A secure method of copyright protection for digital videos using split watermark embedding algorithm

Author(s):  
Jabir Ali ◽  
S. P. Ghrera
2018 ◽  
Vol 7 (2.9) ◽  
pp. 90
Author(s):  
Jabir Ali ◽  
Satya Prakash Ghrera

Digital copyright protection has become an effective way to prove the ownership and protect the multimedia contents from illegal use and unauthorized users. In order to prove the ownership of a video certain security program is embedded in a video and one of the ways of ensuring the ownership of a video is embedding the watermark in a video. In this paper, a new approach to digital video copyright protection, SWEA (Split watermark embedding algorithm) with Zero Padding Algorithm (ZPA) is proposed. With the help of this algorithm, it is hard to know the original pattern of watermark because of SWEA and minimizing the perceptual degradation of watermarked video because of ZPA. Here we are using ‘db1’ wavelet domain for embedding the watermark in the LL sub-band of the original identical frame (I-frame), based on the energy of high-frequency sub-band in an adaptive manner. SCD (Scene changed detection) is used to find out the identical frame (I-frame). The proposed algorithm has undergone various attacks, such as compression, uniform noise, Gaussian noise frame repetition and frame averaging attacks. The proposed algorithm, sustain all the above attacks and offers improved performance compared with the other methods from the literature.


Author(s):  
Farook Sattar ◽  
Dan Yu

Today, the Internet is a worldwide broadcasting capability, a mechanism for information dissemination and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. With the rapid evolution of digital networks, digital libraries and World Wide Web (WWW) services, the convenient broadcasting or exposition of digital products on the global network leads easily to illegal copying, modifying and retransmission. The Internet has spawned many copyright issues involving multimedia content distribution. Let’s say an owner would like to sell or distribute a work to legal/registered users only. If the work were subsequently copied/redistributed illegally, how could the owner find who was responsible? Cryptographic techniques provide an effective solution for securing the delivery process and controlling the use of the contents that an user has obtained. However, with flawless transmission through the network, the contents after decryption are exactly the same as the original data. The contents can be copied perfectly infinite times. A user can also manipulate the contents. Digital watermarking (Arnold, Schmucker, & Wolthusen, 2003; Katzenbeisser & Petitcolas, 2000) offers a way to counter copyright piracy on global networks that are not solvable by cryptography. It provides proof and tracking capabilities to illegal copying and distribution of multimedia information. Most existing digital watermarking schemes are based on some assumptions for watermark detection and extraction. Some schemes require the previous knowledge of watermark locations, strengths or some thresholds. In some algorithms, the watermark is estimated with the help of the original watermark information. To ensure the robustness and invisibility of the watermark, the optimum embedding locations are usually different for different images. For a large image database, it could be a disadvantage to require watermark location and strength information for watermark detection and extraction. A large amount of information then needs to be stored. On the Internet, an owner would like to distribute multimedia data by signing different watermarks to different users in order to prevent illegal redistribution of the data by a legal user. In this scenario, watermark detection and extraction algorithms requiring information of either watermark embedding locations and strengths or the original watermark should fail, since one does not know exactly which watermark is embedded in a particular copy of the watermarked image. To this end, we present a new blind watermarking scheme (Yu, Sattar, & Ma, 2002; Yu & Sattar, 2003, 2005) based on Independent Component Analysis (ICA) (Hyvarinen, 1999; Hyvärinen & Oja, 1999; Lee, 1998) for color images, which can overcome existing problems of watermark detection and extraction as described above. The new ICA-based scheme is found to be efficient in the application of data tracking/tracing for multimedia distribution through the Internet against other digital watermarking schemes. By adopting this ICA-based watermarking scheme, an efficient multimedia distribution framework/protocol for copyright protection can be accomplished. This article is organized as follows: The watermark embedding and extraction algorithms for color image watermarking using the new ICA-based scheme are presented next, followed by a discussion and comments on the results, security issues, summary and future works.


2012 ◽  
Vol 198-199 ◽  
pp. 1481-1486
Author(s):  
Xin Li ◽  
Yi Ping Tian

Watermark information is embedded in three-dimensional mesh model through three-dimensional watermarking algorithm for effective copyright protection. The widely use of three-dimensional grid model attracts more attention on the copyright protection. The digital watermark algorithm with the NURBS model based on the wavelet transform aims to get the virtual grayscale images using the control point coordinate. Then we can embed the watermark into the virtual gray image watermark. It can change the three-dimensional models into two-dimensional images. And this algorithm can enhance the operability and simplicity of the watermark embedding. Experiments show that the proposed algorithm is easy to implement, simple in principle, and the extracted watermark is clearly visible, moreover, the model does not need to be directly modified, so it has good robustness. Watermarked model does not change in the visual, it has good invisibility.


