You are on page 1of 9

A Novel Video Watermarking Scheme

Based on MPEG-2 for Copyright Protection


Rakesh Ahuja1, S S Bedi2
1
Department of Computer Science & Engineering Department, MIT Moradabad, (UP), India
2 Department of CS & IT, MJP Rohilkhand University, Bareilly (U.P), India

Abstract: An innovative MPEG-2 based robust, invisible and blind watermarking scheme for video is
presented. The proposed algorithm uses all the DC coefficients from all 8 x 8 block of discrete coefficient
transforms matrices generated from each IDR frame in order to embed the binary watermark. The watermark
can only be extracted by using the key, which also enhance the security of watermark itself. Therefore the
extraction will never possible without knowing the actual key. The robustness is evaluated by testing against
image processing attacks and video processing intentional and non-intentional attacks by evaluating two
parameters as Normalized Correlation and Bit error Rate in order to find the degree of similarity and degree of
dissimilarity respectively between the original and extracted watermark. The superiority of the proposed video
watermarking algorithm is that the excellent robustness and good perceptibility achieved without changing the
motion vectors during the DPCM process of MPEG-2 encoding scheme.

Keyword: Discrete cosine transforms, information retrieval, video compression, MPEG-2 Structure.

1. Introduction requirements of imperceptibility, throughput


and robustness.
With the advent of internet technology, it This paper is structured into six sections
becomes easier to copy, edit and transfer digital described as follows. Section 1 described the
multimedia data from one system to other. Due brief introduction and section 2 summarised the
to this easiness another issues arises like background of MPEG-2 video compression
creation of illegal redistribution of visual scheme. A brief review of video watermarking
multimedia data, piracy and tempering with the using the MPEG structure elaborated in section
original contents and much more serious effect 3. Proposed digital video watermark scheme is
is to claim for false ownership and more explained in section 4. The experimental setup
challenges is to protect the copyright and their results and analyses are illustrated in
information. Encryption is the earlier use section 5. Section 6 comparing the proposed
technique to protect the contents. Still, it fails to method with the existing techniques either
protect the digital contents once decrypted. works on the same structure (MPEG) or
Another way to protect the multimedia is to different structure like spatial domain and
embed the copyright into the host object in a frequency domain in order to perfectly evaluate
robust and imperceptible manner. It certainly the standing of the anticipated scheme. Section
feels more comfortable not only to the 7 is set for concluding the paper with their
multimedia owners for supplying the limitations and future works.
copyrighted materials but also for end users for
sharing much of the information. The current 2. Background of MPEG-2 Video
digital video multimedia data is available in Compression Standard
different format and types and therefore
watermarking terminology can also use these The MPEG-2 coding standard development is
different compression standards like MPEG-2 started in 1990. Each video sequence in MPEG
for embedding purposes. Other way of video
is divided into one or more group of pictures
watermarking is to use directly original video
stream as spatial domain or frequency domain. (GOP). Each group consisting of three types of
Hence there are numbers of ways to implement pictures named as I frames (Intra coded
the video watermarking algorithms but the pictures), P frames (forward predicted
common thing for any video watermarking is pictures), and B frames (Bidirectional frames).
that they must meet three basic contradict
Their decoding and encoding order of GOP is watermark in this type of frames. Since I- frames
shown in fig 1 and fig 2 respectively. directly affect the quality of P-frame and B-
frame. Degrading the quality of I frames by
I1 B2 B3 P4 B5 B6 P7 B8 B9 P10 inserting other information means lowering down
Fig. 1 Decoding and Display order of GOP the value of P-frames and B-frames. Hence the
limitation with this approach is that the quality of
I1 P4 B2 B3 P7 B5 B6 P10 B8 B9 watermarked video may degraded significantly if
Fig. 2 Encoding and Processing Order of GOP special care has not been consider. The proposed
scheme uses this approach to embed the
MPEG structure processed the video frames in watermark but carefully designed keeping the
unit of a macro blocks. Each of the macro block view of quality of watermarked video must not be
is processed in intra or inter coded mode and the degraded sharply. Another method for embedding
