scispace - formally typeset
Search or ask a question
Author

Rakesh Ahuja

Bio: Rakesh Ahuja is an academic researcher from University Institute of Engineering and Technology, Panjab University. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 6, co-authored 21 publications receiving 77 citations. Previous affiliations of Rakesh Ahuja include Massachusetts Institute of Technology & Uttar Pradesh Technical University.

Papers
More filters
Journal Article
TL;DR: This paper presents a novel technique to protect the copyright information by embedding a bit map image as watermark into the frames of videos in such a way in could be extract to proof the ownership from the video contents.
Abstract: This paper presents a novel technique to protect the copyright information by embedding a bit map image as watermark into the frames of videos in such a way in could be extract to proof the ownership from the video contents. The proposed scheme produce a robust video watermarking scheme into two bands therefore named as multiband with strength α1 and α2 respectively, which result from applying the discrete wavelet transform of every video frame. The watermark is embedded into LLLL band obtained by second level wavelet decomposition and into HH band obtained by single wavelet transformation. Various attacks, such as gaussian noise addition, cropping and rotation, have been applied in order to test the robustness of watermark. Experimental results shown in table 1 and table 2 clearly indicate that we have extracted the watermark successfully from various types of attacked video frames.

18 citations

Journal ArticleDOI
TL;DR: A hybrid digital video watermarking scheme based on discrete wavelet transform and singular value decomposition is proposed, which shows a tradeoff between imperceptibility and resiliency against intentional attacks and unintentional attacks.
Abstract: In this paper a hybrid digital video watermarking scheme based on discrete wavelet transform and singular value decomposition is proposed. Unlike the most existing watermarking schemes, the used watermark is a gray scale image instead of a binary watermark. The watermark is embedded in the original video frames by first converted it into YCbCr color space and than decomposing the luminance part (Y component) into four sub-bands using discrete wavelet transform and finally the singular values of LL sub-band are shaped perceptually by singular values of watermark image. The experimental result shows a tradeoff between imperceptibility and resiliency against intentional attacks such as rotation, cropping, histogram stretching, JPEG compression on individual frames, Indeo5 video compression and unintentional attacks like frame swapping, frame averaging, frame insertion and different types of noise addition. Superiority of the proposed scheme is carried out by comparison with existing schemes to reveal its efficiency for practical applications.

15 citations

Proceedings ArticleDOI
15 May 2015
TL;DR: A blind watermarking algorithm is being proposed in which the watermark information is being embedded by little alteration of some of the value of DCT coefficients of luminance part of video during encoding it in MPEG-2 style.
Abstract: Video watermarking plays a key role in copyright protection domain of today's world. In the following paper, a blind watermarking algorithm is being proposed in which the watermark information is being embedded by little alteration of some of the value of DCT coefficients of luminance part of video during encoding it in MPEG-2 style. It is obvious that for any type of watermarking the three parameters, robustness, perceptibility and payload capacity must be simulated in order to provide better results. But unfortunately there is always a trade off among all these three parameters. But the proposed algorithm focused on one more issue, ‘elapsed time’, a serious concern in video watermarking. The special care must be taken that how much time the system takes to embed the watermark. The algorithm is being tested also against several intentional and unintentional attacks to judge the robustness of this scheme. To maintain the perceptibility issue the value of threshold is manage in such a way that the quality of video must not being compromised during the embedding process. Therefore, the superiority of this algorithm is that our approach has covered three characteristics and evaluated better results as compared to the existing techniques proposed by other researchers.

14 citations

Journal ArticleDOI
TL;DR: The present work calculates the simulation results that shows the watermarking scheme achieved high robustness against video processing attacks frequently occur in the real world and perceptibility also obtained without changing the motion vectors during the DPCM process of MPEG-2 encoding scheme.
Abstract: This paper focuses on moving picture expert group ( MPEG) based digital video watermarking scheme for copyright protection services. The present work implemented the video watermarking technique in which discrete cosine transform (DCT) intermediate frequency coefficients from instantaneous decoder refresh (IDR) frames are utilized. The subset of IDR frames as candidate frames are chosen to reduces the probability of temporal synchronization attacks to achieve better robustness and high visual perceptual quality. A secret key based cryptographic technique is used to enhance the security of embedded watermark. The proposed scheme embedded the watermark directly during the differential pulse code modulation (DPCM) process and extracting through decoding the entropy details. Three keys are required to extract the watermark whereas one of the key is used to stop the extraction process and the remaining two are used to display the watermark. The robustness is evaluated by testing spatial synchronization attacks, temporal synchronization attacks and re-encoding attacks. The present work calculates the simulation results that shows the watermarking scheme achieved high robustness against video processing attacks frequently occur in the real world and perceptibility also obtained without changing the motion vectors during the DPCM process of MPEG-2 encoding scheme.

