Two Kinds of Digital Video Watermarking Algorithm Implement and Compare
نویسندگان
چکیده
With the rapid development of multimedia technology, large amounts of digital information turn into easy storage and transmission, at the same time, copyright protection and authentication become a problem to be solved. Digital Video is composed of a series of continuous static images, because of its own characteristic, general image watermarking technology is difficult to direct extension to the video signal. In this paper, by using DCT transform and DWT transform, combined with the mean quantization algorithm, using three dimensional frequency domain transformation, introduces two kinds of transformation to the 3D video watermarking technology, utilize the quantitative test method to prove the existence of the watermark, and through the attacked experiments to verify the low complexity and well imperceptibility and robustness about the video watermarking algorithm.
منابع مشابه
Two Novel Chaos-Based Algorithms for Image and Video Watermarking
In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...
متن کاملA chaos-based video watermarking algorithm
The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental ...
متن کاملA survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملA Robust Digital Image Watermarking Scheme Based on DWT
In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...
متن کاملRobust Digital Image Watermarking Technique Based on Histogram Analysis
Watermarking techniques can be classified into two main categories; Spatial and Transformational approaches. They are characterized to rely on descriptive global models through which each technique is formalized and structured using models of Steganography and Encryption. This paper presents a robust digital image watermarking technique that attributes the watermarking process to signal modulat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014