scholarly journals Optimal keyframe selection-based lossless video-watermarking technique using IGSA in LWT domain for copyright protection

Author(s):  
Roop Singh ◽  
Himanshu Mittal ◽  
Raju Pal

AbstractVideo piracy is a challenging issue in the modern world. Approximately $$90\%$$ 90 % of newly released films were illegally distributed around the world via the Internet. To overcome this issue, video watermarking is an effective process that integrates a logo in video frames as a watermark. Therefore, this paper presents an efficient lossless video-watermarking scheme based on optimal keyframe selection using an intelligent gravitational search algorithm in linear wavelet transform. This technique obtains color motion and motionless frames from the cover video by the histogram difference method. One-level linear wavelet transform is performed on the chrominance channel of motion frames and a low-frequency sub-band LL opts for watermark embedding. The performance of the proposed technique has been evaluated against 12 video processing attacks in terms of imperceptibility and robustness. Experiments demonstrate that the proposed technique outperforms five state-of-the-art schemes on the considered attacks.

2011 ◽  
Vol 179-180 ◽  
pp. 103-108
Author(s):  
Sheng Bing Che ◽  
Jin Kai Luo ◽  
Bin Ma

A quasi-blind adaptive video watermarking algorithm in uncompressed video wavelet domain based on human visual system is proposed in this paper. This algorithm established a visual model according to the human visual masking and the characteristics of wavelet coefficients. It did not require the scene segmentation of the video, choosing the video frames which used for embedding watermarking by the key, and embedding different watermarking which processed by Arnold scrambling into different frame, so it is robust to statistical analysis, frame crop and so on. To ensure the spatial synchrony when extracting the watermark information, zero-watermarking method and chaotic system are used to generate the synchronization information. The quantized central limit theorem is applied to adjust the low frequency coefficients, it makes the extracted watermark information keeps invariant when its element value changed in robust region. A new correlation detection method of watermarking information was put forward. Watermark detection does not require original video. It realized the quasi-blind watermark detection.


In today’s era use of digital media is most popular way of communication. Digital media covers images, videos and animations available online. The easy methods of accessing, copying and editing digital media have made them more popular. With several advantages these easy methods of copying and editing data have created some big issues like ownership identification. This increases the demand of protecting online digital media. Watermarking is solution of such problem. In this work, a block-based method has been proposed for video watermarking that uses a key at the time of embedding and extraction. Some frames are selected from the video according to a key. Watermark is embedded on the selected frames after dividing into parts called blocks. Each part of the watermark is embedded in one selected frame of the video. This method increases the security of the system as the complete watermark cannot be extracted without knowing the positions of watermarked frames and the position of the block in that frame. Watermarking is performed in the Discrete Wavelet Transform domain after scaling of watermark data. To show the authenticity of proposed scheme various attacks are applied on different watermarked video frames and extracted watermark results are shown under different tables.


2014 ◽  
Vol 644-650 ◽  
pp. 4641-4644
Author(s):  
Zhen Xian Lin ◽  
Yuan Sheng Li ◽  
Jian Tao Li

Put forward an improved QIM watermark embedding algorithm. The carrier image is transformed into YCbCr space, lifting wavelet transform the three components, then using the QIM quantization method embeds watermark into high frequency coefficients of Cb and Cr component, and Y component of low frequency coefficients. The experimental results show that embedded watermark which using improved algorithm has good invisibility. Anti attack test results show that after using common attack method attack the image embedded watermark, it can still extract the watermark completely. The anti-attack performance of improved QIM algorithm is much better than texture watermarking algorithm based on DCT.


2020 ◽  
Vol 8 (6) ◽  
pp. 1389-1399

In this paper investigation of the application of teaching learning based optimization (TLBO) technique for the design of a modified Phillips haffron model of SMIB installed with SSSC based controller is made. The design objectives are to reduce low frequency oscillation and improve power system stability. Simulation result are demonstrated with Eigen value analysis, where various types of disturbance is applied as mechanical torque input and reference voltage settling, variation in parameter & various loading condition. The results obtained are compared with some well-known optimization techniques, such as the genetic algorithm (GA), particle swarm optimization (PSO) and the gravitational search algorithm (GSA). A comparative study of results demonstrates that the results of the proposed controller were more precise and robust


2021 ◽  
Vol 2021 ◽  
pp. 1-27
Author(s):  
Chirag Sharma ◽  
Amandeep Bagga ◽  
Bhupesh Kumar Singh ◽  
Mohammad Shabaz

The multimedia technologies are gaining a lot of popularity these days. Many unauthorized persons are gaining the access of multimedia such as videos, audios, and images. The transmission of multimedia across the Internet by unauthorized person has led to the problem of illegal distribution. The problem arises when copyrighted data is getting accessed without the knowledge of copyright owner. The videos are the most attacked data during COVID-19 pandemic. In this paper, the frame selection video watermarking technique is proposed to tackle the issue. The proposed work enlightens frame selection followed by watermarking embedding and testing of the technique against various attacks. The embedding of the watermark is done on selected frames of the video. The additional security feature Hyperchaotic Encryption is applied on watermark before embedding. Watermark embedding is done using graph-based transform and singular-valued decomposition and the performance of the technique is further optimized using hybrid combination of grey wolf optimization and genetic algorithm. Many researchers face the challenge of quality loss after embedding of watermark. Proposed technique will aim to overcome those challenges. A total of 6 videos (Akiyo, Coastguard, Foreman, News, Bowing, and Pure Storage) are used for carrying out research work. The performance evaluation of the proposed technique has been carried out after processing it against practical video processing attacks Gaussian noise, sharpening, rotation, blurring, and JPEG compression.


2019 ◽  
Vol 2 (3) ◽  
pp. 508-517
Author(s):  
FerdaNur Arıcı ◽  
Ersin Kaya

Optimization is a process to search the most suitable solution for a problem within an acceptable time interval. The algorithms that solve the optimization problems are called as optimization algorithms. In the literature, there are many optimization algorithms with different characteristics. The optimization algorithms can exhibit different behaviors depending on the size, characteristics and complexity of the optimization problem. In this study, six well-known population based optimization algorithms (artificial algae algorithm - AAA, artificial bee colony algorithm - ABC, differential evolution algorithm - DE, genetic algorithm - GA, gravitational search algorithm - GSA and particle swarm optimization - PSO) were used. These six algorithms were performed on the CEC’17 test functions. According to the experimental results, the algorithms were compared and performances of the algorithms were evaluated.


2016 ◽  
Vol 3 (4) ◽  
pp. 1-11
Author(s):  
M. Lakshmikantha Reddy ◽  
◽  
M. Ramprasad Reddy ◽  
V.C. Veera Reddy ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document