udoc_1_.pdf

44
1 Chapter1. INTRODUCTION The rapid proliferation of multimedia over internet demands sophisticated technique for secure and efficient access to information. There is growing need to discourage unauthorized duplication and use of digital data. With the advent of digital video, issues of copyright protection have become more important, since the duplication of digital video signals does not result in an inherent decrease in quality normally suffered by analog video. Steganography , data hiding, data embedding and watermarking are techniques used for the invisible embedding of information in the host data, with the intent information is stored/transmitted together with the host data retaining secret information. The main difference between Steganography and watermarking is that steganograpic methods rely on the fact that covert communication is a point to point communication between trusting parties alone and that is unknown to third parties. Thus steganographic methods are typically not designed to be robust against attempted attacks. In watermarking methods the existence of the embedded information is unknown to unauthorized parties who have access to the data, and can attempt unlawful attacks. Copyright protection has been a problem since the advent of compact discs. Several methods have been implemented for preventing the copyright information from being muddled with, like steganographic algorithms, cryptographic techniques and the new era technology watermarking. 1.1 Objective The objective of this project is to use digital watermarking techniques to detect video piracy. The information watermarked includes owner, recipient and/or distributor details, transaction dates, serial numbers, etc. which play an important role in determining which of the copies, have been pirated.

Upload: mayur-hole

Post on 22-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

1

Chapter1. INTRODUCTION

The rapid proliferation of multimedia over internet demands sophisticated

technique for secure and efficient access to information. There is growing need to

discourage unauthorized duplication and use of digital data. With the advent of digital

video, issues of copyright protection have become more important, since the

duplication of digital video signals does not result in an inherent decrease in quality

normally suffered by analog video. Steganography , data hiding, data embedding and

watermarking are techniques used for the invisible embedding of information in the

host data, with the intent information is stored/transmitted together with the host data

retaining secret information. The main difference between Steganography and

watermarking is that steganograpic methods rely on the fact that covert

communication is a point to point communication between trusting parties alone and

that is unknown to third parties. Thus steganographic methods are typically not

designed to be robust against attempted attacks. In watermarking methods the

existence of the embedded information is unknown to unauthorized parties who have

access to the data, and can attempt unlawful attacks.

Copyright protection has been a problem since the advent of compact discs.

Several methods have been implemented for preventing the copyright information

from being muddled with, like steganographic algorithms, cryptographic techniques

and the new era technology watermarking.

1.1 Objective

The objective of this project is to use digital watermarking techniques to

detect video piracy. The information watermarked includes owner, recipient and/or

distributor details, transaction dates, serial numbers, etc. which play an important role

in determining which of the copies, have been pirated.

2

1.2 Scope

Digital watermarking is a technique that has a plethora of applications. This

project aims at exploiting the advantages of this technique for video piracy detection.

The project's scope extends to detection of piracy in video and audio files in AVI

RIFF format thus enabling copyright protection.

1.3 Synopsis

Digital watermarking is a technology for embedding various types of

information in digital content. In general, information for protecting copyrights and

providing the validity of data is embedded as a watermark. This project embeds the

copyright information as the watermark in a video file to detect piracy.

3

Chapter 2:Literature Survey

2.1 Introduction

This project presents a hardware implementation of a digital watermarking system

that can insert invisible, semi fragile watermark information into compressed video

streams in real time. The watermark embedding is processed in the discrete cosine

transform domain. To achieve high performance, the proposed system architecture

employs pipeline structure and uses parallelism. Hardware implementation using field

programmable gate array has been done, and an experiment was carried out using a

custom versatile breadboard for overall performance evaluation. Experimental results

show that a hardware-Based video authentication system using this watermarking

technique features minimum video quality degradation and can withstand certain

potential attacks, i.e., cover-up attacks, cropping, and segment removal on video

sequences. Furthermore, the proposed hardware based watermarking system features

low power consumption, low cost implementation, high processing speed, and

reliability.

2.2 Steganography

Steganography is an ancient art to hide information in ways that it prevents

the detection of the hidden message. It is a very old method of passing massages in

secret. This method of message cloaking goes back to the time of the ancient

Greeks. The historian Herodotus wrote about how an agent wrote a message warning

of an invasion on the wood part of a wax tablet. Since messages were normally

inscribed in the wax and not the wood, the tablet appeared blank to a common

observer.

