International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 176 - Issue 4 |
Published: Oct 2017 |
Authors: Neha Sharma, Sukhjeet Kaur Ranade |
![]() |
Neha Sharma, Sukhjeet Kaur Ranade . Digital Fingerprinting for Piracy Control. International Journal of Computer Applications. 176, 4 (Oct 2017), 18-23. DOI=10.5120/ijca2017915568
@article{ 10.5120/ijca2017915568, author = { Neha Sharma,Sukhjeet Kaur Ranade }, title = { Digital Fingerprinting for Piracy Control }, journal = { International Journal of Computer Applications }, year = { 2017 }, volume = { 176 }, number = { 4 }, pages = { 18-23 }, doi = { 10.5120/ijca2017915568 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2017 %A Neha Sharma %A Sukhjeet Kaur Ranade %T Digital Fingerprinting for Piracy Control%T %J International Journal of Computer Applications %V 176 %N 4 %P 18-23 %R 10.5120/ijca2017915568 %I Foundation of Computer Science (FCS), NY, USA
Aiming at the secure, robust and perceptually invisible data hiding goal, a Discrete Cosine Transform (DCT) based blind video watermarking algorithm which is robust against collusion attack is proposed in this paper. This research work embeds the binary code acting as a digital fingerprint in the video frame that uniquely recognizes the authenticated user. The fingerprints are designed in the DCT domain that resist collusion and controls piracy. The confidentiality of the original frame is achieved by embedding watermark logo at the random blocks in the successive frames of the video. This is done by using Pseudo Random Number (PRN) generator whose seed value generated by a permutation vector acts as a secret key (K). During the extraction of watermark information, the same permutation vector is used to regenerate the secret key as well as the selection of the embedding blocks. This achieves the piracy control in digital fingerprinting mechanism as none of unauthorized users can tamper the original content. The experimental results show that the proposed scheme is robust against the collusion attack.