Skip to main content
Erschienen in: Wireless Personal Communications 4/2019

08.12.2018

High Performance and Energy Efficient Image Watermarking for Video Using a Mobile Device

verfasst von: Rabeah Noor, Ahmed Khan, Aaliya Sarfaraz

Erschienen in: Wireless Personal Communications | Ausgabe 4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This article describes the basic information hiding technique that is most commonly used nowadays. As evolution in the communication media has made information access much easier but has also increased the risks of invading privacy and ownership. To overcome such threats, watermarking is one of the most suitable methods used for hiding information. It is the process of inserting audio, video, image or text for owner verification. A study on spatial and temporal domain watermarking is conducted. An experiment is carried out for the analysis of power and time consumption while inserting and extraction of the watermarks. For better understanding of the concept, embedding of an image on a video was performed using a computer and a mobile with similar logic. This concluded that the watermarking process can be implemented by both computer and mobile phones. Extraction of image was done with PSNR value that was inserted on a video. Only limitation found in this process was tracing back to the source of content theft and that is covered by forensic watermarking.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Venugopala, P. S., Sarojadevi, H., & Chiplunkar, N. N. (2017). An approach to embed image in video as watermark using a mobile device. Sustainable Computing: Informatics and Systems, 15, 82–87. Venugopala, P. S., Sarojadevi, H., & Chiplunkar, N. N. (2017). An approach to embed image in video as watermark using a mobile device. Sustainable Computing: Informatics and Systems, 15, 82–87.
2.
Zurück zum Zitat Khan, A., Sohaib, M., & Amjad, F. M. (2016). High-capacity multi-layer framework for highly robust textual steganography. Science International, 28(5), 4451–4457. Khan, A., Sohaib, M., & Amjad, F. M. (2016). High-capacity multi-layer framework for highly robust textual steganography. Science International, 28(5), 4451–4457.
3.
Zurück zum Zitat Khan, A. (2015). Comparative analysis of watermarking techniques. Science International, 27(6), 6091–6096. Khan, A. (2015). Comparative analysis of watermarking techniques. Science International, 27(6), 6091–6096.
4.
Zurück zum Zitat Zheng, Z., Saxena, N., Mishra, K. K., & Sangaiah, A. K. (2018). Guided dynamic particle swarm optimization for optimizing digital image watermarking in industry applications. Future Generation Computer Systems, 88, 92–106.CrossRef Zheng, Z., Saxena, N., Mishra, K. K., & Sangaiah, A. K. (2018). Guided dynamic particle swarm optimization for optimizing digital image watermarking in industry applications. Future Generation Computer Systems, 88, 92–106.CrossRef
5.
Zurück zum Zitat Khan, A. (2015). Robust Textual Steganography. Journal of Science, 4(4), 426–434. Khan, A. (2015). Robust Textual Steganography. Journal of Science, 4(4), 426–434.
6.
Zurück zum Zitat Khan, A., & Sarfaraz, A. (2018). Copy/move forgery detection in MPEG videos used for personal communications. Wireless Personal Communications, 103(4), 2995–3008.CrossRef Khan, A., & Sarfaraz, A. (2018). Copy/move forgery detection in MPEG videos used for personal communications. Wireless Personal Communications, 103(4), 2995–3008.CrossRef
7.
Zurück zum Zitat Khan, A. (2014). Joint ownership verification for digital text. Advances in Computer Science and its Applications (ACSA), 3(4), 525–531. Khan, A. (2014). Joint ownership verification for digital text. Advances in Computer Science and its Applications (ACSA), 3(4), 525–531.
8.
Zurück zum Zitat Singh, A. K., Kumar, B., Singh, S. K., Ghrera, S. P., & Mohan, A. (2016). Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Generation Computer Systems, 86, 926–939.CrossRef Singh, A. K., Kumar, B., Singh, S. K., Ghrera, S. P., & Mohan, A. (2016). Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Generation Computer Systems, 86, 926–939.CrossRef
9.
Zurück zum Zitat Hameed, K., Khan, A., Ahmed, M., Reddy, A. G., & Rathore, M. M. (2018). Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks. Future Generation Computer Systems, 82, 274–289.CrossRef Hameed, K., Khan, A., Ahmed, M., Reddy, A. G., & Rathore, M. M. (2018). Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks. Future Generation Computer Systems, 82, 274–289.CrossRef
11.
