scispace - formally typeset
Journal ArticleDOI

Fibonacci Based Key Frame Selection and Scrambling for Video Watermarking in DWT---SVD Domain

Reads0
Chats0
TLDR
A new technique for video copyright namely Fibonacci based keyframe selection and scrambling for video watermarking in DWT–SVD is introduced and the experimental results show that the proposed methodology resists different image and video processing attacks.
Abstract
Video copyright is the technique for hiding sensitive data in digital video. This paper aims to introduce a new technique for video copyright namely Fibonacci based keyframe selection and scrambling for video watermarking in DWT---SVD. In this methodology, scene change detection technique is employed for identifying frequent changes in the scenes. In a specific frame, each scene is selected by using keyframes, which are generated by Fibonacci sequence. The initial seeds of the Fibonacci sequence are used as authentication key for generating keyframes. Based on the limitations of the scene changes the authentication keys are generated. The watermark is embedded only in specific frame of the changed scene in LH sub band. The secret image is scrambled using Fibonacci---Lucas transform. In embedding process, singular values (SVs) of the scrambled watermark block are added to the SVs of specific frames, produce the watermarked video collectively. In extraction phase, SVD is performed on the watermarked video to extract the scrambled watermark block from key frames. After that the extracted watermark blocks are collected together to yield the complete scrambled watermark. Later it is descrambled by using the secret keys to generate the original watermark. This method is blind since the host video is not required to extract the watermark. The experimental results show that the proposed methodology resists different image and video processing attacks. In addition, the proposed methodology improves the robustness and quality of both host video and watermark.

read more

Citations
More filters
Journal ArticleDOI

Image Encryption Using Fibonacci-Lucas Transformation

TL;DR: This paper is suggesting a new image encryption model based on Fibonacci and Lucas series based on the need of information security and confidentiality at various levels of communication.
Journal ArticleDOI

A Survey on Robust Video Watermarking Algorithms for Copyright Protection

TL;DR: This paper reviews robust video watermarking algorithms for copyright protection based on original videos and compressed videos, and discusses the challenges in the research and possible development directions for the future.
Journal ArticleDOI

Robust Digital Watermarking Techniques for Copyright Protection of Digital Data: A Survey

TL;DR: This study reviews and compare performance summary of the several state-of-art robust watermarking methods available and proposes some brief theories proposed in the literature on Frequency transformation techniques and various performance evaluation parameters considered by researchers.
Journal ArticleDOI

A discrete wavelet transform and singular value decomposition-based digital video watermark method

TL;DR: A more imperceptible and robust digital video watermarking method that model the problem to achieve the minimum video frame distortion as an optimization problem, i.e., choose embedded positions that can maximize peak signal to noise ratio.
Journal ArticleDOI

A robust digital audio watermarking scheme based on DWT and Schur decomposition

TL;DR: The proposed digital audio watermarking scheme based on a discrete wavelet transform and Schur decomposition hybrid method is inaudible and robust against common types of attacks such as Gaussian noise, re-quantization, re -sampling, low-pass filter, high- pass filter, echo, MP3 compression, and cropping.
References
More filters
Book

A wavelet tour of signal processing

TL;DR: An introduction to a Transient World and an Approximation Tour of Wavelet Packet and Local Cosine Bases.
Journal ArticleDOI

Authentication and authenticated key exchanges

TL;DR: A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols.
Journal ArticleDOI

Watermarking digital image and video data. A state-of-the-art overview

TL;DR: The authors begin by discussing the need for watermarking and the requirements and go on to discuss digitalWatermarking techniques based on correlation and techniques that are notbased on correlation.
Journal ArticleDOI

Simple three-party key exchange protocol

TL;DR: This paper proposes a new simple three-party password based authenticated key exchange protocol that does not require any server's public key, but can resist against various known attacks.
Journal ArticleDOI

A secure and scalable group key exchange system

TL;DR: A Group Key Exchange protocol which is scalable: it has two rounds and the number of modular exponentiations per user is constant and it is secure against a passive adversary if the Diffie-Hellman problem is intractable.
Related Papers (5)