Abstract
With the advent of internet, every aspect of life is going online. From online working to watching videos, everything is now available on the internet. With the greater business benefits, increased availability and other online business advantages, there is a major challenge of security and ownership of data. Videos downloaded from an online store can easily be shared among non-intended or unauthorized users. Invisible watermarking is used to hide copyright protection information in the videos. The existing methods of watermarking are less robust and imperceptible and also the computational complexity of these methods does not suit low power devices. In this paper, we have proposed a new method to address the problem of robustness and imperceptibility. Experiments have shown that our method has better robustness and imperceptibility as well as our method is computationally efficient than previous approaches in practice. Hence our method can easily be applied on low power devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Polyak, T.: Robust Watermarking of Video Streams. ACTA Polytechnica 46(4), 49–51 (2006)
Dittmann, J., Stabenau, M., Steinmetz, R.: Robust MPEG video Watermarking Technologies. In: ACM Multimedia, Bristol, UK, August 1998, pp. 71–80 (1998)
Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann, San Francisco (2008)
Dittmann, J., Megias, D., Lang, A., Joancomarti, J.H.: Theoretical framework for a practical evaluation and comparison of audio/video watermarking schemes in the triangle of robustness, transparency and capacity. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security I. LNCS, vol. 4300, pp. 1–40. Springer, Heidelberg (2006)
Smirnov, M.V.: Holographic approach to embedding hidden watermarks in a photographic image. Journal of Optical Technology 72(6), 464–468 (2005)
Usman, I., Khan, A., Ali, A., Choi, T.-S.: Reversible watermarking based on Intelligent coefficient selection and integer wavelet transform. International Journal of Innovative Computing, Information and Control (IJICIC) 5(12) (December 2009)
Johnson, N.F., Katezenbeisser, S.C.: A survey of steganographic techniques. In: Information Techniques for Steganography and Digital Watermarking, December 1999, pp. 43–75 (1999)
Langelaar, G., Setyawan, I., Lagendijk, R.L.: Watermarking digital image and video data. IEEE Signal Processing Magazine 17, 20–43 (2000)
Hernandez, J.R., Amado, M., Perez-Gonzalez, F.: DCT-Domain watermarking techniques for still images: Detector Performance Analysis and a New Structure. IEEE Trans. Image Processing 9, 55–68 (2000)
Sheomaker, C.: Hidden Bits: A survey of techniques for digital watermarking. In: Independent Survey (July 2002)
Piva, A., Bartolini, F., Barni, M.: Managing copyright in open networks. IEEE Transactions on Internet Computing 6(3), 18–26 (2002)
Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking and fundamentals. Morgan Kaufmann, San Francisco (2002)
Hernandez, J.R., Amado, M., Perez-Gonzelez, F.: DCT-Domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Transactions on image processing 9(1), 55–68 (2000)
Khan, A., Mirza, A.M., Majid, A.: Intelligent perceptual shaping of a digital watermark: Exploiting Characteristics of human visual system. International Journal of Knowledge based and Intelligent Engineering Systems 10(3), 213–223 (2006)
Khan, A., Mirza, A.M., Majid, A.: Automatic Visual Masking of a Digital Watermark Using Genetic Programming. International Journal of Knowledge based and Intelligent Engineering Systems (KES) 9(1), 1–11 (2005)
Liu, Z., Karam, L.J., Watson, A.B.: JPEG2000 Encoding With Perceptual Distortion Control. IEEE Transactions on Image Processing 15(7), 1763–1778 (2006)
Khan, A., Mirza, A.M.: Genetic Perceptual Shaping: Utilizing Cover Image and Conceivable Attack Information Using Genetic Programming. Information Fusion, Elsevier Science 8(4), 354–365 (2007)
Hassanien, A.E.: A Copyright Protection using Watermarking Algorithm. Informatica 17(2), 187–198 (2006)
Yen, E., Tsai, K.-S.: HDWT-based grayscale watermark for copyright protection. An International Journal Source Expert Systems with Applications 35(1-2), 301–306 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ishtiaq, M., Jaffar, M.A., Khan, M.A., Jan, Z., Mirza, A.M. (2009). Robust and Imperceptible Watermarking of Video Streams for Low Power Devices. In: Ślęzak, D., Pal, S.K., Kang, BH., Gu, J., Kuroda, H., Kim, Th. (eds) Signal Processing, Image Processing and Pattern Recognition. SIP 2009. Communications in Computer and Information Science, vol 61. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10546-3_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-10546-3_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10545-6
Online ISBN: 978-3-642-10546-3
eBook Packages: Computer ScienceComputer Science (R0)