Open Access Open Access  Restricted Access Subscription or Fee Access

A Digital Watermarking Algorithm for Video Authentication in H.264

A. Anitha Rani, A. Vasantharaj, T. Reubon Felix, Anu S. Thampi


A visible watermark is a secondary translucent image overlaid into the primary image and appears visible to a viewer on a careful inspection. The invisible watermark is embedded in such a way that the modification made to the pixel value is perceptually not noticed, and it can be recovered only with an appropriate decoding mechanism. In this brief, we present a new VLSI architecture that can insert invisible or visible watermarks in images in the discrete cosine transform domain. The proposed watermarking system features low power consumption, low cost implementation, high processing speed and reliability


Watermarking, H.264.Low Power Consumption

Full Text:



‘Intelligent Transport Systems by Assisting Driver’ Vasantharaj, A, Anitharani, A, Sathiyapriya, M & Jashwan Kumar, P 2017, , International Journal of Advanced Research Methodology in Engineering & Technology, , vol.1 issue.3, May 2017, pp.233 -238 ISSN : 2456 – 6446.

Multi-purpose video watermarking algorithm based wavelet transform: and image partition (zhang yong-mei, 2012)

A Biorthogonal Wavelet Transform Based Robust Watermarking Scheme (Rajendra S. Shekhawat, 2012)

Real-Time Compressed- Domain Video Watermarking Resistance to Geometric Distortions (Rajendra S. Shekhawat, 2012)

A Secure Skin Tone based Steganography Using Wavelet Transform (Anjali A. Shejul, Umesh L. Kulkarni, 2011)

Robust Video Watermarking using Multi-Band Wavelet transforms (Jamal HUSSEIN1 and Aree MOHAMMED, 2009)

Oblivious Spatio-Temporal Watermarking of Digital Video by Exploiting the Human Visual System (Alper Koz, 2008)

Chaotic Watermarking for Video Authentication in Surveillance Applications.( Siyue Chen and Henry Leung,2008)

A Dual Voltage-Frequency VLSI Chip for Image Watermarking in DCT Domain (Nagarajan Ranganathan,2006)

A VLSI Architecture for Visible Watermarking in a Secure Still Digital Camera (S2DC) Design (Corrected)( Saraju P. Mohanty,2005)

Hardware Implementation Perspectives of Digital Video Watermarking Algorithms.( Nebu John Mathai,2003)

R. L. Pickholtza, D. L. Schilling, and L. B. Mllstein, “Theory of spread spectrum communications-a tutorial,” IEEE Trans. Commun., vol. COM-30, no. 5, pp. 855–884, May 1982.

A.B. Watson, “DCT quantization matrices visually optimized for individual images,” in Proc. SPIE Human Vision, Visual Processing, and Digital Display IV, Sep. 1993, vol. 1913, pp. 202–216.

A.Zhu, A. H. Tewfik, and Ö. N. Gerek, “Low bit rate near-transparent image coding,” in Proc. SPIE Int. Conf. on Wavelet Apps. for Dual Use, 1995, vol. 2491, pp. 173–184.

G. E. Legge and J. M. Foley, “Contrast masking in human vision,” J. Opt. Soc. Amer., vol. 70, no. 12, pp. 1458–1471, 1980.

A.B. Watson, M. Taylor, and R. Borthwick, “Image quality and entropy masking,” in Proc. SPIE, Human Vision, Visual Processing, and Digital Display VIII, 1997, vol. 3016, pp. 2–12.

S. Suthaharana, S. W. Kim, S. Sathananthan, H. K. Lee, and K. R. Rao, “Perceptually tuned robust watermarking scheme digital video using motion entropy masking,” in Proc. IEEE ICCE, Los Angeles, CA, Jun. 1999, pp. 104–105

Z. Wang and A. C. Bovik, “Embedded foveation image coding,” IEEE Trans. Image Process., vol. 10, no. 10, pp. 1397–1410, Oct. 2001.

C. S. Lu, J. R. Chen, and K. C. Fan, “Real-time frame-dependent video watermarking in VLC domain,” Signal Process.: Image Commun., vol.20, no. 7, pp. 624–642, 2005.

. Biswas, S. R. Das, and E. M. Petriu, “An adaptive compressed MPEG-2 video watermarking scheme,” IEEE Trans. Instrum. Meas., vol. 54, no. 5, pp. 1853–1861, Oct. 2005.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.