CFP last date
20 December 2024
Reseach Article

Time Performance of Digital Video Watermarking with MATLAB

by Gyanendra Tomar, Deepak Chaudhary, Vikas Chandra Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 45
Year of Publication: 2018
Authors: Gyanendra Tomar, Deepak Chaudhary, Vikas Chandra Sharma
10.5120/ijca2018917107

Gyanendra Tomar, Deepak Chaudhary, Vikas Chandra Sharma . Time Performance of Digital Video Watermarking with MATLAB. International Journal of Computer Applications. 180, 45 ( May 2018), 6-9. DOI=10.5120/ijca2018917107

@article{ 10.5120/ijca2018917107,
author = { Gyanendra Tomar, Deepak Chaudhary, Vikas Chandra Sharma },
title = { Time Performance of Digital Video Watermarking with MATLAB },
journal = { International Journal of Computer Applications },
issue_date = { May 2018 },
volume = { 180 },
number = { 45 },
month = { May },
year = { 2018 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number45/29444-2018917107/ },
doi = { 10.5120/ijca2018917107 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:03:38.880600+05:30
%A Gyanendra Tomar
%A Deepak Chaudhary
%A Vikas Chandra Sharma
%T Time Performance of Digital Video Watermarking with MATLAB
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 45
%P 6-9
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A new framework is established for time-based synchronization in sightless symmetric video watermarking. Embedding and detection models are planned that include the conduct of many video watermarking methods. These representations establish that synchronization is stimulating when the waterline lacks dismissal, but also that well-organized synchronization can be attained by scheming the transformation. The transformation models are modified to spatial synchronization in still image watermarks. For wavelets transformation calculate the execution time and then compare the result with different transformation.

References
  1. A. M. Eskicioglu and E. J. Delp, “An overview of multimedia content protection in consumer electronics devices,” Signal Processing: Image Communication,vol. 16, no. 7, pp. 681–699, Apr. 2001.
  2. E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk, and E. J. Delp, “Advances in digital video content protection,” Proceedings of the IEEE: Special Issue on Advances in Video Coding and Delivery, vol. 93, no. 1, pp. 171–183, Jan. 2005.
  3. J. A. Bloom, I. J. Cox, T. Kalker, J.-P. M. G. Linnartz, M. L. Miller, and C. B. S. Traw, “Copy protection for dvd video,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1267–1276, July 1999.
  4. T. Kalker, G. Depovere, J. Haitsma, and M. Maes, “A video watermarking system for broadcast monitoring,” Proceedings of the SPIE Security and Watermarking of Multimedia Contents, vol. 3657, San Jose, CA, Jan. 25–27, 1999,pp. 103–112.
  5. F. Bartolini, A. Tefas, M. Barni, and I. Pitas, “Image authentication techniquesfor surveillance applications,” Proceedings of the IEEE, vol. 89, no. 10, pp.1403–1418, Oct. 2001.
  6. G. Friedman, “The trustworthy digital camera: Restoring credibility to the photographic image,” IEEE Transactions on Consumer Electronics, vol. 39, pp. 905–910, Nov. 1993.
  7. P. W. Wong and N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593–1601, Oct. 2001.
  8. M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, “Hierarchical watermarking for secure image authentication with localization,” IEEE Transactions on Image Processing, vol. 11, no. 6, pp. 585–595, June 2002
  9. E. T. Lin, C. I. Podilchuk, and E. J. Delp, “Detection of image alterations using semi-fragile watermarks,” Proceedings of the SPIE Security and Watermarking of Multimedia Contents II, vol. 3971, San Jose, CA, Jan. 23–28, 2000, pp. 152–163.
  10. E. T. Lin and E. J. Delp, “A review of fragile image watermarks,” Proceedings of the Multimedia and Security Workshop at ACM Multimedia ’99, Orlando, FL, Oct. 30–31, 1999, pp. 25–29.
  11. A. M. Alattar, ““Smart images” using Digimarc’s watermarking technology,” Proceedings of the SPIE Security and Watermarking of Multimedia Contents II, vol. 3971, San Jose, CA, Jan. 24–26, 2000, pp. 264–273.
  12. S. Katzenbeisser and F. A. P. Petitcolas, Eds., Information Hiding: Techniques for Steganography and Digital Watermarking. Norwood, MA: Artech House, 2000.
Index Terms

Computer Science
Information Sciences

Keywords

Watermarking transformation wavelets