processing is depend upon that it is associated the watermark is to finding the motion vector by
with which type of frame (I, P or B). Each macro considering the P and B frames. Although this
block of size 16 x 16 of I frame is divided into approach claims for high throughput and good
number of blocks and the size of each block is set perceptibility, yet the robustness and bit error rate
to 8 x 8. Each block of video frame is passes may not get up to the mark due to P-frame is
through some key steps necessary to encode the having less redundancy. The limitation of this
video data. Since I-frames are the very first approach is that the robustness will be
frame in each picture group therefore these I compromised certainly, the essential feature of
frames are coded directly i.e. without taking any video watermarking. Therefore, the proposed
reference to any other past or future frames. algorithm implemented the video watermarking
While encoding I-frames, spatial redundancy can by adopting the first method in order to get all
be reduces and therefore also consider as Intra- three features remarkably.
frame coding. Another kind of frame is P frames,
can be predicted from previous I frame or P
3. Previous Researchers Work
frame i.e. they are using the inter-frame coding
technique are use to reduce spatial and temporal
Chiou-Ting Hsu et al. [1] embedded the
redundancies and provides more compression as
watermark into the modified quantized middle
compared to I frames. The result is P frames are
frequency DCT frequency coefficients to survive
more complex than I-frames and therefore also
the MPEG structure. Since MPEG do the
having less space for any type of embedding
quantization operation to achieve the higher level
information. The third category of pictures is B-
of adaptation. Therefore the limitation of this
pictures, also called bidirectional prediction and it
approach is that is the modification of DCT
uses both references, past and future frame may
coefficients for inserting the watermark is
be I or P frames as a reference to provide highest
depends upon the quantization factor. Larger the
degree of compression.
quantization factor providing the larger survival
of watermark against compression ratio otherwise
MPEG-2 video data stream is being divided into
poor invisibility would be obtained. Bijan G.
3 major parts: Evaluation of DCT coefficients
Mobasseri [2] embedded the watermark into the
data stream, finding motion vector and head
raw video contents by using the spread spectrum
information. Watermark information can be
technique. In this approach, they simulated their
embedded into the first two of them. If the
experiments that the extraction of watermark can
copyright information as watermark is embedded
be extracted from the MPEG decoded bit stream.
into the DCT coefficients during the encoding of
It has been clearly indicated the limitation in his
video, it is generally embedded into I-frames
approach that up to what extend the inserting
because of having large number of DCT
binary pattern would survives. You-Ru Lin et al.
coefficients available in it as compared to P-
[3] inserted the watermark image according to the
frames and B-frames. Since I frames is the key
frame among all three kinds of frames therefore
special attention must be required to embed the
direction of motion vector by using the block proposed the watermarking method of MPEG
matching algorithm. Satyen Biswas et al. [4] video for evaluation of authentication and
described the video watermarking scheme temper detection. Their algorithm is entirely
based on MPEG2 structure. They converted based on the compressed bit stream in which is
the gray scale image into multiple bit-plane to identifying the watermark carrying VLCs.
images and DCT is applied to all the bit-plane These VLCs can be use to embedding the
images. Each partitioned image embedded watermark bits. LSB of each VLC is use to
into each different scene of the movie. In this embed one watermark bits. The common
way the watermark is embedded into the limitation with these above two approaches is
whole video. Robustness is being evaluated by that the attacker can randomized all the LSB
simulating the various attacks like collusion, values in order to completely destroy the
filtering, frame dropping, rotation, and watermark. Dr. Anil kumar Sharma [10] uses
blurring, scaling and temporal shift. The only quantization index modulation (QIM)
limitation with this approach is that only I technique to embed the watermark bits into P
frames are used to embed the watermark but frames and claiming that the thousand of bits
when security concern in so important, as they of watermark can be embedded in just one P
indicated, then all kinds of frames I, P and B frame which certainly improves the capacity of
frames could be used for watermarked for the watermark bits. But the limitation with this
uncompressed domain, but again the limitation approach is that the data of P-frame is having
is that it would be performed at the cost of less redundancy and therefore PSNR and NC
higher computational complexity. Lu Jianfeng decreases with increases the probability of
et al. [5] described the video watermarking errors. The limitations with all above
based on DCT coefficient. They adjusted the approaches are that adopted a very cryptic
DCT coefficient to embed the watermark and method to modify the structure of MPEG for
extracted successfully without the need of embedding the watermark bits and due to
original video or watermark. The limitation which all three essential features cannot
with this approach is that the quality of obtained in a optimized way. To overcome the
watermarked video depends upon the control limitations of all the above methods is that this
parameter. Therefore, the little increasing this paper proposed a novel technique by little
control parameter may drastically affect the modifying the DC coefficients of DCT blocks
perceptibility of watermarked video. Another by using the MPEG-2 structure in view of
limitation is that the robustness has been achieving the higher perceptibility and
evaluated against only ‘Salt & Pepper’ attack robustness, essential features of any video
although numbers of image processing attack watermarking.
as well as video specific attacks are available
to judge the robustness of the scheme. Ahuja 4. Proposed video watermarking
et al. [6] further extended this work based on algorithm
MPEG2 structure tried to cover the above
limitations. They focused on improving the 4.1 Generation of Watermark Key
elapsed time to embed the watermark and
achieved higher robustness against some A two dimensional binary image of size K= M
common image processing attacks and video x N bits for bit depth 1 is use as watermark
specific attacks. Another way to embed the signal ‘W’ is converted into one dimensional
watermark bits is to first finding the macro consisting K bits. Each pixel of the binary
block of Y or Cr or Cb component of I frame image is needed to be represented by 1 bit.
when P-frame has a motion vector and then The size of image ‘K’ is act as a key and it will
these blocks will be little modified in order to be use to extract the watermark image from the
embed the binary watermark watermarked video.
bits as described by [7]. The purpose of all
above mentioned works is to embed the 4.2 Video Preprocessing
copyright information in a robust manner. Yuk
Ying Chung et al. [8] developed the If the video is in compressed form, convert
watermarking scheme for MPEG-2 video into uncompressed form by separating it into
based on quantized DCT coefficient. They number of frames. Then the video is divided
embedded each watermark bits into the LSB of into the group of pictures (GOP) consisting I,
the DC coefficient in each DCT coefficient P and B frames, where each GOP consisting
lock of I frames. Daniel Cross et al.[9] 10 frames for processing as shown in Fig. 2, a
general regular structure of MPEG 2 but it one as luminance component ‘Y’ and other
doesn’t adamant to follow the same sequence two Chrome channels known as CB and CR
that the I frame must be followed by a chain of respectively. Choose Y component as it is the
P-frame and B-frames. Sometimes a P-frame most luminance part and have a rich space for
may have drastically changes from the inserting the watermark. Divide the Y matrix
previous I or P- frame and therefore it may be into the number of equal size ( 8 x 8) of blocks
predicated awful and due to which it is better for applying DCT and then quantization on
to encode it as I-frame. each currently selected 8 x 8 block. Pick one
watermark bit and also check the value of DC
4.3 Watermark Embedding Process component of currently selected DCT for odd
or even. If the picked value of watermark bit is
Since I frames are having high density of DCT 1 and the DC value is odd then there is no
blocks as compare to P and B frames therefore change of DC value otherwise make it odd for
the proposed algorithm uses the I type of the currently selected DCT component then it
frames to insert the watermark bits by little is considered that selected one watermark bit
modifying the DC value of each DCT blocks of ‘1’ is inserted virtually. On the contrary, if
of Y channel of each I frame in view of that the current watermark bit is ‘0’ and the DC
the quality of watermarked video must not be value is even than there is no change of DC
degraded significantly. The details of value otherwise make it even for the currently
embedding algorithm is defined as follows:
Each I frame is divided into three channels,
For each I frame Coverted To Y ,CB and Extract Y component Divided Y into 8 x 8 bits
CR Channel of Blocks

