2017
DOI: 10.11591/ijeecs.v5.i2.pp391-400
|View full text |Cite
|
Sign up to set email alerts
|

Video Watermarking Scheme Based on Candidates I-frames for Copyright Protection

Abstract: The proposed scheme embedded the watermark during the differential pulse code modulation process and extracted through decoding the entropy details. This technique utilize the moving picture expert groups standard

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 11 publications
0
11
0
Order By: Relevance
“…To check the robustness of the proposed technique against the order of frames in a video this attack is taken into consideration (Jiang et al, 2015;Ahuja and Bedi, 2017). To verify frame swapping attack the 27th and 40th frames of the watermarked video are swapped with one another.…”
Section: Frame Swappingmentioning
confidence: 99%
See 1 more Smart Citation
“…To check the robustness of the proposed technique against the order of frames in a video this attack is taken into consideration (Jiang et al, 2015;Ahuja and Bedi, 2017). To verify frame swapping attack the 27th and 40th frames of the watermarked video are swapped with one another.…”
Section: Frame Swappingmentioning
confidence: 99%
“…This image has been modified to fit to the dimensions and the resolution of the video and is then replaced with the 90th frame of the video. Thus, the image part is now extracted from this image placed in the video (Arab and Hashim, 2016;Ahuja and Bedi, 2017). The effect of this extraction will entirely depend on the similarity of the image with the rest of the frames and also on the size of the part to be extracted as displayed in Figure 7 (a)-(c).…”
Section: Frame Replacementmentioning
confidence: 99%
“…The benefit of this technique is that the watermark can be extracted at any time from the watermarked object to claim the ownership of the related multimedia contents [1]. In order to be a effective watermark, it should meet three requirements: (i) robustness-it should resist various possible attacks (ii) transparency-it is the perceptual similarity between original and watermark cover image (iii) capacity-it should carry the enough information that represents the uniqueness of data, the more the capacity the more private information can be carried by the host image.…”
Section: *Author For Correspondencementioning
confidence: 99%
“…Then, it will be needed a method to improve security in transaction data on the internet, especially about copyright protection. Image watermarking is a popular method for authenticating copyright on digital image [4][5][6]. There are two important aspects of the image watermarking, i.e., imperceptibility and robustness.…”
Section: Introductionmentioning
confidence: 99%