scispace - formally typeset
Open AccessJournal ArticleDOI

A Blind DWT-SCHUR Based Digital Video Watermarking Technique

Reads0
Chats0
TLDR
This paper presents a blind digital video watermarking technique based on a combination scheme between the Discrete Wavelet transform in (DWT) and the real Schur Decomposition which shows high efficiency due to the use of Schur decomposition which requires fewer computations compared to other transforms.
Abstract
Digital watermarking is one of the most powerful tools used in ownership and copyrights protection in digital media. This paper presents a blind digital video watermarking technique based on a combination scheme between the Discrete Wavelet transform in (DWT) and the real Schur Decomposition. The scheme starts with applying two-level DWT to the video scene followed by Schur decomposition in which the binary watermark bits are embedded in the resultant block upper triangular matrix. The proposed technique shows high efficiency due to the use of Schur decomposition which requires fewer computations compared to other transforms. The imperceptibility of the scheme is also very high due to the use of DWT transform; therefore, no visual distortion is noticed in the watermarked video after embedding. Furthermore, the technique proves to be robust against set of standard attacks like: Gaussian, salt and pepper and rotation and some video attacks such as: frame dropping, cropping and averaging. Both capacity and blindness features are also considered and achieved in this technique.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Video Watermarking for Copyright Protection with Genetic-Based FrameSelection

TL;DR: This paper intends to formulate a novel video watermarking framework that includes three stages: (i) Optimal video frame prediction, (ii) A watermark embedding process, and (iii) a watermark extraction process.
Book ChapterDOI

Analysis of Blind Image Watermarking Algorithms

TL;DR: This paper presented an overview of blind image watermarking algorithms and compared pros and cons of using blind method for embedding and extraction of watermark, and implemented these algorithms using MATLAB 2011 and tested on the standard image dataset.
Journal ArticleDOI

Recaptured attack-resilient watermarking scheme

TL;DR: In this paper , the authors proposed a recaptured attack-resilient blind watermarking scheme, which is robust to several geometrical and signal processing attacks, including lens distortions, intensity distortion, and moiré distortion caused by recapture attack.
Journal ArticleDOI

A Hybrid Video Watermarking Technique based on DWT, SVD and SCHUR Decomposition

TL;DR: A robust video watermarking scheme is proposed that will protect videos from being unauthorized manipulation by the intruder and the proposed method has achieved a satisfactory performance against various notable attacks.
References
More filters
Book

Matrix computations

Gene H. Golub
Proceedings ArticleDOI

Digital watermarking using multiresolution wavelet decomposition

TL;DR: In this article, a multiresolution wavelet fusion technique is proposed for the digital watermarking of still images, which is robust to a variety of signal distortions and is not required for watermark extraction.
Proceedings ArticleDOI

A multiresolution watermark for digital images

TL;DR: A new multiresolution watermarking method based on the discrete wavelet transform (DWT), where Pseudo-random codes are added to the large coefficients at the high and middle frequency bands of the DWT of an image.
Journal ArticleDOI

Attacks on digital watermarks: classification, estimation based attacks, and benchmarks

TL;DR: The current work of the European Certimark project is summarized, whose goal is to accelerate efforts from a number of research groups and companies in order to produce an improved ensemble of benchmarking tools.
Proceedings ArticleDOI

A robust video watermarking technique in the spatial domain

TL;DR: The results show that a robust watermark can be embedded in video sequences, and extracted after different attacks, in particular MPEG compression and geometrical attacks like cropping and resizing.
Related Papers (5)