A Robust Watermarking Method for Mpeg-4 Based on Kurtosis

Size: px
Start display at page:

Download "A Robust Watermarking Method for Mpeg-4 Based on Kurtosis"

Transcription

1 Advance Access publication on 24 October 2014 c The British Computer Society All rights reserved. For Permissions, please journals.permissions@oup.com doi: /comjnl/bxu112 A Robust Watermarking Method for Mpeg-4 Based on Kurtosis Murat esilyurt 1, ildiray alman 1, and A. Turan Ozcerit 2 1 Computer Engineering Department, Turgut Ozal University, Ankara, Turkey 2 Computer Engineering Department, Sakarya University, Sakarya, Turkey Corresponding author: yyalman@turgutozal.edu.tr Watermarking is a method of data hiding in relation to information security and copyright protection. In this paper, a new kurtosis-based watermarking approach is proposed for compressed video files. The proposed approach has two main parts. First, an intraframe of the video file is transformed from RGB to CbCr color space and each component s kurtosis value is calculated. A threshold kurtosis value is determined for the video because it is recommended to interpret the kurtosis values in combination with noise and resolution measurement. Secondly, the middle band Discrete Cosine Transform (DCT) coefficients of the luminance () component is used for watermarking processes considering the threshold kurtosis values. Each bit of the binary watermark is embedded in a different DCT block. The experimental results show that the proposed method can be safely used for watermarking processes when the point of interest is binary watermarks. In addition, the proposed watermarking approach is highly imperceptible and robust. Statistical and perceptual quality evaluations show that the proposed approach is better than its counterparts. 1. ITRODUCTIO Digital watermarking is a novel technique developed to overcome the problem of copyright protection of digital content [1]. A lot of watermarking methods have been developed in the last decade, because widespread applications in conjunction with the increasing speed of the Internet have resulted in an increase in the illegal use of digital content [2]. In general, watermarking schemes can be classified into two methods for data hiding in compressed video streams. The scheme in the first method is to fully decompress the video, embed the watermark into the raw video and then finally recompress the video data again. This approach s disadvantages are additional compression noise and a degradation of video quality during the re-compression process. Moreover, a binary watermark is not robust against attacks [3]. It requires fully decompressing for watermark-embedding and then, recompressing the watermarked video stream again. Another method is to embed and detect directly in the compressed video stream to avoid computationally demanding operations [4]. Motion Vector (MV) domain, Variable Length Code (VLC) domain and some transform (i.e. Discrete Cosine Keywords: Mpeg-4; compressed video stream; Kurtosis; watermarking Received 27 February 2014; revised 2 October 2014 Handling editor: Suchi Bhandarkar Transform (DCT), Discrete Wavelet Transform, Discrete Fourier Transform) domains have been used for this dataembedding approach. Xu et al. [5] have proposed that MV information can be selected for watermark hiding and extraction processes while control information is embedded to the I-frame in each group of pictures. In another approach, Fang and Chang [6] have used MV in macroblocks interframe (P and B frame) in the video stream for embedding data. Langelaar et al. [7] have proposed a scheme where data are embedded by modifying the code generated by VLC. Furthermore, Pranata et al. s [8] method proposes that data embedding is achieved by associating bit lengths of a set of multiple watermarked VLC code words. Many watermarking techniques use the DCT domain, which has three regions, Low Frequency (DC), Mid-Band Frequency and High Frequency (AC). Hsu and Wu [9] have proposed the raw video watermarking matter by a DCT transform on a block-by-block basis in a video stream. Similarly, a robust watermarking method has been proposed in DCT coefficients for both JPEG and MPEG standards [10]. Langelaar and

2 1646 M. esilyurt et al. (a) (b) M n n+1 n+2 n+3 t Lagendijk s [11] method has proposed to embed the watermark to the Intra (I) frame of the MPEG video stream. It is based on selectively discarding high-frequency DCT coefficients in the compressed data stream. Sarkar et al. s [12] method has proposed a high-volume transform domain data hiding in MPEG-2 video files. They have applied Quantization Index Modulation to low-frequency DCT coefficients and adapted the quantization parameter based on MPEG-2 parameters. Furthermore, they have varied the embedding rate depending on the type of frame. Barni et al. s [13] method has proposed a watermarking method for MPEG-4 embedding in some middle frequency DCT coefficients for the luminance blocks of pseudo-randomly selected macroblocks. Besides, Alattar et al. [14] have proposed the spatial spread-spectrum watermark, which is embedded directly to compressed MPEG-4 bit streams by modifying DCT coefficients. These days, H.264 or (Advanced Audio-Video Coding/ Decoding Standard) AVC is a relatively new standard for video compression like MPEG-4 structure. H.264/AVC is a hybrid video coder; intra- and Interprediction are used together to exploit spatial and temporal redundancies, respectively [15]. Tang et al. [16] have proposed that data are embedded into DC coefficients of 4 4 macroblocks inside the I- frame of H.264/AVC. Besides, Tian et al. [17] propose Context Adaptive VLC (CAVLC)-based blind watermarking for H.264/AVC. It ensures that watermarking data are only embedded into the last non-zero non-trailing AC coefficients in CAVLC. From these points of view, a kurtosis-based watermarking approach is proposed in this paper for MPEG-4 video files. The proposed approach is based on directly embedding and directly detecting the watermark to the compressed video stream to avoid computationally demanding operations. The paper is organized as follows: Section 2 presents the structure of MPEG-4 and its details; Section 3 describes the statistical texture features of video frames; Section 4 presents the proposed watermarking method and its details (selection appropriate frame, embedding algorithm, use of the neighbor coefficients method and watermark extraction). Experimental FIGURE 1. I, P, B frames (a) and sample video sequence in time t (b). results and conclusions are presented in Sections 5 and 6, respectively. 2. STRUCTURE OF MPEG-4 Efficient video compression techniques remove spatial, temporal and perceptual redundancy from a video. Many digital video applications employ lossy compression techniques, such as MPEG-1, MPEG-2 and MPEG-4. Basically, the structure of the MPEG-4 standard is no different from other MPEG standards. They are all cosine-transform-based compression standards and constitute the same units, such as block-based motion compensation, motion-vector and motion quantization. In addition, MPEG-4 has an I (Intra) Frame, a P (Predictive) Frame and a B (Bi-directional) frame [17]. I, P and B frames in an MPEG structure and sample video sequence (M resolution) can be seen in Fig. 1. Each frame of input video sequence is segmented into a number of arbitrarily shaped regions, Video Object Planes (VOPs) and the shape, motion and texture information of the VOPs belonging to the same Video Object (VO) are coded into a separate Video Object Layer. The first VOP is coded as the I- frame (I-VOP coding mode) by splitting it into macroblocks. Each macroblock has a luminance () component and a chrominance (C) component in 8 8 pixel blocks. Each 8 8 block is produced as a DCT coefficient, and then quantized resulting in that block. Each subsequent VOP in the Group of Object Video is coded using P-VOP or B-VOP redundancy and then into blocks that are compressed in the same way as I-VOP blocks [12]. Video compression field tests of natural video at rates below 1 Mbps have consistently indicated better performance for MPEG-4 than for MPEG-1 and MPEG-2 [14]. 3. THE STATISTICAL TEXTURE FEATURES OF A FRAME The statistical texture features mean that standard deviation, skewness and kurtosis are calculated by using the probability distribution of intensity levels. Here, I is the matrix of

3 A Robust Watermarking Method 1647 Original Video Watermark Watermarked Video Is the Take a Kurtosis DCT EP Frame Encoding Value ()' Suitable? CT DCT IDCT ICT FIGURE 2. General scheme of the proposed kurtosis-based watermark-embedding approach. luminance () component of only one frame in an original video, and n is the matrix elements. Ī can be calculated as I = 1 n I i (1) n Mean value and standard deviation are directly related to each other. If available data are close to the mean, standard deviation is low, otherwise standard deviation is high. Standard deviation (stddev) is equal to 0 available data are distributed evenly (Eq. 2). ( ) 1/2 1 n stddev = (I i I ) 2 (2) n i=0 Skewness is a measure of the asymmetry of a distribution around its mean (Equation 3). It can be positive or negative. A negative skewness value means that the tail lies on the lefthand side of the probability density and the bulk of the values lie to the right of the mean; a positive skewness value is vice versa. Skewness = i=0 (1/n) n ( i=0 Ii I ) 3 ( (1/n) n ( i=0 Ii I ) ) 3 (3) 2 The fourth process, kurtosis, is a measure of peakedness of the available distribution of data (Equation 4). An image s kurtosis value is directly related to noise ratio and resolution. It is not required to have a very high value. Separation of rarefaction of the rise of the value of the distribution (deviation) indicates this. Kurtosis = (1/n) n ( i=0 Ii I ) 4 ( (1/n) n ( i=0 Ii I ) ) 4 (4) 2 The Kurtosis value is very important feature which is used for comparison of frames features for watermarking in the proposed method. The most widely used method, for comparison of two frames, is a method of examining histograms of frames. But the histogram method, mean, standard deviation and skewness values may be the same. On the contrary, only the kurtosis values are not the same. Specifically, differences in density of DCT coefficients can be understood by the presence of kurtosis values. Thus, providing a robust watermarking can be done [18]. In addition, kurtosis values are always positive values and greater than zero. Therefore, mathematical calculation is reduced and easier. 4. PROPOSED KURTOSIS-BASED WATERMARKIG APPROACH This section presents the proposed kurtosis-based watermarking approach for MPEG-4 video files. The binary watermarkembedding algorithm is based on DCT and middle band coefficients of the luminance DCT block and I-Frames are used for watermark bit embedding. Figure 2 presents a general scheme of the proposed embedding process, where CT, EP, DCT, IDCT and ICT represent Color Transformation (RGB to CbCr), Embedding Process, which is an unimportant step in the proposed method s base process (it is detailed in the following subsections), DCT, Inverse DCT and Inverse Color Transform, respectively Kurtosis-based suitable frame selection for watermarking Many researchers have used I-Frames of compressed videos for watermarking [19, 20]. The most important process for the proposed approach is suitable frame selection. The suitable frame selection and decision process are based on the kurtosis and it is the best method for achieving robustness. The kurtosis value of each frame gives resolution and noise ratio information about the frame. In Fig. 3, there are some versions of the test video s (Mobile.mp4) I-frames under attack. While the kurtosis value of luminance () component of the original I-frame is 3.28 (Fig. 3a), its distorted version s (salt and pepper noise) value is 3.31 (Fig. 3b). This means that the kurtosis value is increased when the frame is distorted.

4 1648 M. esilyurt et al. FIGURE 3. The kurtosis value of the original frame s component is 3.28 (a), the kurtosis value of the distorted (Salt and Pepper noise) frame is 3.31 (b), the kurtosis value is 3.29 after the original frame s resolution ( ) is changed to.sif format ( ) (c), the kurtosis value of the distorted (Gaussian noise) frame is 3.35 (d). The changing of the image resolution is another important factor that affects the kurtosis value. After the original frame (.cif file format, resolution) has been converted to the.sif file format ( resolution), the kurtosis value is 3.29 (Fig. 3c). Similarly, after Gaussian noise has been added to the luminance component of the original I-Frame, the kurtosis value is 3.35 (Fig. 3d). As mentioned previous paragraph, if noise ratio on the frame increases, the kurtosis value increases, too. This also indicates the abundance of the video frame s degradation. As mentioned above, our aim is to minimize data loss on the watermark when it is extracted from a distorted video frame. A kurtosis value of luminance component is more efficient in terms of noise ratio and unwanted changes. Thus, kurtosis values play a crucial role during frame selection for watermarking. If watermarking processes are applied on the frames without taking this into consideration, it will not be a robust watermarking scheme. The kurtosis value is used to prevent the probable loss on the watermark. All frames kurtosis values of Foreman (300 frames), Mobile (299 Frames), Tennis (150 frames) and Tempete (260 frames) test videos are shown in Fig. 4. Each video file has its own kurtosis value set. What is important here is the set of values in the general distribution of the values are outside. Because, the noise (i.e. jpeg compression, salt and pepper noise, Gaussian noise, etc.) on an image causes marginal change on the kurtosis value of the frame as seen in Fig. 3. Kurtosis values of all the frames for Foreman are seen as a cluster between 10 and 40 (Fig. 4a). Similarly, kurtosis values of all the frames for Mobile, Tennis and Tempete are seen as a cluster between 0 and 5, 0 and 2, and 0 and 20, respectively (Fig. 4b d). Thus, it can be said that some frames where the kurtosis values are outside of the cluster should be ignored for robust watermarking because they have marginal kurtosis values (Fig. 3). Considering the fact that the frames which have marginal kurtosis values are more distorted than the other frames Watermark-embedding and extraction processes After kurtosis-based suitable frames are selected for watermarking, the binary watermark is embedded to DCT blocks of

5 A Robust Watermarking Method 1649 (a) 180 Kurtosis Values (b) Kurtosis Values (c) Kurtosis Values (d) Kurtosis Values FIGURE 4. Kurtosis values of each frame for Foreman (a), Mobile (b), Tennis (c) and Tempete (d).

6 1650 M. esilyurt et al. I-frames because it is usually used for robust embedding processes in compressed videos. Watermark-embedding steps are given as follow: (iii) Appropriate I-Frames that are inside the threshold values? are used for the watermark-embedding processes as detailed below. (i) At first, the watermark-embedding process starts with decoding the original video and each I-frame is transformed from RGB to CbCr color components. (ii) All components kurtosis values are calculated. These kurtosis values are saved for a decision, which means determination of threshold kurtosis values and selection of the appropriate I-frames for watermarking. D 2 + C D2 >D 1 SWAP D2, D1 W(i)=1 D 1 >D 2 SWAP D1, D2 FIGURE 5. The flow chart of EP [20 22]. Is the D 1 + C As previously mentioned, a new embedding approach has been developed for robustness, inspired by the method detailed in [20 22]. The method can embed a bit in each DCT block. Let us assume that the selected frame size is M and the luminance component () is divided by 8 8 blocks for the watermark-embedding process. Block numbers in image (I bn ) can be calculated as seen in Equation (5). Then, each block of component is separately transformed to 2D-DCT after color transformation. I bn = (M )/64 (5) It is important to note that the watermark is embedded several steps into the cover frame. The steps depend on the size of the selected frame and watermark. In the embedding process, each binary watermark bit has been embedded using DCT(5, 2) and DCT(4, 3) coefficients of the mid-band frequency fields of the luminance () component. In this study, DCT(5, 2) and DCT(4, 3) coefficients are referred to as D 1 and D 2, respectively. Take a Kurtosis Frame Value DCT WE () Encoding Suitable? CT ICT FIGURE 6. WE processes. Watermark (a) (b) FIGURE 7. DCT coefficients of Mobile (a) and Foreman (b) video frames after watermark bit (1) 2 embedding (D 1 > D 2 ).

7 A Robust Watermarking Method 1651 (a) (b) FIGURE 8. DCT coefficients of Mobile (a) and Foreman (b) video frames after extracting the watermark bit (D 2 > D 1 ). FIGURE 9. Defective block numbers for I-Frames in which the kurtosis value is outside the threshold values. TABLE 1. The number of DB and DB K for the reference videos I-frames. Sample Video Frame Acquirement video format size DB DB K performance (%) Foreman MPEG R Hall Monitor MPEG R Mobile MP4 R Tennis MP4 R Foreman Mp4 R Tempete Mp4 R Tennis Mp4 R The proposed method can be applied without the process of adding or subtracting to the coefficients of each DCT located in the blocks (8 8) unlike many others (Fig. 5). While the Embedding Process (EP) is realized into each block, if the watermark bit is equal to 1, D 1 is expected to be larger than D 2. If the data equals 0, then D 2 is expected to be larger than D 1 (Equation 6)[20 22]. { } D1 > D 2 1 w(i, j) = D 1 < D 2 0 The DCT coefficients may become very close to each other depending on the structure of the cover images during the EP. That is why a constant C is defined to prevent possible losses when the watermark is extracted (Fig. 5) [20 22]. This way, watermarked coefficients become less affected from the distortions and attacks by the DCT and IDCT processes. During the extraction process, DCT(5, 2) and DCT(4, 3) watermarked coefficients are referred to as D 1 and D 2, respectively, and watermark bits are extracted as seen below (Fig. 6). Embedded data are extracted without using the original host/cover video file. During the first step of the extraction process, the watermarked video s frames are separated and then, it is converted from RGB to CbCr color space. Luminance () component s DCT coefficients are calculated for each 8 8 block. D 1 and D 2 are used for obtaining the watermark bit. According to the relationship between these coefficients, one bit from each block is obtained. The binary (6)

8 1652 M. esilyurt et al. watermark extraction (WE) step can be seen in Fig. 6 and (Equation 7) [20 22]. { w 1 D (i, j) = 1 > D 2 } 0 D 2 > D 1 (7) 4.3. The defective block In frequency domain watermarking, compressed video frames or images are used as a cover object and distortions are unavoidable. These distortions may be performed during the data-embedding process, quantization, and attacks during or through outside intervention. As it is known, using the DCT coefficients during the data hiding process may increase data loss on cover files. In addition, if the data is embedded into the DCT coefficients by adding or removing, this process causes more distortions on the blocks that are in the I-frames. Thus, lossless WE from these blocks (defective block) is impossible. All watermarking methods must take into account this important complication. A solution is proposed for this problem in this paper. First of all, kurtosis values are calculated for all I-frames and a range in which results are concentrated is determined. Thus, the most suitable frames are determined before the watermarking process. In other words, it can be said that there is a relationship between kurtosis values and whether the block is defective or not. Figure 7 shows that DCT coefficients of Mobile (a) and Foreman (b) video frames after watermark bit (1) 2 embedding. Figure 8 shows DCT coefficients of Mobile (a) and Foreman (b) video frames after extracting the watermark bit (0) 2. It means that these blocks are defective and the watermark-embedding process is unnecessary because these frames kurtosis values are out of the defined kurtosis range. 5. EXPERIMETAL RESULTS An important issue in comparing the proposed watermarking method with its counterparts is the peak signal to noise ratio (PSR) performance with respect to the maximum watermarked bits-embedding capacity. PSR measurement is used to evaluate the watermarked frame quality with respect to the cover frame as a statistical measure during experimental works. A computed PSR value indicates the quality approximation between a watermarked frame and the original. The higher the PSR value is, the better the watermarking process is in terms of HVS perception [2]. In addition, to analyze performance of the proposed method, widely used video files in the literature and other comparison metrics (ormalized Cross-Correlation (CC), Bit-Rate Increase Ratio (BIR), Mean Structural Similarity (MSSIM)) are used. In this scope, performance analysis of the presented method and its results are given in the following paragraphs. FIGURE 10. Original frames (Mobile (a), Foreman (c), Hall Monitor (e), Tempete (i), Tennis (c)) and their watermarked versions (Mobile (b), Foreman (d), Hall Monitor (f), Tempete (h), Tennis (j)). Some reference video files (i.e. Hall Monitor, Foreman, Mobile, Tennis and Tempete) have been used as test video files for experimental applications. Foreman (300 frames), Mobile (299 frames), Hall Monitor (299 Frames) all have 30

9 A Robust Watermarking Method 1653 frames per second (fps) video files and they have a resolution, which is notated as R 1 below. Tennis (150 frames) has a resolution, which is notated as R 2, Tempete (260 frames) has a resolution, which is notated as R 3 and they have 30 fps, like the others. The experimental results show that the number of defective blocks (DB) of an I-frame that is casually watermarked is more than the number of DB of a watermarked I-frame that is selected using kurtosis (DB K ) as seen in Table 1. It can be easily said that the presented kurtosisbased watermarking approach s performance is better than the classical watermarking approach. This means that the proposed approach is more robust than the classical watermarking approach. Figure 9 shows the I-frame numbers of reference video files and the number of defective blocks of I-frames. Because those defective blocks cause loss of hidden data, they are excluded from the embedding process. As seen in Fig. 9, there are 350 defective blocks for the 192th I-Frame of the Foreman video. This means that the data are embedded on this frame and the data cannot be properly extracted. Thus, the robustness requirement will not be achieved. Original test video frames ((a), (b) and (c)) and their watermarked versions ((d), (e) and (f)) coded by the proposed approach are seen in Fig. 10. Table 2 shows the experimental average -PSR results for each watermarked I-frame. The results show that the proposed approach s performance is better than the counterpart [23] and [24] in terms of PSR. Similarly, the number of watermarked bits and PSR results are presented in Table 3. It shows frame sizes (R 1 ) of cover videos, embedded bits and PSR results. The results show that the proposed approach s performance is better than the counterpart [24 26] in terms of PSR and watermark bits. TABLE 2. -PSR values for intraframes of sample videos. Sample Average Liu et al. Wang et al. video -PSR (db) [23] [24] Foreman db db Mobile db db Tennis db Unused Tempete Unused db It can be easily seen that the proposed method s performance is very efficient for different frame sizes. The proposed method s all counterparts [24 26] have been realized on different frame sizes R 1. The PSR results show that performance of the presented method is better than its all counterparts. In addition to the results presented above, some attacks (Sharpness, Salt and Peppers noise, Jpeg Compression and Gaussian noise) have been performed on the watermarked I-Frames of Foreman video for robustness measuring. Extracted watermarks are shown in Fig. 11 after the attacks. Another performance evaluation metric used for experimental performance evaluation is CC. A computed CC value indicates the quality approximation between a recovery watermark and the original watermark. The CC can be computed as given in Equation (8). Where I and I are the original and watermarked frame values and the frame size is M. M M CC = I j,k I j,k (I j,k ) 2 (8) j=1 k=1 j=1 k=1 For example, the CC results of the proposed method for Foreman video are , , , , , , , , and after the Sharpen attack, Salt and peppers (0.05), Salt and peppers (0.02), Salt and peppers (0.01), the JPEG Compression (quality 90, 50 and 30), Gaussian noise (0.01), Gaussian noise (0.02) and Motion Blur attacks, respectively (Table 4). In addition, additional CC results have been presented for other reference video files (Mobile and Tennis) in the Table 4. These results show that the presented method guaranteed the CC values higher than 0.92 and it is extremely robust against the attacks mentioned above. Since the bit-rate increase depends on the embedded capacity, we define the BIR (Equation 9) as the percentage of bit-rate increase per embedded bit in order to perform a fair comparison (Table 5). BR(Watermarked) BR(Original) BIR = ( 100) (9) Embedded Capacity BR(Original) where BR (Watermarked) and BR (Original) are the number of bits utilized for coding the watermarked and original sequences, respectively [27]. Table 5 shows the comparison of the BIR (BIR 10 3 )of different video sequences in the proposed method. The results show that the proposed method can prevent the bit-rate increase for most of the video sequences. TABLE 3. Comparisons on the watermarked bits and PSR results. Performance Proposed Kim et al. Proposed Wang et al. Wu et al. Frame size metric method [25] method [24] [26] R 1 ( ) Watermarked bits PSR (db) db db db db db

10 1654 M. esilyurt et al. FIGURE 11. Extracted watermark after the attacks: Original watermark (a) Sharpen(b), Salt and peppers (1%) (c), Salt and peppers (2%) (d), Salt and peppers (5%) (e), Jpeg compression (10%) (f), Jpeg compression (30%) (g), Jpeg compression (50%) (h), Gaussian noise (1%) (i), Gaussian noise (2%) (j), Motion Blur (k). TABLE 4. CC values of watermarks against some attacks for the proposed method. Attacks Foreman Mobile Tennis Without attacks Sharpen Salt and peppers noise (0.05) Salt and peppers noise (0.02) Salt and peppers noise (0.01) JPEG compression (Quality factor: 90) JPEG compression (Quality factor: 50) JPEG compression (Quality factor: 30) Gaussian noise (0.01) Gaussian noise (0.02) Motion Blur TABLE 5. Different video sequences and BIR values. Video Frame Watermarked sequence size bit I-frame BIR 6. COCLUSIOS As it is known, data hiding methods in compressed videos that use DCT and high compression rates may suffer from data loss. In addition to this, if the data are embedded into the DCT coefficients by adding or removing, this process causes more distortions on the blocks that are in I-frames. Thus, lossless WE from these blocks (defective block) is too difficult, if not impossible. All watermarking methods must take into account this important complication. The proposed approach s results show that there is a very close relationship between kurtosis values and the number of defective blocks. Thanks to ranges of kurtosis values specified separately for each video file, the number of defective blocks can be easily reduced. When the range of kurtosis values between 2 and 5 is determined for the Mobile video file, the number of defective blocks that are used for watermarking is reduced by 17 18%. Similarly, when the range of kurtosis values between 10 and 40 is determined for the Foreman video file, the number of defective blocks that are used for watermarking is reduced by 14 18%. Specified ranges can be different for each file or I-frame, but these ranges must be known while the WE process is applied. Foreman R ews R Tennis R Tennis R Tempete R Mobile R ACKOWLEDGEMET The authors thank the anonymous reviewers and the editor for their valuable comments and suggestions for better presentation of this work.

11 A Robust Watermarking Method 1655 REFERECES [1] Frattolillo, F. (2015) Watermarking protocols: problems, challenges and a possible solution. Comput. J., 58, [2] alman,. and Erturk, I. (2014) Secret data embedding scheme modifying the frequency of occurrence of image brightness values. Sadhana Acad. Proc. Eng. Sci., 39, (Springer). [3] Chan, P.W., Lyu, M.R. and Chin, R.T. (2005) A novel scheme for hybrid digital video watermarking: approach evaluation and experimentation. IEEE Trans. Circuits Syst. Video Technol., 15, [4] Liu, S., Chen, T., ao, H. and Gao, W. (2008) A Real- Time Video Watermarking Using Adjacent Luminance Blocks Correlation Based on Compressed Domain. In Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp China. [5] Xu, C., Ping, X. and Zhang, T. (2006) Steganography in Compressed Video Stream. In IEEE Int. Conf. on Innovative Computing, Information and Control (ICICIC 06), II, pp Beijing, China. [6] Fang, D.. and Chang, L.W. (2006) Data Hiding for Digital Video with Phase of Motion Vector. In IEEE Int. Sym. on Circuits and Systems, pp Island of Kos, Greece. [7] Langelaar, G.C., Lagendijk, R.L. and Biemond, J. (1998) Realtime labeling of MPEG-2 compressed video. Vis. Commun. Image Represent., 9, [8] Pranata, S., Wahadaniah, V., Guan,.L. and Chua, H.C. (2004) Improved bit rate control for real-time MPEG watermarking. EURASIP J. Adv. Signal Process., 14, [9] Hsu, C. and Wu, J. (1997) Digital Watermarking for Video. In IEEE Int. Conf. on Digital Signal Processing, vol. 1, pp Santorini, Greece. [10] Chen, Q., Maitre, H. and Deng, Q. (2012) Reliable information embedding for image/video in the presence of lossy compression. Signal Process.: Image Commun., 27, [11] Langelaar, G. and Lagendijk, R.L. (2001) Optimal differential energy watermarking of DCT encoded images and video. IEEE Trans. Image Process., 10, [12] Sarkar, A., Madhow, U., Chandrasekaran, S. and Manjunath, B.S. (2007) Adaptive MPEG-2 Video Data Hiding Scheme. In 9th SPIE Sec. Steganography Watermarking Multimedia Contents, pp San Jose, USA. [13] Barni, M., Bartolini, F., Checcacci,. (2005) Watermarking of MPEG-4 video objects. IEEE Trans. Multimedia, 7, [14] Alattar, A.M., Lin, E.T. and Celik, M.U. (2003) Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video. IEEE Trans. Circuits Syst. Video Technol., 13, [15] in, H., ang, D. and Xia, J. (2007) A ovel Watermark Arithmetic for Video Coding. In IEEE Int. Workshop on Anticounterfeiting, Security, Identification, pp Fujian, China. [16] Tang, J., Zheng, J. and Guo, L. (2011) H.264/AVC Compressed Domain Data Hiding Algorithm Based on in Loop Compensation. In 4th Int. Congress on Image and Signal Processing, pp Shanghai, China. [17] Tian, L., Zheng,., Xue, J. and Xu, T. (2008) CAVLC- Based Blind Watermarking Method for H.264/AVC Compressed Video. In IEEE Asia-Pacific Services Computing Conf., pp Taiwan. [18] Frederick, A.A., Kingdom, A., Anthony, H.B. and David, J.F. (2001) Sensitivity to contrast histogram differences in synthetic wavelet-textures. Vis. Res., 41, [19] Esen, E. and Alatan, A.A. (2011) Robust video data hiding using forbidden zone data hiding and selective embedding. IEEE Trans. Circuits Syst. Video Technol., 21, [20] esilyurt, M. (2013) Kurtosis based a new robust watermarking algorithm for compressed videos. PhD Thesis, Sakarya University, Sakarya. [21] esilyurt, M., alman,., Ozcerit, A.T. and Erturk, I. (2011) A DCT-Based Invisible Watermarking Application for Compressed Images. In 8th Int. Conf. on Electronics and Computer Technology, pp Almaty, Kazakhstan. [22] esilyurt, M., alman,. and Ozcerit, A.T. (2013) A new DCT-based watermarking method using luminance component. Electron. Electr. Eng., 19, [23] Liu,. and Zhao, J. (2010) A new video watermarking algorithm based on 1D DFT and Radon transform. Signal Process., 90, [24] Wang, C. and Hsu,.-C. (2010) Fragile watermarking scheme for H.264 video authentication. Opt. Eng., 49, [25] Kim, D.W., Choi,.G., Kim, H.S., oo, J.S., Choi, H.J. and Seo,.H. (2010) The problems in digital watermarking into intraframes of H.264/AVC. Image Vis. Comput., 28, [26] Wu, C.H., Zheng,., Ip, W.H., Chan, C.., ung, K.L. and Lu, Z.M., (2011) Flexible H.264/AVC compressed video watermarking scheme using particle swarm optimizationbased dither modulation. Int. J. Electron. Commun., 65, [27] Mansouri, A., Aznaveh, A.M.A., Torkamani, F. and Kurugollu, F. (2010) Low complexity video watermarking in H.264 compressed domain. IEEE Trans. Inf. Forensics Sec., 5,

A New DCT Based Watermarking Method Using Luminance Component

A New DCT Based Watermarking Method Using Luminance Component http://dx.doi.org/10.5755/j01.eee.19.4.2015 ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 1392-1215, VOL. 19, NO. 4, 2013 A New DCT Based Watermarking Method Using Luminance Component M. Yesilyurt 1, Y. Yalman

More information

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,

More information

Image and Video Watermarking

Image and Video Watermarking Telecommunications Seminar WS 1998 Data Hiding, Digital Watermarking and Secure Communications Image and Video Watermarking Herbert Buchner University of Erlangen-Nuremberg 16.12.1998 Outline 1. Introduction:

More information

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based

More information

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,

More information

A CAVLC-BASED VIDEO WATERMARKING SCHEME FOR H.264/AVC CODEC. Received May 2010; revised October 2010

A CAVLC-BASED VIDEO WATERMARKING SCHEME FOR H.264/AVC CODEC. Received May 2010; revised October 2010 International Journal of Innovative Computing, Information and Control ICIC International c 2011 ISSN 1349-4198 Volume 7, Number 11, November 2011 pp. 6359 6367 A CAVLC-BASED VIDEO WATERMARKING SCHEME

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

Digital Video Processing

Digital Video Processing Video signal is basically any sequence of time varying images. In a digital video, the picture information is digitized both spatially and temporally and the resultant pixel intensities are quantized.

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT COMPARISO BETWEE TWO WATERMARKIG ALGORITHMS USIG DCT COEFFICIET, AD LSB REPLACEMET Mona M. El-Ghoneimy Associate Professor, Elect. & Comm. Dept., Faculty of Engineering, Cairo University, Post code 12316

More information

Image Error Concealment Based on Watermarking

Image Error Concealment Based on Watermarking Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,

More information

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES H. I. Saleh 1, M. E. Elhadedy 2, M. A. Ashour 1, M. A. Aboelsaud 3 1 Radiation Engineering Dept., NCRRT, AEA, Egypt. 2 Reactor Dept., NRC,

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

DATA hiding [1] and watermarking in digital images

DATA hiding [1] and watermarking in digital images 14 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 1, MARCH 2011 Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error Hussein A. Aly, Member,

More information

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute

More information

Optimized Watermarking Using Swarm-Based Bacterial Foraging

Optimized Watermarking Using Swarm-Based Bacterial Foraging Journal of Information Hiding and Multimedia Signal Processing c 2009 ISSN 2073-4212 Ubiquitous International Volume 1, Number 1, January 2010 Optimized Watermarking Using Swarm-Based Bacterial Foraging

More information

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Comparison of Wavelet Based Watermarking Techniques for Various Attacks International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,

More information

Tampering Detection in Compressed Digital Video Using Watermarking

Tampering Detection in Compressed Digital Video Using Watermarking Tampering Detection in Compressed Digital Video Using Watermarking Mehdi Fallahpour, Shervin Shirmohammadi, Mehdi Semsarzadeh, Jiying Zhao School of Electrical Engineering and Computer Science (EECS),

More information

Block Mean Value Based Image Perceptual Hashing for Content Identification

Block Mean Value Based Image Perceptual Hashing for Content Identification Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions

More information

Reversible Data Hiding VIA Optimal Code for Image

Reversible Data Hiding VIA Optimal Code for Image Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering

More information

H.264/AVC Video Watermarking Algorithm Against Recoding

H.264/AVC Video Watermarking Algorithm Against Recoding Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com H.264/AVC Video Watermarking Algorithm Against Recoding Rangding Wang, Qian Li, Lujian Hu, Dawen Xu College of Information

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

Digital Image Watermarking Using DWT Based DCT Technique

Digital Image Watermarking Using DWT Based DCT Technique International Journal of Recent Research and Review, Vol. VII, Issue 4, December 2014 ISSN 2277 8322 Digital Image Watermarking Using DWT Based DCT Technique Digvijaysinh Vaghela, Ram Kishan Bairwa Research

More information

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD Robust Lossless Image Watermarking in Integer Domain using SVD 1 A. Kala 1 PG scholar, Department of CSE, Sri Venkateswara College of Engineering, Chennai 1 akala@svce.ac.in 2 K. haiyalnayaki 2 Associate

More information

A Robust Watermarking Algorithm For JPEG Images

A Robust Watermarking Algorithm For JPEG Images nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation

More information

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust Image Watermarking based on DCT-DWT- SVD Method Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete

More information

Image Authentication and Recovery Scheme Based on Watermarking Technique

Image Authentication and Recovery Scheme Based on Watermarking Technique Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications

More information

A New DCT based Color Video Watermarking using Luminance Component

A New DCT based Color Video Watermarking using Luminance Component IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 83-90 A New DCT based Color Video Watermarking using Luminance Component

More information

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed

More information

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL SPREAD SPECTRUM WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL 1 Yüksel Tokur 2 Ergun Erçelebi e-mail: tokur@gantep.edu.tr e-mail: ercelebi@gantep.edu.tr 1 Gaziantep University, MYO, 27310, Gaziantep,

More information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation , 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

More information

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients Available online at www.sciencedirect.com Energy Procedia 17 (2012 ) 623 629 2012 International Conference on Future Electrical Power and Energy Systems The Analysis and Detection of Double JPEG2000 Compression

More information

Combined Hashing/Watermarking Method for Image Authentication

Combined Hashing/Watermarking Method for Image Authentication Combined Hashing/Watermarking Method for Image Authentication Vlado Kitanovski, Dimitar Taskovski, and Sofija Bogdanova Abstract In this paper we present a combined hashing/watermarking method for image

More information

A new wavelet based logo-watermarking scheme

A new wavelet based logo-watermarking scheme Pattern Recognition Letters 6 (5) 9 7 www.elsevier.com/locate/patrec A new wavelet based logo-watermarking scheme A. Adhipathi Reddy *, B.N. Chatterji Department of Electronics and Electrical Communication

More information

A Video Watermarking Algorithm Based on the Human Visual System Properties

A Video Watermarking Algorithm Based on the Human Visual System Properties A Video Watermarking Algorithm Based on the Human Visual System Properties Ji-Young Moon 1 and Yo-Sung Ho 2 1 Samsung Electronics Co., LTD 416, Maetan3-dong, Paldal-gu, Suwon-si, Gyenggi-do, Korea jiyoung.moon@samsung.com

More information

Pattern based Residual Coding for H.264 Encoder *

Pattern based Residual Coding for H.264 Encoder * Pattern based Residual Coding for H.264 Encoder * Manoranjan Paul and Manzur Murshed Gippsland School of Information Technology, Monash University, Churchill, Vic-3842, Australia E-mail: {Manoranjan.paul,

More information

A Digital Video Watermarking Algorithm Based on LSB and DCT

A Digital Video Watermarking Algorithm Based on LSB and DCT A Digital Video Watermarking Algorithm Based on LSB and DCT Kirti Jain, U.S.N Raju Department of Computer Science and Engineering NIT Warangal India kirtijain.kj@gmail.com,usnraju@gmail.com ABSTRACT: In

More information

Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding.

Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding. Project Title: Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding. Midterm Report CS 584 Multimedia Communications Submitted by: Syed Jawwad Bukhari 2004-03-0028 About

More information

arxiv: v1 [cs.mm] 9 Aug 2017

arxiv: v1 [cs.mm] 9 Aug 2017 Robust Video Watermarking against H.264 and H.265 Compression Attacks Nematollah Zarmehi 1* and Mohammad Javad Barikbin 2 1 Advanced Communication Research Institute, Electrical Engineering Department,

More information

A NOVEL SCANNING SCHEME FOR DIRECTIONAL SPATIAL PREDICTION OF AVS INTRA CODING

A NOVEL SCANNING SCHEME FOR DIRECTIONAL SPATIAL PREDICTION OF AVS INTRA CODING A NOVEL SCANNING SCHEME FOR DIRECTIONAL SPATIAL PREDICTION OF AVS INTRA CODING Md. Salah Uddin Yusuf 1, Mohiuddin Ahmad 2 Assistant Professor, Dept. of EEE, Khulna University of Engineering & Technology

More information

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami to MPEG Prof. Pratikgiri Goswami Electronics & Communication Department, Shree Swami Atmanand Saraswati Institute of Technology, Surat. Outline of Topics 1 2 Coding 3 Video Object Representation Outline

More information

Video Compression MPEG-4. Market s requirements for Video compression standard

Video Compression MPEG-4. Market s requirements for Video compression standard Video Compression MPEG-4 Catania 10/04/2008 Arcangelo Bruna Market s requirements for Video compression standard Application s dependent Set Top Boxes (High bit rate) Digital Still Cameras (High / mid

More information

Watermarking of Image Using Priority Based On Algorithms

Watermarking of Image Using Priority Based On Algorithms This work by IJARBEST is licensed under Creative Commons Attribution 4.0 International License. Available at https://www.ijarbest.com Watermarking of Image Using Priority Based On Algorithms B.Aarthi,

More information

A CRT BASED ROBUST IMAGE WATERMARKING USING DISCRETE TCHEBICHEF TRANSFORM

A CRT BASED ROBUST IMAGE WATERMARKING USING DISCRETE TCHEBICHEF TRANSFORM A CRT BASED ROBUST IMAGE WATERMARKING USING DISCRETE TCHEBICHEF TRANSFORM J. L. Divya Shivani and Ranjan K. Senapati Department of Electronics and Communication, K. L. University, A. P., India E-Mail:

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

Video Compression An Introduction

Video Compression An Introduction Video Compression An Introduction The increasing demand to incorporate video data into telecommunications services, the corporate environment, the entertainment industry, and even at home has made digital

More information

JPEG 2000 vs. JPEG in MPEG Encoding

JPEG 2000 vs. JPEG in MPEG Encoding JPEG 2000 vs. JPEG in MPEG Encoding V.G. Ruiz, M.F. López, I. García and E.M.T. Hendrix Dept. Computer Architecture and Electronics University of Almería. 04120 Almería. Spain. E-mail: vruiz@ual.es, mflopez@ace.ual.es,

More information

Enhancing the Image Compression Rate Using Steganography

Enhancing the Image Compression Rate Using Steganography The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,

More information

Fast frame memory access method for H.264/AVC

Fast frame memory access method for H.264/AVC Fast frame memory access method for H.264/AVC Tian Song 1a), Tomoyuki Kishida 2, and Takashi Shimamoto 1 1 Computer Systems Engineering, Department of Institute of Technology and Science, Graduate School

More information

streams cannot be decoded properly, which would severely affect the quality of reconstructed video. Therefore, error resilience is utilized to solve

streams cannot be decoded properly, which would severely affect the quality of reconstructed video. Therefore, error resilience is utilized to solve 3rd International Conference on Multimedia Technology(ICMT 2013) Video Error Resilience Scheme using Reversible Data Hiding Technique for Intra- Frame in H.264/AVC Ranran Li, Rangding Wang 1 Abstract.

More information

Comparative Study of Partial Closed-loop Versus Open-loop Motion Estimation for Coding of HDTV

Comparative Study of Partial Closed-loop Versus Open-loop Motion Estimation for Coding of HDTV Comparative Study of Partial Closed-loop Versus Open-loop Motion Estimation for Coding of HDTV Jeffrey S. McVeigh 1 and Siu-Wai Wu 2 1 Carnegie Mellon University Department of Electrical and Computer Engineering

More information

IMAGE COMPRESSION. Image Compression. Why? Reducing transportation times Reducing file size. A two way event - compression and decompression

IMAGE COMPRESSION. Image Compression. Why? Reducing transportation times Reducing file size. A two way event - compression and decompression IMAGE COMPRESSION Image Compression Why? Reducing transportation times Reducing file size A two way event - compression and decompression 1 Compression categories Compression = Image coding Still-image

More information

A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS

A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS Xie Li and Wenjun Zhang Institute of Image Communication and Information Processing, Shanghai Jiaotong

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES Mrs. R.J. Shelke, Dept of Electronics Engineering, Walchand Institute of Technology, Solapur 43002, India ABSTRACT Dr. Mrs. S.S. Apte,

More information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM 74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small

More information

Digital Watermarking with Copyright Authentication for Image Communication

Digital Watermarking with Copyright Authentication for Image Communication Digital Watermarking with Copyright Authentication for Image Communication Keta Raval Dept. of Electronics and Communication Patel Institute of Engineering and Science RGPV, Bhopal, M.P., India ketaraval@yahoo.com

More information

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain Chinmay Maiti a *, Bibhas Chandra Dhara b a Department of Computer Science & Engineering, College of Engineering & Management, Kolaghat,

More information

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The

More information

VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION

VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION Volume, Issue 3, March 2015 VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION V.Rajendhiran J.Elavanthan M.Vengadapathiraj R.Vinothkumar Dr.M.Saravanan Abstract:-In this paper proposed a novel video

More information

A Joint DWT-DCT Based Watermarking Technique for Avoiding Unauthorized Replication

A Joint DWT-DCT Based Watermarking Technique for Avoiding Unauthorized Replication A oint DT-DCT Based atermarking Technique for Avoiding Unauthorized Replication Kaushik Deb 1, Md. Sajib Al-Seraj 1, Mir Md. Saki Kowsar 1 and Iqbal Hasan Sarkar 1 1 Department of Computing Science and

More information

Deblocking Filter Algorithm with Low Complexity for H.264 Video Coding

Deblocking Filter Algorithm with Low Complexity for H.264 Video Coding Deblocking Filter Algorithm with Low Complexity for H.264 Video Coding Jung-Ah Choi and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 261 Cheomdan-gwagiro, Buk-gu, Gwangju, 500-712, Korea

More information

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing Arash Ashtari Nakhaie, Shahriar Baradaran Shokouhi Iran University of Science

More information

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS SETIT 2005 3 rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 27-31, 2005 TUNISIA ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS Shiva Zaboli

More information

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Feature Based Watermarking Algorithm by Adopting Arnold Transform Feature Based Watermarking Algorithm by Adopting Arnold Transform S.S. Sujatha 1 and M. Mohamed Sathik 2 1 Assistant Professor in Computer Science, S.T. Hindu College, Nagercoil, Tamilnadu, India 2 Associate

More information

An Improved Performance of Watermarking In DWT Domain Using SVD

An Improved Performance of Watermarking In DWT Domain Using SVD An Improved Performance of Watermarking In DWT Domain Using SVD Ramandeep Kaur 1 and Harpal Singh 2 1 Research Scholar, Department of Electronics & Communication Engineering, RBIEBT, Kharar, Pin code 140301,

More information

A new robust watermarking scheme based on PDE decomposition *

A new robust watermarking scheme based on PDE decomposition * A new robust watermarking scheme based on PDE decomposition * Noura Aherrahrou University Sidi Mohamed Ben Abdellah Faculty of Sciences Dhar El mahraz LIIAN, Department of Informatics Fez, Morocco Hamid

More information

Improved Qualitative Color Image Steganography Based on DWT

Improved Qualitative Color Image Steganography Based on DWT Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V

More information

Random Image Embedded in Videos using LSB Insertion Algorithm

Random Image Embedded in Videos using LSB Insertion Algorithm Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.

More information

FRAGILE WATERMARKING USING SUBBAND CODING

FRAGILE WATERMARKING USING SUBBAND CODING ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING

More information

EXPLORING ON STEGANOGRAPHY FOR LOW BIT RATE WAVELET BASED CODER IN IMAGE RETRIEVAL SYSTEM

EXPLORING ON STEGANOGRAPHY FOR LOW BIT RATE WAVELET BASED CODER IN IMAGE RETRIEVAL SYSTEM TENCON 2000 explore2 Page:1/6 11/08/00 EXPLORING ON STEGANOGRAPHY FOR LOW BIT RATE WAVELET BASED CODER IN IMAGE RETRIEVAL SYSTEM S. Areepongsa, N. Kaewkamnerd, Y. F. Syed, and K. R. Rao The University

More information

Interframe coding A video scene captured as a sequence of frames can be efficiently coded by estimating and compensating for motion between frames pri

Interframe coding A video scene captured as a sequence of frames can be efficiently coded by estimating and compensating for motion between frames pri MPEG MPEG video is broken up into a hierarchy of layer From the top level, the first layer is known as the video sequence layer, and is any self contained bitstream, for example a coded movie. The second

More information

CSE237A: Final Project Mid-Report Image Enhancement for portable platforms Rohit Sunkam Ramanujam Soha Dalal

CSE237A: Final Project Mid-Report Image Enhancement for portable platforms Rohit Sunkam Ramanujam Soha Dalal CSE237A: Final Project Mid-Report Image Enhancement for portable platforms Rohit Sunkam Ramanujam (rsunkamr@ucsd.edu) Soha Dalal (sdalal@ucsd.edu) Project Goal The goal of this project is to incorporate

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

Design of a High Speed CAVLC Encoder and Decoder with Parallel Data Path

Design of a High Speed CAVLC Encoder and Decoder with Parallel Data Path Design of a High Speed CAVLC Encoder and Decoder with Parallel Data Path G Abhilash M.Tech Student, CVSR College of Engineering, Department of Electronics and Communication Engineering, Hyderabad, Andhra

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

Video Watermarking Algorithm for H.264 Scalable Video Coding

Video Watermarking Algorithm for H.264 Scalable Video Coding 56 Lu et al.: Video Watermarking Algorithm for H.264 Scalable Video Coding Video Watermarking Algorithm for H.264 Scalable Video Coding Jianfeng Lu,Li Li and Zhenhua Yang Institute of computer Graphics

More information

Adaptive Quantization for Video Compression in Frequency Domain

Adaptive Quantization for Video Compression in Frequency Domain Adaptive Quantization for Video Compression in Frequency Domain *Aree A. Mohammed and **Alan A. Abdulla * Computer Science Department ** Mathematic Department University of Sulaimani P.O.Box: 334 Sulaimani

More information

Robust Lossless Data Hiding. Outline

Robust Lossless Data Hiding. Outline Robust Lossless Data Hiding Yun Q. Shi, Zhicheng Ni, Nirwan Ansari Electrical and Computer Engineering New Jersey Institute of Technology October 2010 1 Outline What is lossless data hiding Existing robust

More information

Jaya Jeswani et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014,

Jaya Jeswani et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, A Hybrid DCT and DWT Color Image Watermarking in RGB Color Space Jaya Jeswani 1, Tanuja Sarode 2 1 Department of Information Technology, Xavier Institute of Engineering, 2 Department of Computer Engineering,,

More information

FOR compressed video, due to motion prediction and

FOR compressed video, due to motion prediction and 1390 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 24, NO. 8, AUGUST 2014 Multiple Description Video Coding Based on Human Visual System Characteristics Huihui Bai, Weisi Lin, Senior

More information

Comparison of wavelet based watermarking techniques Using SVD

Comparison of wavelet based watermarking techniques Using SVD Comparison of wavelet based watermarking techniques Using SVD Prof.T.Sudha Department of Computer Science Vikrama Simhapuri University Nellore. Email- thatimakula_sudha@yahoo.com Ms. K. Sunitha Head, P.G

More information

Quality Estimation of Video Transmitted over an Additive WGN Channel based on Digital Watermarking and Wavelet Transform

Quality Estimation of Video Transmitted over an Additive WGN Channel based on Digital Watermarking and Wavelet Transform Quality Estimation of Video Transmitted over an Additive WGN Channel based on Digital Watermarking and Wavelet Transform Mohamed S. El-Mahallawy, Attalah Hashad, Hazem Hassan Ali, and Heba Sami Zaky Abstract

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme A Robust Color Image Watermarking Using Maximum Wavelet-Tree ifference Scheme Chung-Yen Su 1 and Yen-Lin Chen 1 1 epartment of Applied Electronics Technology, National Taiwan Normal University, Taipei,

More information

A New Configuration of Adaptive Arithmetic Model for Video Coding with 3D SPIHT

A New Configuration of Adaptive Arithmetic Model for Video Coding with 3D SPIHT A New Configuration of Adaptive Arithmetic Model for Video Coding with 3D SPIHT Wai Chong Chia, Li-Minn Ang, and Kah Phooi Seng Abstract The 3D Set Partitioning In Hierarchical Trees (SPIHT) is a video

More information

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels International Journal of Computer Science & Communication Vol., No. 2, July-December 200, pp. 35-356 Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels Kirti Arora Jasuja & Baljit

More information

Fast Decision of Block size, Prediction Mode and Intra Block for H.264 Intra Prediction EE Gaurav Hansda

Fast Decision of Block size, Prediction Mode and Intra Block for H.264 Intra Prediction EE Gaurav Hansda Fast Decision of Block size, Prediction Mode and Intra Block for H.264 Intra Prediction EE 5359 Gaurav Hansda 1000721849 gaurav.hansda@mavs.uta.edu Outline Introduction to H.264 Current algorithms for

More information

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY Md. Maklachur Rahman 1 1 Department of Computer Science and Engineering, Chittagong University of Engineering and Technology,

More information

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning C. SANTIAGO-AVILA, M. GONZALEZ LEE, M. NAKANO-MIYATAKE, H. PEREZ-MEANA Sección de Posgrado e Investigación, Esime Culhuacan Instituto

More information

A Flexible Scheme of Self Recovery for Digital Image Protection

A Flexible Scheme of Self Recovery for Digital Image Protection www.ijcsi.org 460 A Flexible Scheme of Self Recoery for Digital Image Protection Zhenxing Qian, Lili Zhao 2 School of Communication and Information Engineering, Shanghai Uniersity, Shanghai 200072, China

More information

Block-Matching based image compression

Block-Matching based image compression IEEE Ninth International Conference on Computer and Information Technology Block-Matching based image compression Yun-Xia Liu, Yang Yang School of Information Science and Engineering, Shandong University,

More information

A Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration

A Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration A Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration R. Riad H. Douzi M. El Hajji R. Harba PRISME, University of Orleans, Orléans, France F. Ros PRISME, University of Orleans,

More information

signal-to-noise ratio (PSNR), 2

signal-to-noise ratio (PSNR), 2 u m " The Integration in Optics, Mechanics, and Electronics of Digital Versatile Disc Systems (1/3) ---(IV) Digital Video and Audio Signal Processing ƒf NSC87-2218-E-009-036 86 8 1 --- 87 7 31 p m o This

More information

2014 Summer School on MPEG/VCEG Video. Video Coding Concept

2014 Summer School on MPEG/VCEG Video. Video Coding Concept 2014 Summer School on MPEG/VCEG Video 1 Video Coding Concept Outline 2 Introduction Capture and representation of digital video Fundamentals of video coding Summary Outline 3 Introduction Capture and representation

More information

CHAPTER-4 WATERMARKING OF GRAY IMAGES

CHAPTER-4 WATERMARKING OF GRAY IMAGES CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do

More information

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques 1 Himanshu Verma, Mr Tarun Rathi, 3 Mr Ashish Singh Chauhan 1 Research Scholar, Deptt of Electronics and

More information

Image Compression Algorithm and JPEG Standard

Image Compression Algorithm and JPEG Standard International Journal of Scientific and Research Publications, Volume 7, Issue 12, December 2017 150 Image Compression Algorithm and JPEG Standard Suman Kunwar sumn2u@gmail.com Summary. The interest in

More information

Block-based Watermarking Using Random Position Key

Block-based Watermarking Using Random Position Key IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.2, February 2009 83 Block-based Watermarking Using Random Position Key Won-Jei Kim, Jong-Keuk Lee, Ji-Hong Kim, and Ki-Ryong

More information

Open Access Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain

Open Access Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain Send Orders for Reprints to reprints@benthamscience.net The Open Signal Processing Journal, 2013, 5, 1-6 1 Open Access Side-Informed Image ing Scheme Based on Dither Modulation in the Frequency Domain

More information