Video Watermarking Based On Wavelet Packet Analysis for Various Attack
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 11
Abstract
As the world has moved to the digital era, whole content the living being has been uploaded to the server over internet. People are now very much familiar with the internet and are using for every need. The transition from the old era to the existing one has made people to have internet for various need and to fulfil the requirement of information. As the people are getting educated for the use of internet many kind of misuse of the private content has also been seen. Hence there is a requirement of securing the data which is uploaded to the internet irrespective of the necessity. There has been various method proposed in recent past by many researchers. Some of them are security of image or video using PCA, DCT, and DWT etc. Some also proposed methods utilizing the Stenographic or Cryptographic techniques of security. One way of providing security is the method of watermarking. Recently the use of Discrete Packet Transform technique has been evolved as a new technique for signal analysis. The use of this method for image and video watermarking has been seen in recent years. Here the paper analyses the use of Discrete Wavelet Packet Transform for digital watermarking and attack analysis. The attack analysis is done by the introduction of various types of noise in the embedded video and then extracting the copyright image from the noisy image after demonising. The results obtained for video watermarking and as per the extracted watermark image it can be concluded that this method of watermarking proves to the most robust and economical in terms of SSIM and UIQI which is the measure of quality of the image.
Authors and Affiliations
Monika Sharma, Sachin Meshram
Carbon Monoxide Detection and Warning System for Four Wheel Vehicle Cabin
We regularly read about several deaths due to carbon monoxide when people accidently inhale large amount of poisonous gas. There is no system inbuilt in vehicles to warn people about the presence of Carbon Monoxide (CO)...
Implementation on Secure Distributed Deduplication Systems with Improved Reliability
Data deduplication is a method for removing multiple copies of same data, and has been widely used in cloud storage to reduce storage space and uploading speed. However, there is only one copy for each file stored in cl...
A Load Balanced Data Collection Framework for Wireless Sensor Network Using Dual Data Uploading and Polling Technique
The concept is to gather data from different mobiles in wireless sensor network. To achieve this, three layers of frame work is used. They are sensor layer, cluster head layer, mobile collector layer. This framework emp...
Analysis Of Different Utility Mining Methodologies In Transactional Databases
Utility Mining may be delineated as an motion that analyze the data and draws out a few new nontrivial information from the big amount of databases. traditional data mining methods have focused on finding the statistica...
The Big Data analytics with Hadoop: Review
Big data is huge amount of data. It is form of structure and unstructured, structure data have sql data and unstructured data is images, videos and social media data etc, today 80% data is unstructured and 20% data is s...