Shaik et al., 2016 - Google Patents
Secure Video Watermarking Technique Using Cohen-Daubechies-Feauveau Wavelet and Gollman Cascade Filtered Feedback Carry Shift Register (F-FCSR)Shaik et al., 2016
- Document ID
- 11430847289139484526
- Author
- Shaik A
- Masilamani V
- Publication year
- Publication venue
- Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC–16’)
External Links
Snippet
The enormous growth of digital data in the form of digital videos has brought many issues for the copyright holders. Due to advanced technologies available, the legal data can be distributed illegally and modified easily, which creates a problem for the owners of the …
- 238000000034 method 0 title abstract description 22
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3269—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television, VOD [Video On Demand]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Gutub et al. | Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons | |
| Ambadekar et al. | Digital image watermarking through encryption and DWT for copyright protection | |
| Sharma et al. | A secured frame selection based video watermarking technique to address quality loss of data: combining graph based transform, singular valued decomposition, and hyperchaotic encryption | |
| Ou et al. | High payload image steganography with minimum distortion based on absolute moment block truncation coding | |
| Wang et al. | Hybrid multiplicative multi-watermarking in DWT domain | |
| Ponni alias Sathya et al. | Fibonacci based key frame selection and scrambling for video watermarking in DWT–SVD domain | |
| AU2004240154A1 (en) | Desynchronized fingerprinting method and system for digital multimedia data | |
| Ben Jabra et al. | Deep learning-based watermarking techniques challenges: a review of current and future trends | |
| Rhayma et al. | Semi-fragile watermarking scheme based on perceptual hash function (PHF) for image tampering detection | |
| Embaby et al. | Digital watermarking properties, classification and techniques | |
| Ahmed et al. | Discrete wavelet transform-based reversible data hiding in encrypted images | |
| Vybornova | A new watermarking method for video authentication with tamper localization | |
| Sowmya et al. | Video authentication using watermark and digital signature—a study | |
| Ling et al. | Watermarking for image authentication | |
| Sharma et al. | Digital video watermarking: features, techniques, and challenges | |
| Saini et al. | Watermarked hashing as a video content authentication technique | |
| Wang et al. | Hybrid additive multi-watermarking and decoding | |
| Shaik et al. | Secure Video Watermarking Technique Using Cohen-Daubechies-Feauveau Wavelet and Gollman Cascade Filtered Feedback Carry Shift Register (F-FCSR) | |
| Saini et al. | A Review on Digital Video Watermarking Security: Significance and Persistent Challenges | |
| Al-Kadei et al. | Improve a secure blind watermarking technique for digital video | |
| Rout et al. | Secure video steganographic model using framelet transform and elliptic curve cryptography | |
| Ur-Rehman et al. | Digital watermarking for image authentication | |
| Shaik et al. | Digital watermarking technique in transform domain using meta-heuristic algorithm | |
| Mihăilescu et al. | Watermarking techniques for content integrity verification, tamper detection and forensics in synthetic media | |
| Kumar et al. | Concealing the confidential information using LSB steganography techniques in image processing |