Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/15698
Title: DIGITAL WATERMARKING IN VIDEO
Authors: ALAM, NAVED
Keywords: DWT
SVD
NCC
PSNR
ATTACKS
Issue Date: Jul-2013
Series/Report no.: TD NO.1337;
Abstract: In this era, any type of digital media such as image, text, audio, video All are easily accessible and transferable through the use of high speed internet, as the use of internet is increased in banks, big industries and in government organizations. Security and authenticity is must required, so the need of securing and protecting the multimedia data is also increased. In our thesis work we are proposing a most secure and authentication technique using 1-Level 2-D DWT and 2-level SVD for robust watermarking in video. In this thesis first we are starting from the introduction of watermarking followed by various techniques available in video watermarking. Literature survey of previous research paper based on video watermarking and in next section theory of wavelet and singular value decomposition. DWT and SVD both are mathematical technique. Wavelet is a compression technique in frequency domain which divide the image into low frequency, diagonal frequency and in high frequency band. In our proposed technique we convert a video into frames then after resizing we applied DWT on each frame of the video. Then we applied SVD in diagonal frequency (LH, HL) Sub-band. In watermark image we converted it into GRAY scale from RGB scale then divide it into columns matrix. Frame 1 to 64 and frame 65 to 128 and embed it into host frames of DWT in HL and LH band with some scaling factor C. After embedding the image we again applied SVD to make it more robust and then multiply the S2 matrices with the U1 and V1 matrices of HL and LH band to make inverse SVD then we applied IDWT to get watermarked video after rearranging these frames. For evaluation the watermarking in video we applied attacks on watermarked video such as Gaussian noise attack, Median Filtering attack, Histogram Equalization attack, Contrast adjustment attack, Sharpening attack and rotation attack. After applying these attacks we compute the PSNR and NCC of all attacks and compare the results with the watermarked video without attacks. Which shows this watermarking scheme is more secure and robust.
URI: http://dspace.dtu.ac.in:8080/jspui/handle/repository/15698
Appears in Collections:M.E./M.Tech. Electronics & Communication Engineering

Files in This Item:
File Description SizeFormat 
navedfrontpage.pdf366.26 kBAdobe PDFView/Open
mtechthesis.pdf2.15 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.