…F m denotes the frequency band with gain factor k and (u, v) are the DCT coefficients in 8x8 block. Some of other approaches based on this technique are found in [16] …”
Section: Discrete Cosine Transformmentioning
confidence: 99%
“…Because of the fact that it is easier to obtain a high algorithm robustness in the transform domain, this type of algorithms is more popular compared to spatial algorithms. Among numerous proposed methods one may notice the large number of algorithms in the DCT [10,29,32] and DWT [4,26,47,51] domains (because of the fact that most popular lossy compression standards-JPEG and JPEG2000 operates in DCT and DWT). Also two transforms are used, e.g.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, imperceptible methods may be further divided into those which use the perceptual models of a human being [4,55]-the Watson model may be given as an example [16,43]. There are many methods which do not take into account the perceptible models [9,17,18,27].…”
Section: Introductionmentioning
confidence: 99%