2020
DOI: 10.1109/access.2020.2984180
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Attacks of SVD-Based Video Watermarking Scheme in an IoT Environment

Abstract: This study reviews the superiority and limitations of the Singular Value Decomposition (SVD)-based video watermarking scheme. First applies key frame selection to the video sequence to obtain an appropriate video frame for the purpose of watermark embedding in this paper. The Fibonacci-Lucas image transformation scrambles the grayscale watermark image before the embedding process. The former scheme satisfies the imperceptibility and robustness aspects. However, it can suffer from the False-Positive-Problem (FP… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…There have been multiple digital watermarking techniques developed in the literature which use the SVD domain to embed the watermark [7], [8], [10], [18]- [22]. For example, the authors of [21] altered the SVs of an image with the watermark.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…There have been multiple digital watermarking techniques developed in the literature which use the SVD domain to embed the watermark [7], [8], [10], [18]- [22]. For example, the authors of [21] altered the SVs of an image with the watermark.…”
Section: Related Workmentioning
confidence: 99%
“…Then, every sub-band was used to elicit the watermark. Similarly, Prasetyo et al [22] proposed an SVD-based watermarking scheme. More specifically, the LLband of a DWT-transformed host frame is divided in nonoverlapping blocks, and the principal components of the scrambled watermark signal is embedded into the largest singular value of each block.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The hiding algorithms use different related algorithms such as Singular Value Decomposition (SVD), Discrete Wavelet Transform (DWT) and Discrete Fourier Transform (DFT). In the extraction domain, the watermark retrieval process is defined as the reverse process that is based on the embedding process [21]. These processes use low weight calculations, which cause low consuming energy [16].…”
Section: Introductionmentioning
confidence: 99%