Multimedia Protection, Authentication and Advanced Digital Watermarking Techniques: A Survey
RanaKhudhair Abbas Ahmed "Multimedia Protection, Authentication and Advanced Digital Watermarking Techniques: A Survey". International Journal of Computer Trends and Technology (IJCTT) V30(3):162-168, December 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Multimedia contents such as images,
videos, audio, and texts are easy to available for
download through internet in worldwide.
Duplication of multimedia contents is to create using
different software. This type of operation some time
created problem of copyright and ownership
authentication. Digital watermarking techniques are
usedto protect multimedia contents. This paper gives
various watermarking techniques in transform
domain and sparse domain for protection and
authentication of multimedia contents.
References
[1] Mahmoud El-Gayyar., "Watermarking Techniques – Spatial
Domain Digital Rights Seminar. Media Informatics",
University of Bonn, Germany, May 2006.
[2] Reena, Vandera."Modified Approach of Digital Image
Watermarking Using Combined Dct and Dwt Modified
Approach of Digital Image Watermarking Using Combined
Dct and Dwt", Volume 3, Issue 7, July, 2013.
[3] Munesh Chandra "A DFT-DWT Domain Invisible Blind
Watermarking Techniques for Copyright Protection of
Digital Images", Advances in Wavelet Theory and Their
Applications in Engineering, Physics and Technology
2015.
[4] HamzaA. Ali, Sama’a A. K. khamis, World of Computer
Science and Information Technology Journal (WCSIT)
Vol. 2, No. 5, 163-168, 2012 ,Robust Digital Image
Watermarking Technique Based on Histogram Analysis.
[5] International Journal of Advanced Research in Computer
Science & Technology (IJARCST 2014) 218 Vol. 2, Issue
2, Ver. 2 (April - June 2014) ISSN : 2347 - 8446 (Online)
ISSN : 2347 - 9817 (Print) © 2014, IJARCST All Rights
Reserved www.ijarcst.com Digital Watermarking:
Comparing Two Techniques I Jyoti Rani, IIAnupam
[6] Wolfgang, R. &Podilchuk, C., "Perceptual Watermarks for
Digital Images and Video". Proceedings of the IEEE,
87(7), 1277 – 1281, July 1999.
[7] Langelaar, G., Setyawan, I. &Lagendijk, R., "Watermarking
of Digital Image and Video Data – A State of Art Review",
IEEE Signal Processing Magazine, 20 – 46, Sept. 2000.
[8] Li &Drew., "Fundamentals of Multimedia, Chapter 1,
Introduction to Multimedia", Prentice Hall, 26. M. Wu and
B. Liu, "Watermarking for Image Authentication", IEEE
Proc. Of ICIP, Chicago, 2003.
[9] The Oxford English Dictionary, 2nd Ed., Oxford Univ., pp.
795-796, 1989.
[10] The Webster`s New 20th Century Dictionary.
[11] Dattatherya , S. VenkataChalam , Manoj Kumar Singh, A
Generalized Image Authentication Based On Statistical
Moments of Color Histogram, Int. J. on Recent Trends in
Engineering and Technology, Vol. 8, No. 1, Jan 2013.
[12] D. Bearman, and J. Trant, "Authenticity of Digital
Resources: Towards a Statement of Requirements in the
Research Process", D-LibMagazine, June 1998.
[13] M. Yeung and F. Mintzer. "An Invisible Watermarking
Technique for Image Verification", IEEE International
Conf. on Image Processing, Santa Barbara, Oct. 1997
[14] Ching-Yung Lin. " Watermarking and Digital Signature
Techniques for Multimedia Authentication and Copyright
Protection", Submitted in partial fulfillment of the
requirements for the degree of Doctor of Philosophy in the
Graduate School of Arts and Sciences Columbia
University, 2000.
[15]Clara Cruz Ramos, R. Reyes, Mariko Nakano-Miyatake,
He?ctor Manuel Pe?rezMeana, "Watermarking-Based
ImageAuthentication System in the Discrete Wavelet
Transform Domain", Discrete Wavelet Transforms:
Algorithms and Applications, 2011.
