(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Technology and Engineering Exploration (IJATEE)

ISSN (Print):2394-5443    ISSN (Online):2394-7454
Volume-10 Issue-104 July-2023
Full-Text PDF
Paper Title : Video data security: analysis, relevance and open challenges
Author Name : Purnima , Rakesh Ahuja and Nidhi Gautam
Abstract :

With the rapid advancement of technology, ensuring authentication and security in communication over long distances has become a primary concern. The film industry is particularly vulnerable to the unauthorized distribution of digital videos, which can be easily disseminated to a global audience due to widespread internet access. Video watermarking has gained significant importance in various applications such as copyright protection, security, fingerprinting, copy control, and annotation. Watermarking, whether in the form of an image, audio, or video, is a technique used to embed additional information within a digital video signal. This embedded information is utilized for copyright owner detection. Consequently, several methods for digital video watermarking (DVW) have been developed to address this issue. Watermarking has emerged as a crucial means of verifying ownership, ensuring authenticity, and safeguarding copyrights. Researchers employ watermarking techniques to hide confidential information, which can be made either visible or obscured based on the user's requirements. This approach plays a vital role in determining the ownership of information. To ensure secure watermarking, an optimization process is often employed. This paper presents an overview of the diverse trends and techniques adopted in the field of digital watermarking. It aims to provide a comprehensive guide to research scholars interested in exploring this area of study.

Keywords : Digital video watermarking, Discrete wavelet transform, Discrete cosine transform, Robustness, Security.
Cite this article : Purnima , Ahuja R, Gautam N. Video data security: analysis, relevance and open challenges. International Journal of Advanced Technology and Engineering Exploration. 2023; 10(104):875-905. DOI:10.19101/IJATEE.2022.10100440.
References :
[1]Cox I, Miller M, Bloom J, Fridrich J, Kalker T. Digital watermarking and steganography. Morgan Kaufmann; 2007.
[Google Scholar]
[2]Cox I, Miller M, Bloom J, Honsinger C. Digital watermarking. Journal of Electronic Imaging. 2002; 11(3).
[Crossref] [Google Scholar]
[3]Petitcolas FA, Anderson RJ, Kuhn MG. Information hiding-a survey. Proceedings of the IEEE. 1999; 87(7):1062-78.
[Crossref] [Google Scholar]
[4]Lin EI, Eskicioglu AM, Lagendijk RL, Delp EJ. Advances in digital video content protection. Proceedings of the IEEE. 2005; 93(1):171-83.
[Google Scholar]
[5]Anusree K, Binu GS. Biometric privacy using visual cryptography, halftoning and watermarking for multiple secrets. In national conference on communication, signal processing and networking 2014 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[6]Gupta P. Cryptography based digital image watermarking algorithm to increase security of watermark data. International Journal of Scientific & Engineering Research. 2012; 3(9):1-4.
[Google Scholar]
[7]Asikuzzaman M, Pickering MR. An overview of digital video watermarking. IEEE Transactions on Circuits and Systems for Video Technology. 2017; 28(9):2131-53.
[Crossref] [Google Scholar]
[8]Singh AK, Kumar B, Dave M, Ghrera SP, Mohan A. Digital image watermarking: techniques and emerging applications. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. 2016: 246-72.
[Crossref] [Google Scholar]
[9]Cayre F, Fontaine C, Furon T. Watermarking security part two: practice. In security, steganography, and watermarking of multimedia contents VII 2005 (pp. 758-68). SPIE.
[Crossref] [Google Scholar]
[10]Jensen-link LA, Thompson C. Effective video capture techniques for educational multimedia. In proceedings frontiers in education 25th annual conference, engineering education for the 21st century 1995 (pp. 30-3). IEEE.
[Google Scholar]
[11]Sen J, Sen AM, Hemachandran K. An algorithm for digital watermarking of still images for copyright protection. Indian Journal of Computer Science and Engineering. 2012; 3(1):46-52.
