Combined DWT–DCT-Based Video Watermarking Algorithm Using Arnold Transform Technique

Author(s):  
Amit M. Joshi ◽  
Shubham Gupta ◽  
Mohit Girdhar ◽  
Pranshu Agarwal ◽  
Ranabir Sarker
2015 ◽  
Vol 740 ◽  
pp. 588-591
Author(s):  
Chun Xing Wang ◽  
Yao Wei ◽  
Tong Liu ◽  
Fei Han

A new algorithm of video watermarking based on changed area is studied in this paper. We propose a method to located area which pixels change greatly from three successive frames of uncompressed video by using three-frame differencing. Then we choose the region where changes drastically to embed watermark by using the Quantization Modulation algorithm in DCT coefficients. In order to have a good performance on video quality and embed more information, we divided the binary watermark into two parts which obtain a logistic Arnold transform before being embedded. The experimental results indicates that the proposed scheme has a good performance to frame dropping, frame cropping, frame rating, Gaussian noising, MPEG2 compression, etc. and it has a advantage on little degrading the video quality.


Author(s):  
Fahad Layth Malallah ◽  
Awatif Ali Jafaar ◽  
Nidaa Hasan Abbas ◽  
Mustafa Ghanem Saeed

<p>Unauthorized redistribution and illegal copying of digital contents are serious issues which have affected numerous types of digital contents such as digital video. One of the methods, which have been suggested to support copyright protection, is to hide digital watermark within the digital video. This paper introduces a new video watermarking system which based on a combination of Arnold transform and integer wavelet transforms (IWT). IWT is employed to decompose the cover video frames whereby Arnold transform is used to scramble the watermark which is a grey scale image. Scrambling the watermark before the concealment makes the transmission more secure by disordering the information. The system performance was benchmarked against related video watermarking schemes, in which the evaluation processes consist of testing against several video operations and attacks. Consequently, the scheme has been demonstrated to be perfectly robust.</p>


In this paper, a novel chaotic encryption-based blind digital video watermarking technique (DVWT) is presented for grayscale and color images. This method makes use of Discrete Cosine transform (DCT) prior to embed the watermark in the hosting video. The hosting video is split into frames of 8*8 nonoverlapping blocks before employing DCT, and watermark bit is implanted by altering the variations among the nearby DCT coefficients of neighboring blocks. Arnold transform is applied for chaotic encryption to offer extra security to the watermark. A set of three versions of the proposed model has been applied and the results are investigated. The experimental outcome confirms that the DCT-VWT is efficient on different image processing functions such as JPEG compression, sharpening, cropping, and median filtering. The comparative analysis ensures that the presented DCT for digital video watermarking technique (DCT-DVWT) is efficient under subjective as well as objective way.


2011 ◽  
Vol 25 (8) ◽  
pp. 734-740
Author(s):  
Tao Li ◽  
Rui Sun ◽  
Caichen Xu
Keyword(s):  

Author(s):  
Aarushi Shrivastava ◽  
Janki Ballabh Sharma ◽  
Sunil Dutt Purohit

Objective: In the recent multimedia technology images play an integral role in communication. Here in this paper, we propose a new color image encryption method using FWT (Fractional Wavelet transform), double random phases and Arnold transform in HSV color domain. Methods: Firstly the image is changed into the HSV domain and the encoding is done using the FWT which is the combination of the fractional Fourier transform with wavelet transform and the two random phase masks are used in the double random phase encoding. In this one inverse DWT is taken at the end in order to obtain the encrypted image. To scramble the matrices the Arnold transform is used with different iterative values. The fractional order of FRFT, the wavelet family and the iterative numbers of Arnold transform are used as various secret keys in order to enhance the level of security of the proposed method. Results: The performance of the scheme is analyzed through its PSNR and SSIM values, key space, entropy, statistical analysis which demonstrates its effectiveness and feasibility of the proposed technique. Stimulation result verifies its robustness in comparison to nearby schemes. Conclusion: This method develops the better security, enlarged and sensitive key space with improved PSNR and SSIM. FWT reflecting time frequency information adds on to its flexibility with additional variables and making it more suitable for secure transmission.


Sign in / Sign up

Export Citation Format

Share Document