Real World Applications

[34] Ma J, Xue J, Yang S, He Z. A study of the construction and application of a daubechies wavelet-based beam element. Finite Elements in Analysis and Design. 2003;39(10):965-975

[43] Chen X, Xiang J. Solving diffusion equation using wavelet method. Applied Mathematics and Computation. 2011;

[44] Xiang J, Wang Y, Jiang Z, Long J, Ma G. Numerical simulation of plane crack using hermite cubic spline wavelet. CMES: Computer Modeling in Engineering and Sciences. 2012;88:1-16

[45] He Y, Chen X, Xiang J, He Z. Adaptive multiresolution finite element method based on second generation wavelets. Finite Elements in Analysis and Design. 2007;43(6):566-579

[46] He Y, Chen X, Xiang J, He Z. Multiresolution analysis for finite element method using interpolating

Communications in Numerical Methods in Engineering;24(11):1045-1066

Amaratunga K. A multiresolution finite

generation hermite multiwavelets. In: Bathe K, editor. Computational Fluid and Solid Mechanics 2003. Oxford:

[48] Liu Y, Liu Y, Cen Z. Daubechies wavelet meshless method for 2-d elastic

[49] Yousefi MR, Jafari R, Moghaddam HA. A combined wavelet based mesh free method for solving the forward problem in electrical impedance

tomography. In: 2012 IEEE International Symposium on Medical Measurements and Applications Proceedings; 2012.

problems. Tsinghua Science and Technology. 2008;13:605-608

wavelet and lifting scheme.

[47] Sudarshan R, D'Heedene S,

element method using second

Elsevier Science Ltd; 2003.

pp. 2135-2140

pp. 1-4

217(13):6426-6432

[36] He W-Y, Wang Y, Zhu S. Adaptive reconstruction of a dynamic force using multiscale wavelet shape functions. Shock and Vibration. 2018;2018:8213105

[37] Mitra M, Gopalakrishnan S. Wave propagation analysis in anisotropic plate

approach. Journal of Applied Mechanics.

[38] Han J-G, Ren W-X, Huang Y. A spline wavelet finite-element method in structural mechanics. International Journal for Numerical Methods in Engineering. 66(1):166-190

[39] Chen WH, Wu CW. A spline wavelets element method for frame structures vibration. Computational

[40] Pian THH, Chen D-P. Alternative ways for formulation of hybrid stress elements. International Journal for Numerical Methods in Engineering.

[41] Jia R-Q, Liu S-T. Wavelet bases of hermite cubic splines on the interval.

[42] Xiang J-w, Chen X-f, Li X-k. Numerical solution of poisson equation with wavelet bases of hermite cubic splines on the interval. Applied Mathematics and Mechanics.

Mechanics. 1995;16:11-21

1982;18(11):1679-1684

2009;30:1325

54

Advances in Computational Mathematics. 2006;25:23-39

using wavelet spectral element

2008;75(1):014504

[35] Li B, Hongrui C, He Z. The construction of one-dimensional Daubechies wavelet-based finite elements for structural response analysis. Journal of Vibroengineering.

Wavelet Transform and Complexity

2011;13:729-738

Chapter 4

Abstract

Protection

DWT-Based Data Hiding

Farhan Al-Enizi and Awad Al-Asmari

signal-to-noise ratio (PSNR) is 45 dB.

video coding, video attacks

1. Introduction

57

Technique for Videos Ownership

This chapter proposes a wavelet data hiding scheme for video authentication and ownership protection. A watermark in the shape of a logo image will be hidden. In this research, a discrete wavelet transform (DWT) process is implemented using orthonormal filter banks, where the Y components of the YUV color space of the video frames are decomposed using DWT, and a watermark is inserted in one or more of the resulting sub-bands in a way that is fully controlled by the owner. Then, the watermarked video is reconstructed. The filters used for the DWT decompositions are randomly generated to increase the security of the algorithm. An enhanced detection technique is developed to increase the reliability of the system. The overall robustness of this scheme is measured when common attacks are applied to the test videos. Moreover, the proposed algorithm is used with the high-efficiency video coding (HEVC) technique to examine the whole performance. Furthermore, a selective denoising filter is built to eliminate the effect of the noise. The simulation results show that the proposed algorithm achieves well under both the visual and the metric tests. Moreover, it performed well against intentional and unintentional attacks. The average normalized correlation achieved is 97%, while the mean peak

Keywords: watermarking, filter banks, data hiding, pyramid transform,

The digital age brought new technologies and services to people, industry, and

methods. Moreover, the new compression techniques especially the high-efficiency video coding (HEVC) or H.265 are added to these challenges and difficulties to have

governments. The digitization process covered all types of information being exchanged especially images and videos. The exchange of these forms of multimedia became faster and easier with the new communication network capabilities. On the other hand, that made it easier to steal or use these forms of multimedia illegally. Those concerns opened new horizons in the field of multimedia security especially data hiding [1]. Data hiding has many types; a useful classification is to divide data hiding into watermarking and steganography. New techniques used in video processing brought new challenges and difficulties to the data hiding
