Implementation of Watermarking System to Embed the Information within Video Streams for Security Purpose
S. G. Galande1, G. H. Agrawal2, Surdikar Pradnya3

1Prof. S .G. Galande, Department of Electronics & Telecommunication, P.R.E.C., Loni, Pune University, Pune (Maharashtra), India.
2Dr. G. H. Agrawal, Department of Electronics & Telecommunication, KDK College of Engineering, Nagpur (Maharashtra), India.
3Surdikar Pradnya, Department of Electronics & Telecommunication, P.R.E.C., Loni, Pune University, Pune (Maharashtra), India.

Manuscript received on 15 June 2015 | Revised Manuscript received on 25 June 2015 | Manuscript Published on 30 June 2015 | PP: 119-122 | Volume-4 Issue-5, June 2015 | Retrieval Number: E4101064515/15©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Now a day’s security is main concern when we entered into digital world but the steps to develop such security system and how we take optimum use of available or rather advanced techniques for developing such systems that can also fulfils our requirement are much important. As we are discussing about digital world we must take into account about the multimedia object such as text, image, audio and video. In above all form of data, video data security is challenging issue so dealing with digital watermarking in video for security is focus of paper. Technology can be carried out by various algorithms like DWT, DCT in frequency domain. In this paper, combined DWT and DCT transforms are used to watermark data in video with minimum quality loss. Combined approach makes system robust as making use of multi-resolution DWT with energy compaction DCT. Results are evaluated for every frame in video by three parameters PSNR, MSE and NC. Design of proposed scheme is using MATLAB R 2013a.
Keywords: DWT and DCT Transform MSE, NC, PSNR, Watermark.

Scope of the Article: Security, Privacy and Trust in IoT & IoE