VW16E: A Robust Video Watermarking Technique Using Simulated Blocks

The basic idea for video watermarking technique is concealing information in the video host for different purposes including authentication and tamper detection. The most common approach for concealing information in the video host is spatial domain. This paper focuses on video watermarking; particularly with respect to the Audio Video Interleaved (AVI) form of video file format in spatial domain by simulating blocks. It proposes a new watermarking technique that gives a high imperceptibility and efficient tamper detection compared to the other similar schemes.

[1]  Mazdak Zamani,et al.  An overview on audio steganography techniques , 2012 .

[2]  Zahoor Jan,et al.  Robust and Imperceptible Watermarking of Video Streams for Low Power Devices , 2009, FGIT-SIP.

[3]  Siti Zaiton Mohd Hashim,et al.  A robust video watermarking technique for the tamper detection of surveillance systems , 2015, Multimedia Tools and Applications.

[4]  Akram M. Zeki,et al.  An approach to improve the robustness of substitution techniques of audio steganography , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[5]  Mihai Mitrea,et al.  Semi-fragile watermarking for video surveillance applications , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[6]  M. Zamani,et al.  An Introduction to Image Steganography Techniques , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[7]  Hossein Rouhani Zeidanloo,et al.  Genetic substitution-based audio steganography for high capacity applications , 2011 .

[8]  Akram M. Zeki,et al.  A robust watermark embedding in smooth areas , 2011 .

[9]  Aruna Chakraborty,et al.  Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis , 2011 .

[10]  Shahidan M. Abdullah,et al.  Mazdak Technique for PSNR Estimation in Audio Steganography , 2012 .

[11]  Mazdak Zamani,et al.  Genetic algorithm for fragile audio watermarking , 2014, Telecommunication Systems.

[12]  Siti Zaiton Mohd Hashim,et al.  Evaluation of video watermarking techniques , 2013 .

[13]  Akram M. Zeki,et al.  A secure audio steganography approach , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[14]  Aboul Ella Hassanien A Copyright Protection using Watermarking Algorithm , 2006, Informatica.

[15]  Azizah Bt Abdul Manaf,et al.  Azizah technique for efficiency measurement in steganography , 2012, 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT2012).

[16]  Mazdak Zamani,et al.  Capacity and quality improvement in reversible image watermarking approach , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[17]  Akram M. Zeki,et al.  Robust audio steganography via genetic algorithm , 2009, 2009 International Conference on Information and Communication Technologies.

[18]  S. R. Khot,et al.  Robustness of video watermarking against various attacks using Wavelet Transform techniques and Principle Component Analysis , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[19]  Akram M. Zeki,et al.  A Novel Approach for Audio Watermarking , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[20]  Salwani Mohd Daud,et al.  Discrete Wavelet Transform Domain Techniques , 2013, 2013 International Conference on Informatics and Creative Multimedia.

[21]  Dan Xu,et al.  Palmprint Authentication Based on DCT-Based Watermarking , 2013 .

[22]  S. S. Bedi,et al.  Highly Robust and Imperceptible Luminance Based Hybrid Digital Video Watermarking Scheme for Ownership Protection , 2012 .

[23]  Mazdak Zamani,et al.  Pixel Correlation Behavior in Different Themes , 2013, GRMSE.

[24]  Mazdak Zamani,et al.  Statistical Steganalysis of Four Photo Themes before Embedding , 2013, 2013 International Conference on Advanced Computer Science Applications and Technologies.