Video Source tracking and copyright protection in video watermarking

International Journal of Communication and Media Science
© 2014 by SSRG - IJCMS Journal
Volume 1 Issue 1
Year of Publication : 2014
Authors : Mr. K.Duraisamy
pdf
How to Cite?

Mr. K.Duraisamy, "Video Source tracking and copyright protection in video watermarking," SSRG International Journal of Communication and Media Science, vol. 1,  no. 1, pp. 6-11, 2014. Crossref, https://doi.org/10.14445/2349641X/IJCMS-V1I1P102

Abstract:

Due to extensive usage of internet, the exchange of data between users are also increasing rapidly. Security and copyright protection are becoming important issues in digital media applications and services. Owners of the digital products are troubled about illegal copying of their products. Digital watermarking throughout the last decade is improved due to the increase in the need for copyright protection. More specifically Creative Commons License (CCL) has been established as expedient method to protect copyrights of user generated digital products. However, the lack of technical method to protect CCL causes illegal manipulations and sharing of CCL. This paper presents, embedding dual watermarking system which embeds both robust watermarks and semi-fragile watermarks for CCL protection and manipulation detection. A robust watermark is generated, in order to withstand frame drop and rescaling, which increases the overall robustness. Then the fragile watermark is embedded at DWT domain, robust watermarks are embedded at spatial domain

Keywords:

Copyright Protection, discrete wavelet transform, Creative common license, Watermarking

References:

[1] Yujie Zhang, YuanyuanZhang ” Research on  video copyright protection system”in 2nd international conference on Consumer electronics, Communication and Network  2012.
[2] Prachi V. Powar , Prof.S.S.Agrawal “Design of digital video watermarking scheme using matlabsimulink ” in International journal of research in engineering and technology 2013.
[3] H-D. Kim, T-W. Oh, J-W. Lee, and H-K. Lee, “A hybrid watermarking scheme for CCL-applied video contents,” in Proc. 3rd European Workshop on Visual Information Processing, Paris, France, pp. 199-204, 2011.
[4] Tang Songsheng , Dong Ying.“Video watermarking algorithm based on DWT” [J].Information technology, 2008(4):116~117.
[5] GaoQian, Zhou Lijuan.”Digital watermarking design in image and video copyright protection “[J]. Science technology and engineering, 2007  7(11):2677~2679.
[6] Hu Yuping, Zhang Jun.” Digital watermark protocol research used for copy tracing” [J]. Computer science, 201037(1):91~94.
[7] Li Bixiang, Yu Hongzhen.” A video watermarking algorithm research based on DCT coefficients” [J]. Computer and digital engineering, 2010 38(5):108~110.
[8] Tahani Al-Khatib, Ali Al-Haj  Lama Rajab”. A Robust Video Watermarking Algorithm” [J]. Journal of Computer Science  2008,4(11):6~9. 1280.
[9] Zhang Defeng.”Matlab wavelet analysis and engineering application[M]”. Beijing: National defencse industry Press,200865-78115-130.
[10] Chen Jun, Zhang Wei, Yang Huaqian, He Chunxiao.” A digital watermarking algorithm based on wavelet transform and neural network” [J]. Computer science, 201138(6):142~144.
[11] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon,“Secure spread spectrumwatermarking for multimedia,”IEEE Trans. on Image Processing,vol. 6, no. 12, pp. 1673-1687, 1997.
[12] J. Fridrich, “Security of fragile authentication watermarks with localization,”in Proc. SPIE, vol. 4675, pp.691-700, 2002.
[13] C-Y. Lin and S-F.Chang, “Semifragile watermarking for authenticatingjpeg visual content,” in Proc.SPIE, vol. 5681, pp.353-362, 2005.
[14] S. Thiemert, H. Sahbi, and M. Steinebach, “Applying interest operatorsin semi-fragile video authentication,” in Proc. SPIE, vol. 5681, pp.353-362, 2005.
[15] I. G. Langelaar and R.Lagendijk, “Watermarking digital image andvideo data: A state-of-the-art overview,” IEEE Signal ProcessingMagazine, vol. 17, pp. 20–46, 2000.
[16] F. Hartung and M. Kutter, “Multimedia watermarking techniques,”Proceedings of IEEE, vol. 87, pp. 1079–1107, 1999.
[17] M. K. M. Swason and A. Tewfik, “Multimedia data-embedding andwatermarking technologies,” Proceedings of IEEE, vol. 86, pp. 1064–1087.
[18] S. Lee and D. Seo, “Novel robust video watermarkingalgorithm based on adaptive modulation.” IEEE, 2012,pp. 225–229.
[19] C. Rey and J. Dugelay, “A survey of watermarking algorithmsfor image authentication,” EURASIP Journalon Applied Signal Processing, vol. 2002, no. 1, pp.613–621, 2002.
[20] I. Cox, Digital watermarking and steganography.Morgan Kaufmann, 2008.
[21] C. Hsu and J.Wu, “Dct-based watermarking for video,”Consumer Electronics, IEEE Transactions on, vol. 44,no. 1, pp. 206–216, 1998.