Zurück zum Zitat Sarfaraz, A., & Khan, A. (2018). Feature selection based correlation attack on HTTPS secure searching. Wireless Personal Communications, 103(4), 2995–3008.CrossRef Sarfaraz, A., & Khan, A. (2018). Feature selection based correlation attack on HTTPS secure searching. Wireless Personal Communications, 103(4), 2995–3008.CrossRef
12.
Zurück zum Zitat Nayak, A. A., Venugopala, P. S., Sarojadevi, H., & Chiplunkar, N. N. (2014). A survey and comparative study on video watermarking techniques with reference to mobile devices. International Journal of Engineering Research and Applications, 4(12 (Part 6)), 39–44. Nayak, A. A., Venugopala, P. S., Sarojadevi, H., & Chiplunkar, N. N. (2014). A survey and comparative study on video watermarking techniques with reference to mobile devices. International Journal of Engineering Research and Applications, 4(12 (Part 6)), 39–44.
13.
Zurück zum Zitat Wei- Meng, L. (2011). Beginning android application development. Hoboken: Wiely. Wei- Meng, L. (2011). Beginning android application development. Hoboken: Wiely.
14.
Zurück zum Zitat Suresh Kumar, M., & Madhavi Latha, G. (2014). DCT based secret image hiding in video sequence. International Journal of Engineering Research and Applications, 4(8(Version 1)), 5–9. Suresh Kumar, M., & Madhavi Latha, G. (2014). DCT based secret image hiding in video sequence. International Journal of Engineering Research and Applications, 4(8(Version 1)), 5–9.
15.
Zurück zum Zitat Haribabu, M., Bindu, C. H., & Swamy, K. V. (2016). A secure & invisible image watermarking scheme based on wavelet transform in HSI color space. Procedia Computer Science, 93, 462–468.CrossRef Haribabu, M., Bindu, C. H., & Swamy, K. V. (2016). A secure & invisible image watermarking scheme based on wavelet transform in HSI color space. Procedia Computer Science, 93, 462–468.CrossRef
16.
Zurück zum Zitat Gupta, A., Chandwani, A., & Yadav, G. (2014). RGB image watermarking on video frames using DWT. In Confluence the next generation information technology summit (confluence), 5th international conference, at Noida, on 25–26, (pp. 675–680). Gupta, A., Chandwani, A., & Yadav, G. (2014). RGB image watermarking on video frames using DWT. In Confluence the next generation information technology summit (confluence), 5th international conference, at Noida, on 2526, (pp. 675–680).
17.
Zurück zum Zitat Abraham, J., & Paul, V. (2016). An imperceptible spatial domain color image watermarking scheme. Journal of King Saud University-Computer and Information Sciences. Abraham, J., & Paul, V. (2016). An imperceptible spatial domain color image watermarking scheme. Journal of King Saud University-Computer and Information Sciences.
18.
Zurück zum Zitat Siddiqui, A., & Kaur, A. (2017). A secure and robust image watermarking system using wavelet domain. In 2017 7th international conference on cloud computing, data science & engineering-confluence (pp. 599–604). IEEE. Siddiqui, A., & Kaur, A. (2017). A secure and robust image watermarking system using wavelet domain. In 2017 7th international conference on cloud computing, data science & engineering-confluence (pp. 599–604). IEEE.
19.
Zurück zum Zitat Robert, A., & Doerr, G. (2013). Impact of content mastering on the throughput of a bit stream video watermarking system. In 2013 20th IEEE international conference on image processing (ICIP). Robert, A., & Doerr, G. (2013). Impact of content mastering on the throughput of a bit stream video watermarking system. In 2013 20th IEEE international conference on image processing (ICIP).
20.
Zurück zum Zitat Khan, A., & Sarfaraz, A. (2018). Practical Guidelines for securing wireless local area networks (WLANs). International Journal of Security and Its Applications, 12(3), 19–28.CrossRef Khan, A., & Sarfaraz, A. (2018). Practical Guidelines for securing wireless local area networks (WLANs). International Journal of Security and Its Applications, 12(3), 19–28.CrossRef
21.
Zurück zum Zitat Khan, A., & Sarfaraz, A. (2017). Vetting the security of mobile applications. Science International, 29(2), 361–365. Khan, A., & Sarfaraz, A. (2017). Vetting the security of mobile applications. Science International, 29(2), 361–365.
Metadaten
Titel
High Performance and Energy Efficient Image Watermarking for Video Using a Mobile Device
verfasst von
Rabeah Noor
Ahmed Khan
Aaliya Sarfaraz
Publikationsdatum
08.12.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-6097-3

Weitere Artikel der Ausgabe 4/2019

Wireless Personal Communications 4/2019 Zur Ausgabe

Neuer Inhalt