Loading…
Propose a new watermarking technique in digital video using facial landmarks
The advancement of multimedia made Technology for digital Video Watermarking is becoming widely recognized as a crucial tool for copyright enforcement, thus it identifies the video content and discourages unauthorized users from accessing or using it. New watermarking algorithm is presented in this...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The advancement of multimedia made Technology for digital Video Watermarking is becoming widely recognized as a crucial tool for copyright enforcement, thus it identifies the video content and discourages unauthorized users from accessing or using it. New watermarking algorithm is presented in this paper the digital video based on landmarks of faces, landmark of a face is localized of certain characteristic points on the face, which made these marks an optimal host. Embedding the secret message in video frames will be used the Least Significant Bit (LSB) technique which slightly changes in the video. confidentiality is improved by encrypting the watermark before embedding it in the video frames with the SALSA20 Stream, which increases the watermark’s security and power, The results of the experiments show that the suggested algorithm achieves significant imperceptibility and excellent resistance to different attacks. Peak to Signal Noise Ratio (PSNR) is higher and of higher quality in the attached video. According to experimental findings, the suggested algorithm achieves great resilience to several forms of attacks. Four statistical measures are used to evaluate the proposed algorithm, they are: Uses Peak Signal Noise Ratio (PSNR), Signal-to-noise ratio (SNR),Mean Squared Error (MSE), and Normalized Cross-Correlation (NCC), and the results are satisfied. The suggested algorithm achieves great resilience to several forms of attacks, also an acceptable level of transparency is obtained present in the embedded version. |
---|---|
ISSN: | 0094-243X 1551-7616 |
DOI: | 10.1063/5.0190671 |