2021
DOI: 10.11591/ijeecs.v22.i2.pp619-628
|View full text |Cite
|
Sign up to set email alerts
|

Video mosaic watermarking using plasma key

Abstract: Video watermarking is one of the most widespread techniques amongst the many watermarking techniques presently are used; this is because the extreme existences of copyright abuse and misappropriation occur for video content. In this paper, a new watermarking algorithm is proposed to embed logo in digital video for copyright protection. To make the watermarks more robust to attack, host frame and host embedding indices must be changeable. A new algorithm is proposed to determined host frames by plasma function,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Symmetric encryption methods use only one key for encryption as well as decryption [12]. A single key usage for encryption and decryption a straightforward operation and that's why it's knows as "symmetric" [13]. Symmetric method is considered a great technique is the simplicity of its process where it lies in a single key usage for encryption and decryption [14].…”
Section: Symmetric and Asymmetric Encryptionmentioning
confidence: 99%
“…Symmetric encryption methods use only one key for encryption as well as decryption [12]. A single key usage for encryption and decryption a straightforward operation and that's why it's knows as "symmetric" [13]. Symmetric method is considered a great technique is the simplicity of its process where it lies in a single key usage for encryption and decryption [14].…”
Section: Symmetric and Asymmetric Encryptionmentioning
confidence: 99%
“…, β„Ž π‘€βˆ’1 (𝑑) on the [0,1] are orthogonality and basis functions. If π‘Ÿ = 2 βˆ’π‘˜ , 𝑠 = (π‘Ÿ(2𝑒 βˆ’ 1)) and transform π‘₯ = π‘Ÿ(2π‘Ÿ βˆ’1 𝑑), replacing parameters r, s with a variable in (3) is obtained (2). DHWT β„Ž 𝑒,𝑣 (𝑑) = β„Ž(π‘˜, 𝑒, 𝑣, 𝑑) includes four parameters, π‘˜ ∈ β„€ + , 𝑑 independent variable in [0,1], and 𝑣 is the degree of the Hermite polynomials:…”
Section: Discrete Hermite Wavelet Transformmentioning
confidence: 99%
“…The license plate recognition (LPR) technology, which is derived from advanced intelligent transportation systems, plays a vital role in managing traffic, enhancing digital security surveillance, recognizing vehicles, and facilitating parking management in large cities [1][2][3][4][5]. The LPR technology is employed in various countries worldwide, particularly in smart cities, electronic garages, and mainly on roads, to capture data on speeding vehicles or track stolen cars.…”
Section: Introductionmentioning
confidence: 99%