Many people lump Steganography with cryptography, and while they are in

many cases means to the same ends (not letting unauthorized persons view data) they

are not the same thing. Although, they are often sibling processes and first encrypting

a message then using a steno-tool to hide it is more effective in hiding a secret

message than either method by itself. Steganography is "Hiding a secret message

within a larger one in such a way that others can not discern the presence or contents

4

of the hidden message" and Cryptography is "The process or skill of communicating

in, or deciphering secret writing or ciphers". Steganography can be used to cloak

hidden messages in image, audio and even text files.

There are three main ways to conceal the secret message/image. The first way

is straight insertion where you just put the message into the cover image. The next

way requires some analysis to find the variations in color and it puts the message in

those areas where it is less likely to be detected. The last way is to randomly insert

the message into the image.

2.2.1 USES OF STEGANOGRAPHY

Steganography can be used anytime you want to hide data. There are many

reasons to hide data but they all boil down to the desire to prevent unauthorized

persons from becoming aware of the existence of a message. In the business world

steganography can be used to hide a secret chemical formula or plans for a new

invention.

Steganography can also be used for corporate espionage by sending out trade

secrets without anyone at the company being any wiser. Steganography can also be

used in the non-commercial sector to hide information that someone wants to keep

private. Spies have used it since the time of the Greeks to pass messages undetected.

Terrorists can also use steganography to keep their communication secret and to

coordinate attacks.

2.3CRYPTOGRAPHY

2.3.1 DEFINITION

Cryptography is the study of mathematical techniques related to aspects of

information security such as confidentiality, data integrity, entity authentication, and

data origin authentication. Cryptography is not the only means of providing

information security, but rather one set of techniques.

2.3.2 CRYPTOGRAPHIC GOALS

The following are the four basic objectives form a framework for the other

goals.

5

• Privacy or confidentiality

• Data Integrity.

• Authentication

• Non-repudiation.

1. Confidentiality is a service used to keep the content of information from

all but those authorized to have it. Secrecy is a term synonymous with confidentiality

and privacy. There are numerous approaches to providing confidentiality, ranging

from physical protection to mathematical algorithms that render data unintelligible.

2. Data integrity is a service that addresses the unauthorized alteration of

data. To assure data integrity, one must have the ability to detect data manipulation

by unauthorized parties. Data manipulation includes such things as insertion,

deletion, and substitution.

3. Authentication is a service related to identification. This function

applies to both entities and information itself. Two parties entering into a

communication should identify each other. Information delivered over a channel

should be authenticated as to origin, date of origin, data content, time sent, etc.

For these reasons this aspect of cryptography is usually subdivided into two

major classes: entity authentication and data origin authentication. Data origin

authentication implicitly provides data integrity (for if a message is modified, the

source has changed).

4. Non-repudiation is a service that prevents an entity from denying previous

commitments or actions. When disputes arise due to an entity denying that certain

actions were taken, a means to resolve the situation is necessary. For example, one

entity may authorize the purchase of property by another entity and later deny such

authorization was granted. A procedure involving a trusted third party is needed to

resolve the dispute. A fundamental goal of cryptography is to adequately address

these four areas in both theory and practice. Cryptography is about the prevention

and detection of cheating and other malicious activities.

6

2.4 Watermarking:

We have witnessed an extraordinary growth of techniques for copyright

protection of different types of data, especially multimedia information. This interest

is not surprising in view of the simplicity of digital coping and dissemination: digital

copies can be made identical to the original and later reused or even manipulated.

Cryptography is an effective solution to the distribution problem, but in most

instances has to be tied to specialized and costly – hardware to create tamper-proof

devices that avoid direct access to data in digital format (even so, there exist

software/hardware tools that allow to resample the analog output of the device with

decent results).

For instance, access control in set-boxes used for digital television

demodulation and decoding succeed in avoiding unauthorized access to programs that

are being broadcast in scrambled form, but fail in precluding further storage and

illegal dissemination actions. There is then an increasing need for software that

allows for protection of ownership rights and it is in this context where watermarking

techniques come to our help. Perceptible marks of ownership or authenticity have

been around for centuries in the form of stamps, scales, signatures or classical

watermarks, nevertheless, given current data manipulation technologies;

imperceptible digital watermarks are mandatory in most applications.

2.5 DIGITAL WATERMARKING

Digital watermarking is a technology for embedding various types

Of information in digital content in general, information for protecting copyrights and

proving the validity of data is embedded as a watermark.

Why do we need to embed such information in digital content using digital

watermark technology? The Internet boom is one of the reasons. It has become easy

to connect to the Internet from home computers and obtain or provide various

information using the World Wide Web (WWW).

All the information handled on the Internet is provided as digital content.

Such digital content can be easily copied in a way that makes the new file

indistinguishable from the original. Then the content can be reproduced in large

7

quantities.

