Advertisement

Introduction

  • Ashish M. Kothari
  • Vedvyas Dwivedi
  • Rohit M. Thanki
Chapter
Part of the Signals and Communication Technology book series (SCT)

Abstract

This chapter presents the background of digital watermarking. The basic overview of several types and applications of digital watermarking is given in this chapter. The various existing work for copyright protection of digital videos is also described in this chapter.

Keywords

Digital Watermarking Imperceptibility Robustness Videos 

Bibliography

  1. 1.
    R.B. Wolfgang, C.I. Podilchuk, Perceptual watermarks for digital images and video. Proc. IEEE 87(7), 1108–1126 (1999)CrossRefGoogle Scholar
  2. 2.
    G.C. Langelaar, I. Setyawan, R.L. Lagendijk, Watermarking of digital image and video data – A state of art review. IEEE. Signal. Process. Mag. 17(5), 20–46 (2000)Google Scholar
  3. 3.
    C.I. Podilchuk, E.J. Delp, Digital watermarking: Algorithms and applications. IEEE Signal Process. Mag. 18(4), 33–46 (2001)CrossRefGoogle Scholar
  4. 4.
    R. Chandramouli, N.D. Memon, M. Rabbani, Digital watermarking, in Encyclopedia of Imaging Science and Technology, (Wiley, New York, NJ, 2002)Google Scholar
  5. 5.
    R.T. Paul, in Review of Robust Video Watermarking Techniques, IJCA Special Issue on Computational Science – New Dimensions & Perspectives. (NCCSE, 2011), Cochin, Kerala, IndiaGoogle Scholar
  6. 6.
    M. Kutter, F.A.P. Petitcolas, A fair benchmark for image watermarking systems. Electron. Imaging Secur. Watermarking Multimed. Contents 3657, 25–27 (1999)Google Scholar
  7. 7.
    F.A.P. Petitcolas, Watermarking schemes evaluation. IEEE Signal Process. Mag. 17, 58–64 (2000)CrossRefGoogle Scholar
  8. 8.
    S. Voloshynovskiy, S. Pereira, T. Pun, Attacks on digital watermarks: Classification, estimation-based attacks, and benchmarks. IEEE Commun. Mag. 39, 118–126 (2001)CrossRefGoogle Scholar
  9. 9.
    C.-H. Huang., J.-L.Wu Attacking visible watermarking schemes. IEEE Trans. Multimed. 6(1), 16–30 (2004)CrossRefGoogle Scholar
  10. 10.
    O.O. Khalifa, Y. binti Yusof, A.-H. Abdalla and R.F. Olanrewaju, State-of-the-art digital watermarking attacks. Int. Conf. Comput. Commun. Eng. (ICCCE). 744–750 (2012)Google Scholar
  11. 11.
    CKHCK. Yahaya, H. Hassan and MIBM. Kahmi, Investigation on perceptual and robustness of LSB digital watermarking scheme on Halal Logo authentication. Proc. Int. Conf. Syst. Eng. Technol. 11–12 Sept (2012)Google Scholar
  12. 12.
    Y.K. Lee, L.H. Chen, High capacity image steganographic model. IEEE Proc. Vis. Image Signal Proces. 147, 288–294 (2000)CrossRefGoogle Scholar
  13. 13.
    C.-K. Chan, L.M. Cheng, Hiding data in images by simple LSB substitution. Pattern Recogn. 37, 469–474 (2004)CrossRefGoogle Scholar
  14. 14.
    M. Ramalingam, Stego machine – Video steganography using modified LSB algorithm. World Acad. Sci. Eng. Technol. 74, 502–505 (2011)Google Scholar
  15. 15.
    C.-T. Hsu, J.-L. Wu, Hidden digital watermarks in images. IEEE Trans. Image Proces. 8, 58–68 (1999)CrossRefGoogle Scholar
  16. 16.
    S. Arena, M. Caramma, R. Lancini, Digital watermarking applied to MPEG-2 coded video sequences exploiting space and frequency masking. Proc. Int. Conf. Image Proces. 2, 796–799 (2000)Google Scholar
  17. 17.
    R. Bangaleea and H.C.S. Rughoopth, Performance improvement of spread Spectrum spatial domain watermarking scheme through diversity and attack characterization. in IEEE conf. Africon. 293–298 (2002)Google Scholar
  18. 18.
    R. Lancini, F. Mapelli, S. Tubaro, A robust video watermarking technique in the spatial domain. IEEE Region 8 Int. Symp. Video/Image Proc. Multimed. Commun. Zadar, Croatia. 251–256, 16–19 June 2002Google Scholar
  19. 19.
    D. He, Qibin Sun and Qi Tian, A semi-fragile object based video authentication system. Proc. Int. Symp. Circuits Syst. 814–817 (2003)Google Scholar
  20. 20.
