Abstract

In connection with the continuous growth of the amount of digital information and the wider use of the Internet, today’s urgent task is the protection of copyright with the help of steganography. In particular, the technologies of digital watermarks (DWM) are successfully used to solve the problems of confirming copyright in relation to digital files, controlling their use by authorized users and other persons, confirming the authenticity and reliability of copies of software and multimedia objects used. An algorithm for embedding digital watermarks based on the idea of a differential energy watermark (DEW) was chosen for research and further improvement in the work, and is a method of embedding a digital watermark based on the selective rejection of a part of the high-frequency coefficients of the discrete cosine transform (DCT) compressed images and videos. Based on the results of the work carried out, this article describes the improvement of the method for copyright protection of streaming video (MPEG2 and MPEG4 formats) by embedding a digital watermark only in the low-frequency coefficients of the discrete-cosine transformation and applying the Canni’s segmentation method, which uses a multi-level computational approach to the detection of the segment boundaries in the image and helps to reduce the visual changes of the container. In order to study the practical results of the improved method, it was implemented in the developed online service and applied to video files, which made it possible to evaluate the performance and compare it with other methods of embedding the DW in terms of visual impact indicators (SSIM, SNR, PSNR, AD, NAD, IF) and resistance to attacks. According to the results of the study, it was concluded that in general, the application of the improved method allows to increase the stability indicators of DW in streaming video by approximately 12%. The digital watermark embedded in the video file did not have a significant impact on it, and the embedding of data in low-frequency coefficients made it possible to increase resistance to attacks.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call