A secure and robust video watermarking based on chaotic maps

Author(s):  
Somayyeh Mohammadi ◽  
Siamak Talebi ◽  
Ahmad Hakimi
2014 ◽  
Vol 989-994 ◽  
pp. 1469-1472
Author(s):  
Ya Wen Li

The scrambled watermark is embedded in DCT coefficients of low-frequency sub image with the Brightness Component of original color image after lifting wavelet transformation. Before embedding the watermark, the image confusion method is used to eliminate the space correlation of the pixels and improves the security and robustness. The results showed that the algorithm is easy to carry out with the real-time request of video watermarking.


2018 ◽  
Vol 7 (S1) ◽  
pp. 73-77
Author(s):  
J. Udayakumar ◽  
G. Prabakaran ◽  
R. Madhan Mohan

Nowadays, there is an explosive growth in the digital multimedia creation, capturing, processing and distribution. Protecting the multimedia contents from copyright in fingerprint has become a major concern. Encryption and watermarking are two complementary techniques that are used for protecting the multimedia data. In this paper, a proposed hybrid encryption-watermarking algorithm for copyright protection is proposed. The watermarking phase of this proposed algorithm is based on, the discrete cosine transform (DCT), while the encryption phase is based on using four chaotic maps with different dimensions. The proposed watermarking scheme uses a new PN-codes embedding strategy of the watermark into the cover image. This strategy allows decreasing the embedding strength factor of the scheme to a value that maximizes imperceptibility performance while maintaining acceptable robustness of the watermarking scheme. On the other hand, the proposed chaos-based encryption algorithm used four chaotic maps of different dimensions and it has two diffusion stages rather than one to improve the algorithm efficiency. The proposed encryption algorithm is tested using different experiments. The experimental results demonstrate that the proposed encryption algorithm shows advantages of large key space, high resistance against differential attacks and high security analysis such as statistical analysis, and sensitivity analysis.


2017 ◽  
pp. 106
Author(s):  
Dhaher Abass Redha ◽  
Marwa Mohamed ali Mohsen
Keyword(s):  

2011 ◽  
Vol 25 (8) ◽  
pp. 734-740
Author(s):  
Tao Li ◽  
Rui Sun ◽  
Caichen Xu
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document