Apply DCT on each


A size of binary image is S= M x N. Where S= { S(i,j) |
Pick first watermark bit (wj) block
0 ≤ i<M, 0 ≤ j<N, And S(i,j) ∈ {0,1}. Convert the
from the first DCT block.
image into one dimensional array, where W= {
wj}, j=1,2,……S, where S= M x N, and wj = 0 or
1 Pick First DC_value from
the first DCT block

y=XOR (wj, x) x= (DC )Mod 2

If y==0? If wi=0?
Yes Yes Yes Yes

No No
No change to DC value of & it is Change DC value to greatest even Change DC value to greatest
considered that the selected bit (wi=0 or integer lower than the DC value & it odd integer lower than the DC
1) is inserted into the currently selected is considered that the selected value for the currently selected
DCT block watermark bit ‘0’ is inserted into the DCT block & it is considered that
currently selected DCT block . the selected bit ‘1’ is inserted .

Select next Yes If any more


If any more Yes Select next
watermark bit DCT block
bit exist? DCT Block
(wj) exist?

No No
Select first
Embedding of watermark bits Embedding process
watermark bit (wj) is started from the scratch completed.
Fig. 3: Watermark Embedding System
selected DCT coefficient then it is considered watermark. The extracted watermark is shown
that the selected one watermark bit ‘0’ is in Fig 4b.
inserted virtually. Now choose DC value from
the next adjacent DCT block. At the same time
also pick the watermark bit (0/1). Repeat the
same procedure to insert the other watermark
bit. This process is continued to embed the
other watermark bits from all the DCT block
from the currently selected I frame. Move to
another GOP to get another I frame for
repeating the same process for inserting the
rest watermark bits. This process is continued
till all watermark bits have been processed. If Fig 4a: Original Fig 4b: Extracted
still some DCT blocks are untouched then Watermark Watermark
watermark bits will be inserted again from the
scratch in order to cover all untouched DCT The simulation results have been evaluated for
block. In this way all DCT blocks from all I three major parameters as defined below
frame has been covered. It can be best
understand by the following example. Suppose 5.1 Perceptibility
5 watermark bits to be insert are { 0,0, 1,1,1}
and the actual DC values are { 183, 94, 72,
The perceptibility factor measures the degree
187, 190} then the updated value of DC
of similarity between the original video with
components are { 182, 94, 71, 187, 189} in
the watermarked video. It is defined by the
order to be considered that the watermark bits
following formula.
have been inserted.
NoofFrames
5 Experimental setup And Result PSNR  1/ NoofFrames 
K 1
PSNR (i)
K
Analysis
Where PSNRK = 10 log10 255/ MSEK(mean
Proposed video watermarking algorithm is square error) is the peak signal to noise ration
simulated under MATLAB tool version measures between Kth original video frame and
R2009. Experimental results have been Kth Watermarked Video frame and MSE it is
evaluated by considering the standard videos defined as mean square error between these
namely ‘Akiyo.avi’ . The video is static since two frames, defined by the following formula
a newsreader is having only lips movements –
and rest part of the video including
N 1 M 1 2

MSEK  1/ MN  (OrigVid (i, j ) K  WtrVid (i, j ) K ) (ii)