[Google Scholar]
[12]Channalli S, Jadhav A. Steganography an art of hiding data. arXiv preprint arXiv:0912.2319. 2009.
[Google Scholar]
[13]Deshpande N, Rajurkar A, Manthalkar R. Review of robust video watermarking algorithms. arXiv preprint arXiv:1004.1770. 2010.
[Crossref] [Google Scholar]
[14]Singh S, Singh AK, Ghrera SP. A recent survey on data hiding techniques. In international conference on IoT in social, mobile, analytics and cloud 2017 (pp. 882-6). IEEE.
[Crossref] [Google Scholar]
[15]Sunesh HK. Watermark attacks and applications in watermarking. In national workshop-cum-conference on recent trends in mathematics and computing 2011:8-10.
[Google Scholar]
[16]Chang X, Wang W, Zhao J, Zhang L. A survey of digital video watermarking. In seventh international conference on natural computation 2011 (pp. 61-5). IEEE.
[Crossref] [Google Scholar]
[17]Lee SJ, Jung SH. A survey of watermarking techniques applied to multimedia. In international symposium on industrial electronics proceedings (Cat. No. 01TH8570) 2001 (pp. 272-7). IEEE.
[Crossref] [Google Scholar]
[18]Sharma C, Bagga A, Singh BK, Shabaz M. A novel optimized graph-based transform watermarking technique to address security issues in real-time application. Mathematical Problems in Engineering. 2021; 2021:1-27.
[Crossref] [Google Scholar]
[19]Asikuzzaman M, Alam MJ, Lambert AJ, Pickering MR. Imperceptible and robust blind video watermarking using chrominance embedding: a set of approaches in the DT CWT domain. IEEE Transactions on Information Forensics and Security. 2014; 9(9):1502-11.
[Crossref] [Google Scholar]
[20]Ahuja R, Bedi SS. Video watermarking scheme based on IDR frames using MPEG-2 structure. International Journal of Information and Computer Security. 2019; 11(6):585-603.
[Crossref] [Google Scholar]
[21]Cox IJ, Miller ML, Bloom JA. Watermarking applications and their properties. In proceedings international conference on information technology: coding and computing (Cat. No. PR00540) 2000 (pp. 6-10). IEEE.
[Crossref] [Google Scholar]
[22]Doerr G, Dugelay JL. A guide tour of video watermarking. Signal Processing: Image Communication. 2003; 18(4):263-82.
[Crossref] [Google Scholar]
[23]Singh AK, Dave M, Mohan A. Wavelet based image watermarking: futuristic concepts in information security. Proceedings of the National Academy of Sciences, India section A: physical sciences. 2014; 84:345-59.
[Crossref] [Google Scholar]
[24]Cox IJ, Miller ML. Review of watermarking and the importance of perceptual modeling. In human vision and electronic imaging II 1997 (pp. 92-9). SPIE.
[Crossref] [Google Scholar]
[25]Kaur M, Jindal S, Behal S. A study of digital image watermarking. Journal of Research in Engineering and Applied Sciences. 2012; 2(2):126-36.
[Google Scholar]
[26]Moniruzzaman M, Hawlader MA, Hossain MF. Wavelet based watermarking approach of hiding patient information in medical image for medical image authentication. In international conference on computer and information technology 2014 (pp. 374-8). IEEE.
[Crossref] [Google Scholar]
[27]Bakhtiari S, Ibrahim S, Salleh M, Bakhtiari M. JPEG mage encryption with elliptic curve cryptography. In international symposium on biometrics and security technologies 2014 (pp. 144-9). IEEE.
[Crossref] [Google Scholar]
[28]Ouslim M, Sabri A, Mouhadjer H. Securing biometric data by combining watermarking and cryptography. In 2nd international conference on advances in biomedical engineering 2013 (pp. 179-82). IEEE.
