The paper focuses on the comparison of video steganography methods for the purpose of digital watermarking in the context of copyright protection. Four embedding methods that use Discrete Cosine and Discrete Wavelet Transforms have been researched and compared based on their embedding efficiency and fidelity. A video steganography program has been developed in the Java programming language with all of the researched methods implemented for experiments. The experiments used 3 video containers with different amounts of movement. The impact of the movement has been addressed in the paper as well as the ways of potential improvement of embedding efficiency using adaptive embedding based on the movement amount. Results of the research have been verified using a survey with 17 participants.
Dāvids Grībermans, Andrejs Jeršovs and Pāvels Rusakovs
The paper focuses on development of requirements specification for steganographic systems. The main concepts and fields of use of steganography are briefly explained. Criteria that can be used for various non-functional requirements are grouped and their possible metrics are given with examples and sample requirements. The authors provide an original systematic approach to develop requirements for steganographic systems based on the field of use and the importance of each criterion in the selected field. The approach also allows for automated selection of steganographic algorithms based on the requirements and is related to the concept of the Universal Stegoconstructor, which guarantees that clients receive the required steganographic system from the developers.
1. Giakoumaki, A., S. Pavlopoulo s, D. Koutsouris. Multiple Image Watermarking Applied to Health Information Management. - Information Technology in Biomedicine, IEEE Transactions on, Vol. 10, 2006, No 4, pp. 722-732.
2. Preda, R. O., D. N. Vizireanu. A Robust Digital Watermarking Scheme for Video CopyrightProtection in the Wavelet Domain. - Measurement, Vol. 43, 2010, No 10, pp. 1720-1726.
3. Panduranga, H. T., S. K. Naveen Kumar, Kiran. Image Encryption Based on Permutation-Substitution Using
Turker Tuncer, Sengul Dogan, Ryszard Tadeusiewicz and Paweł Pławiak
. (2017). An algorithm for encryption of secret images into meaningful images, Optics and Lasers in Engineering 90 : 196–208.
Lee, S.-H. (2014). DWT based coding DNA watermarking for DNA copyrightprotection, Information Sciences 273 : 263–286.
Liu, F. and Wu, C. (2011). Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners, IET Information Security 5 (2): 121–128.
Peng, F., Li, X. and Yang, B. (2012). Adaptive reversible data hiding scheme based on integer transform, Signal Processing 92 (1): 54
Kalvet, T.; Tiits, M. & Hinsberg, H. (2013), E-teenuste kasutamise tulemuslikkus ja mõju [Efficiency and effect of e-service usage], Tallinn: Balti Uuringute Instituut ja Poliitikauuringute Keskus Praxis.
Karjala, D. S. (1998), ‘Copyrightprotection of computer program structure,’ Brooklyn Law Review, vol. 64, no. 2, pp. 519-543.
Lakson, P. (2015), ‘Taavi Rõivas Helsingis: Soome on Eesti olulisim partner’ [Taavi Rõivas in Helsinki: Finland is Estonia’s main partner], Postimees, 14 April 2015.
Levine, H. (1986
Australia’s copyright regime-but we have strengthened protection in certain circumstances-providing a platform for Australia to attract and incubate greater creativity and innovation. Hon. Mark Vaile, Minister for Trade, Reading Speech introducing the U.S. Free Trade Agreement Implementation Bill 2004, House of Representatives Hansard (Jun. 23, 2004), 31218.
The principal political opposition party supported the legislation but identified several problems arising from enhanced copyrightprotection. Colette Ormonde, Copyright Overboard? The Debate After the Australia
24, art. 18.83. Such periods are commonly included in intellectual property agreements for the benefit of developing nations, but the TPP also provides grace periods for some of its developed country parties. For instance, New Zealand has eight years to increase its term of copyrightprotection. Id . art. 18.83.4(d).
Access to Medicines and Protection for Biologics
As noted above, the United States’ negotiating objectives for the TPP included ensuring both strong protection for intellectual property (including for new and emerging technologies) Bipartisan