Video Watermarking Techniques Classifications And Applications
DOI:
https://doi.org/10.61841/5a8bek10Keywords:
Imperceptibility, Payload, Robustness, Compressed domain, Frequency domainAbstract
Digital watermarking is a scheme that involves in concealing the information within the signal which is translucent to the user. Video Watermarking is one among the inspiring fields to ensure the improvement of the system by facilitating the authentication of data, advertisement surveillance, safety, tracing of piracy and copyright protection procedures for digital media, concealed within dynamic video codec. Digital watermarking technology is being adopted to ensure and facilitate data authentication, safety and copyright protection of digital media. It is contemplated as the most significant technology in the modernized world, to avert illegal replication of data. Digital watermarking can be practiced on multimedia data. In this work, we emphasized particularly on the overview of different domains in video watermarking schemes, along with its definitions, properties, applications and evaluation constraints utilized to expand the security of data
Downloads
References
[1] Manoharan, Rajesh, et al. "Selection of Intermediate Routes for Secure Data Communication Systems using Graph Theory Application and Grey Wolf Optimization Algorithm in MANETs." IET Networks (2020).
[2] Rajesh, M., & Gnanasekar, J. M. "Path Observation Based Physical Routing Protocol for Wireless Ad Hoc Networks." Wireless Personal Communications, 97, 1267–1289 (2017). https://doi.org/10.1007/s11277-017-4565-9
[3] Rajesh, M. "Streamlining Radio Network Organizing Enlargement Towards Microcellular Frameworks." Wireless Personal Communications (2020). https://doi.org/10.1007/s11277-020-07336-9
[4] Samuelson, P. “Legally Speaking: Digital Media and the Law.” Communications of the ACM, 34(10), 23–28 (1991).
[5] Lin, E. T., Eskicioglu, A. M., Lagendijk, R. L., & Delp, E. J. “Advances in Digital Video Content Protection.” Proceedings of the IEEE, 93(1), 171–183 (2005).
[6] Litman, J. Digital Copyright. Amherst, NY: Prometheus Books, 2001.
[7] Swaraja, K. "Protection of Medical Image Watermarking." Journal of Advanced Research in Dynamical and Control Systems (JARDCS), Special Issue 11, July 2017.
[8] Poynton, C. A. A Technical Introduction to Digital Video. New York: John Wiley & Sons, Inc., 1996.
[9] Jack, K. Video Demystified. San Diego, CA: HighText Publications, 1996.
[10] Shi, F., Liu, S., Yao, H., Liu, Y., & Zhang, S. “Scalable and Credible Video Watermarking Towards Scalable Video Coding.” In Advances in Multimedia Information Processing—PCM 2010. Springer, 2010.
[11] Hsu, C.-T., & Wu, J.-L. "DCT-based Watermarking for Video." IEEE Transactions on Consumer Electronics, 44(1), 206–216 (1998).
[12] Langelaar, G. C., Setyawan, I., & Lagendijk, R. L. "A State-of-the-Art Overview." IEEE Signal Processing Magazine (2000).
[13] Kyung-Su, K., Hae-Yeoun, L., & Heung-Kyu, L. "Practical, Real-Time, and Robust Watermarking on the Spatial Domain for High-Definition Video Contents." IEICE Transactions on Information and Systems, 91(5), 1359–1368 (2008).
[14] Xue, J., & Tian, J. Compressed Domain Watermarking with Reduced Error Propagation. Google Patents, 2013.
[15] Hartung, F., Su, J. K., & Girod, B. "Spread Spectrum Watermarking: Malicious Attacks and Counterattacks." Security and Watermarking of Multimedia Contents, 1999.
[16] Paul, R. T. "Review of Robust Video Watermarking Techniques." IJCA Special Issue on Computational Science, 3, 90–95 (2011).
[17] Hartung, F., & Girod, B. "Watermarking of Uncompressed and Compressed Video." Signal Processing, 66(3), 283–301 (1998).
[18] Tao, P., & Eskicioglu, A. M. "An Adaptive Method for Image Recovery in the DFT Domain." Journal of Multimedia, 36–45 (2006).
[19] Tsui, T. K., Zhang, X.-P., & Androutsos, D. "Color Image Watermarking Using Multidimensional Fourier Transforms." IEEE Transactions on Information Forensics and Security, 3, 16–28 (2008).
