Video Watermarking in Transform Domain

  • Ashish M. Kothari
  • Vedvyas Dwivedi
  • Rohit M. Thanki
Part of the Signals and Communication Technology book series (SCT)


This chapter presents video watermarking in the transform domain. The various watermarking approaches using discrete cosine transform (DCT) and discrete wavelet transform (DWT) are described in the chapter. The experimental results of these approaches are also demonstrated in this chapter.


Discrete cosine transform (DCT) Discrete wavelet transform (DWT) Transform domain 


  1. 1.
    D. He, Q. Sun and T. Qi, A semi-fragile object based video authentication system. Proc. Int. Symp. Circuits Syst. 814–817 (2003)Google Scholar
  2. 2.
    S. Arena, M. Caramma, R. Lancini, Digital watermarking applied to MPEG-2 coded video sequences exploiting space and frequency masking. Proc. Int. Conf. Image Proces. 2, 796–799 (2000)Google Scholar
  3. 3.
    J.R. Hernandez, M. Amado, F. Perez-Gonzalez, DCT-domain watermarking techniques for still image: Detector performance analysis and a new structure. IEEE Trans. Image Proces. 9, 55–68 (2000)CrossRefGoogle Scholar
  4. 4.
    L. Chun-Shien, H.-Y.M. Liao, Video object-based watermarking: A rotation and flipping resilient scheme. Proc. Int. Conf. Image Proces. (2001)Google Scholar
  5. 5.
    R.O. Preda, D.N. Vizireanu, Blind watermarking capacity analysis of MPEG2 coded video. Proc. Conf. Telecommun. Modern Satell. Cable Broadcast. Services, Serbia. 465–468 (2007)Google Scholar
  6. 6.
    A. Alper Koz, A. Alatan, Oblivious spatio-temporal watermarking of digital video by exploiting the human visual system. IEEE Trans. Circuits Syst. Video Technol. 18(3), 326–337 (2008)CrossRefGoogle Scholar
  7. 7.
    T. Sridevi, B. Krishnaveni, V. Vijaya Kumar, Y. Rama Devi, A video watermarking algorithm for MPEG videos. A2CWiC 2010 - Amrita ACM-W Celebration Women Comput. 16–17 Sept 2010Google Scholar
  8. 8.
    Y. Ding, X. Zheng, Y. Zhao, G. Liu, A video watermarking algorithm resistant to copy attack. Proc. Third Int. Symp. Electron. Commerce Secur. 29 July 2010Google Scholar
  9. 9.
    F. Huang, Z.-H. Guan, A hybrid SVD-DCT watermarking method based on LPSNR. Pattern Recogn. Lett. 25, 1769–1775 (2004)CrossRefGoogle Scholar
  10. 10.
    M. ejima, A. Miyazaki, A wavelet-based watermarking for digital images and video. IEEE Int Conf Image Proces. 678–681 (2000)Google Scholar
  11. 11.
    C.V. Serdean, M.A. Ambroze, M. Tomlinson and G. Wade, Combating geometrical attacks in a dwt based blind video watermarking system. IEEE Region 8 Int. Symp. Video/Image Proces. Multimed Commun. Zadar, Croatia. 263–266, 16–19 June 2002Google Scholar
  12. 12.
    F. Liang, F. Yanmei, A DWT-Based Video Watermarking Algorithm Applying DS-CDMA. IEEE Region 10 Conf. TENCON 2006. 14–17 Nov 2006Google Scholar
  13. 13.
    E. Ersin, Robust mpeg video watermarking in wavelet domain. Trakya Univ. J. Sci. 8(2), 87–93 (2007)Google Scholar
  14. 14.
    A. Essaouabi, E. Ibnelhaj, A 3D Wavelet -Based Method for Digital Video Watermarking. Proc. 4th IEEE Int. Inf. Hiding Multimed. Signal Proces., 29–31 July 2009Google Scholar
  15. 15.
    K. Raghavendra, K.R. Chetan, A blind and robust watermarking scheme with scrambled watermark for video authentication. Proc IEEE Int. Conf. Int. Multimed. Services Archit. Appl. 9–11 Dec 2009Google Scholar
  16. 16.
    J. Hussein, A. Mohammed, Robust Video Watermarking using Multi-Band Wavelet Transform. IJCSI Int. J. Comput. Sci. Issues. 6(1), 44–49 (2009)Google Scholar
  17. 17.
    S.A.K. Mostafa, A.S. Tolba, F.M. Abdelkader, H.M. Elhindy, Video watermarking scheme based on principal component analysis and wavelet transform. IJCSNS Int. J. Comput. Sci. Netw. Secur. 9(8), 45–52 (2009)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  • Ashish M. Kothari
    • 1
  • Vedvyas Dwivedi
    • 2
  • Rohit M. Thanki
    • 2
  1. 1.Atmiya Institute of Technology and ScienceRajkotIndia
  2. 2.C. U. Shah UniversityWadhwan CityIndia

Personalised recommendations