MILCOM 2005 - 2005 IEEE Military Communications Conference
DOI: 10.1109/milcom.2005.1605909
|View full text |Cite
|
Sign up to set email alerts
|

Digital Video Watermarking for Metadata Embedding in Uav Video

Abstract: In this work we present an application of video digital watermarking to metadata embedding in UAV video footage. Digital watermarking provides the capability of embedding invisible signatures in digital media. As digital media is easily transported, copied or exchanged, a marked file provides innumerable advantages for tracking, fingerprinting, ownership verification and possibly covert communication. UAVs collect voluminous amount of metadata along with surveillance footage. Presently, metadata stream is tran… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…The WiFi password can either be in the form of alphabets, special characters, numeric values, or the combination of all these three. There are two ways to provide more security to the wireless connections: one is the encryption methodology [126], and the other is the watermarking technology [127]. The novelty can be produced in the existing security protocols by deploying Watermarking with cryptography.…”
Section: A Connectivity Insecuritymentioning
confidence: 99%
“…The WiFi password can either be in the form of alphabets, special characters, numeric values, or the combination of all these three. There are two ways to provide more security to the wireless connections: one is the encryption methodology [126], and the other is the watermarking technology [127]. The novelty can be produced in the existing security protocols by deploying Watermarking with cryptography.…”
Section: A Connectivity Insecuritymentioning
confidence: 99%
“…To overcome various attacks, the UAVs need to be secured 75‐78 . The communication between UAV to UAV and between ground station can be secured with the help of various security techniques such as blockchain, 67,79‐83 ML, 84‐92 digital watermarking, 93‐99 and so on.…”
Section: Related Workmentioning
confidence: 99%
“…The authors of Reference 93 used visible light communication mapping for metadata embedding in UAV video in which the peak signal to noise ratio obtained was greater than 40 dB. The article 203 represents the use of DCT watermarking for securing the images captured by UAVs.…”
Section: Watermarking For Securing Uavs Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Among algorithms which watermark images we may find an interesting approach to the individual identification of the digital image's owner based on embedded biometric data of his voice [19]. Many articles undertake the issue of watermarking video data [36,46], e.g. [52] use a 3D Wavelet transform for blind watermarking, taking into account the Human Visual System (HVS) properties.…”
Section: Introductionmentioning
confidence: 99%