TITLE

Robust Video Watermarking based on Dual-plane Correlation for Immunity to Rotation, Scale, Translation, and Random Distortion

AUTHOR(S)
Atomori, Yusuke; Echizen, Isao; Dainaka, Masanori; Nakayama, Shinta; Yoshiura, Hiroshi
PUB. DATE
April 2008
SOURCE
Journal of Digital Information Management;Apr2008, Vol. 6 Issue 2, p161
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
A robust video watermarking method is described that can embed watermarks immune to not only rotation, scaling, and translation but also to random geometric distortion and any of their combinations. It can detect watermarks without any search for canceling the effect of random distortion. Rotation, scale, and translation are canceled by searching for the angle, size, and origin of the original picture. The search for the angle and size is combinatorial but is independent of the search for the origin. That is, the angle and size of the target picture can be restored without restoring the picture's origin. Furthermore, the search for the origin is divided into horizontal and vertical searches that can be carried out independently. The number of searches is thus drastically reduced, making the processing speed high enough for practical application. Experimental evaluation using actual video samples demonstrated that the proposed method can embed watermarks immune to all four types of transformations.
ACCESSION #
31859676

 

Related Articles

  • Towards Increasing the Robustness of Image Watermarking Scheme Against JPEG Compression. Saxena, Vikas; Gupta, J. P. // International MultiConference of Engineers & Computer Scientists;2007, p1903 

    Image Watermarking with both insensible detection and high robustness capabilities is still a challenging problem for copyright protection up to now. Transformed domain has been found more suitable to hide the watermark data. When a watermarked image is highly compressed using low JPEG...

  • A Strategy for Opposing DC Components Watermarking. Pei-Wei Tsai; Shu-Chuan Chu; Hsiang-Cheh Huang; Ting Chou; Jen-Der Day // Journal of Digital Information Management;Apr2008, Vol. 6 Issue 2, p157 

    For the watermarking technique, which embeds the watermark in the dc components of the discrete cosine transform (DCT) based image using the method presented by Huang et al. [1], we present two methods to remove the watermark from the carrier image. In our first method, it removes the watermark...

  • DCT Watermarking Approach for Security Enhancement of Multimodal System. Paunwala, Mita; Patnaik, S. // ISRN Signal Processing;2012, p1 

    We have addressed a novel watermarking algorithm to support the capacity demanded by the multimodal biometric templates. Proposed technique embeds watermark in low frequency AC coefficients of selected 8×8 DCT blocks. Selection of blocks accomplishes perceptual transparency by exploiting the...

  • A Transparent Encryption Scheme for Watermarked Biometric and Medical Images. Talwai, Aniketh; Sengupta, Debabrata; Karthik, Kannan // International Journal of Computer & Electrical Engineering;Jun2012, Vol. 4 Issue 3, p278 

    In today's digital world, maintaining electronic medical and biometric records is an effective way to store, disseminate, and analyze information for a person. However, protection of privacy of the person is also of paramount importance. In this paper, we propose an encryption scheme which is...

  • JPEG Images Authentication with Discrimination of Tampers on the Image Content or Watermark. Hongxia Wang; Changxing Liao // IETE Technical Review (Medknow Publications & Media Pvt. Ltd.);May-Jun2010, Vol. 27 Issue 3, p244 

    The existing compressed-domain fragile watermarking scheme cannot effectively discriminate tampers on the image contents or the embedded watermark or both tampered by attackers; hence, a novel compressed-domain fragile watermarking scheme with the discrimination of tampers on the image content...

  • VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP. Jung-San Lee; Hsiao-Shan Wong; Yi-Hua Wang // International Journal of Computer Science & Information Technolo;Feb2014, Vol. 6 Issue 1, p225 

    Most watermark methods use pixel values or coefficients as the judgment condition to embed or extract a watermark image. The variation of these values may lead to the inaccurate condition such that an incorrect judgment has been laid out. To avoid this problem, we design a stable judgment...

  • A Visible Watermarking Scheme for Digital Images in Frequency Domain. Denslin Brabin, D. R.; Jebamalar Tamilselvi, J.; Janakiraman, S. // International Journal of Advanced Networking & Applications;Nov/Dec2012, Vol. 4 Issue 3, p1635 

    A novel method is proposed for visible watermarking of digital image in frequency domain. The method is based on DCT modification of original image with respect to watermark image. The host image pixels are transformed into frequency coefficients as well as the watermark image pixels are also...

  • Content Based Image-in-Image Watermarking Using DCT and SVD. Tirumala, Ramashri; Reddy, Narayana S. // International Journal of Applied Engineering Research;2009, Vol. 4 Issue 2, p187 

    In this paper we consider content based features like texture, luminance, corners and the edges based attacks including JPEG compression, noise, filtering and rotation etc. Experimental results are evaluated with correlation and PSNR. Experimental results show that the proposed watermarking...

  • Digital Video Watermarking Using Discrete Cosine Transform and Perceptual Analysis. DARSHAN, B. R.; JILANI, S. A. K. // International Journal of Computer Science & Network Security;Sep2013, Vol. 13 Issue 9, p66 

    Due to the extensive use of digital media applications, multimedia security and copyright protection has gained tremendous importance. Digital Watermarking is a technology used for the copyright protection of digital applications. In this paper, a comprehensive approach for watermarking digital...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics