Explore chapters and articles related to this topic
Digital Image Watermarking Scheme in Transform Domain Using the Particle Swarm Optimization Technique
Published in D. P. Acharjya, V. Santhi, Bio-Inspired Computing for Image and Video Processing, 2018
Digital watermarking is a process through which some data, called a digital watermark, is embedded in a digital signal, which can be an image, audio, video, etc. [6,9]. This digital watermark can then be used to identify the owner or the authorized users of the digital signal. Digital watermarking can be generally classified into two types: visible and invisible watermarking. Visible watermarking has an advantage over invisible watermarking in that visible watermarking can be used to identify the owner with minimal effort, and makes it easier to avoid copyright issues, as any potential violator can be discouraged on seeing the watermark. However, it might be possible to remove a visible watermark using some image editing applications. On the other hand, a person might not suspect that an image contains an invisible watermark, and if any copyright infringement is found, the violator can be prosecuted with relative ease. A typical watermarking scheme consists of a cover image, a watermark, an embedding algorithm and an extraction algorithm, [4,15,22].
Automatic Detection and Removal of Visible Image Watermarks
Published in Frank Y. Shih, Multimedia Security, 2017
Hong-Ren Su, Ya-Yun Cheng, Shin’ichi Lai
In recent years, widespread use of the Internet increased the exchange of information and knowledge. However, the accompanying copyright and ownership problems became very critical to the success of digital content distribution. In order to solve these problems for digital content, information-hiding techniques have become more and more important in many application areas. Electronic watermark, which is also called digital watermark, is a branch of information-hiding techniques and it is a common function in several famous photo-processing application programs. Digital watermarking can be roughly divided into two types—visible marking and invisible marking. The former is commonly used in academic theses and stock photos, and the latter is popular in commercial document sharing, copyright protection, and bill antifaking. Both these types have their own special requirements, such as easy embedding, copy prevention, hard removing, robustness against tempering, and preservation of original information.
Security in Wireless Video Sensor Networks Based on Watermarking Techniques
Published in Shafiullah Khan, Al-Sakib Khan Pathan, Nabil Ali Alrajeh, Wireless Sensor Networks, 2016
Noreen Imran, Boon-Chong Seet, A. C. M. Fong
There exists numerous works regarding video watermarking on a variety of codecs and platforms, but those techniques cannot be applied to the sensor network domain due to their major architectural differences. In literature, digital watermarking has been applied mostly to address copyrights protection of digital content, digital fingerprinting, tamper detection, broadcast monitoring, and metadata insertion [88]. Few applications of this technique have been found in wireless multimedia, video, or even scalar data sensor networks. In the context of WMSNs, security issues such as privacy, trust management, and authentication have a high degree of correlation, and digital watermarking alone is not sufficient to address all of them [71]. Thus, an eight-stage conceptual framework that provides guidelines for secure communication in WMSN based on watermarking is presented [2], as shown in Figure 16.5.
An Overview of Digital Audio Steganography
Published in IETE Technical Review, 2020
Hrishikesh Dutta, Rohan Kumar Das, Sukumar Nandi, S. R. Mahadeva Prasanna
Steganography is also used in digital watermarking applications [15]. Watermarking is the process of concealing auxiliary information (like watermarked bits, logo, and text message) in the host signal, which includes image, video, audio, speech, and text without the perceptibility of the presence of any additional information [16]. The auxiliary data which is incorporated in the original signal should be such that it can be retrieved easily and at the same time it must withstand various attacks. Digital watermarking is practised to protect the copyright information by embedding it in the form of a text, image, audio, or video in a particular media [17]. A watermark is embedded into a digital signal such that in future if any copy of the work is found, both the source and the copy can be identified by the watermark. Watermarking technique is used to protect confidential information from illegal access of unauthorized user. It is also used for banknote authentication. In [18], the authors proposed a method of image steganography using least significant bit (LSB), discrete cosine transform (DCT), and compression technique to enhance security in transferring information to the destination without being detected.
Video Copyright Protection Using Chaotic Maps and Singular Value Decomposition in Wavelet Domain
Published in IETE Journal of Research, 2020
S. Ramakrishnan, S. Ponni alias Sathya
Digital watermarking techniques can be classified in accordance with source type (image watermarking, audio watermarking, video watermarking, and text watermarking), application, and human perception [1]. Based on the domain, watermarking is classified into two types, namely spatial domain and frequency domain. The comparative study of these two domains reveals that the frequency domain entails higher robustness due to its multi-resolution features, significant spatial localization, and frequency spread [2,3,12]. This DWT method is capable of combating various attacks with high robustness. Watermarking techniques developed for images cannot be used for watermarking video because of its redundancy in video frames as it contains added properties with high distortion between the motionless and motion frames [16]. A video is subjected to high level of attacks such as frame dropping, frame averaging, and frame swapping. That is the reason why the watermark method should be robust against all such attacks [1–3]. The applications of watermarking are Proof of Ownership, Transaction Tracking, and Content Authentication.
Anti-HEVC Recompression Video Watermarking Algorithm Based on the All Phase Biorthogonal Transform and SVD
Published in IETE Technical Review, 2018
Chengyou Wang, Rongyang Shan, Xiao Zhou
With the new generation of high efficiency video coding (HEVC), the video coding standards [1] have been gradually developed for application in many fields, and HEVC video copyright protection has become an urgent problem for multimedia development. There are two common digital copyright protection methods: data encryption and digital watermarking [2]. According to the visibility of the watermark, digital watermarking can be divided into visible watermarking and invisible watermarking [3]. According to different functions, digital watermarking can be divided into robust watermarking and fragile watermarking. Robust watermarking is used for copyright protection, while fragile watermarking is generally used for content authentication and recovery. According to the embedded location, digital watermarking can be further divided into spatial domain watermarking [4] and transform domain watermarking [5].