For example, if paper bank notes or stock certificates could be easily copied

and used, trust in their authenticity would greatly be reduced, resulting in a big loss.

To prevent this, currencies and stock certificates contain watermarks. To prevent

this, currencies and stock certificates contain watermarks. These watermarks are one

of the methods for preventing counterfeit and illegal use.

Digital watermarks apply a similar method to digital content. Watermarked

content can prove its origin, thereby protecting copyright. A watermark also

discourages piracy by silently and psychologically deterring criminals from making

illegal copies.

A digital watermark is a distinguishing piece of information that is adhered to

the data that it is intended to protect, this meaning that it should be very difficult to

extract or remove the watermark from the watermarked object. Since, watermarking

can be applied to various types of data; the imperceptibility constraint will take

different forms, depending on the properties of the recipient (i.e. the human sense in

most practical cases)

In addition to imperceptibility are some desirable characteristics that a

watermark should possess, which are somewhat related to the so-called robustness

issue. First, the watermark should be resilient to standard manipulations of

unintentional as well as intentional nature. Second, it should be statistically

unresolvable, that is, a statistical analysis should not produce any advantage from the

attacking point of view, finally, the watermark should withstand multiple

watermarking to facilitate trailer tracing.

2.5.1 PRINCIPLE OF DIGITAL WATERMARKS.

A. watermark on a bank note has a different transparency than the rest of the

note when a light is shined on it. However, this method is useless in the digital world.

Currently there are various techniques for embedding digital watermarks. Basically,

they all digitally write desired information directly onto images or audio data in such

a manner that the images or audio data are damaged. Embedding a watermark should

not result in a significant increase or reduction in the original data.

8

Digital watermarks are added to images or audio data in such a way that they

are invisible or inaudible and unidentifiable by human eye or ear. Furthermore, they

can be embedded in content with a variety of the file formats. Digital watermarking

is the content protection method for the multimedia era.

2.5.2. GENERAL FEATURES REQUIRED FOR DIGITAL WATERMARKS.

1. Elements of digital content can be directly manipulated and information can be

embedded in them.

2. Deterioration of the enquiry of digital content is minimized.

3. Watermarks are retained and detectable after the digital content is edited,

compressed, or converted.

4. The structure of a watermark makes it difficult to detect or overwrite (alter) the

embedded information (watermark contents)

5. Processing required for watermarking and detection is simple.

6. Embedded watermark information cannot be eliminated without diminishing the

quality of the digital content that carries the watermark.

7. The watermark information embedded in digital content can be detected as

required.

2.5.3 TYPE OF WATERMARK

Watermarks and watermarking techniques can be divided into various

categories in various ways. Watermarking techniques can be divided into four

categories according to the type of document to be watermarked as follows:

Text Watermarking

Image Watermarking

Audio Watermarking

Video Watermarking

9

In the case of imagery, several different methods enable watermarking in the spatial

domain. An alternative to spatial watermarking is frequency domain watermarking.

In other way, the digital watermarks can be divided into three different types as

follows:

Visible watermark

Invisible-Robust watermark

Invisible-Fragile watermark

Visible watermark is a secondary translucent overlaid into the primary image. The

watermark appears visible to a casual viewer on a careful inspection. The invisible-

robust watermark is embedded in such a way that alternations made to the pixel

value are perceptually not noticed and it can be recovered only with appropriate

decoding mechanism. The invisible-fragile watermark is embedded in such a way

that any manipulation or modification of the image would alter or destroy the

watermark.

From application point of view digital watermark could be:

Source based

Destination based.

Source-based watermark are desirable for ownership identification or authentication

where a unique watermark identifying the owner is introduced to all the copies of a

particular image being distributed. A source-based watermark could be used for

authentication and to determine whether a received image or other electronic data has

been tampered with. The watermark could also be destination-based where each

distributed copy gets a unique watermark identifying the particular buyer. The

destination-based watermark could be used to trace the buyer in the case of illegal

reselling.

10

Fig.1. Types of water marking

2.5.4 MATERIALS SUITABLE FOR WATERMAKRING

Digital watermarking is applicable to any type of digital content, including

still images, animation, and audio data. It is easy to embed watermarks in material

that has a comparatively high redundancy level ("wasted"). Such as color still

images, animation, and audio data however, it is difficult to embed watermarks in

material with a low redundancy level, such as black-and-white still images.

