A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application

2021 
The multimedia technologies are gaining a lot of popularity these days Many unauthorized persons are gaining the access of multimedia such as videos, audios, and images The transmission of multimedia across the Internet by unauthorized person has led to the problem of illegal distribution The problem arises when copyrighted data is getting accessed without the knowledge of copyright owner The videos are the most attacked data during COVID-19 pandemic In this paper, the frame selection video watermarking technique is proposed to tackle the issue The proposed work enlightens frame selection followed by watermarking embedding and testing of the technique against various attacks The embedding of the watermark is done on selected frames of the video The additional security feature Hyperchaotic Encryption is applied on watermark before embedding Watermark embedding is done using graph-based transform and singular-valued decomposition and the performance of the technique is further optimized using hybrid combination of grey wolf optimization and genetic algorithm Many researchers face the challenge of quality loss after embedding of watermark Proposed technique will aim to overcome those challenges A total of 6 videos (Akiyo, Coastguard, Foreman, News, Bowing, and Pure Storage) are used for carrying out research work The performance evaluation of the proposed technique has been carried out after processing it against practical video processing attacks Gaussian noise, sharpening, rotation, blurring, and JPEG compression [ABSTRACT FROM AUTHOR] Copyright of Mathematical Problems in Engineering is the property of Hindawi Limited and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission However, users may print, download, or email articles for individual use This abstract may be abridged No warranty is given about the accuracy of the copy Users should refer to the original published version of the material for the full abstract (Copyright applies to all Abstracts )
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    29
    References
    16
    Citations
    NaN
    KQI
    []