background is immovable throughout the
playing of video. The length of this video
i 0 j 0
sequence is 300 frames with a frame rate is 25
fps and the size of each video frame is 176 x M x N is the size of each video frame and
144. Another input requirement is to choose OrigVid(i,j) refers to particular pixel value of
the standard binary watermark. A binary ith row and jth column of original video frame
watermarks ‘logo.tif’ as shown in the Fig. 4a and WtrVid(i,j) refers to particular pixel value
is chosen to embed the watermark. The size of of ith row and jth column of watermarked video
this image is 122 x 127 with bit depth 1. frame. The proposed algorithm calculated the
Therefore, here the key ‘K= 15494’ is the size PSNR between original and watermarked
of the binary image use to extract the video with and without attacks as shown in the
Table 1.
5.2 Robustness Evaluation: is concern, two attacks namely ‘rotation
attack’ and ‘crop attack’ are very most
The robustness parameters calculate the degree
important attacks. Generally, in both the cases,
of resemblance between original and extracted
watermarking extraction algorithms fails to
watermark. It is defined by the normalized
extract the embedded watermark therefore
correlation as defined below:
M 1 N 1 simulation must required to verify the
 W (i, j )W '(i, j )
i 0 j 0 robustness against these attacks. Best results of
NC  M 1 N 1
(iii)
extracted watermark in the proposed algorithm
 W (i, j )
i 0 j 0
2
are shown in Table 1, the watermark is
successfully extracted after rotating the entire
where W and W ' are the original and extracted video by 0.1°. Simulation results show that the
watermarks of size M x N, respectively. PSNR is decreasing as increasing the rotation
Robustness is evaluated by applying the angle beyond 0.1°. It is concluded that the
different categories of attacks such as image small value of rotation is acceptable without
processing attack and video specific attacks. having any rotation detector. Definitely the
rotation detector increases the robustness but
Robustness of the proposed algorithms has also increases the complexity. Another
been tested through simulation of the category of geometric attack is cropping attack
following attacks: provides satisfactory results if less than or
equal to 10% of the total frames were cropped.
a) Geometric Attacks- Rotation & Another way to judge the robustness is to
Cropping calculate the ‘Bit Error Rate (BER’. It reflects
b) Noise Attacks: Speckle Noise, Salt & the degree of dissimilarities between the
Pepper Noise & Gaussian Noise extracted and original watermark image. In
c) Filter Attack: Median Filter & Wiener general it is not known the threshold value for
Filter Attack which the value is acceptable.
d) Video Manipulation Attacks: Frames
insertion, frame deletion, frames M 1 N 1
averaging, frame swapping and frame W (i, j)  W '(i, j)
replacement. BER  0 0
*100
e) Compression Attack: Cinepak Attack MN (iv)

Although in all the listed attacks, the best Where W and W ' are the original watermark
robustness results are obtained against frame and the extracted watermark, respectively. M x
replacement attack, frame deletion attack, N is the size of watermark image. NC and
frame swapping, frame averaging attack BER, both the parameters evaluate the
because of NC value in all these case is above robustness but former find the similarities
90%. These attacks must be checked for between the original and extracted watermark
robustness evaluation of any digital video and later described the degree of
watermarking scheme. As compare to previous dissimilarities. The numerical relationship
researchers work, no work have been between these two is that NC is inversely
demonstrate for frame replacement attack for propotional to BER i.e. higher the NC value
robustness evaluation till now & it is as and lower the BER indicates the higher
important as other frame specific attacks. It robustness is obtained for some constant ‘k’.
may be needed for those situation where the In a simple way, when NC=1 and BER=0
commercial video clip as advertisement have reflects that there is no viable difference
to be insert but the entire video length must between the original and the extracted
not be increased. The proposed algorithm also watermark. The proposed algorithm
tested the robustness against various types of calculated the BER between original and
inserting the noise. The results are good for the extracted watermark with and without attacks
small value of noise addition into the as shown in the Table 1.
watermarked video. As far as geometric attack
Table 1: NC, PSNR and BER along with extracted image after applying Attacks on Watermarked Video

No Attack Rotation at 0.1 : 30 frames Crop Speckle Noise at 0.0003 Salt & Pepper Noise at
NC: 0.95343 NC : 0.83419 NC : 0.89403 NC : 0.9404 0.0003:
PSNR: 38.3198 PSNR: 37.6641 PSNR: 34.3369 PSNR: 37.6865 NC : 0.93446
BER: 4.5400 BER: 15.8419 BER: 12.8849 BER:5.7837 PSNR: 38.3036
BER:6.3429

Gaussian Noise Median Filter: Frame Replacement Attack Frame Insertion Attack Frame Deletion Attack
at 0.0003 NC : 0.7354 (12 to 24 Frame Replaced (12 to 24 frame inserted (2 frames Deleted)
NC : 0.8185 PSNR: 37.7444 from ‘cat_video.avi’) : from cat_video.avi) NC : 0.90228
PSNR: 35.4524 BER:28.3974 NC : 0.94187 NC : 0.69888 PSNR: 38.2234
BER:17.2974 PSNR: 38.0504 PSNR: 36.2480 BER: 9.3918
BER:5.6534 BER:29.8682

