{"title":"Watermarking Technique for Multimedia Documents in the Frequency Domain","authors":"Maha Bellaaj, K. Ouni","doi":"10.5772/INTECHOPEN.79370","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.79370","url":null,"abstract":"In order to secure and maintain the authenticity and integrity of multimedia documents, we use digital watermarking. This discipline can be applied to images, audios, and videos. For this reason, and to be independent of the nature of the signal composing the document to be watermarked, we will propose in this chapter two watermarking techniques, one for the audio and another for the image to watermark a video containing the two components audio and image. MDCT is combined with Watson model and a motion detection algorithm in the image watermarking technique and is combined with a psychoacoustic model to elaborate the audio watermarking technique. For the two techniques, the bits of the mark will be duplicated to increase the capacity of insertion and then inserted into the least significant bit (LSB). We will use an error correction code (Hamming) on the mark for more reliability in the detection phase. To highlight our experimental results point of view robustness and imperceptibility, we will compare the proposed techniques with some other existing techniques.","PeriodicalId":212178,"journal":{"name":"Digital Image and Video Watermarking and Steganography [Working Title]","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129106661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introductory Chapter: Digital Image and Video Watermarking and Steganography","authors":"S. Ramakrishnan","doi":"10.5772/INTECHOPEN.84984","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.84984","url":null,"abstract":"Watermarking and steganography are important cryptographic operations on images and videos. Watermarking embeds the ownership symbol in images and videos either visually or invisibly. Steganography hides small piece of information in images and videos invisibly. Watermarking is used mainly for copyright protection, whereas steganography is used to send secret messages. Table 1 presents the difference between watermarking and steganography.","PeriodicalId":212178,"journal":{"name":"Digital Image and Video Watermarking and Steganography [Working Title]","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115075335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Motion Vector-Based Video Steganography by Adding or Subtracting One Motion Vector Value","authors":"S. Bachu, Aravind Kumar Madam","doi":"10.5772/INTECHOPEN.78230","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.78230","url":null,"abstract":"In last decades the Steganography is an tremendous progress, at the same time there exist issues to detect the steganalysis in motion based video where the substance is reliably in motion conduct that makes that to detect it. Analyzing the difference between the rated motion value plays a crucial role that enables us to focus on difference between the locally optimal SAD and actual SAD after adding-or-subtracting-one operation on the motion value. Based on the motion vectors to play out the classification and extraction process at last, two features sets are been used based on the fact that most motion vectors are locally optimal for most video codec ’ s to complete this process. The conventional approaches announced the technique for proposed prevails to meet the requirement applications and detecting the steganalysis in videos compare in the literature.","PeriodicalId":212178,"journal":{"name":"Digital Image and Video Watermarking and Steganography [Working Title]","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133201235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Color Image Watermarking Based on Radon Transform and Jordan Decomposition","authors":"P. K. Dhar, Rakib Hasan, T. Shimamura","doi":"10.5772/INTECHOPEN.80407","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.80407","url":null,"abstract":"Digital watermarking has been widely used for ownership identification and copyright protection. In this chapter, a color image watermarking method based on Radon transform (RT) and Jordan decomposition (JD) is proposed. Initially, the host color image is converted into L*a*b* color space. Then, the b* channel is selected and it is divided into 16 (cid:1) 16 non-overlapping blocks. RT is applied to each of these blocks. JD is applied to the selected RT coefficients of each block represented in m (cid:1) n matrix. Watermark data is embedded in the coefficients of the similarity transform matrix obtained from JD using a new quantization equation. Experimental results indicate that the proposed method is highly robust against various attacks such as noise addition, cropping, filtering, blurring, rotation, JPEG compression etc. In addition, it provides high quality watermarked images. Moreover, it shows superior performance than the state-of-the-art methods reported recently in terms of imperceptibility and robustness. attacks such as noise addition, cropping, filtering, rotation, blurring, sharpening, and JPEG compression. In addition, it provides high quality watermarked images. Moreover, it outper-forms state-of-the-art image watermarking methods in terms of imperceptibility and robustness. These results indicate that the proposed watermarking method can be used for image copyright protection.","PeriodicalId":212178,"journal":{"name":"Digital Image and Video Watermarking and Steganography [Working Title]","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126267152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}