International Journal of Scientific & Engineering Research, Volume 5, Issue 12, December-2014 ISSN 2229-5518 IJSER © 2014 http://www.ijser.org Digital Video Watermarking : A Retrospective Dixa Patel, Nehal Chitaliya, Manoj Pandya, Parth Trivedi, M.B.Potdar, Parul Thakkar AbstractDue to the ease of availability for multimedia content over the Internet, it is too easy for the owners to transfer the data (audio or video) over the internet, and hence it can be copied and stored easily without any loss in fidelity. These leads to serious problem of Copyright Infringe- ment, Ownership Protection. Digital Watermarking is the technique to address such issues. This paper incorporates the detail study of Video wa- termarking techniques, various type of watermarking Attacks & Application. Index TermsDigital Multimedia, Fidelity, Spatial Domain, DCT, DWT, Robust —————————— —————————— 1 INTRODUCTION In the past several years there has been an explosive growth in multimedia and network technology which leads to the neces- sity of developing some secure methods for legal distribution of the digital content. As digital multimedia works (video, audio and images) become available for retransmission, re- production, and publishing over the Internet, a real need for protection against Lossless and unlimited duplication, arbi- trarily modification, unauthorized uploads, illegal redistribu- tion is increasing day by day. Digital watermarking is the technology that provides and ensures security, data authenti- cation and copyright protection to the digital media. Digital watermarking is the embedding of secret information (i.e. Wa- termark) into the digital media (Image, audio or video) in such a way that any attacker can’t remove or replace it. Application for Digital watermarking involves Copyright protection, Fin- gerprinting, Broadcast monitoring, Video Authentication etc. For the protection of confidential and sensitive data from un- authorized access and tampering various methods for data hiding is used. Cryptography technique includes the encryp- tion & decryption process. Encryption Process converts mes- sage into unreadable format which is known as Cipher text. Transmitted Cipher text can be decrypt into original message by only those for whom it is intended. So, Cryptography mainly provides security to message [18] [30] While steganog- raphy is mainly used to hide any secret information within the original message. Steganography is a combination of two words, which are taken from Greek Language: ‘stegano’ means cover and graphie means writing, so called as Cover writing. Secret information can only identify and extract by intended recipient [28]. Watermarking is the direct embedding of additional information (Watermark) into the original con- tent or host signal in a way that any attacker cannot remove or replace it [19][4]. Steganography is useful when the protection of secret information is the required while watermarking is more useful to protect the original content from illegal use. The concept of cryptography is totally different then these approaches of data security. Digital content is encrypted at transmitter using a key and can be decrypted at receiver if and only if the correct key is available. Cryptography gives ad- vantage only through the channel. Once encrypted content is decrypted using a key at receiver, no means of security is available for protecting digital content from copyright. There- fore, encryption must be replaced by some method which pro- tects digital content after decryption and there concept of wa- termarking comes [18]. 2 CLASSIFICATION OF WATERMARKING Watermark can be classified according to host signal, percep- tivity, robustness, and watermark type, Domain of watermark embedding, application and according to data required for watermark extraction. Fig.1 gives overall idea about watemark classification. Fig 1 : Watermarking Classification 1 IJSER