CFP last date
20 May 2024
Reseach Article

Video Authentication and Copyright Protection using Unique Watermark Generation Technique and Singular Value Decomposition

by Chhaya S. Gosavi, Suresh N. Mali
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 3
Year of Publication: 2015
Authors: Chhaya S. Gosavi, Suresh N. Mali
10.5120/ijca2015905255

Chhaya S. Gosavi, Suresh N. Mali . Video Authentication and Copyright Protection using Unique Watermark Generation Technique and Singular Value Decomposition. International Journal of Computer Applications. 123, 3 ( August 2015), 1-5. DOI=10.5120/ijca2015905255

@article{ 10.5120/ijca2015905255,
author = { Chhaya S. Gosavi, Suresh N. Mali },
title = { Video Authentication and Copyright Protection using Unique Watermark Generation Technique and Singular Value Decomposition },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 3 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number3/21936-2015905255/ },
doi = { 10.5120/ijca2015905255 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:12:10.040999+05:30
%A Chhaya S. Gosavi
%A Suresh N. Mali
%T Video Authentication and Copyright Protection using Unique Watermark Generation Technique and Singular Value Decomposition
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 3
%P 1-5
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital watermark is perceptually invisible information embedded in the video. This embedding is done by an encoder using a secret key. The watermark can carry information about owner or recipient of the video or the video itself or some additional information like video caption, date etc. The watermarked video may undergo possible changes by unauthorized users or attackers. Unintentional and malicious attacks are aimed to disable watermark detection. Watermark embedding algorithm should be robust to such attacks. Watermark detection algorithm should decide whether watermark is present or absent in the video. If original video is used to make this decision, detector’s efficiency is increased and this system is termed as non-blind or private or non-oblivious watermarking system. Non-Blind watermarking is very expensive in terms of storage and not a practical solution. Blind or public watermarking algorithms not require original video for watermark detection. These algorithms are more practical but detector’s efficiency is low compared to one in private watermarking. In order to increase security of blind watermarking scheme it is desirable to use video dependent keys in the process of watermark generation. In this paper we discussed various video watermarking generation techniques and their challenges and used it for Video authentication. Experimental results show that same watermark can be used for authentication as well as copyright protection.

References
  1. Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, Vol. 6, No. 12, pp. 1673-1687, December 1997.
  2. Pik Wah Chan, Michael R. Lyu, and Roland T. Chin, “A Novel Scheme for Hybrid Digital Video Watermarking: Approach, Evaluation and Experimentation,” IEEE Transactions On Circuits and Systems for Video Technology, Vol. 15, No. 12, pp. 1638-1649, December 2005
  3. Yujie Zhang, Yuanyuan Zhang, “Research on Video Copyright Protection System,” IEEE Consumer Electronics, Communications and Networks (CECNet), Proceedings of Second International Conference, pp. 1277 – 1281, 21-23 April 2012.
  4. B.Shrinivas, K. Venkara Rao, P. Suresh Verma, “Movie Piracy Detection Based on Audio Features using Mel-Frequency Cepstral Coefficients and Vector Quantization,” International Journal of Soft Computing and Engineering, Vol. 02, No.4, pp. 27-31, September 2012.
  5. Deepa Kundur and Dimitrios Hatzinakos, “Toward Robust Logo Watermarking Using Multiresolution Image Fusion Principles,” IEEE Transactions On Multimedia, Vol. 6, No. 1, pp.185-198, February 2004.
  6. Dipti Mukherjee, Subhamoy Maitra, and Scott Acton, “Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication,” IEEE Transactions On Multimedia, Vol. 6, No. 1, pp. 1-15, 2004.
  7. Chuhong Fei, Deepa Kundur. and Raymond Kwong, “Analysis and Design of Authentication Watermarking,” IEEE Transaction on Multimedia , Vol. 13, No. 2, pp. 126-144, 2004.
  8. Dimitrios Simitopoulos, Sotirios A. Tsaftaris, Nikolaos V. Boulgouris, Alexia Briassouli, Michael G. Strintzis, “Fast Watermarking of MPEG-1/2 Streams Using Compressed-Domain Perceptual Embedding and a Generalized Correlator Detector,” EURASIP Journal on Applied Signal Processing, Vol. 8, pp. 1088-1106, July 2004.
  9. Mayank Vatsa, Richa Singh, Afzel Noore, “Feature based RDWT watermarking for multimodal biometric system,” Science Direct Image and Vision Computing 27, 293–304, 2009
  10. Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian, and Guorui Feng, “Reference Sharing Mechanism for Watermark Self-Embedding,” IEEE Transactions On Image Processing, Vol. 20, No. 2,pp. 485-495, February 2011.
  11. Chin-Chen Chang, Kuo-Feng Hwang, “Digital Watermarking Scheme using Human Visual Effects,” Informatica 24, pp. 505-511, 2000
  12. Chin-Yung Lin, Shih-Fu Chang, “Generating Robust Digital Signature for Image/Video Authentication,” Multimedia and Security Workshop at ACM Multimedia, Briston, U.K., September 1998.
  13. Kunvar Kalpesh N., S.A.Patil, “Real time Application to Generate the Differential Time Lapse Video with Pixel to Pixel Bit Mapping Algorithm,”World Journal of Science and Technology, Vol 2, Issue 4, pp.123-126, 2012
  14. Lei Yang,Qian Chen, Jun Tian, Dapeng Wu, “Robust Track-and-Trace Video Watermarking,”
  15. Vlado Kitanovski, Dimitar Taskovski, “Watermark Generation using Image-dependent Key for Image Authentication,” EUROCON,Serbia & Montenegro, Blegrade, Nov. 2005.
  16. Andrew Tirkel, Thomas Hall, “A Unique Watermark for Every Image,” IEEE Multimedia Transactions, Vol. 8, No. 4, pp. 30-37, Oct. 2001
  17. Ron Schyndel, Andrew Tirkel, Imants Svalbe, Thomas Hall, Charles Osborne, “Spread Spectrum Digital Watermarking Concepts and Higher Dimentional Array Construction,” First International Online Symposium on Electronics Engineering, July 2000.
  18. Samual Blake, Andrew Tarkel, “A Construction for Periodic ZCZ Sequences,” Dec 2012
  19. V.A.Mitekin, E.I.Timbe, “A New Watermark Sequence Generation Algorithm for Collision-free Digital Watermarking,” Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012
Index Terms

Computer Science
Information Sciences

Keywords

Singular Value Decomposition Attacks DCT LSB