STUDY ON AUDIO AND VIDEO WATERMARKING
نویسندگان
چکیده
منابع مشابه
Study on Audio and Video Watermarking
This paper gives the overview of audio and video watermarking. This paper introduces the basic requirements that affect the algorithms for audio and video watermarking which are perceptibility, robustness and security. The attacks which cause manipulations of the audio and video signals are also discussed. The common group of attacks on audio and video data is dynamics, filtering, conversion, c...
متن کاملSecure spread spectrum watermarking for images, audio and video
We describe a digital watermarking method for use in audio, image, video and multimedia data. We argue that a watermark must be placed in perceptually significant components of a signal if it is to be robust to common signal distortions and malicious attack. However, it is well known that modification of these components can lead to perceptual degradation of the signal. To avoid this, we propos...
متن کاملTwo Novel Chaos-Based Algorithms for Image and Video Watermarking
In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...
متن کاملA chaos-based video watermarking algorithm
The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental ...
متن کاملRobust multiplicative video watermarking using statistical modeling
The present paper is intended to present a robust multiplicative video watermarking scheme. In this regard, the video signal is segmented into 3-D blocks like cubes, and then, the 3-D wavelet transform is applied to each block. The low frequency components of the wavelet coefficients are then used for data embedding to make the process robust against both malicious and unintentional attacks. Th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Communication Networks and Security
سال: 2013
ISSN: 2231-1882
DOI: 10.47893/ijcns.2013.1064