2017
DOI: 10.1007/978-3-319-70353-4_42
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Video Watermarking for Real-Time Application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…Nguyen and Duan [ 132 ] used an even-odd quantization approach to deconstruct eight bit-level pictures from the grayscale watermark image to highly DCT coefficients, which were then used in the video luminance component. In [ 26 ], HVS features were used to transform chosen regions into a YUV space, and the Y-component was then processed to extract Krawtchouk moments using optimum commands that might improve reconstruction quality. To construct the embedding process that combines the secret key, the DCT technique is used for the resulting Krawtchouk moments.…”
Section: Video Forensics Overviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Nguyen and Duan [ 132 ] used an even-odd quantization approach to deconstruct eight bit-level pictures from the grayscale watermark image to highly DCT coefficients, which were then used in the video luminance component. In [ 26 ], HVS features were used to transform chosen regions into a YUV space, and the Y-component was then processed to extract Krawtchouk moments using optimum commands that might improve reconstruction quality. To construct the embedding process that combines the secret key, the DCT technique is used for the resulting Krawtchouk moments.…”
Section: Video Forensics Overviewmentioning
confidence: 99%
“… The DCT-based watermarking algorithm’s resistance is inadequate in the face of powerful geometric assaults. [ 26 ] 2017 Non-Blind No Preprocessing Coefficients in the KDCT matrix of the Y component that has been chosen The Y component was used to extract Krawtchouk moments using optimum ordering to improve the reconstruction quality. [ 36 ] 2018 Blind No Preprocessing Each 2D DCT block’s AC coefficients in the Y component It takes full advantage of the Spatio-temporal properties of video sequences to decrease computing complexity and perceived redundancy.…”
Section: Video Forensics Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Nguyen and Duan [36] embedded eight bit-plane images decomposed from a grayscale watermark image into DCT coefficients with robustness, which were selected in the video luminance component using an even-odd quantization algorithm. In a previous paper [37], selected regions, based on the properties of the human visual system (HVS), were converted to the YUV space, and then the Y component was processed to extract Krawtchouk moments using optimal orders which can maximize the quality of the reconstruction. The DCT scheme is implemented to the obtained Krawtchouk moments to achieve the embedding process combining the secret key.…”
Section: Dct-based Watermarking Algorithmsmentioning
confidence: 99%
“…[34] Blind Arnold transform High-frequency coefficients of R, G, and B components [35] Blind CDMA DCT coefficients of Y component [36] Blind -Robust DCT coefficients selected in Y component [37] Non-blind -Selected coefficients in KDCT matrix of Y component [38] Semi-blind Arnold transform Low-frequency DCT coefficients of Y component [40] Blind Permuted processing AC values of selected DCT blocks in Y component [41] Blind Pseudorandom generator Y component of each I frame [43] Blind -AC coefficients of each 2D DCT block in Y component…”
Section: Ref Type Watermark Preprocessing Embedding Positionmentioning
confidence: 99%