[Crossref] [Google Scholar]
[29]Han Y, He W, Ji S, Luo Q. A digital watermarking algorithm of color image based on visual cryptography and discrete cosine transform. In ninth international conference on P2P, parallel, grid, cloud and internet computing 2014 (pp. 525-30). IEEE.
[Crossref] [Google Scholar]
[30]Ghosh S, De S, Maity SP, Rahaman H. A novel dual purpose spatial domain algorithm for digital image watermarking and cryptography using extended hamming code. In 2nd international conference on electrical information and communication technologies 2015 (pp. 167-72). IEEE.
[Crossref] [Google Scholar]
[31]Kumar S, Dutta A. A novel spatial domain technique for digital image watermarking using block entropy. In international conference on recent trends in information technology 2016 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[32]Shahid M, Kumar P. Digital video watermarking: issues and challenges. International Journal of Advanced Research in Computer Engineering & Technology. 2018; 7(4):400-5.
[Google Scholar]
[33]Hartung F, Kutter M. Multimedia watermarking techniques. Proceedings of the IEEE. 1999; 87(7):1079-107.
[Crossref] [Google Scholar]
[34]Seenivasagam DV, Subbulakshmi S, Radhamani S. A survey on video watermarking and its applications. International Journal of Advanced Research in Computer Science and Software Engineering. 2014; 4(3):3015-8.
[Google Scholar]
[35]Singh P, Chadha RS. A survey of digital watermarking techniques, applications and attacks. International Journal of Engineering and Innovative Technology. 2013; 2(9):165-75.
[Google Scholar]
[36]Bhattacharya S, Chattopadhyay T, Pal A. A survey on different video watermarking techniques and comparative analysis with reference to H. 264/AVC. In international symposium on consumer electronics 2006 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[37]Mane GV, Chiddarwar GG. Review paper on video watermarking techniques. International Journal of Scientific and Research Publications. 2013; 3(4):1-5.
[Google Scholar]
[38]Panchal H, Acharya K, Panchal P, Thakar N. Digital watermarking on extracted key frames from uncompressed color video using 4-level DWT. In international conference on emerging trends in networks and computer communications 2011 (pp. 331-5). IEEE.
[Crossref] [Google Scholar]
[39]Varaprasad SA, Srinivas P, Vidya T, kumara CA. LSB modification, correlation, transform based digital image watermarking techniques. International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering. 2015; 3(12):136-9.
[40]Wang Y, Ostermann J, Zhang Y. Video formation, perception, and representation. Signal Processing, Prentice Hall. 2001.
[Google Scholar]
[41]Comesana P, Pérez-freire L, Pérez-gonzález F. Fundamentals of data hiding security and their application to spread-spectrum analysis. In international workshop on information hiding 2005 (pp. 146-60). Berlin, Heidelberg: Springer Berlin Heidelberg.
[Crossref] [Google Scholar]
[42]Bas P, Cayre F. Achieving subspace or key security for WOA using natural or circular watermarking. In proceedings of the 8th workshop on multimedia and security 2006 (pp. 80-8).
[Crossref] [Google Scholar]
[43]Cayre F, Fontaine C, Furon T. Watermarking security part one: theory. In security, steganography, and watermarking of multimedia contents VII 2005 (pp. 746-57). SPIE.
[Crossref] [Google Scholar]
[44]Cayre F, Fontaine C, Furon T. Watermarking security: theory and practice. IEEE Transactions on Signal Processing. 2005; 53(10):3976-87.
[Crossref] [Google Scholar]
[45]Hartung FH, Su JK, Girod B. Spread spectrum watermarking: malicious attacks and counterattacks. In security and watermarking of multimedia contents 1999 (pp. 147-58). SPIE.
[Crossref] [Google Scholar]
[46]Holliman MJ, Macy WW, Yeung MM. Robust frame-dependent video watermarking. In security and watermarking of multimedia contents II 2000 (pp. 186-97). SPIE.
[Crossref] [Google Scholar]
[47]Ahuja R, Bedi SS. Video watermarking scheme based on candidates I-frames for copyright protection. Indonesian Journal of Electrical Engineering and Computer Science. 2017; 5(2):391-400.
[Google Scholar]
[48]Ahuja R, Bedi SS. Robust video watermarking scheme based on intra-coding process in MPEG-2 Style. International Journal of Electrical & Computer Engineering. 2017; 7(6):3332-43.
[Google Scholar]
[49]Harish NJ, Kumar BB, Kusagur A. Hybrid robust watermarking techniques based on DWT, DCT, and SVD. International Journal of Advanced Electrical and Electronics Engineering. 2013; 2(5):137-43.
[Google Scholar]
[50]Sridhar B, Arun C. Secure video watermarking algorithm based on wavelet with multiple watermarks. Latin American Applied Research. 2015; 45(3):207-12.
[Google Scholar]
[51]Zhang X. Reversible data hiding in encrypted image. IEEE Signal Processing Letters. 2011; 18(4):255-8.
[Crossref] [Google Scholar]
[52]Biswas SN, Nahar S, Das SR, Petriu EM, Assaf MH, Groza V. MPEG-2 digital video watermarking technique. In international instrumentation and measurement technology conference proceedings 2012 (pp. 225-9). IEEE.
[Crossref] [Google Scholar]
[53]Yu X, Wang C, Zhou X. A survey on robust video watermarking algorithms for copyright protection. Applied Sciences. 2018; 8(10):1-26.
[Crossref] [Google Scholar]
[54]Kaur P, Laxmi DV. Review on different video watermarking techniques. International Journal of Computer Science and Mobile Computing. 2014; 3(9):190-5.
[Google Scholar]
[55]Mohal D, Sharma S. Image encryption strategies to enhance security of image: an exhaustive analysis. International Journal of Advanced Research in Computer Science. 2017; 8(9):351-61.
[Google Scholar]
[56]Jadhav A, Kolhekar M. Digital watermarking in video for copyright protection. In international conference on electronic systems, signal processing and computing technologies 2014 (pp. 140-4). IEEE.
[Crossref] [Google Scholar]
[57]Mohanty SP, Kougianos E. Real-time perceptual watermarking architectures for video broadcasting. Journal of Systems and Software. 2011; 84(5):724-38.
[Crossref] [Google Scholar]
[58]Langelaar GC, Setyawan I, Lagendijk RL. Watermarking digital image and video data. a state-of-the-art overview. IEEE Signal Processing Magazine. 2000; 17(5):20-46.
[Crossref] [Google Scholar]
[59]Podilchuk CI, Delp EJ. Digital watermarking: algorithms and applications. IEEE Signal Processing Magazine. 2001; 18(4):33-46.
[Crossref] [Google Scholar]
[60]Leelavathy N, Prasad EV, Kumar SS. Video watermarking techniques: a review. International Journal of Computer Applications. 2014; 104(7):24-30.
[Google Scholar]
[61]Zhang Y. Digital watermarking technology: a review. In ETP international conference on future computer and communication 2009 (pp. 250-2). IEEE.
[Crossref] [Google Scholar]
[62]Jayamalar T, Radha V. Survey on digital video watermarking techniques and attacks on watermarks. International Journal of Engineering Science and Technology. 2010; 2(12):6963-7.
[Google Scholar]
[63]Paul RT. Review of robust video watermarking techniques. IJCA Special Issue on Computational Science. 2011; 3:90-5.
[Google Scholar]
[64]Shoemaker C. Hidden bits: a survey of techniques for digital watermarking. Independent Study, EER. 2002; 290:1673-87.
[Google Scholar]
[65]Chan PW, Lyu MR, Chin RT. A novel scheme for hybrid digital video watermarking: approach, evaluation and experimentation. IEEE Transactions on Circuits and Systems for Video Technology. 2005; 15(12):1638-49.
