IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Computational Intelligence Clustering for Dynamic Video Watermarking

Computational Intelligence Clustering for Dynamic Video Watermarking
View Sample PDF
Author(s): Daw-Tung Lin (National Taipei University, Taiwan)and Guan-Jhih Liao (Chun Hua University, Taiwan)
Copyright: 2010
Pages: 21
Source title: Intelligent Soft Computation and Evolving Data Mining: Integrating Advanced Technologies
Source Author(s)/Editor(s): Leon Shyue-Liang Wang (National University of Kaohsiung, Taiwan)and Tzung-Pei Hong (National University of Kaohsiung, Taiwan)
DOI: 10.4018/978-1-61520-757-2.ch014

Purchase

View Computational Intelligence Clustering for Dynamic Video Watermarking on the publisher's website for pricing and purchasing information.

Abstract

Multimedia products today broadcast over networks and are typically compressed and transmitted from host to client. Adding watermarks to the compressed domain ensures content integrity, protects copyright, and can be detected without quality degradation. Hence, watermarking video data in the compressed domain is important. This work develops a novel video watermarking system with the aid of computational intelligence, in which motion vectors define watermark locations. The number of watermark bits varies dynamically among frames. The current study employs several intelligent computing methods including K-means clustering, Fuzzy C-means clustering, Swarm intelligent clustering and Swarm intelligence based Fuzzy C-means (SI-FCM) clustering to determine the motion vectors and watermark positions. This study also discusses and compares the advantages and disadvantages among various approaches. The proposed scheme has three merits. First, the proposed watermarking strategy does not involve manually setting watermark bit locations. Second, the number of embedded motion vector clusters differs according to the motion characteristics of each frame. Third, the proposed special exclusive-OR operation closely relates the watermark bit to the video context, preventing attackers from discovering the real watermark length of each frame. Therefore, the proposed approach is highly secure. The proposed watermark-extracting scheme immediately detects forgery through changes in motion vectors. Experimental results reveal that the watermarked video retains satisfactory quality with very low degradation.

Related Content

. © 2023. 34 pages.
. © 2023. 15 pages.
. © 2023. 15 pages.
. © 2023. 18 pages.
. © 2023. 24 pages.
. © 2023. 32 pages.
. © 2023. 21 pages.
Body Bottom