{"title":"Content-dependent spatio-temporal video watermarking using 3-dimensional discrete cosine transform","authors":"Iwan Setyawan, Ivanna K. Timotius","doi":"10.1109/ICITEED.2013.6676215","DOIUrl":null,"url":null,"abstract":"In this paper we propose a content-dependent spatio-temporal watermarking scheme for digital videos. Content dependency is achieved by incorporating the hash of the video sequence into the watermark. The video sequence is treated as a 3-dimensional spatio-temporal signal for the purposes of video hash computation and watermark embedding and detection. Our experiments show that the video hash algorithm has good discriminating power and robustness against various attacks. The watermark is also shown in the experiments to have good robustness against a variety of attacks, in particular when the watermark is copied from one video sequence to another.","PeriodicalId":204082,"journal":{"name":"2013 International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Information Technology and Electrical Engineering (ICITEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITEED.2013.6676215","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
In this paper we propose a content-dependent spatio-temporal watermarking scheme for digital videos. Content dependency is achieved by incorporating the hash of the video sequence into the watermark. The video sequence is treated as a 3-dimensional spatio-temporal signal for the purposes of video hash computation and watermark embedding and detection. Our experiments show that the video hash algorithm has good discriminating power and robustness against various attacks. The watermark is also shown in the experiments to have good robustness against a variety of attacks, in particular when the watermark is copied from one video sequence to another.