Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

Wavelet Analysis in Video Watermarking through Wavelet Transform Scheme

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Gunjan Malik, Tarun Kumar, Gaurav Agarwal
10.5120/ijca2017913177

Gunjan Malik, Tarun Kumar and Gaurav Agarwal. Wavelet Analysis in Video Watermarking through Wavelet Transform Scheme. International Journal of Computer Applications 161(4):29-36, March 2017. BibTeX

@article{10.5120/ijca2017913177,
	author = {Gunjan Malik and Tarun Kumar and Gaurav Agarwal},
	title = {Wavelet Analysis in Video Watermarking through Wavelet Transform Scheme},
	journal = {International Journal of Computer Applications},
	issue_date = {March 2017},
	volume = {161},
	number = {4},
	month = {Mar},
	year = {2017},
	issn = {0975-8887},
	pages = {29-36},
	numpages = {8},
	url = {http://www.ijcaonline.org/archives/volume161/number4/27140-2017913177},
	doi = {10.5120/ijca2017913177},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Intellectual and copyright protection is one of the major issues faced by copyright owners. Easy access to Internet and all the digital media such as audios, images, digital documents and videos, poses great threat to copyright owners as their work gets manipulated, forged, redistributed conveniently through illegal means. As an effective solution to this problem, concept of Digital Watermarking has been used. Watermarks can be of the form images, text, binary logos, signatures, and numbers. They are used for storing information about the copyright owner, source of data, and authentic users. In the proposed work, video watermarking technique has been shown highlighting comparative analysis of db wavelets based on different quality parameters. Each of the db wavelets is applied on the randomly selected frames from the input coloured video using random number that works as a key for the proposed extraction algorithm. It is shown that not all db wavelets support watermarking scheme. Out of 45 wavelets, 12 db wavelets were applicable for watermarking. The original watermark image and the extracted watermark image are then used as the basis against various quality parameters to check if the imperceptibility of the watermark is retained after watermark extraction. The proposed watermarking scheme is imperceptible against various quality parameters such as Peak-signal-to-noise ratio, Mean-square error, maximum difference, and normalized absolute error.

References

  1. Yang Qianli, Cai Yanhong, "A Digital Image Watermarking Algorithm Based on Discrete Wavelet Transform and Discrete Cosine Transform", 978-1-4673-2108-2/12/$31.00 ©2012 IEEE
  2. Mehran Andalibi, Damon M. Chandler, "Digital Image Watermarking via Adaptive Logo Texturization", IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 24, NO. 12, DECEMBER 2015
  3. Yueh-Hong Chen, Hsiang-Cheh Huang, "Genetic Watermarking Based on Wavelet Packet Transform", 978-0-7695-3745-0/09 $25.00 © 2009 IEEE DOI 10.1109/HIS.2009.59
  4. Hassen Seddik, Mounir Sayadi and Farhat Fnaiech, "A New Blind Image Watermarking Method Based on Schur transformation", 978-1-4244-4649-0/09/$25.00 ©2009 IEEE
  5. Saied Amirgholipour Kasmani, Ahmadreza Naghsh-Nilchi “A New Robust Digital Image Watermarking Technique Based On Joint DWT DCT Transformation”, Third 2008 International Conference on Convergence and Hybrid Information Technology, 2008 IEEE.
  6. Gunjan Malik and Tarun Kumar, "Analysis of Watermarking Techniques", IJCA, Volume 138 – No.10, March 2016.
  7. S. Vongpradhip and S. Rungraungsilp, “QR code using invisible watermarking in frequency domain,” in Proc. 9th Int. Conf. ICT Knowl. Eng., 2012, pp. 47–52.
  8. S. Bhalerao, M. Mehta, N. Dubey, and M. Bhatele, “Digital watermarking of medical images,” in Proc. India Seminar Biomed. Eng., 2012, pp. 111–116.
  9. Cheng-Han Yang,Hui-YuHuang,Wen-Hsing Hsu, "An adaptive video watermarking technique based on DCT domain", 978-1-4244-2358-3/08/$20.00 © 2008 IEEE
  10. Mr. Amit M Joshi, Dr. R.M.Patrikar, Dr. Vivekanand Mishra, "Design of Low Complexity Video Watermarking Algorithm based on Integer DCT", 978-1-4673-2014-6/12/$31.00 ©2012 IEEE
  11. Wei Wang, Aidong Men and Xiaobo Chen, "Robust Image Watermarking Scheme Based on Phase Features in DFT Domain and Generalized Radon Transformations", 978-1-4244-4131-0/09/$25.00 ©2009 IEEE
  12. I. Cox, J. Kilian, T. Leighton, T. Shamoon, “Secure spread spectrum watermarking for multimedia”, IEEE Trans. Image Process. No. 6, Vol. 12, June 1997, pp.1673-1687.
  13. Jeril George, Satishkumar Varma, Madhumita Chatterjee, "Color Image Watermarking using DWT-SVD and Arnold Transform", 2014 Annual IEEE India Conference (INDICON)
  14. Santi P. Maity,Malay K. Kundu, "An Image Watermarking Scheme using HVS Characteristics and Spread Transform", Proceedings of the 17th International Conference on Pattern Recognition (ICPR’04) 1051-4651/04 $ 20.00 IEEE
  15. Nisreen I. Yassin, Nancy M. Salem and Mohamed I. El Adawy, "Entropy Based Video Watermarking Scheme Using Wavelet Transform and Principle Component Analysis", 978-1-4673-4810-2/12/$31.00 ©2012 IEEE
  16. S. A. Mostafa, A. S. Tolba, F. M. Abdelkader, and H. M. Elhindy, “Video Watermarking Scheme Based on Principal Component Analysis and Wavelet Transform”, International Journal of Computer Science and Network Security, vol. 9, no. 8, August 2009.
  17. Nilanjan Dey, Anamitra Bardhan Roy, Poulami Das, Achintya Das, Sheli Sinha Chaudhuri, "DWT-DCT-SVD based IntravascularUltrasound video Watermarking", 2012 World Congress on Information and Communication Technologies, 978-1-4673-4805-8/12/$31.00 c 2012 IEEE.
  18. V.S Vora, Prof. A.C Suthar, Y.N.Makwana, S.J Davda, “Analysis of Compressed Image Quality Assessments”, Published in International Journal of Advanced Engineering & Application, Jan. 2010.

Keywords

Blind, Non-Blind Watermarks, Fidelity, Robustness, Spatial domain, Frequency Domain, DFT, DWT, DCT, PCA, Wavelet Packet Transform, Arnold Transform, Db wavelet, Synchronous and asynchronous attacks.