    J.R. Hernandez, M. Amado, F. Perez-Gonzalez, DCT-domain watermarking techniques for still image: Detector performance analysis and a new structure. IEEE Trans. Image Proces. 9, 55–68 (2000)CrossRefGoogle Scholar
  21. 21.
    L. Chun-Shien, H.-Y.M. Liao, Video object-based watermarking: A rotation and flipping resilient scheme. Proc. Int. Conf. Image Proc. (2001)Google Scholar
  22. 22.
    R. O. Preda, D. N. Vizireanu, Blind watermarking capacity analysis of MPEG2 coded video, Proc. Conf. Telecommun. Modern Satell. Cable Broadcast. Serv. Serbia. 465–468 (2007)Google Scholar
  23. 23.
    A. Alper Koz, A. Alatan, Oblivious Spatio-Temporal Watermarking of Digital Video by Exploiting the Human Visual System. IEEE Trans Circuits Syst. Video Technol. 18(3), 326–337 (2008)CrossRefGoogle Scholar
  24. 24.
    T. Sridevi, B. Krishnaveni, V. Vijaya Kumar, Y. Rama Devi, A video watermarking algorithm for MPEG videos, A2CWiC 2010 – Amrita ACM-W celebration of women in computing, 16–17 Sept 2010Google Scholar
  25. 25.
    Y. Ding, X. Zheng, Y. Zhao, G. Liu, A video watermarking algorithm resistant to copy attack, Proc. Third Int. Symp. Electron. Commerce Secur. 29 July 2010Google Scholar
  26. 26.
    Masataka ejima, Akio Miyazaki, A wavelet-based watermarking for digital images and video, IEEE Int. Conf. Image Proc. 678–681 (2000)Google Scholar
  27. 27.
    C.V. Serdean, M.A. Ambroze, M. Tomlinson and G. Wade, Combating geometrical attacks in a dwt based blind video watermarking system. IEEE Region 8 Int. Symp. Video/Image Proces. Multimed. Commun. Zadar, Croatia, 263–266, 16–19 June 2002Google Scholar
  28. 28.
    F. Liang, F. Yanmei, A DWT-based video watermarking algorithm applying DS-CDMA. IEEE Region 10 Conf. TENCON 2006. 14–17 Nov 2006Google Scholar
  29. 29.
    E.L.B.A.S.I. Ersin, Robust mpeg video watermarking in wavelet domain. Trakya Univ. J. Sci. 8(2), 87–93 (2007)Google Scholar
  30. 30.
    A. Essaouabi, E. Ibnelhaj, A 3D wavelet -based method for digital video watermarking. Proc. 4th IEEE Int. Inf. Hiding Multimed. Signal Proc. 29–31 July 2009Google Scholar
  31. 31.
    Raghavendra K, Chetan K.R, A blind and robust watermarking scheme with scrambled watermark for video authentication. Proc. IEEE Int. Conf. Internet Multimed. Services Arch. Appl. 9–11 Dec 2009Google Scholar
  32. 32.
    J. Hussein, A. Mohammed, Robust video watermarking using multi-band wavelet transform. IJCSI Int. J. Comput. Sci. Issues 6(1), 44–49 (2009)Google Scholar
  33. 33.
    S.A.K. Mostafa, A.S. Tolba, F.M. Abdelkader, H.M. Elhindy, Video watermarking scheme based on principal component analysis and wavelet transform. IJCSNS Int. J. Comput. Sci. Netw. Secur. 9(8), 45–52 (2009)Google Scholar
  34. 34.
    T. Al-Khatib, A. Al-Haj, L. Rajab, Video watermarking algorithms using the SVD transform. Eur. J. Sci Res 30(3), 389–401 (2009)Google Scholar
  35. 35.
    Meenal A. Kamlakar, Chhaya Gosavi, Abhijit J. Patankar, Single channel watermarking for video using block based svd. Int. J. Adv. Comput. Inf. Res. 1(2), (2012)Google Scholar
  36. 36.
    F. Huang, Z.-H. Guan, A hybrid SVD-DCT watermarking method based on LPSNR. Pattern Recogn. Lett. 25, 1769–1775 (2004)CrossRefGoogle Scholar
  37. 37.
    L. Rajab, T. Al-Khatib, A. Al-Haj, Hybrid DWT-SVD Video Watermarking. Proc. Int. Conf. Innov. Inf. Technol. 16–18 Dec 2008Google Scholar
  38. 38.
    A. Mansouri, A. Mahmoudi, F. Aznaveh, T. Azar, SVD-based digital image watermarking using complex wavelet transform. Sadhana 34(3), 393–406 (2009)CrossRefGoogle Scholar
  39. 39.
    V. Santhi, Arunkumar Thangavelu, DWT-SVD combined full band robust watermarking technique for color images in YUV color space. Int. J. Comput. Theory Eng. 1(4), 424–429 (2009)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  • Ashish M. Kothari
    • 1
  • Vedvyas Dwivedi
    • 2
  • Rohit M. Thanki
    • 2
  1. 1.Atmiya Institute of Technology and ScienceRajkotIndia
  2. 2.C. U. Shah UniversityWadhwan CityIndia

Personalised recommendations