CFP last date
20 December 2024
Reseach Article

Catalogue of Hybrid Video Watermarking Techniques

by Manoj Kumar, Sandeep Gupta, Arnold Hensman
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 143 - Number 9
Year of Publication: 2016
Authors: Manoj Kumar, Sandeep Gupta, Arnold Hensman
10.5120/ijca2016910336

Manoj Kumar, Sandeep Gupta, Arnold Hensman . Catalogue of Hybrid Video Watermarking Techniques. International Journal of Computer Applications. 143, 9 ( Jun 2016), 12-18. DOI=10.5120/ijca2016910336

@article{ 10.5120/ijca2016910336,
author = { Manoj Kumar, Sandeep Gupta, Arnold Hensman },
title = { Catalogue of Hybrid Video Watermarking Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2016 },
volume = { 143 },
number = { 9 },
month = { Jun },
year = { 2016 },
issn = { 0975-8887 },
pages = { 12-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume143/number9/25104-2016910336/ },
doi = { 10.5120/ijca2016910336 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:46:02.338450+05:30
%A Manoj Kumar
%A Sandeep Gupta
%A Arnold Hensman
%T Catalogue of Hybrid Video Watermarking Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 143
%N 9
%P 12-18
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Authentication and copyright protection of digital data is a matter of big concern in the present times. As forgery techniques are becoming more sophisticated day by day, incidents of copying and tampering of digital data without the owner’s permission are on the rise. Digital data can be manipulated and copied easily, therefore it becomes important to protect owner data by using some rights protection system. In this paper, various approaches to protect digital data (Audio, Video etc.) using watermarking techniques are discussed. Watermarking is one of the best approach to protect digital data and prove user authenticity. Watermarking technique provides protection against illegal distribution of digital data. Watermarking is a process to embed some noise tolerant signal in the original signal. This technique is very effective against various types of attacks on the digital data and hence provides a robust solution for data theft cases. This paper is a review of different watermarking techniques for protecting digital data.

