An Innovative Technique to Encrypt Videos for Authenticity or Ownership Protection Using PCA Applied in E-Commerce

An Innovative Technique to Encrypt Videos for Authenticity or Ownership Protection Using PCA Applied in E-Commerce

Garv Modwel (Amity University, Noida, India), Anu Mehra (Amity University, Noida, India), Nitin Rakesh (Sharda University, Noida, India) and K K. Mishra (MNNIT, Allahābād, India)
Copyright: © 2019 |Pages: 22
DOI: 10.4018/IJISMD.2019070102
OnDemand PDF Download:
No Current Special Offers


Whenever there is a copywrite protection an article or official material it is usually encrypted with specific information that can only be decrypted by the person who created the document and the owner can claim the ownership of the original document. This type of encryption is called watermarking. This can be used by different e-commerce sites like Netflix, Amazon Prime, who can protect their media through the process of watermarking. As computational power is increasing along with applied mathematics, the application area is now available for multimedia files. This article focuses on encryption of video files so that the owner can claim the ownership of the created video file. The technology also enables the secrecy of the encryption between the sender and the receiver so that receiver can decrypt the file and receive the ownership that is being transferred from the user. In another way, any e-commerce site can claim the ownership of their media if it is pirated.
Article Preview


There are some characteristics based on which watermarking is done in an image or video which are the following:

  • 1.

    Visually imperceptible: Watermark in an image usually should not visible on the image. The more visually imperceptible the image, the more secured the digital data. It is usually recommended to do watermarking which are visually imperceptible so that the owner can only claim the digital data;

  • 2.

    Statically imperceptible: Whatever the watermarking is done it should be statically imperceptible otherwise the hacker can attack the data and de-watermark the digital data resulting in the loss of ownership of the owner. Hence, this is the reason the watermarking should be statically imperceptible;

  • 3.

    Robust to variant: The watermarking should be robust to any type of changes like image compression, noise insertion. It should also be rotationally invariant. These features of the watermarking are more important because the attacker to the image will always try to implement different types of method to get the ownership of the digital data;

  • 4.

    Frazil: The watermark should not break as soon as the digital data is modified. It should be consistent to the modification that is being implemented on it. The most robust method which is being implemented in such cases is the frequency domain modification;

  • 5.

    High capability: Watermarking should be present in high amount in the image so that even an intentional attack on the image or video should not remove the watermark completely from the digital data. There should be enough room to embed the watermark;

  • 6.

    Speed of Embedding: Time taken for the watermarking should not take much time to be implemented. If it takes considerable amount of time and performing good encryption, then the watermarking is robust and will be less effected by the attack form the attacker.

Complete Article List

Search this Journal:
Open Access Articles: Forthcoming
Volume 13: 4 Issues (2022): Forthcoming, Available for Pre-Order
Volume 12: 4 Issues (2021): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing