High Performance and Energy Efficient Image Watermarking for Video Using a Mobile Device

This article describes the basic information hiding technique that is most commonly used nowadays. As evolution in the communication media has made information access much easier but has also increased the risks of invading privacy and ownership. To overcome such threats, watermarking is one of the most suitable methods used for hiding information. It is the process of inserting audio, video, image or text for owner verification. A study on spatial and temporal domain watermarking is conducted. An experiment is carried out for the analysis of power and time consumption while inserting and extraction of the watermarks. For better understanding of the concept, embedding of an image on a video was performed using a computer and a mobile with similar logic. This concluded that the watermarking process can be implemented by both computer and mobile phones. Extraction of image was done with PSNR value that was inserted on a video. Only limitation found in this process was tracing back to the source of content theft and that is covered by forensic watermarking.

[1]  Arun Kumar Sangaiah,et al.  Guided dynamic particle swarm optimization for optimizing digital image watermarking in industry applications , 2018, Future Gener. Comput. Syst..

[2]  S VenugopalaP A Survey and Comparative Study on Video Watermarking Techniques with Reference to Mobile Devices , 2014 .

[3]  Arashdeep Kaur,et al.  A secure and robust image watermarking system using wavelet domain , 2017, 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence.

[4]  Amit Kumar Singh,et al.  Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network , 2016, Future Gener. Comput. Syst..

[5]  Maruturi Haribabu,et al.  A Secure & Invisible Image Watermarking Scheme Based on Wavelet Transform in HSI Color Space , 2016 .

[6]  Gwenaël J. Doërr,et al.  Impact of content mastering on the throughput of a bit stream video watermarking system , 2013, 2013 IEEE International Conference on Image Processing.

[7]  Ahmed Khan,et al.  Novel high-capacity robust and imperceptible image steganography scheme using multi-flipped permutations and frequency entropy matching method , 2019, Soft Comput..

[8]  Karen A. Scarfone,et al.  Vetting the Security of Mobile Applications , 2015 .

[9]  Ahmed Khan Joint Ownership Verification for Digital Text , 2015, CSA 2015.

[10]  Ahmed Khan,et al.  Practical Guidelines for Securing Wireless Local Area Networks (WLANs) , 2018 .

[11]  Niranjan N. Chiplunkar,et al.  An approach to embed image in video as watermark using a mobile device , 2017, Sustain. Comput. Informatics Syst..

[12]  Ahmed Khan,et al.  Feature Selection Based Correlation Attack on HTTPS Secure Searching , 2018, Wirel. Pers. Commun..

[13]  Ahmed Khan Robust Textual Steganography , 2015 .

[14]  Varghese Paul,et al.  An imperceptible spatial domain color image watermarking scheme , 2016, Journal of King Saud University - Computer and Information Sciences.

[15]  Mansoor Ahmed,et al.  Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks , 2017, Future Gener. Comput. Syst..

[16]  G. Madhavi Latha,et al.  DCT Based Secret Image Hiding In Video Sequence , 2014 .