Abstract

In many studies related to watermarking, spatial-domain methods have a relatively low information-hiding capacity and limited robustness, and transform-domain methods are not applicable in real-time processes because of their considerably high computational time. In this paper, we propose a novel watermarking method based on a discrete cosine transform (DCT), which guarantees robustness and low computational complexity. First, we calculated the DCT coefficient of a specific location. Then, a variation value was calculated according to the embedding bits and quantization steps to modify the coefficient. Last, we embedded watermark bits by directly modifying the pixel values without full-frame DCT. Tests comparing invisibility, robustness, and computational time were conducted for determining the feasibility of the proposed method. The results showed that the proposed method had the faster and the more robust performance than previous studies.

Highlights

  • With the rapid development of the Internet, the dissemination and transmission of digital multimedia has become more convenient, leading to an increase in concerns related to piracy

  • According to the type of host data, watermarking methods are classified as image watermarking [13], video watermarking [7], [14], text watermarking [15], and audio watermarking [16]

  • Many video watermarking and image watermarking techniques have been directly applied to video sequences because a video sequence consists of a series of continuous still images

Read more

Summary

Introduction

With the rapid development of the Internet, the dissemination and transmission of digital multimedia has become more convenient, leading to an increase in concerns related to piracy. It is very urgent to protect the copyrights of multimedia content. A number of studies on various aspects of information protection, such as steganography [1], copy detection [2]–[5], and digital watermarking [6]–[13], have been proposed in the past two decades [13]. Digital watermarking has played an irreplaceable role in information security as an important part of copyright protection and has become a necessary technique in many applications such as broadcast monitoring and ownership identification. According to the type of host data, watermarking methods are classified as image watermarking [13], video watermarking [7], [14], text watermarking [15], and audio watermarking [16]. Video watermarking methods are sometimes regarded as an extension of the watermarking of still images.

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.