Please use this identifier to cite or link to this item:
Title: Robust and Imperceptible Copyright Protection for Digital Videos in Transform Domain
Researcher: Ali, Jabir
Guide(s): Ghrera, Satya Prakash
Keywords: Engineering and Technology,Computer Science,Computer Science Information Systems
University: Jaypee University of Information Technology, Solan
Completed Date: 2019
Abstract: From the beginning of 2015, the exchanging of the digital data through the internet has increased at the rapid. We also know that the exchanging the data on the internet is not secured, so the digital copyright protection becomes the basic need of the time as it needs to be protected from various unauthorized owners claiming on the video. In the last few years lot of research has been carried out in the field of digital watermarking. It also provides an opportunity to protect the videos from unauthorized users. To protect the data we have many different approaches e.g. Copy prohibited bit method, password protection, warning disclaimer and digital watermarking. Here we have considered the digital watermarking method for the protection of the digital data from unauthorized users. In the digital watermarking method the biggest challenge is to protect the digital watermark which remains unaltered by various types of attack or we can say the watermark should be robust. newlineThe concept of watermarking is more demanding and it is not only limited to the identification of the copyright owner, we also used it as an actual proof of ownership. A main problem occur when an intruder or unauthorized user uses some kinds of editing tools to crack or modified or replace the actual and then claims to have possession of the copyright himself or herself. In the initial stage of the watermarking techniques, there are many tools available to detect the watermark. Therefore, the intruder replaces the owner s watermark with his own watermark in order to claim the ownership of the video. But in the absence of the detector, the removal of a watermark by an adversary is the extremely difficult job. In some cases if an intruder was not able to remove then intruder try to damage or destroy the host signals by embedding some special codes. newlineThis problem can be resolve by using an algorithm which can prove that the intruder s image is derived from the original watermark image in place of directly embedding the watermark signal in the host image.
Pagination: xix, 94p.
Appears in Departments:Department of Computer Science Engineering

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: