Watermarking algorithm based on a human visual model
Signal Processing
Digital watermarking
The Complete Guide to Mmx Technology
The Complete Guide to Mmx Technology
Digital Watermarking: From Concepts to Real-Time Video Applications
IEEE Computer Graphics and Applications
A Stochastic Approach to Content Adaptive Digital Image Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
Multimedia Security Technologies for Digital Rights Management
Multimedia Security Technologies for Digital Rights Management
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Efficient spatial image watermarking via new perceptual masking and blind detection schemes
IEEE Transactions on Information Forensics and Security
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Optimal differential energy watermarking of DCT encoded images and video
IEEE Transactions on Image Processing
Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain
IEEE Transactions on Image Processing
Embedding image watermarks in dc components
IEEE Transactions on Circuits and Systems for Video Technology
PC-based real-time video watermark embedding system independent of platform for parallel computing
Transactions on Data Hiding and Multimedia Security VII
Hi-index | 0.00 |
Commercial markets employ digital right management (DRM) systems to protect valuable high-definition (HD) quality videos. DRM system uses watermarking to provide copyright protection and ownership authentication of multimedia contents. We propose a real-time video watermarking scheme for HD video in the uncompressed domain. Especially, our approach is in aspect of practical perspectives to satisfy perceptual quality, real-time processing, and robustness requirements. We simplify and optimize human visual system mask for real-time performance and also apply dithering technique for invisibility. Extensive experiments are performed to prove that the proposed scheme satisfies the invisibility, real-time processing, and robustness requirements against video processing attacks. We concentrate upon video processing attacks that commonly occur in HD quality videos to display on portable devices. These attacks include not only scaling and low bit-rate encoding, but also malicious attacks such as format conversion and frame rate change.