Advertisement

High Performance and Energy Efficient Image Watermarking for Video Using a Mobile Device

  • Rabeah Noor
  • Ahmed Khan
  • Aaliya Sarfaraz
Article
  • 28 Downloads

Abstract

This article describes the basic information hiding technique that is most commonly used nowadays. As evolution in the communication media has made information access much easier but has also increased the risks of invading privacy and ownership. To overcome such threats, watermarking is one of the most suitable methods used for hiding information. It is the process of inserting audio, video, image or text for owner verification. A study on spatial and temporal domain watermarking is conducted. An experiment is carried out for the analysis of power and time consumption while inserting and extraction of the watermarks. For better understanding of the concept, embedding of an image on a video was performed using a computer and a mobile with similar logic. This concluded that the watermarking process can be implemented by both computer and mobile phones. Extraction of image was done with PSNR value that was inserted on a video. Only limitation found in this process was tracing back to the source of content theft and that is covered by forensic watermarking.

Keywords

Bit stream Watermarking Android Forensic watermarking High performance Energy efficient 

Notes

References

  1. 1.
    Venugopala, P. S., Sarojadevi, H., & Chiplunkar, N. N. (2017). An approach to embed image in video as watermark using a mobile device. Sustainable Computing: Informatics and Systems, 15, 82–87.Google Scholar
  2. 2.
    Khan, A., Sohaib, M., & Amjad, F. M. (2016). High-capacity multi-layer framework for highly robust textual steganography. Science International, 28(5), 4451–4457.Google Scholar
  3. 3.
    Khan, A. (2015). Comparative analysis of watermarking techniques. Science International, 27(6), 6091–6096.Google Scholar
  4. 4.
    Zheng, Z., Saxena, N., Mishra, K. K., & Sangaiah, A. K. (2018). Guided dynamic particle swarm optimization for optimizing digital image watermarking in industry applications. Future Generation Computer Systems, 88, 92–106.CrossRefGoogle Scholar
  5. 5.
    Khan, A. (2015). Robust Textual Steganography. Journal of Science, 4(4), 426–434.Google Scholar
  6. 6.
    Khan, A., & Sarfaraz, A. (2018). Copy/move forgery detection in MPEG videos used for personal communications. Wireless Personal Communications, 103(4), 2995–3008.CrossRefGoogle Scholar
  7. 7.
    Khan, A. (2014). Joint ownership verification for digital text. Advances in Computer Science and its Applications (ACSA), 3(4), 525–531.Google Scholar
  8. 8.
    Singh, A. K., Kumar, B., Singh, S. K., Ghrera, S. P., & Mohan, A. (2016). Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Generation Computer Systems, 86, 926–939.CrossRefGoogle Scholar
  9. 9.
    Hameed, K., Khan, A., Ahmed, M., Reddy, A. G., & Rathore, M. M. (2018). Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks. Future Generation Computer Systems, 82, 274–289.CrossRefGoogle Scholar
  10. 10.
    Khan, A., & Sarfaraz, A. (2018). Novel high-capacity robust and imperceptible image steganography scheme using multi flipped permutations and frequency entropy matching method. Soft Computing.  https://doi.org/10.1007/s00500-018-3441-1.CrossRefGoogle Scholar
  11. 11.
    Sarfaraz, A., & Khan, A. (2018). Feature selection based correlation attack on HTTPS secure searching. Wireless Personal Communications, 103(4), 2995–3008.CrossRefGoogle Scholar
  12. 12.
    Nayak, A. A., Venugopala, P. S., Sarojadevi, H., & Chiplunkar, N. N. (2014). A survey and comparative study on video watermarking techniques with reference to mobile devices. International Journal of Engineering Research and Applications, 4(12 (Part 6)), 39–44.Google Scholar
  13. 13.
    Wei- Meng, L. (2011). Beginning android application development. Hoboken: Wiely.Google Scholar
  14. 14.
    Suresh Kumar, M., & Madhavi Latha, G. (2014). DCT based secret image hiding in video sequence. International Journal of Engineering Research and Applications, 4(8(Version 1)), 5–9.Google Scholar
  15. 15.
    Haribabu, M., Bindu, C. H., & Swamy, K. V. (2016). A secure & invisible image watermarking scheme based on wavelet transform in HSI color space. Procedia Computer Science, 93, 462–468.CrossRefGoogle Scholar
  16. 16.
    Gupta, A., Chandwani, A., & Yadav, G. (2014). RGB image watermarking on video frames using DWT. In Confluence the next generation information technology summit (confluence), 5th international conference, at Noida, on 2526, (pp. 675–680).Google Scholar
  17. 17.
    Abraham, J., & Paul, V. (2016). An imperceptible spatial domain color image watermarking scheme. Journal of King Saud University-Computer and Information Sciences.Google Scholar
  18. 18.
    Siddiqui, A., & Kaur, A. (2017). A secure and robust image watermarking system using wavelet domain. In 2017 7th international conference on cloud computing, data science & engineering-confluence (pp. 599–604). IEEE.Google Scholar
  19. 19.
    Robert, A., & Doerr, G. (2013). Impact of content mastering on the throughput of a bit stream video watermarking system. In 2013 20th IEEE international conference on image processing (ICIP).Google Scholar
  20. 20.
    Khan, A., & Sarfaraz, A. (2018). Practical Guidelines for securing wireless local area networks (WLANs). International Journal of Security and Its Applications, 12(3), 19–28.CrossRefGoogle Scholar
  21. 21.
    Khan, A., & Sarfaraz, A. (2017). Vetting the security of mobile applications. Science International, 29(2), 361–365.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Bio SciencesCOMSATS UniversityIslamabadPakistan
  2. 2.Department of Computer ScienceCOMSATS UniversityIslamabadPakistan

Personalised recommendations