Digital Video Disambiguation Technique Using 3-Level DWT
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 2
Abstract
Digital video watermarking technique was introduced in 1954 by Hembrooke. The watermark encodes or represents information that can defend the video, typically identifying the proprietor (source) or the deliberate recipient (destination) of the video. In this paper, we proposed a digital video watermarking technique which is based on indistinguishable frame extraction in 3-Level Discrete Wavelet Transform (DWT). In this proposed method, first host video is separated into video shots. Then from each video shot one video frame called indistinguishable frame is selected for embedding watermark. Each identical frame is decomposed into 3-level DWT, then select higher sub band coefficients to insert the watermark and the watermark are adaptively embedded to these coefficients and thus guarantee perceptual unobtrusive of watermark.
Authors and Affiliations
Swapnil Mansing Sonawane, P. U. Lahane
Comparison Study Among Various Anomaly Detection Techniques
Many approaches are implemented for the detection of anomalies on the system. Anomalies based approaches are considered as efficient from that user intention based approach is preferred for the implementation of anom...
A New Approach On Incremntal Affinity Propagation Clustering Technique Based On Preference
Many of the clustering algorithms were intended for discovering patterns in static data. Nowadays, more and more data e.g., blogs, Web pages, video surveillance, etc., are come into view in dynamic manner, known as d...
Secure Transmission and Minimizing Communication Over Head In Cooperative Group
A mobile ad-hoc network is a selfconfiguring infrastructure less network of mobile devices connected by wireless. Here the problem is efficiently and securely broadcasting to cooperative groups and trusted key generat...
Unique i : An Integrated Automated Altered Fingerprint Identification System
Fingerprint identification systems are very useful in several biometric applications. They are capable of finding correct person with proper identification. Fingerprint identification systems are based on fingerprint...
Discretion Sustaining Location-Based Provision Etiquette for K-NN Search
A large number of individuals speak with their surroundings through their companions and their proposals utilizing Mobile gadget applications, for example, four square. However without legitimate security assurance,...