[Crossref] [Google Scholar]
[66]Hazim HT, Alseelawi N, Alrikabi HT. A novel method of invisible video watermarking based on index mapping and hybrid DWT-DCT. International Journal of Online & Biomedical Engineering. 2023; 19(4):155-73.
[Google Scholar]
[67]Liu S, Bo-wei CD, Gong L, Ji W, Seo S. A real-time video watermarking algorithm for authentication of small-business wireless surveillance networks. International Journal of Distributed Sensor Networks. 2015; 11(9):1-11.
[Crossref] [Google Scholar]
[68]Singh N, Joshi S, Birla S. Cover dependent watermarking against ambiguity attacks. Procedia Computer Science. 2020; 171:1137-46.
[Crossref] [Google Scholar]
[69]Doërr G, Dugelay JL. Collusion issue in video watermarking. In security, steganography, and watermarking of multimedia contents VII 2005 (pp. 685-96). SPIE.
[Crossref] [Google Scholar]
[70]Doërr G, Dugelay JL. Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Transactions on Signal Processing. 2004; 52(10):2955-64.
[Crossref] [Google Scholar]
[71]Lei B, Song I, Rahman SA. Robust and secure watermarking scheme for breath sound. Journal of Systems and Software. 2013; 86(6):1638-49.
[Crossref] [Google Scholar]
[72]Agrawal P, Khurshid A. DWT and GA-PSO based novel watermarking for videos using audio watermark. In advances in swarm intelligence: 5th international conference, ICSI 2014, Hefei, China, proceedings, Part II 5 2014 (pp. 212-20). Springer International Publishing.
[Crossref] [Google Scholar]
[73]Guo J, Zheng P, Huang J. Secure watermarking scheme against watermark attacks in the encrypted domain. Journal of Visual Communication and Image Representation. 2015; 30:125-35.
[Crossref] [Google Scholar]
[74]Arab F, Abdullah SM, Hashim SZ, Manaf AA, Zamani M. A robust video watermarking technique for the tamper detection of surveillance systems. Multimedia Tools and Applications. 2016; 75:10855-85.
[Crossref] [Google Scholar]
[75]Han J, Zhao X, Qiu C. A digital image watermarking method based on host image analysis and genetic algorithm. Journal of Ambient Intelligence and Humanized Computing. 2016; 7:37-45.
[Crossref] [Google Scholar]
[76]Sridhar B, Arun C. An enhanced approach in video watermarking with multiple watermarks using wavelet. Journal of Communications Technology and Electronics. 2016; 61:165-75.
[Crossref] [Google Scholar]
[77]Kumar GD, Teja DP, Reddy SS, Sasikaladevi N. An efficient watermarking technique for biometric images. Procedia Computer Science. 2017; 115:423-30.
[Crossref] [Google Scholar]
[78]Shukla D, Sharma M. A novel scene-based video watermarking scheme for copyright protection. Journal of Intelligent Systems. 2018; 27(1):47-66.
[Crossref] [Google Scholar]
[79]Yoo G, Kim H. Real-time video watermarking techniques robust against re-encoding. Journal of Real-Time Image Processing. 2017; 13:467-77.
[Crossref] [Google Scholar]
[80]Himeur Y, Boukabou A. A robust and secure key-frames based video watermarking system using chaotic encryption. Multimedia Tools and Applications. 2018; 77:8603-27.
[Crossref] [Google Scholar]
[81]Zear A, Singh AK, Kumar P. A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools and Applications. 2018; 77:4863-82.
[Crossref] [Google Scholar]
[82]Shukla D, Sharma M. Robust scene-based digital video watermarking scheme using level-3 DWT: approach, evaluation, and experimentation. Radioelectronics and Communications Systems. 2018; 61:1-12.
[Crossref] [Google Scholar]
[83]Nouioua I, Amardjia N, Belilita S. A novel blind and robust video watermarking technique in fast motion frames based on SVD and MR-SVD. Security and Communication Networks. 2018; 2018:1-7.
