International Journal of Advanced Technology and Engineering Exploration, Vol 4(37) ISSN (Print): 2394-5443 ISSN (Online): 2394-7454 http://dx.doi.org/10.19101/IJATEE.2017.437006 181 Study of wavelets using chaotic map on DWT based blind video watermarking Bhavna Sharma 1* , Pankaj Sharma 2 and Vyom Kulshreshtha 3 M.Tech Scholar, Department of Computer Science & Engineering, Sachdeva Institute of Technology, Mathura, Uttar Pradesh, India 1 Professor, Department of Computer Science & Engineering, Sachdeva Institute of Technology, Mathura, Uttar Pradesh, India 2 Assistant Professor, Department of Computer Science & Engineering, Sachdeva Institute of Technology, Mathura, Uttar Pradesh, India 3 ©2017 ACCENTS 1.Introduction With the advent of internet and high speed networks it become easy and simple to share multimedia data over internet .Internet downloading is also easily achievable. It poses threat to copyright data. As it enhances the illegal copying, modification of content and distribution of data. In this situation there arises a need to secure the original digital content from unauthorized access, duplication and tampering of data. Digital watermarking is the technique which serves the purpose of copyright protection. Digital watermarking provides security, authorization and copyright protection to the digital content. In digital watermarking, additional information such as text, image is embedded into the host image by making some changes in the pixel values. Watermarking technique contains the information about author, legal users of the content. *Author for correspondence This additional information is embedded permanently in digital content known as watermarks. The benefit of this technique is that the watermark can be extracted at any time from the watermarked object to claim the ownership of the related multimedia contents [1]. In order to be a effective watermark, it should meet three requirements: (i) robustness-it should resist various possible attacks (ii) transparency- it is the perceptual similarity between original and watermark cover image (iii) capacity-it should carry the enough information that represents the uniqueness of data, the more the capacity the more private information can be carried by the host image. Digital watermarking is carried out in three steps: i) embedding ii) Noise /Attack iii) detection. In the first step the watermark is embedded in the host data with some secret key. In digital watermarking the position where watermark is placed is known as host or cover data. The cover data can be anything such as image, text audio. Watermarking system is shown in Figure 1. Research Article Abstract In the past decade there has been rapid growth in distribution and transmission of digital data. Due to easy access to internet and all the digital media such as audios, images, digital documents and videos, there arises the concern over copyright protection of digital content. As an effective solution to this problem, concept of digital watermarking has been used. Watermarks can be of the form images, text, binary logos, signatures, and numbers. They are used for storing information about the copyright owner, source of data, and authentic users. In the proposed work, video watermarking technique has been proposed which highlights comparative analysis of Daubechies (db) wavelets based on different quality parameters. Each of the db wavelets is applied on the randomly selected frames from the input coloured video using random number generated by chaotic logistic map that works as a key for the proposed extraction algorithm. The study of proposed work shows that not all db wavelets support watermarking scheme. Out of 45 wavelets, 10 db wavelets were applicable for watermarking. The original watermark image and the extracted watermark image are then used against various quality parameters to check if the imperceptibility of the watermark is retained after watermark extraction. The proposed watermarking scheme is robust against various quality parameters such as peak-signal-to-noise ratio, mean-square error, maximum difference, and normalized absolute error. Keywords Digital watermarking, DWT, Chaotic sequence, Logistic map.