{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T14:53:46Z","timestamp":1770044026624,"version":"3.49.0"},"reference-count":21,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2021,9,15]]},"abstract":"<jats:p>This manuscript proposes a new data hiding approach that is used in watermark applications in video by transforming the RGB model to HSV model. This method initially estimates the number of frames needed to embed the data (watermark). Then two sets of RGB (Red, Green, Blue) coefficients (R1, G1, B1), (R2, G2, B2) are converted to HSV (Hue, saturation, values) Coefficients (H1, S1, V1) and (H2, S2, V2). The \u2018Value\u2019 Coefficients V1 and V2 are used to embed the watermark, since there exists a strong correlation between the adjacent \u2018Value\u2019 Coefficients. The same process is repeated on adjacent HSV coefficients till the watermark is fully embedded. After embedding the data HSV coefficients are again converted back to RGB coefficients. During the extraction phase, the data is extracted by transforming the RGB coefficient to HSV coefficients. One bit of information can be extracted from two adjacent HSV coefficients. Experimental outcomes show that the proposed watermarking approach is efficiently against attacks, viz noise, filtering, etc. Also, the proposed method performs better than traditional watermarking methods with the help of embedding rate (bpp), Structural similarity index measurement (SSIM), Visual quality (PSNR), Normalized cross-correlation (NC).<\/jats:p>","DOI":"10.3233\/jifs-202468","type":"journal-article","created":{"date-parts":[[2021,6,15]],"date-time":"2021-06-15T13:54:14Z","timestamp":1623765254000},"page":"2731-2742","source":"Crossref","is-referenced-by-count":3,"title":["HSV model based data hiding in video for watermark applications"],"prefix":"10.1177","volume":"41","author":[{"given":"J.","family":"Jerisha Liby","sequence":"first","affiliation":[{"name":"Department of ECE, Maria College of Engineering and Technology, Thiruvattaru, Tamil Nadu, India"}]},{"given":"T","family":"Jaya","sequence":"additional","affiliation":[{"name":"Department of ECE, CSI Institute of Technology, Thovalai, Tamil Nadu, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-202468_ref1","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s11760-011-0238-4","article-title":"High performance reversible data hiding for block truncation coding compressed images","volume":"7","author":"Wei","year":"2013","journal-title":"Signal Image Video Process"},{"issue":"5","key":"10.3233\/JIFS-202468_ref2","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.displa.2011.02.004","article-title":"A distortion-free data hiding scheme for high dynamic range images","volume":"32","author":"Yu","year":"2011","journal-title":"Displays"},{"issue":"4","key":"10.3233\/JIFS-202468_ref3","doi-asserted-by":"crossref","first-page":"1656","DOI":"10.1016\/j.patcog.2009.09.016","article-title":"A lossless robust data hiding scheme","volume":"43","author":"Zeng","year":"2010","journal-title":"Pattern Recog"},{"issue":"9","key":"10.3233\/JIFS-202468_ref6","doi-asserted-by":"publisher","first-page":"121","DOI":"10.14257\/ijsip.2015.8.9.12","article-title":"Survey on Digital Watermarking Techniques","volume":"8","author":"Shukla","year":"2015","journal-title":"International Journal of Signal Processing, Image Processing and Pattern Recognition"},{"key":"10.3233\/JIFS-202468_ref7","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/S1665-6423(14)71612-8","article-title":"Robust image watermarking theories and techniques: a review","volume":"12","author":"Tao","year":"2014","journal-title":"J Appl Res Technol"},{"issue":"3","key":"10.3233\/JIFS-202468_ref9","first-page":"140","article-title":"Digital image watermarking techniques: a review","volume":"9","author":"Mala","year":"2015","journal-title":"Int J Comput Sci Secur"},{"key":"10.3233\/JIFS-202468_ref10","first-page":"1618","article-title":"Fuzzy inference system based robust digital image watermarking technique using discrete cosine transform","volume":"45","author":"Jagadeesh","year":"2015","journal-title":"International conference on information and communication technologies"},{"issue":"1","key":"10.3233\/JIFS-202468_ref11","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.sigpro.2011.06.006","article-title":"Adaptive reversible data hiding scheme based on integer