References
  1. P. P. W. Chan, M. R. Lyu and R. T. Chin, "Copyright Protection on the Web: A Hybrid Digital Video Watermarking Scheme," in ACM, New York, USA, 17-18 May 2004.
  2. G. G. C. Gopika V Mane, "Review Paper on Video Watermarking Techniques," International Journal of Scientific and Research Publications, vol. 3, no. 4, pp. 1-5, April 2013.
  3. Y. Liu, Digital video watermarking robust to geometric attacks and compressions, Ottawa, Canada: A thesis submittted to the fullfilment of of the requirement for the degree of Doctorate of Philosophy, 2011.
  4. V. K. Agrawal, PERCEPTUAL WATERMARKING OF DIGITAL VIDEO USING THE VARIABLE TEMPORAL LENGTH 3D-DCT, Kanpur, India: A Thesis Submitted for the Degree of M. Tech. at IIT Kanpur, June 2007.
  5. R.Lancini, F.Mapelli and S.Tubaro, "A ROBUST VIDEO WATERMARKING TECHNIQUE IN THE SPATIAL DOMAIN," Zadar, Croatia, June 2002.
  6. R. v. Schyndel, A. Tirkel and C. Osborne, "A Digital Watermark," Austin, Texas, USA, Nov. 1994.
  7. F. Hartung, J. Su and B. Girod, "Spread Spectrum Watermarking: Malicious Attacks and Counterattacks," San Jose (CA), USA, January 1999.
  8. R. Wolfgang and E. Delp, "A Watermarking Technique for Digital Imagery: Further Studies," Las Vegas, USA, July 1997.
  9. T. Kalker, G. Depovere, J. Haitsma and M. Maes, "A Video Watermarking System for Broadcast Monitoring," San Jose, USA, Jan 1999.
  10. G. C. Langelaar, I. Setyawan and R. L. Lagendijk, "Watermarking Digital Image and Video Data: A State-of-the-Art Overview," IEEE SIGNAL PROCESSING MAGAZINE, pp. 20-46, 2000.
  11. H. Kinoshita, "An image digital signature system with ZKIP for the graph isomorphism," Lussane,Switzerland, Sept. 1996.
  12. A. B. Dehkordi, S. N. Esfahani and A. N. Avanaki, "Robust LSB Watermarking Optimized for Local Structural Similarity," 19th Iranian Conference on Electrical Engineering (ICEE), pp. 1-6, May 2011.
  13. T. Aura, "Invisible communication," in Proc. HUT Seminar on Network Security, Espoo, Finland, Nov 1995.
  14. R. v. Schyndel, A. Tirkel and C. Osborne, "A digital watermark," Austin, TX, Nov. 1994.
  15. J. Huang and Y. Q.Shi, "Embedding strategy for image watermarking in DCT domain," in Asia-Pacific Conference on Communications,Beijing, China , vol. 2 , pp. 981-984, Oct. 1999.
  16. M. N. Deshpande and D. A. rajurkar, "Robust DCT based Video Watermarking algorithms for Assorted Watermarks," Dalian, 2010 .
  17. Z. Yan-Shuo and W. Li-feng, "DCT-Based Video Watermarking Transcoding Technique," Harbin, Dec. 2007.
  18. C.-H. Yang, H.-Y. Huang and W.-H. Hsu, "An adaptive video watermarking technique based on DCT domain," 8th IEEE International Conference on Computer and Information Technology, 2008. CIT 2008. Sydney, NSW , pp. 589 - 594, July 2008.
  19. Y. Liu, X. Chen and P. Zhou, "The domain block video watermarking scheme based on video sequences' characteristics and DCT," Melbourne, Australia, July 2012.
  20. J. Li and A. Sui, "A Digital Video Watermarking Algorithm Based on DCT Domain," Harbin, June 2012.
  21. S. Patel, A. Katharotiya and M. Goyani, "A Survey on Digital Video Watermarking," International Journal of Comp. Tech. Appl., vol. 2, no. 6, pp. 3015-3018, Dec. 2011.
  22. S. A. Rathorel, S. Gilanil, A. Mumtaz, T. Jameell and A. Sayyed2, "Enhancing Invisibility and Robustness of DWT based Video Watermarking scheme for Copyright Protection," Karachi, July 2007.
  23. H. Liu, N. Chen, J. Huang, X. Huang and Y. Q. Shi, "A Robust DWT-Based Video Watermarking Algorithm," Phoenix-Scottsdale, AZ, 2002.
  24. S. A. Al-Taweel and P. Sumari, "Robust video watermarking based on 3D-DWT domain," Singapore, Jan. 2009.
  25. T. Tabassum and S. M. Islam, "A digital video watermarking technique based on identical frame extraction in 3-Level DWT," Chittagong, Dec. 2012.
  26. P. Campisi, "Video watermarking in the 3D-DWT domain using quantization-based methods," Shanghai, Nov. 2005.
  27. MBarni, B. F and P. A, "Improved wavelet based watermarking through pixel wise masking," IEEE Transactions on Image Processing, vol. 10, no. 5, pp. 783 - 791, May 2001.
  28. M. Barni, F. Bartolini, D. Rosa and A. Piva, "Optimum decoding and detection of multiplicative watermarks," IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 1118-1123, April 2003.
  29. J. Su, "Fundamental performance limits of power-spectrum condition compliant watermarks," In: Proceedings of SPIE, vol. 3971, pp. 314-325, 2000.
  30. Liu and Zhao, "A new video watermarking algorithm based on 1D DFT and Radon transform," IEEE Signal Processing, vol. 90, no. 2, p. 626–639, Feb. 2010.
  31. F. Deguillaume, "Robust 3D DFT video watermarking," In: Proceedings of SPIE, vol. 3657, pp. 13-124, 1999.
  32. T. Kalker, J. Huitsma, M. Mues and G. Depovere, "HOW TO ACHIEVE ROBUSTNESS AGAINST SCALING IN A REAL-TIME DIGITAL WATERMARKING SYSTEM FOR BROASCAST MONITORING," Proceedings International Conference on IEEE Image Processing, vol. 1, pp. 407-410, 2000.
