Next Article in Journal
A Constant Current Wireless Power Transfer Scheme with Asymmetric Loosely Coupled Transformer for Electric Forklift
Previous Article in Journal
A Generative Model for Traffic Demand with Heterogeneous and Spatiotemporal Characteristics in Massive Wi-Fi Systems
 
 
Article
Peer-Review Record

Securing Color Video When Transmitting through Communication Channels Using DT-CWT-Based Watermarking

Electronics 2022, 11(12), 1849; https://doi.org/10.3390/electronics11121849
by Reem Alkanhel and Hanaa A. Abdallah *
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Electronics 2022, 11(12), 1849; https://doi.org/10.3390/electronics11121849
Submission received: 1 May 2022 / Revised: 4 June 2022 / Accepted: 7 June 2022 / Published: 10 June 2022
(This article belongs to the Section Computer Science & Engineering)

Round 1

Reviewer 1 Report

In this paper, the authors proposed a color video watermarking system based on SVD in the complex wavelet domain (DT-CWT).   

 Many modifications should be carried out to make it suitable for publication.

The work is acceptable for publication, except for the ambiguity and lack of some experiments as well as English improvement, if the above remarks are considered :


The paper contains several grammatical issues that should be imperatively fixed :

The English language and style of the paper should be improved, so extensive changes are required:


1- We compared our suggested method to a DWT-SVD-based technique and found it to be far more reliable and effective. --> We compared our suggested method to a DWT-SVD-based technique and found it far more reliable and effective

2- The problem of data altering and subsequently republishing it under a different name has arisen as a result of sharing information from others-->  The problem of data altering and subsequently republishing it under a different name has arisen as a result of sharing information with others

3-   The payload is the quantity of information that is embedded in information.-->  The payload is the quantity of information that is embedded

4- Digital video watermarking, in which additional information, known as a watermark, is inserted in the host video, may be one way to limit this type of digital theft--> Digital video watermarking, in which additional information, known as a watermark, is inserted in the host video, maybe one way to limit this type of digital theft

5- Each of the two real wavelet transforms uses a different set of filters to satisfy the PR 
criteria --> Each of the two real wavelets transforms uses a different set of filters to satisfy the PR 
criteria

6-  Wavelet-based sign processing methods, such as wavelet coefficient thresholding that have been established for actual wavelet transforms can also be used to the DT-CWT [6]. -->  Wavelet-based sign processing methods, such as 
wavelet coefficient thresholding  established for actual wavelet transforms can also be used to the DT-CWT [6].

7-  the rework will no longer provide the over all benefits of the previously established analytic wavelets.-->  the rework will no longer provide the overall benefits of the previously established analytic wavelets.

8- Video watermarking, unlike picture watermarking.. --> Video watermarking, unlike image watermarking, ..


And so on.

9-Regarding the experimental results, the authors present many results but not the comparison with the state-of-the-art. The authors must compare their scheme with alternative methods to show its effectiveness. They must compare with recent hybrid methods, especially those based on DT-WCT. The comparison with "DWT based SVD" and "CWT based SVD"  techniques is not sufficient at all. 


10-The authors should justify why they chose just 30 video frames to evaluate their scheme and why the y didn't use a database that contains a large number of videos. 


 
11- The arrows are not laid very well on some blocks in Figure 2

12- In Figure 4, some blocks are not well adjusted, and their titles are not centered; sometimes, a part is deleted. It would be best if you fixed this by making a new figure. 

Author Response

The authors would like to thank the reviewer for his/her efforts in reviewing the paper. The notifications of the reviewer have been considered in the revised version

Author Response File: Author Response.pdf

Reviewer 2 Report

A considerable work has been investiagted for video watermarking, but the authors didn't surveyed it well. It is limitedly presented just for 5 methods. A considerable related work is needed which should be followed with existing research gaps and motivation to fill the existing gaps pertaining to the video watrmarking area.

Fig. 4 & others are not interactive. Prepare it well for decent comprehensiveness.

Why the authors applied 1-level complex wavelet transform? Why not the 2-level complex wavelet transform. Authors are also suggested to analyse it for 2-level complex wavelet transform if possible.

Apart of Cr results, authors are advised to present the MSE, PSNR, SSIM & NC statistical results.

Robustness perfromance results for Median filtering, Histogram equalization, Blurring, Sharpening, Gamma correction, Rotation, Cropping, Scaling, Average filter, Frame averaging, Frame dropping are to be analyzed.

The embedding capacity of the proposed method is to be discussed.

Comparison of performance results of suggested method with more existing techniques is needed. Do a good comparison analysis. Author may refer to following excellent articles on the topic:

A blind and robust video watermarking based on IWT and new 3D generalized chaotic sine map
A secure video watermarking technique based on hyperchaotic Lorentz system
Performance analysis of 2 level DWT-SVD based non blind and blind video watermarking using range conversion method
A Robust Blind Oblivious Video Watermarking Scheme Using Undecimated Discrete Wavelet Transform

Low number of references have been consulted, authors are advised to refer to more number of related papers.

Author Response

The authors would like to thank the reviewer for his/her efforts in reviewing the paper. The notifications of the reviewer have been considered in the revised version

Round 2

Reviewer 1 Report

The paper can be published in its current form since the authors processed all comments. 

Back to TopTop