transform","volume":"92","author":"Peng","year":"2012","journal-title":"Sig Process"},{"issue":"1","key":"10.3233\/JIFS-202468_ref12","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1080\/09720529.2006.10698068","article-title":"Weighted bipartite graph for locating optimal LSB substitution for secret embedding","volume":"9","author":"Yang","year":"2006","journal-title":"J Discret Math Sci Cryptography"},{"issue":"3","key":"10.3233\/JIFS-202468_ref13","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","article-title":"Hiding data in images by simple LSB substitution","volume":"37","author":"Chan","year":"2004","journal-title":"Pattern Recognit"},{"issue":"4","key":"10.3233\/JIFS-202468_ref14","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1007\/s11042-014-2381-8","article-title":"Steganalysis of LSB matching using differences between nonadjacent pixels","volume":"75","author":"Xia","year":"2016","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"10.3233\/JIFS-202468_ref15","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","article-title":"Detecting LSB steganography in color, and grayscale images","volume":"8","author":"Fridrich","year":"2001","journal-title":"IEEE Multimedia"},{"issue":"2","key":"10.3233\/JIFS-202468_ref16","doi-asserted-by":"publisher","first-page":"3065","DOI":"10.1007\/s11042-015-3170-8","article-title":"Robust video steganography algorithm using adaptive skintone detection","volume":"76","author":"Sadek","year":"2017","journal-title":"Multimedia Tools and Applications"},{"issue":"17","key":"10.3233\/JIFS-202468_ref17","doi-asserted-by":"crossref","first-page":"10311","DOI":"10.1007\/s11042-015-3060-0","article-title":"A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes","volume":"75","author":"Mstafa","year":"2016","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"10.3233\/JIFS-202468_ref18","doi-asserted-by":"publisher","first-page":"2791","DOI":"10.1007\/s11042-017-4427-1","article-title":"Robust video watermarking scheme using high efficiency video coding attack","volume":"77","author":"Mohammed","year":"2018","journal-title":"Multimedia Tools and Applications"},{"key":"10.3233\/JIFS-202468_ref19","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1016\/j.compeleceng.2015.10.005","article-title":"A data-hiding technique using scene-change detection for video steganography","volume":"54","author":"Ramalingam","year":"2016","journal-title":"Computers and Electrical Engineering"},{"issue":"3","key":"10.3233\/JIFS-202468_ref20","doi-asserted-by":"publisher","first-page":"410","DOI":"10.3390\/app8030410","article-title":"Robust Image Watermarking Algorithm Based on ASIFT against Geometric Attacks","volume":"8","author":"Wang","year":"2018","journal-title":"Applied Sciences"},{"key":"10.3233\/JIFS-202468_ref23","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.aeue.2017.05.025","article-title":"A novel blind color image water-marking using upper Hessenberg matrix","volume":"78","author":"Su","year":"2017","journal-title":"AEU - International Journal of Electronics and Communications"},{"key":"10.3233\/JIFS-202468_ref24","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TCSII.2006.886247","article-title":"Robust video watermarking of H. 264\/AVC","volume":"54","author":"Zhang","year":"2007","journal-title":"IEEE transactions on circuits and systems II: express briefs"},{"issue":"2","key":"10.3233\/JIFS-202468_ref25","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1007\/s10462-020-09877-8","article-title":"A new chaotic complex map for robust video watermarking","volume":"54","author":"Ayubi","year":"2021","journal-title":"Artificial Intelligence Review"},{"key":"10.3233\/JIFS-202468_ref27","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.jvcir.2017.02.013","article-title":"SIFT based video watermarking resistant to temporal scaling","volume":"45","author":"Sahu","year":"2017","journal-title":"Journal of Visual Communication and Image Representation"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-202468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T03:23:42Z","timestamp":1770002622000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-202468"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,15]]},"references-count":21,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/jifs-202468","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,15]]}}}