Frame Swapping Frame Averaging Compression Attack Wiener Filter Attack ( 3x


Attack (4 frames Attack NC : 0.7127 3)
swapped) NC : 0.95343 PSNR: 37.4866 NC : 0.69956
----
NC : 0.94197 PSNR: 38.0026 BER:27.0109 PSNR: 38.4757
PSNR: 38.1402 BER:4.5427 BER: 28.3974
BER: 5.8143

----

6 State of Art Vs Simulation Results can be compared with those researchers who
have evaluated either NC or BER as shown in
The theme of the proposed technique is that the Table 2. Another important obsession is that no
robustness results can be compared with the existing schemes shown results for evaluating
results of previous research by covering same PSNR after various attacks. Since this factor is
and different variety of existing techniques as directly associated with the quality of
frequency domain based approach, DCT based watermarked video and therefore it cannot be
and motion vector based using MPEG structure overlooked and it is almost as important as
as shown in Table 2. Other consideration is that normalized correlation value. That is why; the
- some of the author evaluated the NC or other proposed scheme demonstrates PSNR along
calculated the BER for robustness point of view. with NC and BER before and after various types
In view of this, the proposed method evaluated of attacks.
both NC and BER so that the simulation results
Table 2: Comparison of the robustness between the proposed algorithm and other previously suggested algorithms

