Loading

Video watermarking with Curvelet Transform
K. Meenakshi1, Padmavathi Kora2, D. Kishore3

1K. Meenakshi, Electronics and Communications Engineering, Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad, India.

2Padmavathi Kora, Electronics and Communications Engineering, Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad, India.

3D. Kishore, Electronics and Communications Engineering,  Actuarial Common Entrance Test, Kakinada, India.

Manuscript received on 17 May 2019 | Revised Manuscript received on 24 May 2019 | Manuscript Published on 02 June 2019 | PP: 602-607 | Volume-8 Issue-7S2 May 2019 | Retrieval Number: G11030587S219/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In wireless communications, secured transmission of video has gained considerable research interest. The traditional wavelets are poor in handling curve singularities. Therefore, to handle them curvelet transforms are used. This transform exhibits minimum mean square error between the original and reconstructed image. Therefore, in this work, a watermarking is proposed with this transform using quantization index modulation. The watermark is embedded in the low resolution part of curvelet coefficients using dither quantization. To provide security, the mark is enciphered with Toral Amorphism. The algorithm is blind and the experimental results confirms that the proposed watermarking scheme offers high imperceptibility at the same time robust to attacks such as rotation, blurring due to camera motion and H.264 compression. To evaluate the performance of the watermarking scheme performance metrics Peak Signal to Noise ratio (PSNR) and Normalized Cross Correlation (NCC) are used in the work. The proposed algorithm is compared with recent works and the proposed algorithm offers high invisibility and resistance to attacks.

Keywords: Curvelet Transform, H.264 Compression, Dither Quantization, PSNR, NCC.
Scope of the Article: Communications