A Novel Digital Video Watermarking Algorithm
نویسندگان
چکیده
منابع مشابه
A chaos-based video watermarking algorithm
The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental ...
متن کاملDigital Video Watermarking with a Genetic Algorithm
Due to the explosion of data exchange on the Internet and the extensive use of digital media, it has been of intense interest to digital data owners in multimedia security and multimedia copyright protection. In this paper, a comprehensive approach for protecting and managing video copyrights with watermarking techniques is introduced. We propose a novel digital video watermarking scheme based ...
متن کاملA Novel Algorithm for Digital Distance Relaying
Distance relays are used to protect EHV and HV Transmission lines. Over the past decades many algorithms have emerged for digital distance relays. These are based on the calculation of the transmission line impedance from the relaying to fault points. In this paper a novel method for digital distance relaying is proposed. In the method the tracking procedure is implemented. The method uses the ...
متن کاملA Novel Algorithm for Digital Distance Relaying
Distance relays are used to protect EHV and HV Transmission lines. Over the past decades many algorithms have emerged for digital distance relays. These are based on the calculation of the transmission line impedance from the relaying to fault points. In this paper a novel method for digital distance relaying is proposed. In the method the tracking procedure is implemented. The method uses the ...
متن کاملTwo Novel Chaos-Based Algorithms for Image and Video Watermarking
In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Engineering
سال: 2011
ISSN: 1877-7058
DOI: 10.1016/j.proeng.2011.11.2607