Generally, Watermarking is the process of hiding the concealed message into multimedia sources, like image, video and audio. Video watermarking is mostly concentrated in the robustness of the system rather than other steganography. In this paper, the multiobjective cost function is proposed for video watermarking. At first, the cover image (video frame) is subjected into cost function computation. Subsequently, the cost function is recently proposed and modeled by various constraints, like energy, intensity, coverage, edge, as well as brightness. Then, the Haar Wavelet Transform is applied to the original frame, which attains a wavelet coefficient on the basis of the video frame. Concurrently, by exploiting the bit plane technique the concealed message is partitioned into binary images. In the embedding phase, the message bit is embedded into the wavelet coefficients according to the cost value. The concealed message is retrieved in the extraction phase. At last, the simulation results are examined, and performance is evaluated by exploiting metrics like Peak Signal Noise Ratio (PSNR) and correlation coefficients.
H. Mareen, J. De Praeter, G. Van Wallendael and P. Lambert, "A novel video watermarking approach based on implicit distortions," 2018 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, 2018, pp. 1-2.
M. Asikuzzaman and M. R. Pickering, "An Overview of Digital Video Watermarking," IEEE Transactions on Circuits and Systems for Video Technology, vol. 28, no. 9, pp. 2131-2153, Sept. 2018.
K. Pexaras, I. G. Karybali and E. Kalligeros, "Optimization and Hardware Implementation of Image and Video Watermarking for Low-Cost Applications," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 66, no. 6, pp. 2088-2101, June 2019
H. Mareen, J. De Praeter, G. Van Wallendael and P. Lambert, "A Scalable Architecture for UncompressedDomain Watermarked Videos," in IEEE Transactions on Information Forensics and Security, vol. 14, no. 6, pp. 1432-1444, June 2019.
Z. Li, S. Q. Chen and X. Y. Cheng, "Dual Video Watermarking Algorithm Based on SIFT and HVS in the Contourlet Domain," in IEEE Access, vol. 7, pp. 84020-84032, 2019.
Q. Cheng, T. Huang, An additive approach to transform-domain information hiding and optimum detection structure, IEEE Transactions on Multimedia 3 (3) (2001) 273–284.
Q. Cheng, T. Huang, Robust optimum detection of transform domain multiplicative watermarks, IEEE Transactions on Signal Processing 51 (4) (2003) 906–924. doi:10.1109/TSP.2003.809374.
M. Barni, F. Bartolini, Watermarking systems engineering: enabling digital assets security and other applications, CRC Press, 2004.
H. Khalilian, I. Bajic, Multiplicative video watermarking with semi-blind maximum likelihood decoding for copyright protection, in: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim), 2011, pp. 125–130
S. M. E. Sahraeian, M. Akhaee, F. Marvasti, Information hiding with optimal detector for highly correlated signals, in: IEEE International Conference on Communications, ICC ’09, 2009, pp. 1–5..
H. Khalilian, I. Bajic, Video watermarking with empirical PCA-based decoding, IEEE Transactions on Image Processing 22 (12) (2013) 4825–4840.
Priyanka Patiala and Chandrakant Biradar, "Robust Scheme of Digital Video Watermarking", International Journal of Science and Research (IJSR), vol. 4, no. 9, pp. 460-465, 2015.
Youssef Bassil, “Image Steganography based on a Parameterized Canny Edge Detection Algorithm”, International Journal of Computer Applications, vol. 60, no. 4, pp. 0975–8887, 2012.
Ritika and Sandeep Kaur, "Contrast Enhancement Techniques for Images–A Visual Analysis", International Journal of Computer Applications, vol. 64, no. 17, pp. 975-8887, 2013.
Rakesh Kumar and Savita Chaudhary, "Video Watermarking Using Wavelet Transformation", International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 5, pp. 1154-1157, 2013.
A. K. Singh, M. Dave and A. Mohan, Multilevel encrypted text watermarking on medical images using spreadspectrum in DWT domain, Wireless Pers. Commun. 83 (2015), 2133–2150.
Jian-Fei Wang, "Reproducing kernel of image space of Haar wavelet transform," 2008 International Conference on Wavelet Analysis and Pattern Recognition, Hong Kong, 2008, pp. 639-643.
Vinolin V and Vinusha S,"Edge-based Image Steganography using Edge Least Significant Bit (ELSB) Technique",Multimedia Research, Volume 1, Issue 1, October 2018.
Vinusha S,"Secret Image Sharing and Steganography Using Haar Wavelet Transform", Multimedia Research, Volume 2, Issue 2, April 2019.