2018
DOI: 10.1109/tcsvt.2017.2712162
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Digital Video Watermarking

Abstract: The illegal distribution of a digital movie is a common and significant threat to the film industry. With the advent of high-speed broadband Internet access, a pirated copy of a digital video can now be easily distributed to a global audience. A possible means of limiting this type of digital theft is digital video watermarking whereby additional information, called a watermark, is embedded in the host video. This watermark can be extracted at the decoder and used to determine whether the video content is wate… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
111
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 215 publications
(112 citation statements)
references
References 217 publications
1
111
0
Order By: Relevance
“…There has been extensive research into watermarking techniques [8] and some of the ideas developed in that field have applications in forgery prevention/detection, however, overall I consider it to be a tangential strain of research.…”
Section: Integrity Measuresmentioning
confidence: 99%
“…There has been extensive research into watermarking techniques [8] and some of the ideas developed in that field have applications in forgery prevention/detection, however, overall I consider it to be a tangential strain of research.…”
Section: Integrity Measuresmentioning
confidence: 99%
“…This method is used for the safe distribution of audio content over public networks, whereby only authorized users can access the high-quality content, while other users can only access a low-quality content [13]. Watermarks can be used in video files to identify pirates, which can be extracted at the decoder and used to determine whether the video content is watermarked [14]. We stress that our proposed scheme for integrating access control policies as watermarks can also be applied in audio files or video files, although we concentrate on images in this paper.…”
Section: Related Workmentioning
confidence: 99%
“…It exploits the redundancy of digital images and embeds some information, namely watermark, into the images. According to different application situations, digital image watermarking scheme can be divided into three main categories [1]: Robust watermarking [2,3], fragile watermarking, and semi-fragile watermarking. The robust watermarking scheme can resist most attacks including signal processing attacks and some malicious attacks [4,5].…”
Section: Introductionmentioning
confidence: 99%