Digital Watermarking for Robustness of Low Bit Rate Video Contents on the Mobile


KIPS Transactions on Computer and Communication Systems, Vol. 1, No. 1, pp. 47-54, Oct. 2012
10.3745/KTCCS.2012.1.1.47,   PDF Download:

Abstract

Video contents in the mobile environment are processed with the low bit-rate relative to normal video contents due to the consideration of network traffic; hence, it is necessary to protect the copyright of the low bit-rate video contents. The algorithm for watermarking appropriate for the mobile environment should be developed because the performance of the mobile devices is much lower than that of personal computers. This paper suggested the invisible spread spectrum watermarking method to the low bit-rate video contents, considering the low performance of the mobile device in the M-Commerce environment; it also enables to track down illegal users of the video contents to protect the copyright. The robustness of the contents with watermark is expressed with the correlation of extraction algorithm from watermark removed or distorted contents. The results of our experiment showed that we could extract the innate frequencies of M-Sequence when we extracted M-Sequence after compressing the contents with watermark easily. Therefore, illegal users of the contents can be tracked down because watermark can be extracted from the low bit-rate video contents.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. H. Seo and H. B. Park, "Digital Watermarking for Robustness of Low Bit Rate Video Contents on the Mobile," KIPS Transactions on Computer and Communication Systems, vol. 1, no. 1, pp. 47-54, 2012. DOI: 10.3745/KTCCS.2012.1.1.47.

[ACM Style]
Jung Hee Seo and Hung Bog Park. 2012. Digital Watermarking for Robustness of Low Bit Rate Video Contents on the Mobile. KIPS Transactions on Computer and Communication Systems, 1, 1, (2012), 47-54. DOI: 10.3745/KTCCS.2012.1.1.47.