1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: ijeee@ejournal.net.
2. Can I submit an abstract?
The journal publishes full research papers. So only full paper submission should be considered for possible publication...[Read More]

Blind Video Watermarking Using Multilevel Hybrid Regression Technique under Compression Based Attacks

Sakshi Batra 1 and Rajneesh Talwar 2
1. Chandigarh Group of Colleges, Mohali, India
2. Chandigarh Group of Colleges, Jhanjeri, India
Abstract—Whirlwind neoplasm of networks such as Internet, wireless communication and Intranet has facilitated the wide use of multimedia techniques and digital data. Transmission of information has become rather swift and sheer due to the same but as all good things come at a price, this in turn has multiplied the casualties of bushwhack and assail on the data that is being transmitted. To fence this, many techniques have come into foray in the recent past. These techniques are broadly categorized under Copyright Protection Solutions. The main features of information hiding are capacity, security and robustness. Video watermarking usually prefers robustness. In a robust algorithm to eliminate, the watermark without rigorous degradation of cover content is not possible. This paper introduce frequently used key techniques and Video Watermarking with features required to robustly watermark a video for a valuable application, algorithm is based on Singular Value Decomposition (SVD) and redundant wavelet transform. The algorithm showed high level of imperceptibility, when compared with base approach; performance varied with respect to robustness and payload.
 
Index Terms—digital video watermarking, Singular Value Decomposition (SVD), robustness, imperceptibility, DWT, DCT

Cite: Sakshi Batra and Rajneesh Talwar, "Blind Video Watermarking Using Multilevel Hybrid Regression Technique under Compression Based Attacks," International Journal of Electronics and Electrical Engineering, Vol. 4, No. 6, pp. 569-574, December 2016. doi: 10.18178/ijeee.4.6.569-574
Copyright © 2012-2015 International Journal of Electronics and Electrical Engineering, All Rights Reserved