[16]JasniZain, and Malcolm Clarke, 3rd International
Conference:Sciences of electronic, Technologies
of Information andTelecommunications, March 27-31,
2005 –, Mohammad Faizal Ahmad Fauzi,
RajasvaranSecurity In Telemedicine: Issues In
WatermarkingMedical Images , SETIT 2005
[17] Hadamard Transform ArisMarjuni, International Journal of
Computer and Electrical Engineering, Vol. 5, No. 3, June
2013, An Improved DCT-Based Image Watermarking
Scheme Using Fast Walsh, Logeswaran, and Swee-
HuayHeng.
[18] R. G. van Schyndel, A. Z. Trikel, and C. F. Osborne. "A
Digital Watermark", IEEE International Conf. on Image
Processing, Austin, Texas, Nov. 1994.
[19] B. Zhu, M. D. Swanson, and A. H. Tewk. "Transparent
Robust Authentication and Distortion Measurement
Technique for Images", The 7th IEEE Digital Signal
Processing Workshop, pp. 45-48, Sep 1999.
[20] R. B. Wolfgang and E. J. Delp. "A Watermark for Digital
Images", IEEE International Conf. on Image Processing,
Laussane, Switzerland, Oct. 1996.
[21] Heather J. Meeker., "Multimedia and Copyright", Rutgers
Computer and Technology Law Journal, 1994.
[22] Lee, Y. & Chen, L, "High Capacity Image Steganographic
Model", IEEE proceedings of Vision Image and Signal
Processing, 288 – 294, June 2000.
[23] Chan, C. & Cheng, L., "Hiding Data in Images by Simple
LSB Substitution", Pattern Recognition, 37, 469 – 474,
2004.
[24]Ramalingam, M., Stego, "Machine – Video Steganography
using Modified LSB Algorithm", World Academy of
Science, Engineering and Technology, 74, 502 – 505,
2011.
[25] Arena, S., Caramma, M. &Lancini, R., "Digital
Watermarking Applied to MPEG-2 Coded Video
Sequences Exploiting Space and Frequency Masking",
Proceedings of International Conference on Image
Processing, 2, 796 – 799, 2000.
[26] Bangaleea, R. &Rughooputh, H., "Performance
Improvement of Spread Spectrum Spatial Domain
Watermarking Scheme Through Diversity and Attack
Characterization", IEEE Conference Africon, 293 – 298,
2002.
[27] Thanki, R., Trivedi, R., Kher, R. &Vyas, D., "Digital
Watermarking Using White Gaussian Noise (WGN) in
Spatial Domain", Proceedings of International Conference
on Innovative Science & Engineering Technology
(ICISET), 38 – 42, 2011.
[28] Dajun, H., Qibin, S. &Tian, Q., "A Semi-fragile Object
based Video Authentication System", Proceedings of the
International Symposium on Circuits and Systems, 814 –
817, 2003.
[29] Hernandez, J., Amado, M. & Perez-Gonzalez, F., "DCT
domain Watermarking Techniques for Still Image: Detector
Performance Analysis and a New Structure", IEEE
Transactions on Image Processing, 9, 55 – 68, Jan 2000.
[30] Lu, C. & Liao, H., "Video Object based Watermarking: A
Rotation and Flipping Resilient Scheme", Proceedings of
International Conference on Image Processing, 2001.
[31] Huang, F. & Guan, Z., "A Hybrid SVD-DCT Watermarking
Method Based on LPSNR", Pattern Recognition Letters 25,
1769 – 1775, 2004.
[32] Preda, R. &Vizireanu, D., "Blind Watermarking Capacity
Analysis of MPEG2 Coded Video", Proceedings of
Conference of Telecommunications in Modern Satellite,
Cable and Broadcasting Services, Serbia, 465 – 468, Sept.
2007.
[33] Koz, A. &Alatan, A., "Oblivious Spatio-Temporal
Watermarking of Digital Video by Exploiting the Human
Visual System", IEEE Transactions on Circuits and
Systems for Video Technology, 18(3), 326 – 337, March
2008.
[34] Sridevi, T., Krishnaveni, B., Vijayakumar, V. &Ramadevi,
Y., "A Video Watermarking Algorithm for MPEG Videos",
A2CWiC 2010 – Amrita ACM-W Celebration of Women
in Computing, Sept. 2010.
