Loading

A SecureVideo Watermarking using Encryptionwith Lossless Compression
G.Dhevanandhini1, G.Yamuna2

1G.Dhevanandhini, Department of ECE, Alagappa Chettiar Government College Of Engineering And Technology, Karaikudi, Tamilnadu, India.
2G.Yamuna, Department of ECE,Annamalai University, Annamalainagar, Chidambaram, Tamil Nadu, India.

Manuscript received on September 16, 2019. | Revised Manuscript received on 24 September, 2019. | Manuscript published on October 10, 2019. | PP: 1318-1323 | Volume-8 Issue-12, October 2019. | Retrieval Number: L39191081219/2019©BEIESP | DOI: 10.35940/ijitee.L3919.1081219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The fundamental goal of building up a video watermarking system is to fulfill both indistinctness and strength prerequisites. The video watermarking gives the firstdimension of security for the secrete communication. The videos have to be encrypted before compression to give high level security. Video compression is the technique of lessening the record measure of a video without compromising with the video quality at acceptable level. Now–a-days, video compression is one among the demanding and vast researches because high Quality video requires larger bandwidth. Raw videos need larger memory space. The altered SPIHT pressure method goes with the Huffman coding calculation in this proposition the Huffman coding is connected with the adjusted SPIHT calculation to improve the pressure proportion. Video pressure tends to the issue of decreasing the measure of information required to speak to a video. Huffman encoding and translating is lossless pressure method to execute and it lessens the unpredictability of memory.
Keywords: Discrete type Wavelet Transform, SVD, Hierarchical Trees, Secret Sharing Scheme Based Vision
Scope of the Article: Encryption Methods and Tools