[Crossref] [Google Scholar]
[84]Arab F, Zamani M, Poger S, Manigault C, Yu S. A framework to evaluate the performance of video watermarking techniques. In 2nd international conference on information and computer technologies 2019 (pp. 114-7). IEEE.
[Crossref] [Google Scholar]
[85]Singh R, Singh S, Sharma N. A review of digital watermarking technique. International Journal of Computer Applications. 2015:1-6.
[Google Scholar]
[86]Mohanarathinam A, Kamalraj S, Prasanna VGK, Ravi RV, Manikandababu CS. Digital watermarking techniques for image security: a review. Journal of Ambient Intelligence and Humanized Computing. 2020; 11:3221-9.
[Crossref] [Google Scholar]
[87]Nadesh RK, Arivuselvan K, Aishwarya K. A hybrid Approach for video watermarking using DWT and SVD. In innovations in power and advanced computing technologies 2019 (pp. 1-6). IEEE.
[Crossref] [Google Scholar]
[88]Alotaibi SS. Optimization insisted watermarking model: hybrid firefly and Jaya algorithm for video copyright protection. Soft Computing. 2020; 24(19):14809-23.
[Crossref] [Google Scholar]
[89]Sharma C, Amandeep B, Sobti R, Lohani TK, Shabaz M. A secured frame selection based video watermarking technique to address quality loss of data: combining graph based transform, singular valued decomposition, and hyperchaotic encryption. Application-Aware Multimedia Security Techniques. 2021; 2021:1-19.
[Google Scholar]
[90]Agarwal H, Husain F. Development of payload capacity enhanced robust video watermarking scheme based on symmetry of circle using lifting wavelet transform and SURF. Journal of Information Security and Applications. 2021; 59:102846.
[Crossref] [Google Scholar]
[91]Neena PM, Narayanan SA, Bijlani K. Copyright protection for E-learning videos using digital watermarking. In fifth international conference on advances in computing and communications 2015 (pp. 447-50). IEEE.
[Crossref] [Google Scholar]
[92]Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A. Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Generation Computer Systems. 2018; 86:926-39.
[Crossref] [Google Scholar]
[93]Panyavaraporn J, Horkaew P. DWT/DCT-based invisible digital watermarking scheme for video stream. In 10th international conference on knowledge and smart technology 2018 (pp. 154-7). IEEE.
[Crossref] [Google Scholar]
[94]Kumar NU, Sandhya G, Bachu S. Security of finger prints with video watermarking techniques based on DWT and SVD. In IOP conference series: materials science and engineering 2021 (pp. 1-8). IOP Publishing.
[Crossref] [Google Scholar]
[95]Li J, Liu H, Huang J, Shi YQ. Reference index-based H. 264 video watermarking scheme. ACM Transactions on Multimedia Computing, Communications, and Applications. 2012; 8(2S):1-22.
[Crossref] [Google Scholar]
[96]Keerthana P, Nikita E, Lakkshmi R, Devi RS. Tampering detection in video inter-frame using watermarking. International Journal of Research in Engineering, Science and Management. 2019; 2(3):251-4.
[Google Scholar]
[97]Rao R. Video watermarking algorithm using the SVD transform. International Journal of Engineering Research and Development. 2013; 8(11):1-8.
[Google Scholar]
[98]Isac B, Santhi V. A study on digital image and video watermarking schemes using neural networks. International Journal of Computer Applications. 2011; 12(9):1-6.
[Google Scholar]
[99]Bahrami Z, Akhlaghian TF. A new robust video watermarking algorithm based on SURF features and block classification. Multimedia Tools and Applications. 2018; 77:327-45.
[Crossref] [Google Scholar]
[100]Al-athamneh M, Kurugollu F, Crookes D, Farid M. Video authentication based on statistical local information. In proceedings of the 9th international conference on utility and cloud computing 2016 (pp. 388-91). ACM.
