116
Views
4
CrossRef citations to date
0
Altmetric
Articles

Video Copyright Protection Using Chaotic Maps and Singular Value Decomposition in Wavelet Domain

&

References

  • C. H. Pik-Wah, Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery. Shatin, Hong Kong: The Chinese University of Hong Kong, Jul. 2004.
  • G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, “Watermarking digital image and video data. A state-of-the-art overview,” IEEE Signal Process. Mag., Vol. 17, no. 5, pp. 20–6, Sep. 2000. doi: 10.1109/79.879337
  • R.T. Paul, “Review of robust video watermarking techniques,” IJCA Spec. Issue Comput. Sci., Vol. 3, pp. 90–95, 2011.
  • M. Ejima and A. Miyazaki, “A wavelet-based watermarking for digital images and video,” IEICE Trans. Fund. Electron. Commun. Comput. Sci., Vol. 83, no. 3, pp. 532–40, Mar. 2000.
  • D. W. Xu, “A blind video watermarking algorithm based on 3D wavelet transform,” in Computational Intelligence and Security, 2007 International Conference, IEEE, Dec. 2007, pp. 945–9.
  • S. A. Al-Taweel and P. Sumari, “Robust video watermarking based on 3D-DWT domain,” in TENCON 2009–2009 IEEE Region 10 Conference, IEEE, Jan. 2009, pp. 1–6.
  • K. R. Chetan and K. Raghavendra, “DWT based blind digital video watermarking scheme for video authentication,” Int. J. Comput. Appl., Vol. 4, no. 10, pp. 19–26, Aug. 2010.
  • C. Cruz-Ramos, R. Reyes-Reyes, M. Nakano-Miyatake, and H. Pérez-Meana, “A blind video watermarking scheme robust to frame attacks combined with MPEG2 compression,” J. Appl. Res. Technol., Vol. 8, no. 3, pp. 323–37, Dec. 2010. doi: 10.22201/icat.16656423.2010.8.03.454
  • R. O. Preda and D. N. Vizireanu, “A robust digital watermarking scheme for video copyright protection in the wavelet domain,” Measurement, Vol. 43, no. 10, pp. 1720–6, Dec. 2010. doi: 10.1016/j.measurement.2010.07.009
  • R. S. Run, S. J. Horng, W. H. Lin, T. W. Kao, P. Fan, and M. K. Khan, “An efficient wavelet-tree-based watermarking method,” Expert Syst. Appl., Vol. 38, no. 12, pp. 14357–66, Nov. 2011. doi: 10.1016/j.eswa.2011.03.024
  • R. O. Preda and D. N. Vizireanu, “Robust wavelet-based video watermarking scheme for copyright protection using the human visual system,” J. Electron. Imag., Vol. 20, no. 1, pp. 013022–013022, Jan. 2011. doi: 10.1117/1.3558734
  • O. S. Faragallah, “Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain,” AEU – Int. J. Electron. Commun., Vol. 67, no. 3, pp. 189–96, Mar. 2013. doi: 10.1016/j.aeue.2012.07.010
  • A. Naved and Y. Rajesh, “Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking In Video,” Int. J. Sci. Res., Vol. 2, no. 9, pp. 249–252, Sep. 2013.
  • D. K. Thind and S. Jindal, “A semi blind DWT-SVD video watermarking,” Procedia Comput. Sci., Vol. 46, pp. 1661–7, Jan. 2015. doi: 10.1016/j.procs.2015.02.104
  • L. Rajab, T. Al-Khatib, and A. Al-Haj, “A blind DWT-SCHUR based digital video watermarking technique,” J. Software Eng. Appl., Vol. 8, no. 4, p. 224, Apr. 2015. doi: 10.4236/jsea.2015.84023
  • M. Masoumi and S. Amiri, “A blind scene-based watermarking for video copyright protection,” AEU – Int. J. Electron. Commun., Vol. 67, no. 6, pp. 528–35, Jun. 2013. doi: 10.1016/j.aeue.2012.11.009
