Research Article
A Novel Video Copyright Protection Scheme Based on Blockchain and Double Watermarking
Table 6
The effect of extracting watermark after the attack.
| Original video frame | Embedded watermark | Embedded watermark video frame | Clipped video frame | Extracted watermark |
| | | | 0 | | | | | | NC: 0.9840 | Original video frame | Embedded watermark | Embedded watermark video frame | Clipped video frame | Extracted watermark | 2 | | | | | | | | | NC: 0.9761 | Original video frame | Embedded watermark | Embedded watermark video frame | Clipped video frame | Extracted watermark | | | | | | | | | | NC: 0.9940 | Original video frame | Embedded watermark | Embedded watermark video frame | Clipped video frame | Extracted watermark | | | | | | | | | | NC: 0.9826 | Original video frame | Embedded watermark | Embedded watermark video frame | Clipped video frame | Extracted watermark | | | | | | | | | | NC: 0.9941 |
|
|