DWT-based watermarking technique for video authentication

Farhan Alenizi, Fadi Kurdahi, Ahmed Eltawil, Abdullah Aljumah

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Scopus citations

Abstract

This paper proposes a wavelet watermarking scheme for video authentication. The discrete wavelet transform (DWT) has been used extensively in recent years in watermarking systems. It provides the necessary perceptual invisibility and robustness. In this paper, a DWT process is implemented using orthonormal filters, where the Y-components of the video frames are decomposed using DWT, and a watermark is inserted in one or more of the resulting subbands. Then, the watermarked video is reconstructed. The filters used for the DWT decompositions are randomly generated to increase the security of the algorithm. This scheme is integrated into the high efficiency video coding (HEVC) technique to examine the whole performance. The simulation results show that the proposed algorithm achieves well in terms of visual and metric tests. The average normalized correlation achieved is 85%, while the mean peak signal-to-noise ratio is 45 dB.

Original languageEnglish
Title of host publication2015 IEEE International Conference on Electronics, Circuits, and Systems, ICECS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages41-44
Number of pages4
ISBN (Electronic)9781509002467
DOIs
StatePublished - 23 Mar 2016
EventIEEE International Conference on Electronics, Circuits, and Systems, ICECS 2015 - Cairo, Egypt
Duration: 6 Dec 20159 Dec 2015

Publication series

NameProceedings of the IEEE International Conference on Electronics, Circuits, and Systems
Volume2016-March

Conference

ConferenceIEEE International Conference on Electronics, Circuits, and Systems, ICECS 2015
Country/TerritoryEgypt
CityCairo
Period6/12/159/12/15

Keywords

  • filter banks
  • video coding
  • watermarking

Fingerprint

Dive into the research topics of 'DWT-based watermarking technique for video authentication'. Together they form a unique fingerprint.

Cite this