You can view the full text of this article for free using the link below.

Title: Authenticate audio video-crypto invisible watermarking approach for enhancing hidden information security and robustness

Authors: Mahesh Gangarde; Shruti Oza; Janardhan Chitode

Addresses: Department of Electronics Engineering, Bharati Vidyapeeth Deemed University College of Engineering, Pune, 411043, India ' Department of Electronics and Telecommunication Engineering, Bharati Vidyapeeth Deemed University College of Engineering, Pune, 411043, India ' Department of Electronics Engineering, Bharati Vidyapeeth Deemed University College of Engineering, Pune-411043, India

Abstract: For any type of watermarking techniques imperceptibility, robustness, embedding capacity, security of hidden watermark data and good visual recovery of both cover, as well as watermark secret data, are the major issues. To solve these issues the selected frames of video and the secret data is divided into the equal number of parts and every part is mapped using adaptive pixel location mapping (APLM) algorithm to get watermarked video, hence the embedding capacity and security of hidden watermark data are increased. Furthermore, the proposed system also calculates the key security parameters like peak signal to noise ratio (PSNR), mean square error (MSE), histogram, structural similarity index module (SSIM) and cross-correlation factor (CCF) before watermarking, after watermarking and after recovering the secret data from watermarked video which are found to be identical, hence the proposed system is more insusceptible to any type of attack as compared to existing watermarking approaches.

Keywords: audio video watermarking; APLM; perceptibility; robustness; watermark information security.

DOI: 10.1504/IJESDF.2020.103871

International Journal of Electronic Security and Digital Forensics, 2020 Vol.12 No.1, pp.16 - 42

Received: 20 Apr 2018
Accepted: 03 Sep 2018

Published online: 15 Nov 2019 *

Full-text access for editors Access for subscribers Free access Comment on this article