Improving Security for Video Watermarking
A digital watermark, embedded in an image or a video frame, is additional or less visible data inserted into the original image, video, or audio in the style of a text, logo, audio, etc. In order to create it either easy or laborious to reconstruct the watermark, the embedded data is often extra or...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Published: |
Auckland University of Technology,
2021-05-06T23:18:41Z.
|
Subjects: | |
Online Access: | Get fulltext |
LEADER | 01712 am a22002653u 4500 | ||
---|---|---|---|
001 | 14169 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Gupta, Milan |e author |
100 | 1 | 0 | |a Yan, Wei Qi |e contributor |
245 | 0 | 0 | |a Improving Security for Video Watermarking |
260 | |b Auckland University of Technology, |c 2021-05-06T23:18:41Z. | ||
520 | |a A digital watermark, embedded in an image or a video frame, is additional or less visible data inserted into the original image, video, or audio in the style of a text, logo, audio, etc. In order to create it either easy or laborious to reconstruct the watermark, the embedded data is often extra or less clear. Comparative video watermarking is a highly innovative tool designed to unravel the issue of digital video manipulation and sharing. It's the process of incorporating copyright information into video watermarking. In this thesis, we take use of singular value decomposition (SVD) and discrete wavelet transform (DWT) to embed the algorithmic rule for video watermarking, so we take advantage of Inverse DWT (IDWT) to extract the video watermarking. The approach of a digital signature is also utilized to increase privacy and authenticity. For the watermarking, we embed an image watermark to implement video watermarking. After tampered with various attacks, the performance of this new enhanced algorithm is evaluated through MSE, PSNR, Entropy, SSIM, etc. | ||
540 | |a OpenAccess | ||
546 | |a en | ||
650 | 0 | 4 | |a Watermarking |
650 | 0 | 4 | |a DWT |
650 | 0 | 4 | |a SVD |
650 | 0 | 4 | |a Encryption |
650 | 0 | 4 | |a MD5 |
650 | 0 | 4 | |a Wavelets |
650 | 0 | 4 | |a PSNR |
650 | 0 | 4 | |a Entropy |
650 | 0 | 4 | |a Digital Signture |
655 | 7 | |a Thesis | |
856 | |z Get fulltext |u http://hdl.handle.net/10292/14169 |