IJMECS Vol. 7, No. 12, 8 Dec. 2015
Cover page and Table of Contents: PDF (size: 248KB)
Full Text (PDF, 248KB), PP.35-41
Views: 0 Downloads: 0
Watermarking, frequency domain- Discrete Wavelet Transform (DWT), Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT), digital videos
As Watermarking have been considered as an emerging technique for copyright protection, data security and protection of ownership, several techniques and algorithms have been developed and created either in spatial domain or frequency domain mainly to achieve the properties of digital watermarking like robustness, imperceptibility, fidelity, etc. It is also found that the frequency domain techniques provides a better solution in obtaining these properties than the spatial domain. So, most researchers have used this domain in developing a good watermarking scheme for achieving robustness and other important properties of digital watermarking against all kinds of intentional and unintentional attacks. The attacks may include image processing attacks like compression, frame dropping, piracy, geometric distortions, loss of quality, etc. So, utmost importance must be given on how to create a scheme which can achieve robustness against all these attacks at the same time. The medium for watermarking is chosen as video because of its vast future scope So, in this paper, a thorough research on the various techniques available in watermarking based on frequency domain has been done to find out a secure technique that can withstand any kinds of attacks in a digital video.
Monasa Yengkhom, Pradeep Kumar Singh, "An Analysis on Digital Watermarking in Videos based on Frequency Domain Techniques", International Journal of Modern Education and Computer Science (IJMECS), vol.7, no.12, pp.35-41, 2015. DOI:10.5815/ijmecs.2015.12.05
[1]D. Arya, “A survey on frequency and wavelet domain digital watermarking techniques”, International Journal of Scientific & Engineering Research, Vol.1, No. 2, pp. 286-292, 2010.
[2]W. Y. Chen , H. S. Yuan, “ Digital Watermarking using DCT transformation”, National Chin-Yi University Library, China, pp. 173-184, 2012.
[3]A.Poljicak, L. Mandic, D. Agic, “Discrete Fourier transform-based watermarking method with an optimal implementation radius”, Journal of Electronic Imaging, Vol.20, No.3, pp.3001-3009, 2011.
[4]S.A. Patil, N. Srivastava, “Digital video watermarking using Dwt and Pca”, IOSR Journal of Engineering, Vol.3, No. 11, pp. 45-49, 2013.
[5]P. Patil, DS. Bormane, “DWT-based invisible watermarking technique for Digital Images”, International journal of Engineering and Advanced Technology, Vol. 2, No. 4, pp.603-605, 2013.
[6]Z. Jie, “A Novel Block-DCT and PCA Based Image Perceptual Hashing Algorithm”, http://arxiv.org/abs/1306.4079, access on 24/02/2015.
[7]KB. Raja, CR. Chowdary, KR. Venugopal, and LM. Patnaik, “A secure image steganography using LSB, DCT, and compression techniques on raw images”, published in Proceedings of IEEE 3rd International Conference on Intelligent Sensing and Information Processing, Bangalore, India, pp. 170–176, ,2005.
[8]M. Sharma, A. Tiwari, “A Hybrid technique of Video Watermarking in Wavelet domain and Scan based Encryption Method”, IJEDR, Vol.2, No. 3, pp. 3220-3224, 2014.
[9]YY. Lee, HS. Jung, S. Lee, “Multi-bit Video Watermarking Based on 3D DFT Using Perceptual Models”, Springer, Vol. 2939, pp. 301-315, 2004.
[10]E.Ganic, S. D. Dexter, A.M.Eskicioglu, “Embedding Multiple Watermarks in the DFT Domain Using Low and High Frequency Bands”, SPIE, Vol. 5681, pp. 175-184, USA, 2005.
[11]A.Hu, N. Chen, “A Blind Watermarking Algorithm for Color Image Based on Wavelet Transform and Fourier Transform”, published in the proceedings of IEEE 9th International Conference for Young Computer Scientists, ICYCS, Hunan, pp. 1453-1458, 2008.
[12]S. Zheng, Y. Zhu, X. Wang, “A new RST-invariant watermarking scheme based on texture features”, published in Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, e-Forensics '08, Article No. 23, Belgium, 2008.
[13]Y. Liu, J. Zhao, “A new video watermarking algorithm based on 1D DFT and Radon transform”, Signal Processing, Vol.90, No. 2, pp. 626–639, Canada, 2010.
[14]J. Hou, J. Park, D. Kim, S.Nam, H.Lee, “Robust Video Watermarking for MPEG Compression and DA-AD Conversion”, published in the Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, IWIHC ’14, pp.2-8,USA, 2014.
[15]S.Baudry, C. Sevigne, “Frame-accurate temporal registration for non-blind video watermarking”, published in Proceedings of the on Multimedia and security, MM&Sec '12, pp. 19-26, ACM New York, 2012.
[16]M. Schlauweg, D. Pröfrock, B. Zeibich, E.Müller, “Dual watermarking for protection of rightful ownership and secure image authentication”, published in Proceedings of the 4th ACM international workshop on Contents protection and security, MCPS '06, pp. 59 – 66, USA, 2006.
[17]BG. Mobasseri, MP. Marcinak, “Watermarking of MPEG-2 video in compressed domain using VLC mapping”, Published in Proceedings of the 7th workshop on Multimedia and security, pp. 91-94, NY, USA, 2005.
