slugAn Enhanced Video Watermarking Approach for Robustness And Security Using Pixel And Transform Domain in An Uncompressed Video
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 6
Abstract
It has been observed that many numbers of researches has been done in field of digital video watermarking using transformation technique. Digital media protection and security is major concern in today’s world because of explosion of data exchange on the Internet and the extensive use of digital media. In this paper, a comprehensive approach for managing robustness and security of video watermarking is introduced. We propose a digital video watermarking scheme based on combination transformation and pixel domain technique. For any reliable water marking Robustness and Fidelity are the major requirements. In pervious work, a robustness scene-based watermarking scheme is proposed. We focus on improving the fidelity at higher extent of scheme in this paper. The fidelity of the scheme is enhanced by applying using combination of our proposed and DWT watermarking algorithm, which optimizes the quality of the watermarked video. We have performed a series of experiments for effectiveness of this scheme.
Authors and Affiliations
Sunil Sharma, Mahendra Kumar Rai
Investigation of Biogas Flow Analysis in Mixing Chamber by Using CFD, Performance and Emission Characteristics of Single Cylinder SI Engine
In this work, Design and fabrication of mixing chamber for biogas supply to the engine and CFD analysis of the mixing Chamber. Biogas is used as fuel for SI engine by the help of pressure conversion kit, study of differ...
An Advanced Object Detection Algorithm Using Feature Isolation for Surveillance Cameras
In this Paper Automatic motion detection technology is an important component of quick transportation systems, and is particularly necessary for management of traffic and maintenance of traffic surveillance systems. Tra...
A Guarantee and Service Provider Based GeTrust Model in Chord-Based P2p Networks
more and more users are attracted by p2p networks characterized by decentralization, autonomy and anonymity. However, users’ unconstrained behavior makes it necessary to use a trust model when establishing trust relatio...
Stability of Vitamins in Pharmaceutical Preparations- A Review
Vitamins are one of the few groups of food constituents in which it is possible to demonstrate quantitatively deterioration in content over a period. The rate of this reduction in vitamin content is influenced by a numb...
MOM A Substitute to Your MOM
Mom is an engineering solution that is a combination of both hardware and software, it consist of a simple circuit that enables the user to search for essentialities that are misplaced in his everyday life ,consuming hi...