CFP last date
20 December 2024
Reseach Article

Review of Robust Video Watermarking Techniques

Published on None 2011 by Rini T Paul
Computational Science - New Dimensions & Perspectives
Foundation of Computer Science USA
NCCSE - Number 3
None 2011
Authors: Rini T Paul
131862b8-3738-4a22-8a4e-fcbde5fd6f46

Rini T Paul . Review of Robust Video Watermarking Techniques. Computational Science - New Dimensions & Perspectives. NCCSE, 3 (None 2011), 90-95.

@article{
author = { Rini T Paul },
title = { Review of Robust Video Watermarking Techniques },
journal = { Computational Science - New Dimensions & Perspectives },
issue_date = { None 2011 },
volume = { NCCSE },
number = { 3 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 90-95 },
numpages = 6,
url = { /specialissues/nccse/number3/1867-169/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Computational Science - New Dimensions & Perspectives
%A Rini T Paul
%T Review of Robust Video Watermarking Techniques
%J Computational Science - New Dimensions & Perspectives
%@ 0975-8887
%V NCCSE
%N 3
%P 90-95
%D 2011
%I International Journal of Computer Applications
Abstract

There has been a remarkable increase in the data exchange over web and the widespread use of digital media. The mounting interest with reference to digital watermarking throughout the last decade is certainly due to the increase in the need of copyright protection. Applications of video watermarking in copy control, broadcast monitoring, finger printing, video authentication, copyright protection etc is immensely rising. The main aspects of information hiding are capacity, security and robustness. The skill of anyone detecting the information is security and robustness refers to the resistance to modification of the cover content before concealed information is destroyed. Video watermarking algorithms normally prefers robustness. In robust algorithm it is not possible to eliminate the watermark without rigorous degradation of the cover content. In this paper, we introduce the notion of Video Watermarking and features required to design a robust watermarked video for valuable application and focus on various domains of video watermarking techniques.

References
  1. G. Langelaar, I. Setyawan, and R. Lagendijk, "Watermarking Digital Image and Video Data: A State-of Art Overview,” IEEE Signal Processing Magazine, vol. , pp. 20-46, Sep. 2000.
  2. G. Doerr and J. Dugelay, "A Guided Tour to Video Watermarking," Signal Processing: Image Communication, vol. 18, pp. 263-282, 2003.
  3. D. Kundur, K, Su, and D. Hatzinakos, "Digital Video Watermarking: Techniques, Technology, and Trends," in Intelligent Watermarking Techniques , chapter 10, P. Pan, H. Huang, and L. Jain, eds., World Scientific Computing, pp. 265-314, 2004.
  4. H. Hartung and B. Girod, "Watermarking of Compressed and Un-Compressed Video,” Signal Processing, vol. 66, no. 3, pp. 283-301, May 1998. Cox, I. J., Miller, M. L., and Bloom, J. A. Digital Watermarking. Morgan Kaufmann Publishers, San Francisco, CA, 2002, pp. 26–36
  5. M. Rehan et al, A New Motion-Estimation Technique for Efficient Video Compression, IEEE Pacific Rim Conference, No. 1, pp. 326-330, 1997.
  6. H. Andrews and C. Patterson, "Singular Value decompositions and Digital Image Processing," IEEE Trans. on Acoustics, Speech, and Signal Processing, vol. 24, no. 1, pp. 26-53, Feb. 1976.
  7. P. Chan and M. Lyu, "A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code," in Proceedings of the 5th International Conference on Information and Communications Security, 2003, pp. 202-213.
  8. X. Niu and S. Sun, "A New Wavelet-Based Digital Watermarking for Video," in Proceedings of the 9th IEEE Digital Signal Processing Workshop, 2000, pp. 241-245.
  9. S. Voloshynovskiy, S. Pereira, and T. Pun, "Attacks on Digital Watermarks: Classification, Estimation-Based Attacks, and Benchmarks,” Comm. Magazine, vol., pp. 118-126, Aug. 2001.
  10. E. Ganic and A. M. Eskicioglu, “Secure DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies,” ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, September 20-21, 2004.
  11. J. Lee et al, A survey of watermarking techniques applied to multimedia, IEEE International Symposium on Industrial Electronics, Vol. 1, pp. 272-277, 2001.
Index Terms

Computer Science
Information Sciences

Keywords

DWT Robust Techniques SVD Video Watermarking