[Crossref] [Google Scholar]
[101]Velickovic ZS, Milivojevic ZN, Velickovic MZ. A secured digital video watermarking in chrominance model. In international scientific-professional conference on information technology 2018 (pp. 1-4). IEEE
[Google Scholar]
[102]Lafkih S, Zaz Y. Digital video watermarking for solar panel indexation and monitoring. In 3rd international renewable and sustainable energy conference 2015 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[103]Kulkarni TS, Dewan JH. Digital video watermarking using hybrid wavelet transform with Cosine, Haar, Kekre, Walsh, Slant and Sine transforms. In international conference on computing communication control and automation 2016 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[104]Dhevanandhini G, Yamuna G. An efficient lossless video watermarking extraction process with multiple watermarks using artificial jellyfish algorithm. Turkish Journal of Computer and Mathematics Education. 2021; 12(6):3048-55.
[Google Scholar]
[105]Patel SV, Yadav AR. Invisible digital video watermarking using 4 level DWT. In national conference on recent trends in engineering & technology 2011 (pp. 1-6).
[Google Scholar]
[106]Verma Y, Singh M. Implementation the effects of barrel distortion in field of digital video watermarking. International Journal of Science, Engineering and Technology Research. 2017; 6(6):2278-7798.
[Google Scholar]
[107]Shanmugam M, Chokkalingam A. Performance analysis of 2 level DWT-SVD based non blind and blind video watermarking using range conversion method. Microsystem Technologies. 2018; 24:4757-65.
[Crossref] [Google Scholar]
[108]Al-gindy A, Omar AA, Mashal O, Shaker Y, Alhogaraty E, Moussa S. A new watermarking scheme for digital videos using DCT. Open Computer Science. 2022; 12(1):248-59.
[Google Scholar]
[109]Ke Z, Huang H, Liang Y, Ding Y, Cheng X, Wu Q. Robust video watermarking based on deep neural network and curriculum learning. In international conference on e-business engineering 2022 (pp. 80-5). IEEE.
[Crossref] [Google Scholar]
[110]Fan D, Zhang X, Kang W, Zhao H, Lv Y. Video watermarking algorithm based on NSCT, pseudo 3D-DCT and NMF. Sensors. 2022; 22(13):1-18.
[Crossref] [Google Scholar]
[111]Singh R, Mittal H, Pal R. Optimal keyframe selection-based lossless video-watermarking technique using IGSA in LWT domain for copyright protection. Complex & Intelligent Systems. 2022; 8(2):1047-70.
[Crossref] [Google Scholar]
[112]Fan D, Sun W, Zhao H, Kang W, Lv C. Audio and video matching zero-watermarking algorithm based on NSCT. Complexity. 2022; 2022:1-14.
[Crossref] [Google Scholar]
[113]Velazquez-garcia L, Cedillo-hernandez A, Cedillo-hernandez M, Nakano-miyatake M, Perez-meana H. Imperceptible–visible watermarking for copyright protection of digital videos based on temporal codes. Signal Processing: Image Communication. 2022; 102:116593.
[Crossref] [Google Scholar]
[114]Bistroń M, Piotrowski Z. Efficient video watermarking algorithm based on convolutional neural networks with entropy-based information mapper. Entropy. 2023; 25(2):1-26.
[Crossref] [Google Scholar]
[115]Tarhouni N, Masmoudi S, Charfeddine M, Amar CB. Fake COVID-19 videos detector based on frames and audio watermarking. Multimedia Systems. 2023; 29(1):361-75.
[Crossref] [Google Scholar]
[116]Ali J, Ghrera SP. A secure method of copyright protection for digital videos using split watermark embedding algorithm. In fourth international conference on image information processing 2017 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[117]Ram B. Digital image watermarking technique using discrete wavelet transform and discrete cosine transform. SSRN. 2013: 1-7.
[Crossref] [Google Scholar]