Blind Watermarking Scheme for Un-Compressed Video Using RBF Neural Network
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 5
Abstract
Robust watermarking is one of the major multimedia processing applications which is specifically important for compressed and uncompressed video for copyright protection, content authentication and broadcasting. In this paper, we present a robust and blind watermarking scheme for RGB Uncompressed Video in AVI format in DWT domain. The quantized LL3 sub-band coefficients constitute the dataset to train the Radial Basis Function Neural Network (RBFNN). The output of the RBFNN is used to embed a binary watermark in the Y channel of the colored video frames using a pre-specified formula. The watermarked video exhibits good visual quality. The extracted watermarks yield high normalized correlation values which indicate a successful watermark recovery. We also examine robustness by executing three attacks – Gaussian Noise, Gaussian Blur and Scaling. Normalized Cross Correlation values for these attacks are high thereby indicating successful extraction and good robustness. We conclude that the fast watermarking scheme presented in this paper is suitable for real time applications.
Authors and Affiliations
Anurag Mishra, Aruna Jain
An Adhoc Sensor network with an Infrared Imaging System for Controlling Room air temperature in a large Auditorium building
This paper proposes an embedded wireless sensor network system for temperature control in a large auditorium. The objective is to save energy cost and reduce energy consumption. The room air temperature at various lo...
Bankruptcy Prediction of Financially Distressed Companies using Independent Component Analysis and Fuzzy Support Vector Machines
The aim of research is to model the dependency of enterprises on their financial ratios for predicting bankruptcy using artificial neural networks combined with fuzzy logic. A sample of companies which are financially...
Enhanced Representation Of Data Flow Anomaly Detection For Teaching Evaluation
In this paper we propose three letter sequence of action for dataflow anomaly detection and representing data flow model for each data object. When we represent the CFG for data object, it is not giving the informatio...
Wi-Fi Based Smart Energy Meter
Home automation is fast popularity nowadays. An automatic remote meter-reading system based on Wi-Fi is presented in this paper can be considered as a part of home automation. The Energy data collection system is a ve...
Detection of Precise C/C++ Memory Leakage by diagnosing Heap dumps using Inter procedural Flow Analysis statistics
Memory leak is a time consuming bug often created by C++ developers. Detection of memory leaks is often tedious. Things get worst if the code is not written by you, or if the code base is quite huge. The most difficu...