33 research outputs found

    A New Video authentication Template Based on Bubble random Sampling

    Get PDF
    The rapid growth of digital video distribution has highlighted new important issues in digital rights management, as well as in other important applications such as video authentication. Digital watermarking offers a promising solution against piracy and it is therefore a very active area of research. However, robustness to video manipulations, either malicious or not, is a demanding task because there are many different types of possible attacks that can be envisioned. Among these, geometric and temporal distortions play the major roles. The countermeasures against these specific attacks are still an open challenge. In this paper we propose the use of a video authentication template based on bubble random sampling. The authentication template is introduced in order to ensure temporal synchronization and to prevent content tampering. The simulation results are encouraging and this approach is therefore worth further development efforts

    Robust Digital Video Watermarking using Reversible Data Hiding and Visual Cryptography

    Get PDF
    Watermarking is a major image processing application used to authenticate user documents by embedding and hiding some authenticated piece of information behind an image, audio or the video file. For example, copyright symbols or signatures are often used. Our proposed work is to develop and implement an improved layered approach to video watermarking. The traditional watermarking approach tends to embed an entire watermark image within each video frame or within random video frames to give the appearance of a hidden watermark to the casual observer. This work proposes a more efficient and secure approach to perform watermarking, by using sub image classification. That is to say, selected frames only will contain a fractional number of pixels from the watermark image. We take k bits from the watermark and store then within a video frame, depending on the size of that watermark image. Our algorithm is capable of hiding high capacity information over video frames. The novel approach is to partially distribute the watermarking data over a set of frames until the entire watermark is eventually distributed throughout the entire video. The originality our technique is that it is a histogram inspired and reversible watermarking approach as defined with visual cryptography. Our approach hides similar watermarking pixels with frames of a similar appearance. Differing sets of watermark pixels are thus embedded within dissimilar frames, thus making the system more robust. It will provide a high degree of authentication, as the extraction of information from a single frame only will not reveal the entire watermarking data, or even give any obvious indication that it contains a fraction of the watermark pixels. The resilience of our technique will be tested by performing various systematic attacks upon a series of videos watermarked in this manner

    A Novel DWT-Based Watermarking for Image with The SIFT

    Get PDF
    A kind of scale invariant features transformation (SIFT for short) operators on DWT domain are proposed for watermarking algorithm. Firstly, the low frequency of the image is obtained by DWT. And then the SIFT transformation is used to calculate the key feature points for the low frequency sub-image. Based on the chosen space’s key points with moderate scale, a circular area as watermark embedding area is constructed. According to the research and final results, the novel digital watermark algorithm is proposed benefiting from the characteristics of SIFT’s key points and local time-frequency of DWT. The algorithm not only has good robustness to resist on such operations as compression, shearing, noise addition, median filtering and scaling, but also has good inhibition to possible watermark fake verification

    Hardware Implementations of Video Watermarking

    Get PDF
    Various digital watermarking (WM) techniques for still imaging have been studied in the last several years. Recently, many new WM schemes have been proposed for other types of digital multimedia data, such as text, audio and video. This paper presents a brief overview of existing digital video WM. We classify WM techniques and discuss the properties of video WM. Since each WM application has its own specific requirements, WM design must take the intended application into consideration. Video WM applications are also discussed in the paper. The features of video WM implementations in software and hardware and their differences are presented through the description of four examples of existing work

    Improve a secure blind watermarking technique for digital video

    Get PDF
    In recent years, digital watermark video has become increasingly popular in a range of industries, but because it is widely available on the Internet, it is simple to make unlawful copies and tamper with digital video. Watermarking digital video has become more popular as a method of detecting changes and preventing illegal duplication. This paper presents a video copyright protection system that is secure, blind, and robust. Two approaches that are resistant to diverse attacks are proposed in this research. The initial step is to encrypt a hybrid watermark (Message, Image) using two different encryption techniques (RSA and AES).The second is a steganography technique based on LSB-based robust watermarking, which embeds an encrypted secret bit Message and Image in key frames of an MP4 video file by utilizing the mean of the grayscale images that differ and take the most significant differences between the two images. The intensity of the histogram will become more consistent across all pixels as the encryption quality improves. For keyframe watermarking in the spatial domain, the proposed methods can maintain the watermarked information while achieving high imperceptibility and a Peak Single to Noise Ratio [PSNR] equivalent to more than 50 db, where quality measures (MSE, PSNR, and correlation coefficient) that calculate the levels of distortion caused by embedding a watermark in digital video produce good results