  33. F. Hartung and B. Girod, "Digital Watermarking of MPEG-2 Coded Video in the Bitstream Domain," IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP-97 in Munich, vol. 4, pp. 2621 - 2624, Apr. 1997.
  34. Z. Sakr and N. D. Georganas, "An MPEG-4 XMT scene structure algorithm for authentication and copyright protection," 14th International Workshop on Research Issues on Data Engineering: Web Services for e-Commerce and e-Government Applications, 2004. Proceedings. , pp. 48 - 55, March 2004.
  35. M. Taniguchi, "Scaling detection method for watermarked MPEG content," IEEE International Conference on Image Processing, ICIP 2005. , vol. 1, pp. I - 225-8, Sept. 2005.
  36. B. Girod, "The efficiency of motion-compensating prediction for hybrid coding of video sequences," IEEE Journal on Selected Areas in Communications, vol. 5, pp. 1140-1154, Aug. 1987.
  37. P. fin and H. H. Yu, "A semi-fragile watermarking system for MPEG video authentication," Orlando, FL, USA, May 2002.
  38. H. Wang, L. Z, M, S.-H. Sun, T. Simos and P. G, "A Blind Video Watermarking Algorithm Based on SVD in the DCT Domain," AIP Conference Proceedings, pp. 360-364, 2008.
  39. X. Zhao, J. Peng and Y. Xi, "The research on digital watermarking algorithm Based on neural networks and singular value decomposition," Shanghai, July 2011.
  40. Y. Wang and T. Li, "Digital watermarking algorithm based on singular value decomposition and wavelet transformation," Xiamen, March 2012.
  41. L. Zhang and A. Li, "Robust Watermarking Scheme Based on Singular Value of Decomposition in DWT Domain," Shenzhen, July 2009.
  42. D. Wu, W. Kong, B. Yang and X. Niu, "A fast SVD based video watermarking algorithm compatible with MPEG2 Standard," Springer, Soft Computing, vol. 13, no. 4, p. 375–382, June 2008.
  43. J. Kaufman and M. Celenk, "Digital Video Watermarking using Singular Value Decomposition and 2D Principal Component Analysis," In: 2006 International Conference on Image Processing, IEEE, pp. 2561-2564, 2006.
  44. L. Rajab, T. Al-Khatib and A. Al-Haj, "Video Watermarking Algorithms Using the SVD Transform," European Journal of Scientific Research, vol. 30, no. 3, p. 389–401, 2009.
  45. Z. Ni, Y.-Q. Shi, N. Ansari and W. Su, "Reversible Data Hiding," IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, vol. 16, no. 3, pp. 354-362, March 2006.
  46. D.-c. Lou, Chou and Chao-Lung, "Active steganalysis for histogram-shifting based reversible data hiding," optics communication, Elsevier, vol. 285, no. 10, pp. 2510-2518, 2012.
  47. H.-W. Yang, I.-E. Liao and C.-C. Chen, "Reversible data hiding based on grayscale value histogram with optimal multiple pairs of crests and troughs," Chiang Mai, Jan. 2009.
  48. A.Lavanya and V.Natarajan, "Data hiding using histogram modification of difference in medical images based on block division," Chennai, Tamil Nadu, April 2012.
  49. W. Hong, C.-W. Shiu and T.-S. Chen, "A High Quality Histogram Shifting Based Embedding Technique for Reversible Data Hiding," Kaohsiung, Nov.2008.
  50. R. Naskar and R. S. Chakraborty, "Histogram-bin-shifting-based reversible watermarking for colour images," Image Processing, IET , vol. 7, no. 2, Mar. 2013.
  51. b. H. L. C. a. c. Z. Zhenfei Zhaoa, H. Luo, Z.-M. Lu and J.-S. Pand, "Reversible data hiding based on multilevel histogram modification and sequential recovery," AEU - International Journal of Electronics and Communications, Elesivier, vol. 65, no. 10, pp. 814-826, Oct. 2011.
  52. M. Naor and A. Shamir, "Visual Cryptography," Advances in Cryptology Eurocrypt'94 Proceedings, Springer-Verlag, vol. 950, pp. 1-12, 1995.
  53. S. B.SaiChandana, "A New Visual Cryptography Scheme for Color Images," International Journal of Engineering Science and Technology, vol. 2, no. 6, pp. 1997-2000, 2010.
  54. A. Houmansadr and S. Ghaemmagham, "A Digital Image Watermarking Scheme Based on Visual Cryptography," [Online]. Available: http://www.cs.utexas.edu/~amir/papers/IST05.pdf. [Accessed 10 May 2013].
  55. T. R. Singh, K. M. Singh and S. Roy, "Robust Video Watermarking Scheme Based on Visual Cryptography," Trivandrum, Nov. 2012.
  56. S. Ghaemmaghami and A. Houmansadr, "A Novel Video Watermarking Method Using Visual Cryptography," Islamabad, 2006.
  57. A. Vashistha, R. Nallusamy, A. Das and S. Paul, "Watermarking video content using visual cryptography and scene averaged image," Suntec City, July 2010.
  58. Y.-B. Xing and J.-H. He, "A NEW ROBUST COPYRIGHT PROTECTION SCHEME FOR DIGITAL IM AGE BASED ON VISUAL CRYPTOGR APHY," Qingdao, July 2010.
  59. C.-S. Hsu and S.-F. Tu, "Digital Watermarking Scheme with Visual Digital Watermarking Scheme with Visual," Hong Kong, Mar. 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Video Watermarking Data Security User Authenticity