S.No Attack Type [11] [12] [13] [14] Proposed Scheme

PSNR NC PSNR NC PSNR BER PSNR NC PSNR NC BER

1 Rotation --- 0.60 --- 0.71 --- 49.87 --- 0.9140 38.1441 0.95343 15.8419

2 Cropping --- 0.68 --- 0.73 --- 6.52 --- --- 34.3369 0.89403 12.8849

3 Speckle Noise --- 0.90 0.91 35.04 11.34 --- --- 37.6865 0.9404 5.7837

4 Salt & Pepper --- 0.63 --- --- 34.67 --- --- 0.6684 38.3036 0.93446 6.3429

5 Gaussian Noise --- --- --- --- --- --- --- 0.6847 35..4524 0.8185 17.2974

6 Median Filter --- 0.54 --- 0.63 35.04 6.54 --- --- 37.7444 0.7354 28.3974

7 Wiener Filter --- --- --- --- 35.04 --- --- --- 38.4757 0.69956 28.3974

8 Frame Replacement --- --- --- --- --- --- --- --- 38.0504 0.94187 5.634

9 Frame Insertion --- --- --- --- --- --- --- --- 36.248 0.69888 29.8682

10 Frame Deletion --- 0.90 --- --- --- --- --- 0.8801 38.2234 0.90228 9.3918

11 Frame Swapping --- 0.90 --- --- --- --- --- 0.9011 38.1402 0.94197 5.8143

12 Frame Averaging --- --- --- --- --- --- --- 0.9030 38.0026 0.95343 4.5427

13 Compression --- --- --- --- --- 28.13 --- --- 37.4866 0.7127 27.0109

According to the experimental results, the 3. Another observation is that the existing
following observation made. schemes have shown their results for covering
few attacks. The proposed approach covered
1. It is observed from the above results that the almost all geometric attack, image processing
proposed method shows better results than other attacks and video specific attacks. Till now, no
existing schemes for most of the image and video researcher has evaluated the robustness against
specific attacks. frame replacement attack.
2. The quality of watermarked video is compared
with the original video tested through 4. By analyzing the table, it is concluded that the
perceptibility (PSNR) as shown in the Table 1. Its robustness results are almost better than previous
value lies between 38.0026 (minimum value with work except with [13], the results are tarnished
any type of attack applied) and 38.3198 only for cropping and median filter attack shown
(maximum value without any attack), shows that by bold case letter.
perceptibility is degraded to maximum of 1.23%, 5. Security of extraction of watermark is
which is very nominal. Hence it is concluded that depending upon the key & the key is ‘size of
the proposed algorithm successfully achieved the watermark’ itself. The watermark can never be
perceptibility requirements, most essential feature extracted by the attacker until he/she knows the
of any video watermarking, under any type of key.
intentional or non-intentional attack.
7 Conclusion Algorithm based on MPEG-2 Structure”, Paper in
press in IEEE proceedings, conference held on
In this paper, DCT based robust and 15-16 May’2015.
imperceptible digital video watermarking is [7] Ueno, Y., "A digital video watermarking
proposed by using the MPEG structure. The method by associating with the motion
results have been evaluated for covering the three estimation," Signal Processing, 2004. IEEE
main issues as robustness, imperceptibility and Proceedings. ICSP '04. 2004 7th International
payload capacity. Robustness is being Conference on , vol.3, no., pp.2576,2579 vol.3,
successfully simulated by covering fourteen 31 Aug.-4 Sept. 2004
intentional and non-intentional attacks as shown [8] Yuk Ying Chung, Fan Fei Xu, Faith Choy, “
in the table 1 and the beauty of this proposed Development of Digital Video Watermarking for
algorithm is that the watermark is recovered MPEG-2 Video, Proc of IEEE, 2006, pp. 1-4
successfully without degrading the perceptibility. [9] Danial Cross, Bijan G. Mobasseri, “
The only limitation with this approach is that the Watermarking for self authentication of
payload capacity is depend upon the number of compressed video”, IEEE proceeding,
DCT coefficients available in the I frames. The International Conference on , vol.2, pp.913-916
future work can be extended to test the robustness vol.2, 2002
against applying more attacks like ambiguity [10] Dr. Anil Kumar Sharma, Mr. Yunus
attacks, collusion attacks and joint attacks. Mohammed Pervej, “Simulation and analysis of
digital video watermarking using MPEG-2”
,International Journal on Computer Science and
References Engineering,3(7)2700-2706, 2011
[11] Mahesh R. Saghavi, Dr. Mrs Archana M.,
[1] Chiou-Ting Hsu; Ja-Ling Wu,, "DCT-based Prof. Dr. Rajeev, Kainjan S. Kotecha, “ A Robust
watermarking for video," Consumer Electronics, Scheme for Digital Video Watermarking based
IEEE Transactions on , vol.44, no.1, pp.206,216, on Scrambling of Watermark,” International
Feb 1998 Journal of Computer Applications (0975-8887),
[2] Mobasseri, B.G., "A spatial digital video Vol 35- No. 2, Dec 2011
watermark that survives MPEG," in Information [12] Mirza, H.H.; Thai, H.D.; Nagata, Y.; Nakao,
Technology: Coding and Computing, 2000. Zensho, "Digital Video Watermarking Based on
Proceedings. International Conference on, vol., Principal Component Analysis," Innovative
no., pp.68-73, 2000 Computing, Information and Control, 2007.
[3] You-Ru Lin; Hui-Yu Huang; Wen-Hsing Hsu, ICICIC '07.IEEE Second International
"An embedded watermark technique in video for Conference on , vol., no., pp.290,290, 5-7 Sept.
copyright protection," in Pattern Recognition, 2007
2006. ICPR 2006. 18th International Conference [13] Yuan-Gen Wang, Zhe Ming Lu, Liang Fan,
on , vol.4, no., pp.795-798, 20-24 Aug. 2006 Yun Zheng, “Robust dual watermarking
[4] Satyen Biswas, Sunil R. Das, “An adaptive algorithm for AVS video”, ELSEVIER, Signal
compressed MPEG-2 video watermarking processing image communication, vol 24, pp.
scheme”, IEEE transaction on instrumentation 333-344, 2009,
and measurement”, vol. 54, No.5, pp. 1853- 1861, [14] Lama Rajab, Tahani Al-Khatib, Ali Al-Haj,
Oct 2005. “ Hybrid DWT-SVD Video Watermarking” IEEE
[5] Lu Jianfeng; Yang Zhenhua; Yang Fan; Li Li, proceedings, international conference on, pp.
"A MPEG2 Video Watermarking Algorithm 588-592 2008
Based on DCT Domain," Digital Media and
Digital Content Management (DMDCM), 2011
Workshop on , vol., no., pp.194,197, 15-16 May
2011
[6] Rakesh Ahuja, S S bedi, “ Copyright
Protection using Blind Video Watermarking

You might also like