    A Robust Video Watermarking Scheme of H.264

    Get PDF
    [[abstract]]We present a video watermarking scheme which is robust to video coding standards H.264. The proposed scheme embeds watermark on all AC coefficients of 4Ã4 DCT blocks of I-frames. It integrates Watson's human visual system and the contents of 4Ã4 DCT blocks to determine the embedding strength. Since the high correlation of the video content within one scene, producing similar embedding strength, the scheme has the property of same watermarks for same scenes and different watermarks for different scenes. Thus, it can successfully resist the collusion attacks. Experiments validate that the proposed scheme has advantage of the invisibility, and it is robust to collusion attacks as well as H.264 compression.[[sponsorship]]IEEE Taipei Section; National Science Council; Ministry of Education; Tamkang University; Asia University; Providence University; The University of Aizu; Lanzhou University[[conferencetype]]國際[[conferencetkucampus]]淡水校園[[conferencedate]]20091203~20091205[[iscallforpapers]]Y[[conferencelocation]]Taipei, Taiwa

    Reversible color video watermarking scheme based on hybrid of integer-to-integer wavelet transform and Arnold transform

    Get PDF
    Unauthorized redistribution and illegal copying of digital contents are serious issues which have affected numerous types of digital contents such as digital video. One of the methods, which have been suggested to support copyright protection, is to hide digital watermark within the digital video. This paper introduces a new video watermarking system which based on a combination of Arnold transform and integer wavelet transforms (IWT). IWT is employed to decompose the cover video frames whereby Arnold transform is used to scramble the watermark which is a grey scale image. Scrambling the watermark before the concealment makes the transmission more secure by disordering the information. The system performance was benchmarked against related video watermarking schemes, in which the evaluation processes consist of testing against several video operations and attacks. Consequently, the scheme has been demonstrated to be perfectly robust

    Audio, Text, Image, and Video Digital Watermarking Techniques for Security of Media Digital

    Get PDF
    The proliferation of multimedia content as digital media assets, encompassing audio, text, images, and video, has led to increased risks of unauthorized usage and copyright infringement. Online piracy serves as a prominent example of such misuse. To address these challenges, watermarking techniques have been developed to protect the copyright of digital media while maintaining the integrity of the underlying content. Key characteristics evaluated in watermarking methods include capability, privacy, toughness, and invisibility, with robustness playing a crucial role. This paper presents a comparative analysis of digital watermarking methods, highlighting the superior security and effective watermark image recovery offered by singular value decomposition. The research community has shown significant interest in watermarking, resulting in the development of various methods in both the spatial and transform domains. Transform domain approaches such as Discrete Cosine Transform, Discrete Wavelet Transform, and Singular Value Decomposition, along with their interconnections, have been explored to enhance the effectiveness of digital watermarking methods

    Novel steganography scheme using Arabic text features in Holy Quran

    Get PDF
    With the rapid growth of the Internet and mobile devices, the need for hidden communications has significantly increased. Steganography is a technique introduced for establishing hidden communication, Most steganography techniques have been applied to audio, images, videos, and text. Many researchers used steganography in Arabic texts to take advantage of adding, editing or changing letters or diacritics, but lead to notable and suspicious text. In this paper, we propose two novel steganography algorithms for Arabic text using the Holy Quran as cover text. The fact that it is forbidden to add, edit or change any letter or diacritics in the Holy Quran provides the valuable feature of its robustness and difficulty as a cover in steganography. The algorithms hide secret messages elements within Arabic letters benefiting from the existence of sun letters (Arabic: ḥurūf shamsīyah) and moon letters (ḥurūf qamarīyah). Also, we consider the existence of some Arabic language characteristics represented as small vowel letters (Arabic Diacritics). Our experiments using the proposed two algorithms demonstrate high capacity for text files. The proposed algorithms are robust against attack since the changes in the cover text are imperceptible, so our contribution offers a more secure algorithm that provides good capacity
    corecore