[18]L. Coria, P. Nasiopoulos, R.Ward, “A robust content-dependent algorithm for video watermarking”, Published in Proceedings of the ACM workshop on Digital rights management, DRM ’06, pp. 97 - 10 , NY, USA, 2006.
[19]IK. Kang, DH. Im, HK. Lee, YH. Suh, “Implementation of real-time watermarking scheme for high-quality video”, published in the proceedings of the 8th workshop on Multimedia and security, pp.124-129, Geneva, 2006.
[20]D. Bhowmik, C. Abhayaratne, “Video watermarking using motion compensated 2D+t+2D filtering”, Published in Proceedings of the 12th ACM workshop on Multimedia and security, MM&Sec '10, pp. 127-136, NY, USA, 2010.
[21]U. Mukhopadhyay, S. Sinha, P. Ghosh, R. Ghosh, DK. Kole, A. Chakraborty, “ Enhancing the security of digital Video Watermarking using watermark encryption”, Published in Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, pp. 145-150, 2012.
[22]P. Agarwal, K. Adi, B. Prabhakaran, “ Robust blind watermarking mechanism for motion data streams”, Published in the Proceedings of the 8th workshop on Multimedia and security, MM&Sec '06, pp. 230-235, 2006.
[23]W.Liu, Zhao, “Digital watermarking for volume data based on 3D-DWT and 3D-DCT”, Published in Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, pp.352-357, USA, 2009.
[24]D. Kirovski, H. Malvar, Y. Yacobi, “Multimedia content screening using a dual watermarking and fingerprinting system”, Published in Proceedings of the tenth ACM international conference on Multimedia, pp. 372-381,2002.
[25]Dr.SN. Mali, C.S. Gosavi, “Frame Selection for Video Watermark Embedding using. Scene Change Detection Algorithm”, Technovision-2014, Vol. 5, No. 4, July, 2014.
[26]S.A.K Mostafa, A. S. Tolba, F. M. Abdelkader, H.M. Elhindy, “Video Watermarking Scheme Based on Principal Component Analysis and Wavelet Transform”, International Journal of Computer Science and Network Security, IJCSNS, Vol.9 No.8, pp. 45-52,August 2009.
[27]N. Leelavathy, E. V. Prasad and S. Srinivas Kumar, “3D Scene Based Video Watermarking in Discrete Multiwavelet Domain” International Journal of Multidisciplinary Sciences and Engineering, vol.3, No. 7, pp. 12 -17, 2012.
[28]K. Patel, M.Tiwari, J.Singh, “Video Water Marking Using Abrupt Scene Change Detection”, International Journal of Computer Technology and Electronics Engineering, IJCTEE, Vol. 1, No. 2, pp-187-190, 2011.
[29]P. Chan, MR. Lyu. “Digital Video Watermarking with a Genetic Algorithm”, Published in Proceedings of International Conference on Digital Archives Technologies, ICDAT ’05, pp. 139-153, Taiwan, 2005.
[30]SV. Patel, AR. Yadav, “Invisible Digital Video Watermarking Using 4 Level DWT”, National Conference on Recent Trends in Engineering & Technology, pp.1-6, 2011.
[31]M. El’arbi, C. B. Amar and H. Nicolas, “Video Watermarking Based on Neural Networks”, In Proceedings of IEEE Multimedia and Expo, pp. 1577-1580, 2006.
[32]N.K.Dubey, S. Kumar, “An Effective Approach of Distortion-Resistant Video Watermarking for Piracy Deterrence”, International Journal of Security and Its Applications, Vol.9, No.1, pp.283-294, 2015.
[33]C. N. Sujatha, P. Satyanarayana , “High Capacity Video Watermarking based on DWT-DCT-SVD”, International Journal of Science, Engineering and Technology Research (IJSETR), Vol. 4, No. 2,pp. 245-249, 2015.
[34]Pradeep Kumar Singh, O.P. Sangwan and A. Sharm,a A Systematic Review on Fault Based Mutation Testing Techniques and Tools for Aspect-J Programs, published in 3rd IEEE International Advance Computing Conference, IACC-2013 at AKGEC Ghaziabad, India,22-23,February 2013, IEEE Xplore, pp. 1455-1461, 2013.
[35]P.K. Singh, D. Agarwal, A. Gupta, A Systematic Review on Software Defect Prediction, published in Computing for Sustainable Global Development (INDIACom), IEEE, pp. 1793-97, 2015.
[36]P.K. Singh, Ranjan Panda, O.P. Sangwan, A Critical Analysis on Software Fault Prediction Techniques, published in World Applied Sciences Journal, Vol. 33, No. 3, pp. 371-379, 2015.
[37]Pradeep Kumar Singh, Kritika Verma (2015). An Insight to Soft Computing based Defect Prediction Techniques in Software, International Journal on Modern Education and Computer Science (IJMECS), Hong Kong. Vol. 7, No. 9, pp. 52-58. [ISSN: 2075-0161, ISI Index & Impact Factor = 0.13].
[38]Pradeep Kumar Singh, Anadi Ajay(2015). Novel Digital Image Water Marking Technique Against Geometric Attacks, International Journal on Modern Education and Computer Science (IJMECS), Hong Kong. Vol. 7, No. 8, pp. 61-68. [ISSN: 2075-0161, ISI Index & Impact Factor = 0.13].