2013 ◽  
Vol 392 ◽  
pp. 1006-1009
Author(s):  
Qing Chen ◽  
Qi Wen Hu ◽  
Shao Kun Feng ◽  
Ze Fu

In this paper, a text blind watermarking is proposed and implemented for copyright protection. Based on the characteristics of PDF format, this algorithm uses character spacing coding throughout whole PDF document to embed watermark into it. Robustness and security is further increased by using synchronous coding, cycle encryption and majority decision. Watermark embedding and extracting are implemented under the software environment of VC++ 6.0, and performances are tested and analyzed. Experiments show that the algorithm has good transparency, large capacity and good robustness. It can apply to both of Chinese and English PDF documents.


2013 ◽  
pp. 607-648
Author(s):  
Rakesh Kumar Mishra

Protecting copyright of a digital content is gaining momentum and has been suitably complemented by technological innovations. Literature piracy, though not being given much attention, constitutes a major bulk. Unlike audio and video, text piracy is not complemented by IT solutions except for certain proprietary initiatives. This pursuit embarks on review of technological advancements for Text Copyright Protection along with issues and challenges for their implementation. Appraisal comprises of watermark embedding algorithms and distribution infrastructure. A brief discussion over the document structure, watermark composition and type, classification of algorithms and future direction is also being accomplished. To make approach holistic couple of systems were also studied.


Author(s):  
L. Velazquez-Garcia ◽  
A. Cedillo-Hernandez ◽  
M. Cedillo-Hernandez ◽  
M. Nakano-Miyatake ◽  
H. Perez-Meana

2018 ◽  
Vol 8 (10) ◽  
pp. 1891 ◽  
Author(s):  
Xiaoyan Yu ◽  
Chengyou Wang ◽  
Xiao Zhou

With the development and popularization of the Internet and the rise of various live broadcast platforms, digital videos have penetrated into all aspects of people’s life. At the same time, all kinds of pirated videos are also flooding the Internet, which seriously infringe the rights and interests of video copyright owners and hinder the healthy development of the video industry. Therefore, robust video watermarking algorithms for copyright protection have emerged as these times require. In this paper, we review robust video watermarking algorithms for copyright protection based on original videos and compressed videos. Basic models and properties of video watermarking algorithms are described, and the evaluation indexes corresponding to each property are also introduced. To help researchers understand various existing robust watermarking algorithms quickly, some basic information and the quantitative estimation of several performances are analyzed and compared. Finally, we discuss the challenges in the research of robust video watermarking algorithms, and give possible development directions for the future.


2012 ◽  
Vol 6 (1) ◽  
pp. 8
Author(s):  
Khalid Ahmed Ibrahim ◽  
G.K. Viju

Factors like Secrecy, Authentication, Non-repudiation and Integrity are considered in dealing with security. Watermarking is one such security measure. Watermarking technology generally permits authors to hide their names in the image behind their original work. In this proposed work, a segment based model is developed wherein the original image is partitioned into various segments and the information is made confidential. At the receiver’s end the segments are combined to obtain the original image and the secret information. The model facilitates both watermark embedding and extraction. Besides copyright protection, authentication, security, digital watermarks can also serve as invisible labels and content links.


2020 ◽  
Vol 10 (1) ◽  
pp. 68-73
Author(s):  
Farhad M. Khalifa ◽  
Mohammed G. Saeed

In the past decade, a transform called all phase discrete cosine biorthogonal transform (APDCBT) appeared in the field of digital image processing. It is mainly used to solve the negativity found in discrete cosine transform (DCT), especially in a low bit rate. In this paper, the APDCBT is employed for watermark insertion based on selected regions of an image. The insertion is depending on the homogeneity of each part of the image. To determine the extent of homogeneity, there are two criteria: Mean and standard deviation are applied for the intensity of the image. Medium frequency bands of APDCBT in image pixel blocks are used to hold the embedded watermark. Then, the transform is inversed to obtain the resultant watermarked image. The robustness of APDCBT against watermark removal attacks is tested and the experimental results showed the superiority of the APDCBT over traditional DCT in the watermark embedding system. More specifically, when the LSB reset attack applied. For instance, when the contrast adjustment attack applied, the average of normalized cross-correlation (NCC) values of extracted watermark images with the original watermark, it was 0.992 for the proposed method. This is a promised result, if it is compared with the NCC of the DCT method, which was 0.423. The proposed method can be used for copyright protection purpose.


Sign in / Sign up

Export Citation Format

Share Document