Hamid Shojanazeri

  • Citations Per Year
Learn More
The advancement of Internet services and various storage technologies made video piracy as an increasing problem particularly with the proliferation of media sharing through the internet . Thus, research in copyright protection mechanisms and content authentication, where one of which includes digital watermarking has been receiving an increasing interest(More)
Video piracy has become an increasing problem particularly with the proliferation of media sharing through the advancement of internet services and various storage technologies. Thus, research in copyright protection mechanisms, where one of which includes digital watermarking has been receiving an increasing interest from scientists especially in designing(More)
The rapid development of the Internet and digital image modification software has invited the illegal access to and use of digital images. In response, digital watermarking has emerged as a unique tool for protecting the authenticity of digital images. This technique involves the insertion of an imperceptible message within the media. This paper proposes a(More)
Video Watermarking is a major technique of data hiding and maintain the originality of the images and videos. The major issues regarding information are raised about fake, frauds and pirated videos etc. these issues are overcome with the help of video watermarking concept. It also provides copyright protection and authenticity to the owner of the digital(More)
This paper represents digital watermarking is a technique which allows an individual to add hidden copyright notices or other verification messages to digital audio, video, or image signals and documents. Two types of digital watermarks may be distinguished, depending upon if the watermark seems to be visible or even cannot be seen to the rare viewer. The(More)
A method to protect video contents from unauthorized access is known as a video encryption scheme. This paper first surveys the literature to identify most desired features of an encryption algorithm. Then a classification has been drawn according to their characteristics. After that, some of the algorithms are discussed and their working has been explained(More)
  • 1