A Survey on Video Watermarking Method for Reliability and Security in Video Using Least Significant Bit
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 6
Abstract
Digital watermarking techniques have fastest growing techniques for copyright protection and authentication. Digital watermarking field has so many articles which covers innovative approach. Hence, watermarking is a solution for patent protection and content verification mechanisms. Watermarking is classified into three domain i.e. spatial, transform and wavelet. Todays media use watermarking techniques for various applications such as copyright protection, copy control and tamper recurrence. Main focus involved in watermarking approach is its design considerations, choice of suitable watermarking methodology, security, reliability and robustness. In this survey we have studied and analyze much number of techniques and methodologies where we found video watermarking interesting. In this digital world many revolution has taking place with the paradigm of multimedia distribution. Computer networks with High speed in World Wide Web have revolutionized. Distribution and production of High quality copies of digital data through the internet by exploiting recent network and software technologies. Video piracy has become an increasing problem particularly with the proliferation of media sharing through the advancement of Internet services and various technologies. Security techniques that are based on security techniques only provide assurances for data confidentiality, authenticity, and integrity during data transmission through a public channel. However, many security techniques do not provide protection against unauthorized copying or transmitting of illegal materials. Digital watermarking is the act of hiding a message related to digital signals in different forms like an image, song, video within the signal itself. Using digital watermarking, copyright information can be implanted into the multimedia data by using some algorithms. Watermark information is mainly for protecting the copyright, covert communication and data file authenticity. Existing video watermarking techniques are divided into different categories Spatial, Transform and Pixel as shown in Fig1.
Authors and Affiliations
Nitesh Shukla, Sunil Sharma
Factors Influencing Non- Motorized Mode Choice: A Review
Q automobile travel by reducing traffic congestion and air/noise pollution. Their modal share is decreasing in developing countries day-by-day which is evident from the data collected by different organizations. At pres...
Analysing Algorithms for Querying Encrypted Database
With the invent of cloud computing, database outsourcing has emerged as a new platform. After the introduction of Database-as-a-Service (DAS) model organizations are outsourcing management of their data to third party c...
An Efficient System to Access Network Using Time Based Scheduling and Automatic Database Creation Using Data Perturbation
With the wide deployment of public cloud computing infrastructures the time constrain based system is required. Using clouds to host data query services has become an appealing solution for the advantages on scalability...
Network Security Attacks Solution and Analysis
Network security is that the composition of the vital policies and managed criteria adopted by an individual for the interference of unauthorized access, modification network-accessible resources network security plays...
A Copper Based Metal Organic Framework: Dynamic Green Catalyst for Heterogeneous OAcetylation of Alcohols Under Solvent Free Condition
The metal-organic framework material Cu3(BTC)2 was synthesized solvothermally using copper nitrate trihydrate as metal source, benzene 1,3,5 tricarboxylic acid as ligand, dimethyl formamide, ethanol and deionized water...