Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/245594
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2019-06-03T09:48:48Z-
dc.date.available2019-06-03T09:48:48Z-
dc.identifier.urihttp://hdl.handle.net/10603/245594-
dc.description.abstractFrom the beginning of 2015, the exchanging of the digital data through the internet has increased at the rapid. We also know that the exchanging the data on the internet is not secured, so the digital copyright protection becomes the basic need of the time as it needs to be protected from various unauthorized owners claiming on the video. In the last few years lot of research has been carried out in the field of digital watermarking. It also provides an opportunity to protect the videos from unauthorized users. To protect the data we have many different approaches e.g. Copy prohibited bit method, password protection, warning disclaimer and digital watermarking. Here we have considered the digital watermarking method for the protection of the digital data from unauthorized users. In the digital watermarking method the biggest challenge is to protect the digital watermark which remains unaltered by various types of attack or we can say the watermark should be robust. newlineThe concept of watermarking is more demanding and it is not only limited to the identification of the copyright owner, we also used it as an actual proof of ownership. A main problem occur when an intruder or unauthorized user uses some kinds of editing tools to crack or modified or replace the actual and then claims to have possession of the copyright himself or herself. In the initial stage of the watermarking techniques, there are many tools available to detect the watermark. Therefore, the intruder replaces the owner s watermark with his own watermark in order to claim the ownership of the video. But in the absence of the detector, the removal of a watermark by an adversary is the extremely difficult job. In some cases if an intruder was not able to remove then intruder try to damage or destroy the host signals by embedding some special codes. newlineThis problem can be resolve by using an algorithm which can prove that the intruder s image is derived from the original watermark image in place of directly embedding the watermark signal in the host image.
dc.format.extentxix, 94p.
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleRobust and Imperceptible Copyright Protection for Digital Videos in Transform Domain
dc.title.alternative
dc.creator.researcherAli, Jabir
dc.subject.keywordEngineering and Technology,Computer Science,Computer Science Information Systems
dc.subject.keywordLuminance
dc.subject.keywordSCD
dc.subject.keywordSWEA
dc.subject.keywordZPA
dc.description.note
dc.contributor.guideGhrera, Satya Prakash
dc.publisher.placeSolan
dc.publisher.universityJaypee University of Information Technology, Solan
dc.publisher.institutionDepartment of Computer Science Engineering
dc.date.registered21/01/2013
dc.date.completed2019
dc.date.awarded29/05/2019
dc.format.dimensions
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science Engineering



Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: