“Robust Video Watermarking using Discrete Cosine Transform and Third level Discrete Wavelet Transform”
Journal Title: International Journal of engineering Research and Applications - Year 2017, Vol 7, Issue 10
Abstract
Digital watermarking technique is becoming popular for copyright information. The watermark embedded in the digital video may be incorrectly detected and extracted due to lack of appropriate algorithm, so the main concern is to implement the algorithm which is more resistant to different types of attacks. In this paper, a Hybrid video watermark technique has been introduced where DCT and 3 rd level of DWT, for adding more security, is used. PSNR, MSE and NC values of Hybrid technique are analyzed on the basis of different noises and attacks. Hybrid technique is robust against high stream, low stream, frame drop, frame trim attacks.
Authors and Affiliations
Chitrasen . , Tanuja Kashyap
C.F.D. Analysis of Modern Cars: A Comparative Study
Aerodynamics is the science of how air flows around and inside objects. More generally, it can be labeled “Fluid Dynamics” because air is really just a very thin type of fluid. Above slow speeds, the air flow around and...
Experimental Study: Comparison of clustering algorithms
One of the most important processes in the machine learning is the clustering. The clustering is an unsupervised process that gathers all similar measurements to identify and put them in groups based on specific measurem...
Performance Analysis of Spatially Multiplexed MIMO using STBC Antenna Diversity Technique
A new wireless broadband technology, MIMO (multiple input multiple output) systems, has gained great popularity for faster data transmission speed and have been actively investigated and successfully deployed for the eme...
New Orthogonal Codes for Direct Sequence CDMA Communications
From a long period Walsh codes and Gold codes have been used as a spread spectrum codes in Code Division Multiple Access (CDMA) communications because of their ease of generation than the efficiency of these codes. Drawb...
Video Encryption Algorithm and Key Management using Perfect Shuffle
Advancements in networking technologies like cloud computing have popularized applications like, Video-On Demand (VOD), video conferencing, pay-per-view, video broadcast, etc, in all such applications, confidentiality of...