International Journal of Advanced Technology and Engineering Exploration, Vol 4(37)
ISSN (Print): 2394-5443 ISSN (Online): 2394-7454
http://dx.doi.org/10.19101/IJATEE.2017.437006
181
Study of wavelets using chaotic map on DWT based blind video
watermarking
Bhavna Sharma
1*
, Pankaj Sharma
2
and Vyom Kulshreshtha
3
M.Tech Scholar, Department of Computer Science & Engineering, Sachdeva Institute of Technology, Mathura,
Uttar Pradesh, India
1
Professor, Department of Computer Science & Engineering, Sachdeva Institute of Technology, Mathura, Uttar
Pradesh, India
2
Assistant Professor, Department of Computer Science & Engineering, Sachdeva Institute of Technology, Mathura,
Uttar Pradesh, India
3
©2017 ACCENTS
1.Introduction
With the advent of internet and high speed networks
it become easy and simple to share multimedia data
over internet .Internet downloading is also easily
achievable. It poses threat to copyright data. As it
enhances the illegal copying, modification of content
and distribution of data. In this situation there arises
a need to secure the original digital content from
unauthorized access, duplication and tampering of
data. Digital watermarking is the technique which
serves the purpose of copyright protection. Digital
watermarking provides security, authorization and
copyright protection to the digital content. In digital
watermarking, additional information such as text,
image is embedded into the host image by making
some changes in the pixel values. Watermarking
technique contains the information about author,
legal users of the content.
*Author for correspondence
This additional information is embedded permanently
in digital content known as watermarks. The benefit
of this technique is that the watermark can be
extracted at any time from the watermarked object to
claim the ownership of the related multimedia
contents [1]. In order to be a effective watermark, it
should meet three requirements: (i) robustness-it
should resist various possible attacks (ii)
transparency- it is the perceptual similarity between
original and watermark cover image (iii) capacity-it
should carry the enough information that represents
the uniqueness of data, the more the capacity the
more private information can be carried by the host
image. Digital watermarking is carried out in three
steps: i) embedding ii) Noise /Attack iii) detection. In
the first step the watermark is embedded in the host
data with some secret key. In digital watermarking
the position where watermark is placed is known as
host or cover data. The cover data can be anything
such as image, text audio. Watermarking system is
shown in Figure 1.
Research Article
Abstract
In the past decade there has been rapid growth in distribution and transmission of digital data. Due to easy access to
internet and all the digital media such as audios, images, digital documents and videos, there arises the concern over
copyright protection of digital content. As an effective solution to this problem, concept of digital watermarking has been
used. Watermarks can be of the form images, text, binary logos, signatures, and numbers. They are used for storing
information about the copyright owner, source of data, and authentic users. In the proposed work, video watermarking
technique has been proposed which highlights comparative analysis of Daubechies (db) wavelets based on different
quality parameters. Each of the db wavelets is applied on the randomly selected frames from the input coloured video
using random number generated by chaotic logistic map that works as a key for the proposed extraction algorithm. The
study of proposed work shows that not all db wavelets support watermarking scheme. Out of 45 wavelets, 10 db wavelets
were applicable for watermarking. The original watermark image and the extracted watermark image are then used
against various quality parameters to check if the imperceptibility of the watermark is retained after watermark
extraction. The proposed watermarking scheme is robust against various quality parameters such as peak-signal-to-noise
ratio, mean-square error, maximum difference, and normalized absolute error.
Keywords
Digital watermarking, DWT, Chaotic sequence, Logistic map.