  • T. Zong, Y. Xiang, I. Natgunanathan, S. Guo, W. Zhou, and G. Beliakov, “Robust histogram shape-based method for image watermarking,” IEEE Trans. Circuit Syst. Video Technol., Vol. 25, no. 5, pp. 717–29, May 2015. doi: 10.1109/TCSVT.2014.2363743
  • T. R. Singh, K. M. Singh, and S. Roy, “Video watermarking scheme based on visual cryptography and scene change detection,” AEU – Int. J. Electron. Commun., Vol. 67, no. 8, pp. 645–51, Aug. 2013. doi: 10.1016/j.aeue.2013.01.008
  • V. Hernandez-Guzman, C. Cruz-Ramos, M. Nakano-Miyatake, and H. Perez-Meana, “Watermarking algorithm based on the DWT,” IEEE Latin Am. Trans., Vol. 4, no. 4, pp. 257–67, Jun. 2006. doi: 10.1109/TLA.2006.4472122
  • M. Agoyi, E. Çelebi and G. Anbarjafari, “A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition,” Signal Image Video Process., Vol. 9, no. 3, pp. 735–45, Mar. 2015. doi: 10.1007/s11760-014-0624-9
  • H. Demirel, G. Anbarjafari, and M. N. S. Jahromi, “Image equalization based on singular value decomposition,” in Computer and Information Sciences, (ISCIS'08), 23rd International Symposium, Istanbul, Turkey, IEEE, Oct. 2008, pp. 1–5.
  • P. Rasti, S. Samiei, M. Agoyi, S. Escalera, and G. Anbarjafari, “Robust non-blind color video watermarking using QR decomposition and entropy analysis,” J. Vis. Commun. Image Representation, 38, pp. 838–47, Jul. 2016. doi: 10.1016/j.jvcir.2016.05.001
  • N. Singla, “Motion detection based on frame difference method,” Int. J. Inf. Comput. Technol., Vol. 4, no. 15, pp. 1559–65, 2014.
  • J. M. Guo and H. Prasetyo, “Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition,” AEU – Int. J. Electron. Commun., vol. 68, no. 9, pp. 816–34, Sep. 2014. doi: 10.1016/j.aeue.2014.03.008
  • J. M. Guo and H. Prasetyo, “False-positive-free SVD-based image watermarking,” J. Vis. Commun. Image Representation, vol. 25, no. 5, pp. 1149–63, Jul. 2014. doi: 10.1016/j.jvcir.2014.03.012
  • L. Xiao, Z. Wei, and J. Ye, “Comments on ‘Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition,’ and theoretical analysis”. J. Electron. Imag., vol. 17, no. 4, pp. 040501–040503, Oct. 2008. doi: 10.1117/1.3041170
  • Q. Su, Y. Niu, Y. Zhao, S. Pang, and X. Liu, “A dual color images watermarking scheme based on the optimized compensation of singular value decomposition,” AEU – Int. J. Electron. Commun., vol. 67, no. 8, pp. 652–64, Aug. 2013. doi: 10.1016/j.aeue.2013.01.009
  • R.S. Run, S.J. Horng, J.L. Lai, T.W. Kao, and R.J. Chen, “An improved SVD-based watermarking technique for copyright protection,” Expert Syst. Appl., vol. 39, no. 1, pp. 673–89, Jan. 2012. doi: 10.1016/j.eswa.2011.07.059
  • I.A. Ansari, M. Pant, and C.W. Ahn. “Robust and false positive free watermarking in IWT domain using SVD and ABC,” Eng. Appl. Artif. Intell., Vol. 49, pp. 114–25, Mar. 2016. doi: 10.1016/j.engappai.2015.12.004
  • L. Li-Hong, B. Feng-Ming, and H. Xue-Hui, “New image encryption algorithm based on logistic map and hyper-chaos,” in Computational and Information Sciences (ICCIS), 2013 Fifth International Conference on, IEEE, Jun. 2013, pp. 713–6.
  • S. Ponni alias sathya and S. Ramakrishnan, “Fibonacci Based Key Frame Selection and Scrambling for Video Watermarking in DWT–SVD Domain,” Wireless Pers. Commun., Online First, pp. 1–21, Jan. 2018.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.