Research Article
A Novel Video Copyright Protection Scheme Based on Blockchain and Double Watermarking
Table 6
The effect of extracting watermark after the attack.
| | Original video frame | Embedded watermark | Embedded watermark video frame | Clipped video frame | Extracted watermark |
| | | | 0 | | | | | | | NC: 0.9840 | | Original video frame | Embedded watermark | Embedded watermark video frame | Clipped video frame | Extracted watermark | | 2 | | | | | | | | | | NC: 0.9761 | | Original video frame | Embedded watermark | Embedded watermark video frame | Clipped video frame | Extracted watermark | | | | | | | | | | | NC: 0.9940 | | Original video frame | Embedded watermark | Embedded watermark video frame | Clipped video frame | Extracted watermark | | | | | | | | | | | NC: 0.9826 | | Original video frame | Embedded watermark | Embedded watermark video frame | Clipped video frame | Extracted watermark | | | | | | | | | | | NC: 0.9941 |
|
|