Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No.2 Issue No. 2, April 2014 1 Comparative Study of Spatial Watermarking of Various Video formats By Dinesh Goyal 1 , Rishindra Singh 2 , Dr. Naveen Hemrajani 3 Scholar, Suresh Gyan Vihar University,Jaipur Research Scholar, Suresh Gyan Vihar University, Jaipur Professor, JECRC, University, Jaipur Dinesh8dg@rediffmail.com, naveenh@gyanvihar.org ABSTRACT At the forefront of the information world it is all available in the shape of digital media. Digital watermarking has been introduced to provide authentication owners and copy right protection. Digital video watermarking is the process of embedding a digital code in the digital video sequences. Digital video watermarking is nothing but a sequence of consecutive still images. Over recent years applications based on video, pay-per-view, video-on-demand, video broadcasting are becoming more and more popular, which yield requirements to increase safety in the delivery of video. In this paper, the concept of digital video watermarking, its terminology, principle, properties, applications, and classification is introduced i.e. the detailed technique of watermarking such as Spatial Domain Watermarks (Correlation-Based Techniques, Least Significant Bit Modification), Frequency Domain Watermarks (Discrete Cosine Transform, Discrete Wavelet Transform). We have taken three video codec i.e. MPEG, IV 50, MJPG of respective video formats MPEG2, H.261 and AVI, which has been watermarked using BITGET video watermarking technique and comparative study among different video formats has been done to provide chaotic map and the efficient video format for watermarking which withstand on the essential ingredients such as fidelity, robustness, use of keys, blind detection, capacity and speed, statistical imperceptibility, low error probability, real-time detector complexity. 1. INTRODUCTION Today, digital media content (audio or video) can be copied and stored easily and without loss of fidelity. It is therefore essential to use a type of the system that protects the ownership's rights. The majority of content providers will follow production enterprises and use copy protection system called Digital Rights Management (DRM). The encrypted DRM-protected content during transmission and storage on the side of the receiver and therefore copy protected. In addition, the recipient must have a player capable of playing DRM-encrypted content; the biggest drawback is the DRM that once the content is decrypted, it can easily be copied widely used with the utility. Disadvantages of DRM can be removed by using a different protection Watermark system. Watermark can serve as a part of information hiding called as steganography. Steganographic systems embed hidden information in a content-resistant cover so it does not really stand out. Thus, if someone copies such contents, hidden information copied as well. Three aspects of information hiding systems contend with each other: capacity, security and robustness. Ability refers to the number of information that can be hidden, security, the ability of anyone to detect hidden information and strength to the resistance to change of the content on the cover of hidden information is destroyed. Watermarking robustness prefer that should not be possible to remove the watermark, without severe deterioration in the quality of content coverage, while requests steganography high security and capacity, i.e., the hidden information usually is fragile and can be destroyed by trivial changes. Watermark fingerprinting be used in applications usually contain Information on the copyright owner or an authorized recipient of the distributed Multimedia content. It allows back illegally produced copy of the tracking the content, shown in Figure 1. Fig.1 Principle of Fingerprinting This work focuses on the taking of fingerprints, the watermark embedded in video Sequences. Several watermarking methods are designed, implemented and compared with one another in their visibility and robustness. Some of the methods are inspired by existing, some are brand new. How to make the perfect method implementations or improve existing methods not the tasks of the paper aims to