Watermarking techniques for intellectual property protection
DAC '98 Proceedings of the 35th annual Design Automation Conference
Watermarking of uncompressed and compressed video
Signal Processing
Attack modelling: towards a second generation watermarking benchmark
Signal Processing - Special section on information theoretic aspects of digital watermarking
WHIM: watermarking multicast video with a hierarchy of intermediaries
Computer Networks: The International Journal of Computer and Telecommunications Networking
Second Generation Benchmarking and Application Oriented Evaluation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
SDMI-based rights management systems
Decision Support Systems
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Watermarking of MPEG-2 video in compressed domain using VLC mapping
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Security pitfalls of frame-by-frame approaches to video watermarking
IEEE Transactions on Signal Processing - Part II
Temporal synchronization in video watermarking
IEEE Transactions on Signal Processing - Part II
Statistical invisibility for collusion-resistant digital video watermarking
IEEE Transactions on Multimedia
Attacks on digital watermarks: classification, estimation based attacks, and benchmarks
IEEE Communications Magazine
Multiresolution scene-based video watermarking using perceptual models
IEEE Journal on Selected Areas in Communications
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
The rapid expand of Internet and the drastic turn to the digital era have led to the investigation of digital watermarking as a complementary technology to traditional protection mechanisms to ensure digital content protection. Significant research efforts have been reported in the fields of audio and image watermarking, with video and 3D data watermarking following. This chapter provides an in-depth overview of different video watermarking techniques in order to single out the particularities of that field, in relation with artificial intelligence algorithms that may be used as embedding and/or detection counterparts. Furthermore, to complete the picture, the chapter proceeds in presenting benchmarking requirements for objective video watermarking performance evaluation. There is still potential for novel techniques to be explored in conjunction with artificial intelligence approaches to target to optimal video watermarking performance under a variety of attacks. The current chapter will present the essential starting point for the novice researcher in the field.