Multi-symbol QIM video watermarking
نویسندگان
چکیده
منابع مشابه
Multi-symbol QIM video watermarking
This paper introduces the theoretical framework allowing for the binary quantization index modulation (QIM) embedding techniques to be extended towards multiple-symbol QIM (m-QIM, where m stands for the number of symbols on which the mark is encoded prior to its embedding). The underlying detection method is optimized with respect to the minimization of the average error probability, under the ...
متن کاملExhibition QIM-based watermarking for digital cinema
The copyright protection of Digital Cinema requires the insertion of forensic watermarks during exhibition playback. This paper presents a low-complexity exhibition watermarking method based on quantization index modulation (QIM) and embedded in the DCI compliant decoder. Watermark embedding is proposed to fit in the JPEG2000 decoding process, prior to the inverse wavelet transform and such as ...
متن کاملAnonymous Fingerprinting with Robust QIM Watermarking Techniques
Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer’s identity as a watermark into the content so that the merchant can retrieve the buyer’s identity when he encounters a redistributed copy. To prevent the merchant from dishonestly embedding the buyer’s identity multiple times, it is es...
متن کاملA chaos-based video watermarking algorithm
The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental ...
متن کاملRobust multiplicative video watermarking using statistical modeling
The present paper is intended to present a robust multiplicative video watermarking scheme. In this regard, the video signal is segmented into 3-D blocks like cubes, and then, the 3-D wavelet transform is applied to each block. The low frequency components of the wavelet coefficients are then used for data embedding to make the process robust against both malicious and unintentional attacks. Th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Signal Processing: Image Communication
سال: 2014
ISSN: 0923-5965
DOI: 10.1016/j.image.2013.07.007