header
Local cover image
Local cover image
Image from OpenLibrary

Attacking visible watermark in video / Ahmed Alsayed Zaki Embaby ; Supervised Khaled Mostafa Elsayed , Mohamed Ahmed Wahby

By: Contributor(s): Material type: TextTextLanguage: English Publication details: Cairo : Ahmed Alsayed Zaki Embaby , 2020Description: 127 P . : charts , facsmilies ; 30cmOther title:
  • مهاجمة العلامة المائية المرئية فى الفيديو [Added title page title]
Subject(s): Online resources: Available additional physical forms:
  • Issued also as CD
Dissertation note: Thesis (Ph.D.) - Cairo University - Faculty of Computers and Artificial Intelligence - Department of Information Technology Summary: Over the past recent years, digital watermarking technology has seen much use and has been viewed as a potential and effective method of ending illegal access to digital multimedia products. Visual watermarking programs enables the protection of digital videos and images, which are produced based on specific demands, like contents intended for digital library or materials for distant learning websites. These contents prohibit unlawful reproduction or copying of the material. Visible watermark mechanism defends IPR (Intellectual Property Rights) persuasively; openly, watermarked data mainly contains discoverable but un-destroyable copyright keys showing the identity of IPR owners. Many commercial TV stations use video logos, which is a form of visible watermark indicating a disclaimer of content ownership. The video logos also act as a symbol of authentication to re-stream the videos when the primary logos are used together with the new logos .A regretful side effect of these logos is the constant reduction in viewing joy. Until there can be complete removal of the watermark patterns without the destruction of the video quality of the protected content, people cannot directly use visible watermarked information. Meanwhile, abundant studies are discussing the security of invisible watermarks, but there are microscopic researches on the significance of visible watermark technology Our research objective is divided into two sub-problems. The first sub-problem is to locate the visible watermark on video frames with high accuracy in order to be removed. and the second sub-problem is to consider the watermarked area/s as a damaged area/s to be reconstructed exploiting spatial and temporal information
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Call number Copy number Status Barcode
Thesis Thesis قاعة الرسائل الجامعية - الدور الاول المكتبة المركزبة الجديدة - جامعة القاهرة Cai01.20.01.Ph.D.2020.Ah.A (Browse shelf(Opens below)) Not for loan 01010110082349000
CD - Rom CD - Rom مخـــزن الرســائل الجـــامعية - البدروم المكتبة المركزبة الجديدة - جامعة القاهرة Cai01.20.01.Ph.D.2020.Ah.A (Browse shelf(Opens below)) 82349.CD Not for loan 01020110082349000

Thesis (Ph.D.) - Cairo University - Faculty of Computers and Artificial Intelligence - Department of Information Technology

Over the past recent years, digital watermarking technology has seen much use and has been viewed as a potential and effective method of ending illegal access to digital multimedia products. Visual watermarking programs enables the protection of digital videos and images, which are produced based on specific demands, like contents intended for digital library or materials for distant learning websites. These contents prohibit unlawful reproduction or copying of the material. Visible watermark mechanism defends IPR (Intellectual Property Rights) persuasively; openly, watermarked data mainly contains discoverable but un-destroyable copyright keys showing the identity of IPR owners. Many commercial TV stations use video logos, which is a form of visible watermark indicating a disclaimer of content ownership. The video logos also act as a symbol of authentication to re-stream the videos when the primary logos are used together with the new logos .A regretful side effect of these logos is the constant reduction in viewing joy. Until there can be complete removal of the watermark patterns without the destruction of the video quality of the protected content, people cannot directly use visible watermarked information. Meanwhile, abundant studies are discussing the security of invisible watermarks, but there are microscopic researches on the significance of visible watermark technology Our research objective is divided into two sub-problems. The first sub-problem is to locate the visible watermark on video frames with high accuracy in order to be removed. and the second sub-problem is to consider the watermarked area/s as a damaged area/s to be reconstructed exploiting spatial and temporal information

Issued also as CD

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image