[20] Lin, S. D., & Chen, C.-F. "A Robust DCT-Based Watermarking for Copyright Protection." IEEE Transactions on Consumer Electronics, 46, 415–421 (2000).
[21] Patra, J. C., Phua, J. E., & Bornand, C. "A Novel DCT Domain CRT-Based Watermarking Scheme for Image Authentication Surviving JPEG Compression." Digital Signal Processing, 20, 1597–1611 (2010).
[22] Chamlawi, R., Khan, A., & Usman, I. "Authentication and Recovery of Images Using Multiple Watermarks." Computers & Electrical Engineering, 36, 578–584 (2010).
[23] Shen, H., & Chen, B. "From Single Watermark to Dual Watermark: A New Approach for Image Watermarking." Computers & Electrical Engineering, 38, 1310–1324 (2012).
Su, Q., et al. "A Dual Color Images Watermarking Scheme Based on Optimized Compensation of SVD." AEU–International Journal of Electronics and Communications, 67, 652–664 (2013).
[24] Lai, C.-C. "A Digital Watermarking Scheme Based on SVD and Tiny Genetic Algorithm." Digital Signal Processing, 21, 522–527 (2011).
[25] Meenakshi, K., Srinivasa Rao, C., & Satya Prasad, K. "A Scene-Based Video Watermarking Using Slant Transform." IETE Journal of Research, 60(4), 276–287 (2014).
[26] Meenakshi, K., Prasad, K. S., & Rao, C. S. "Development of Low-Complexity Video Watermarking with Conjugate Symmetric Sequency–Complex Hadamard Transform." IEEE Communications Letters, 21(8), 1779–1782 (2017).
[27] Meenakshi, K., Srinivasa Rao, C., & Satya Prasad, K. "A Robust Watermarking Scheme Based on Walsh–Hadamard Transform and SVD Using Zig-Zag Scanning." ICIT 2014, IEEE, 167–172.
[28] Murty, S., & Kumar, P. R. "A Robust Digital Image Watermarking Scheme Using Hybrid DWT–DCT–SVD Technique." IJCSNS, 10, 185–192 (2010).
[29] Bedi, S. S., Kumar, A., & Kapoor, P. "Robust Secure SVD-Based DCT–DWT Oriented Watermarking Technique for Image Authentication." International Conference on IT, 461–467 (2009).
[30] Sverdlov, A., Dexter, S., & Eskicioglu, A. M. "Robust DCT–SVD Domain Image Watermarking for Copyright Protection." EUSIPCO 2005, Antalya, Turkey.
[31] Swaraja, K. "Medical Image Region-Based Watermarking for Secured Telemedicine." Multimedia Tools and Applications (2018). https://doi.org/10.1007/s11042-018-6020-7
[32] Dixit, M., Kulkarni, P., Somasagar, P., & Angadi, V. "Variable Scaling Factor Based Invisible Image Watermarking Using Hybrid DWT–SVD." SCEECS 2012, IEEE.
[33] Kutter, M., Jordan, F., & Ebrahimi, T. "Proposal of a Watermarking Technique for Hiding/Retrieving Data in Compressed and Decompressed Video." ISO/IEC JTC1/SC29/WG11, Technical Report M2281, 1997.
[34] Jun, Z., Jiegu, L., & Ling, Z. "Video Watermark Technique in Motion Vector." XIV Brazilian Symposium on Computer Graphics and Image Processing, 179–182 (2001).
[35] Liu, Z., Liang, H., Niu, X., & Yang, Y. “A Robust Video Watermarking in Motion Vectors.” ICSP’04 Proceedings.
[36] Setyawan, I., & Lagendijk, R. L. "Low Bit Rate Video Watermarking Using Temporally Extended Differential Energy Watermarking Algorithm." Security and Watermarking of Multimedia Contents III, 4314, 73–84 (2001).
[37] Swaraja, K., Latha, Y. M., Reddy, V. S. K., & Paramkusam, A. V. "Video Watermarking Based on Motion Vectors of H.264." INDICON 2011, IEEE.
[38] Swaraja, K., Madhaveelatha, Y., & Reddy, V. S. K. "A Pristine Digital Video Watermarking in H.264 Compressed Domain." ICCIC 2014, IEEE.
[39] Swaraja, K., Madhaveelatha, Y., & Reddy, V. S. K. "A Secure Method of Optimized Low-Complexity Video Watermarking." ARPN Journal of Engineering and Applied Sciences, 10(4), 1822–1827 (2015).
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