10 citations

Journal Article
TL;DR: All aspects of video watermarking are placed together in order to helpful to those readers looking the complete literature related to videoWatermarking scheme.
Abstract: The present review covers the video watermarking literature published from 1997 to the year 2015. Through extensive work, some selection is necessary. Therefore, only articles published by a process of peer review in archival journal are reviewed. Papers are grouped according to the implementation techniques and further divided into sub techniques. Many papers deal with fundamental of digital video watermarking, including experimental, numerical and analytical works. Others are related to application or natural system. In addition to reviewing journal articles, this review also takes papers of good conferences and meeting on video watermarking. The main aim of authors is to provide every details regarding digital video watermarking under an umbrella. In other words all aspects of video watermarking are placed together in order to helpful to those readers looking the complete literature related to video watermarking scheme.

9 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The method presented gradually spreads the watermark information over a region of pixels as implemented by the transform domain techniques to deliver the two essential features of watermarking systems namely, high image quality and high robustness to attacks.

116 citations

Journal ArticleDOI
TL;DR: Two new watermarking schemes are proposed which seem to offer a high degree of imperceptibility and efficient tamper detection and were subjected to nine different types of common attack, which revealed one scheme, VW8F, to be superior, particularly in terms of Imperceptibility.
Abstract: A digital watermark embeds an imperceptible signal into data such as audio, video and images, for different purposes including authentication and tamper detection. A real-time video surveillance application requires a large quantity of sequences to be processed, which makes computational efficiency an additional constraint on video watermarking for surveillance systems. As a result, spatial domain schemes are a more efficient than frequency domain schemes. This paper focuses on video watermarking, particularly with respect to the Audio Video Interleaved (AVI) form of video file format. It proposes two new watermarking schemes which seem to offer a high degree of imperceptibility and efficient tamper detection. Both schemes were subjected to nine different types of common attack, which revealed one scheme, VW8F, to be superior, particularly in terms of imperceptibility. VW8F was then compared with a range of similar schemes by other authors. The results show that VW8F offers both improved imperceptibility (average PSNR of 47.87 dB) and proven efficiency at detecting a wider range of tampering compared to the other similar schemes.

42 citations

Journal ArticleDOI
TL;DR: The early work carried out on digital watermarks is described, including the brief analysis of various watermarking schemes and its applications, and a comparison between various water marking schemes is made.
Abstract: This paper presents a literature survey on Digital Watermarking within an image. It describes the early work carried out on digital watermarks, including the brief analysis of various watermarking schemes and its applications. This paper also makes a comparison between various watermarking schemes .This paper also gives us a brief introduction about the procedure of digital watermarking.

23 citations

Journal Article
TL;DR: This paper presents a novel technique to protect the copyright information by embedding a bit map image as watermark into the frames of videos in such a way in could be extract to proof the ownership from the video contents.
Abstract: This paper presents a novel technique to protect the copyright information by embedding a bit map image as watermark into the frames of videos in such a way in could be extract to proof the ownership from the video contents. The proposed scheme produce a robust video watermarking scheme into two bands therefore named as multiband with strength α1 and α2 respectively, which result from applying the discrete wavelet transform of every video frame. The watermark is embedded into LLLL band obtained by second level wavelet decomposition and into HH band obtained by single wavelet transformation. Various attacks, such as gaussian noise addition, cropping and rotation, have been applied in order to test the robustness of watermark. Experimental results shown in table 1 and table 2 clearly indicate that we have extracted the watermark successfully from various types of attacked video frames.

18 citations

Journal Article
TL;DR: This paper summarizes various aspects of digital watermarking Keywords: Digital Watermarking, discrete wavelet transform.
Abstract: With the advent of internet peoples shares the information such as images, audio and video files easily. The internet is excellent distribution system for transferring document to any corner of the world. This feature leads to the problem of ownership. Digital watermarking is a technology basically designed to deal with such problems. This paper summarizes various aspects of digital watermarking Keywords: Digital Watermarking, discrete wavelet transform.

15 citations