International Journal of Scientific & Engineering Research, Volume 5, Issue 12, December-2014
ISSN 2229-5518
IJSER © 2014
http://www.ijser.org
Digital Video Watermarking : A Retrospective
Dixa Patel, Nehal Chitaliya, Manoj Pandya, Parth Trivedi, M.B.Potdar, Parul Thakkar
Abstract—Due to the ease of availability for multimedia content over the Internet, it is too easy for the owners to transfer the data (audio or video)
over the internet, and hence it can be copied and stored easily without any loss in fidelity. These leads to serious problem of Copyright Infringe-
ment, Ownership Protection. Digital Watermarking is the technique to address such issues. This paper incorporates the detail study of Video wa-
termarking techniques, various type of watermarking Attacks & Application.
Index Terms— Digital Multimedia, Fidelity, Spatial Domain, DCT, DWT, Robust
—————————— ——————————
1 INTRODUCTION
In the past several years there has been an explosive growth in
multimedia and network technology which leads to the neces-
sity of developing some secure methods for legal distribution
of the digital content. As digital multimedia works (video,
audio and images) become available for retransmission, re-
production, and publishing over the Internet, a real need for
protection against Lossless and unlimited duplication, arbi-
trarily modification, unauthorized uploads, illegal redistribu-
tion is increasing day by day. Digital watermarking is the
technology that provides and ensures security, data authenti-
cation and copyright protection to the digital media. Digital
watermarking is the embedding of secret information (i.e. Wa-
termark) into the digital media (Image, audio or video) in such
a way that any attacker can’t remove or replace it. Application
for Digital watermarking involves Copyright protection, Fin-
gerprinting, Broadcast monitoring, Video Authentication etc.
For the protection of confidential and sensitive data from un-
authorized access and tampering various methods for data
hiding is used. Cryptography technique includes the encryp-
tion & decryption process. Encryption Process converts mes-
sage into unreadable format which is known as Cipher text.
Transmitted Cipher text can be decrypt into original message
by only those for whom it is intended. So, Cryptography
mainly provides security to message [18] [30] While steganog-
raphy is mainly used to hide any secret information within the
original message. Steganography is a combination of two
words, which are taken from Greek Language: ‘stegano’
means cover and graphie means writing, so called as Cover
writing. Secret information can only identify and extract by
intended recipient [28]. Watermarking is the direct embedding
of additional information (Watermark) into the original con-
tent or host signal in a way that any attacker cannot remove or
replace it [19][4]. Steganography is useful when the protection
of secret information is the required while watermarking is
more useful to protect the original content from illegal use.
The concept of cryptography is totally different then these
approaches of data security. Digital content is encrypted at
transmitter using a key and can be decrypted at receiver if and
only if the correct key is available. Cryptography gives ad-
vantage only through the channel. Once encrypted content is
decrypted using a key at receiver, no means of security is
available for protecting digital content from copyright. There-
fore, encryption must be replaced by some method which pro-
tects digital content after decryption and there concept of wa-
termarking comes [18].
2 CLASSIFICATION OF WATERMARKING
Watermark can be classified according to host signal, percep-
tivity, robustness, and watermark type, Domain of watermark
embedding, application and according to data required for
watermark extraction. Fig.1 gives overall idea about watemark
classification.
Fig 1 : Watermarking Classification
1
IJSER