Abstract

Introduction: one of the ways to protect multimedia information from unauthorized distribution is the introduction of digital watermarks in the video sequence. In this task, the most important parameter is the stability of the hidden message, which should remain retrievable after various impacts and operations with video data. At the same time, the method of implementing a hidden message should provide as little visual distortion of video data as possible. Purpose: to increase the robustness and secrecy of the method of introducing digital watermarks into the video sequence. Methods: a modification of the method of introducing digital watermarks into video data is proposed, which consists in supplementing the already known methods with new functions based on the fundamental differences between a video stream and a static photo. To solve this problem, it is proposed to apply a terminative approach, the essence of which is to determine the techniques and methods for ensuring the robustness of the marker in the form of threat terminators. Results: an overview of the use of various methods of introducing digital watermarks into graphic images is carried out. A typical information system is described, which uses meths to protect multimedia content from unauthorized distribution. The model of threats to the introduction of digital watermarks is considered. The general statement of the scientific task of developing a method for introducing a robust invisible digital watermark into video data and a description of the stages of the proposed method are presented. The analysis of existing methods and methods of increasing the robust" ness of digital watermarks is carried out in order to identify the necessary terminator techniques that allow leveling the described threats. The developed method is based on the integration of methods and techniques of threat terminators determined by the object of research. Discussion: determining the optimal values of the frequency domain range and the depth of embedding of the marker require further experimental studies.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call