Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

.

Flipping the least significant bit (LSB) of the chosen pixels in the image is the simplest method in image
watermarking. Developing and improving this method is to use pseudo numbers as a generator to
determine which pixels must be used for embedding based on a given key[9]. I.Yassin et al. have
proposed a block based video watermarking scheme in which the watermark signal is embedded in the
maximum coefficients of PCA blocks in LH and HL wavelet sub bands[4]. In[3]J.Xumei et al. suggested a
video watermarking based on shot segmentation and block classification in which watermark is
embedded into AC coefficient of 4*4 DCT in the compressed domain according to the block texture
classification. Another watermarking scheme based on SVD is presented in which a bit watermark is
embedded by modifying the maximum SVs of four successive blocks of frames in the temporal direction
based on slopebased technique[5]. S.Rawat et al. used of SVs extracted features of image to generate
the master share and owner share is generated with the help of watermark and master share using VC
technique[10]. Th.singh et al. have suggested method based on visual cryptography cryptography and
binary watermark bits. Then, watermark can be revealed by using identification share[9].

There are many nature inspired algorithms available for calculating suitable scaling factor. Some of
these are PSO ( Particle Swarm Optimization ), DE ( Differential Evolution ), ACO ( Ant Colony
Optimization ), BA ( Bee Algorithm ), CSO ( Cat Swarm Optimization ), FA ( Firefly Algorithm ), and CS (
Cuckoo Search ). These algorithms are used to find the optimal positions for inserting watermark. In [1],
GA has been used to find the optimal watermark embedding position on spatial domain. A robust
watermarking technique has been presented in [2] by implementing PSO. Robust watermarking
technique has been presented in [3] using DE based on SVD where DE is used to modify the singular
values of the host by multiplying it by a given scaling factor. In [4], ACO has been implemented for
watermarking techniques, where detection and extraction of the watermark is done using ant’s trace.
BE has been implemented in [5] for efficient watermark embedding and extraction technique. In [6, 7]
SCO has been implemented to extract the same watermark that was embedded where SCO corrects
the rounding error when a real number is converted to an integer. FA has been proposed to identify
the watermarking embedding position coefficients in [8].

Serdean [1] has combined the advantages of both Fourier-Mellin Transform (FMT) image registration techniques
and the watermarking in the DWT domain in order to undo geometric attacks. Elarbi [2] has proposed a digital video
watermarking scheme based on multiresolution motion estimation and artificial neural network. In Gaobo [3], the
watermark is scrambled and embedded into the mid frequency DWT coefficients of each frame of the video. The
quality of the scheme is enhanced by using a genetic algorithm. Afterwards, Elarbi [4] has described a method to
embed different parts of a single watermark into different shots of a video under the wavelet domain. A
multiresolution motion estimation algorithm (MRME) has been adopted to allocate the watermark to coefficients
containing motion.
Other transformations have also been explored for watermarking such as principal component analysis (PCA). PCA
is a linear transformation that chooses a new coordinate system for the data set. It has the advantage of high
energy concentration and complete decorrelation which it is suitable for data hiding. PCA has been used in
different ways in image and video watermarking methods. Hien [5] has proposed a method for selecting a set of
coefficients in each PCA subblock to cast the watermark. In Yavuz [6], PCA has been used to obtain a reference of
the cover image. The watermark is embedded according to the difference of the original and its reference image.
Kang [7] has presented a new approach that incorporates multi-band (M-band) wavelet transformation and PCA.
While Sun [8], has proposed a video watermarking scheme to resist the temporal desynchronization by using shot
segmentation and two-dimensional PCA.
In [1], static 3D-DCT scheme is implemented on correlated video. It is observed that this scheme gives favorable
results for low motion activity videos but produces visual distortion in high motion activities.
In [2], a watermark is embedded by adding pseudorandom noise to image components and detected by correlating
the pseudorandom noise with the image components. In [3], a variable-length 3-D DCT is chosen to exploit the
redundancy of the video sequences in temporal domain. The method adopted embeds the watermark (binary logo
image) in an uncompressed video sequence by modifying the values of the mid-range coefficients of 3-D DCT block,
chosen in accordance with the 3-D human visual system model which preserves the perceptual quality of video
sequences. The experimental results demonstrate the robustness of the proposed watermarking procedure to several
video degradations and watermarking attacks.
In [4], authors have implemented three different methods for watermarking a video in 3D-DCT domain. These
spatiotemporal volume embedding techniques have been proved to be very effective in embedding a huge amount of
data with little or no visible distortion to the host video.

You might also like