[35] Ding, Y., Zheng, X., Zhao, Y. & Liu, G., "A Video
Watermarking Algorithm Resistant to Copy Attack",
Proceedings of 3rd International Symposium on Electronic
Commerce and Security, July 2010,.
[36] Ejima, M. & Miyazaki, A., "A Wavelet Based
Watermarking for Digital Images and Videos", IEEE
International Conference on Image Processing, 678 – 681,
August 2000.
[37] Serdean, C., Ambroze, M., Tomlinson, M. & Wade G.,
"Combating Geometrical Attacks in a DWT based Blind
Video Watermarking System", IEEE Region 8
International Symposium on Video/Image Processing and
Multimedia Communications, Zadar, Croatia, 263 – 266,
June 2002.
[38] Raval, M. &Rege, P., "Discrete Wavelet Transform Based
Multiple Watermarking Scheme", Proceedings of the
Convergent Technologies for the Asia-Pacific Region, 3,
935 – 938, 2003.
[39] Fan, L. &Yanmei, F., "A DWT based Video Watermarking
Algorithm Applying DS-CAMA", IEEE Region 10
Conference TENCON 2006.
[40] Elbasi, E., "Robust MPEG Video Watermarking in Wavelet
Domain", Trakya University Journal of Science, 8(2), 87 –
93, 2007.
[41] Essaouabi, A. &Ibnelhaj, E., "A 3D Wavelet based Method
for Digital Video Watermarking", Proceedings of the 4th
IEEE Intelligent Information Hiding and Multimedia
Signal Processing, July 2009.
[42] Raghavendra, K. &Chetan, K., "A Blind and Robust
Watermarking Scheme with Scrambled Watermark for
Video Authentication", Proceedings of IEEE International
Conference on Internet Multimedia Services Architecture
and Applications, Dec. 2009.
[35] Hussein, J. & Mohammed, A., "Robust Video Watermarking
using Multiband Wavelet Transform", IJCSI International
Journal of Computer Science Issues, 6(1), 44 – 49, 2009.
[44] Mostafa, S., Tolba, A., Abdelkader, F. &Elhindy, H., "Video
Watermarking Scheme Based on Principal Component
Analysis and Wavelet Transform", IJCSNS International
Journal of Computer Science and Network Security, 9(8),
45 – 52, Aug. 2009.
[45] Ganic, E. &Eskicioglu, A., "Secure DWT-SVD Domain
Image Watermarking Embedding Data in All Frequencies",
ACM Multimedia and Security Workshop 2004, 1 – 9,
2004.
[46] Dili, R. &Mwangi, E., "An Image Watermarking Method
Based on the Singular Value Transformation and the
Wavelet Transformation", Proceedings of IEEE
AFRICON, 1 – 5, 2007.
[47] Mansouri, A., Mahmoudi, A., Aznaveh, &Azar, F., "SVD
based Digital Image Watermarking using Complex
Wavelet Transform", Sadhana, 34(3), 393 – 406, June
2009.
[48] Santhi, V. &Thangavelu, A., "DWT SVD Combined Full
Band Robust Watermarking Technique for Color Images in
YUV Color Space", International Journal of Computer
Theory and Engineering. 1(4), Oct. 2009.
[49] Kamlakar, M., Gosavi, C. &Patankar, A., "Single Channel
Watermarking for Video Using Block based SVD",
International Journal of Advances in Computing and
Information Researches, 1(2), April 2014.
[50] Gupta, A. &Raval, M., "A Robust and Secure Watermarking
Scheme Based on Singular Value Replacement", Sadhana,
37(4), 425 – 440, Augst 2012.
[51] Donoho, D., "Compressed Sensing. IEEE Transaction on
Information Theory", 52(4), 1289 – 1306, April 2006.
[52] Candès, E., "Compressive Sampling. Proceedings of the
International Congress of Mathematicians, Madrid", Spain,
2006.
[53] Baraniuk, R., "Lecture notes on Compressive Sensing",
IEEE Signal Processing Magazine, 24, 118 – 124, July
2007.
Keywords
Wavelet Transform, Copyright,
Authentication, Watermarking.