2.5.5 STRUCTURE OF A TYPICAL WATERMARKING SYSTEM

11

Fig.2. Watermarking structure

Watermarking, like cryptography, also uses secret keys to map information to

owners, although the way this mapping is actually performed considerably differs

from what is done in cryptography, mainly because the watermarked object should

keep its intelligibility. In most watermarking applications embedment of additional

information is necessary. This information includes identifies of the owner, recipient

and/or distributor, transaction dates, serial numbers, etc. which play a crucial role in

adding value to watermarking products.

Every watermarking system consists at least of two different parts:

Watermark embedding unit and watermark detection and extraction unit. Figure 1

shows an example of embedding unit for still images. The unmarked image is passed

through a perceptual analysis block that determines how much a certain pixel can be

altered so that the resulting

Watermarked image is indistinguishable from the original. This takes into account

the human eye sensitivity to changes in flat areas and its relatively high tolerance to

small in edges. After this so-called perceptual-mask has been computed, the

information to be hidden is shaped by this mask and spread all over the original

12

image. This spreading technique is similar to the interleaving used in other

applications involving coding, such as compact disc storage, to prevent damage of the

information caused by scratches or dust.

In our case, the main reason for this spreading is to ensure that the hidden

information services cropping of the image. Moreover, the way this spreading is

performed depends on the secret key, so it is difficult to recover the hidden

information if one is not in possession of this key. In fact, a similar technique is used

in spread spectrum systems (more precisely, in Code-Division Multiple Access) to

extract the desired information from noise or other users. Addition key-dependent

uncertainly can be introduced in pixel amplitudes (recall that the added mask imposes

only an upper limit) finally; watermark is added to the original image.

Higher intensity (i.e. whiter) levels imply that higher perturbations can be

made at those pixels without perceptible distortion. Thus, the higher capacity areas

for hiding information correspond to edges. These masks are computed by using

some known results on how the human eye works in the spatial domain. Different

results are obtained when working on other domains, such as the DCT (Discreate

Cosine Transform) or Wavelet transform. In fact, when working on the DCT

coefficients domain one may take advantage of the relative independence between the

maximum allowable perturbations at every coefficient. This is useful when dealing

with the mask for watermarking purposes.

Watermark detection involves deciding whether a certain image has been

watermarked with a given key. Note then that a watermark detector produces a

binary output. Important considerations here are the probability of correct detection

PD (i.e., the probability of correctly deciding that a watermark is present) and the

probability of false alarm PF (i.e., the probability of incorrectly deciding that

an image has been watermarked with a certain key). These two measures allow us

to compare different watermarking schemes. One method will be superior if achieves

a higher PT) for a fixed PF. Note also that for a watermarking algorithm to be useful

it must work with extremely low probabilities of false alarm. Watermark detection

is usually done by correcting the watermarked image with a locally generated version

of the watermark at the receiver side. This correlation yields a high value when the

watermark has been obtained with the proper key. It is possible to improve the

13

performance of the detector by eliminating original image-induced noise with signal

processing. It is worthy of remark that some authors propose using the original image

in the detection process. Although this simplifies further treatment of the watermark

in the receiver end, it is quite unrealistic for most applications, particularly those

related to E-commerce.

Once the presence of the watermark has been correctly detected, it is

possible to extract the hidden information. The procedure is also generally done by

means of a cross-correlation but in this case, an independent decision has to be taken

for every information bit with a sign slicer. In fact, we have also shown that this

correlation structure has not been well founded and significant improvements are

achievable when image statistics are available.

Obviously, when extracting the information the most adequate parameter for

comparison purposes is the probability of bit error pb, identical to that used in digital

communications. This is not surprising because watermarking creates a hidden

(sometimes called steganogrphic

Channel on which information is conveyed.

As stated above digital watermarking is often performed by masking. The

reason for digital watermarking is very different from Steganography. Where the

goal of Steganography is to transmit a message undetected, a digital watermark is

created as a sign of ownership/authorship. Since digital copies are inherently exact

replicas of the original unless noise or some type of lossy operation is performed,

there will be no way to tell them apart. Therein lays the authorship/ownership

problem due to the likeness of the original and the copy. Digital watermarks can be

used to show proof of ownership by having your mark put into the file, so even if

both images are the same, if they contain your mark then you have a much stronger

case for copyright of ownership disputes.

Watermarks can be visible or invisible depending on the luminance in the

mask. The higher the luminance, the greater the visibility of the watermark.

14

Attackers can use different types of image processing to remove or degrade the

watermark until it is illegible. There are different recovery techniques but it is

usually helpful to have the original image when trying to recover the watermark.

2.5.6 ANALOG HOLE AND DIGITAL WATERMARK

While the entertainment industry may be moving towards an all-digital future,

environment, analog connections to the hundreds of millions of conventional

televisions, VCRs and the like will remain for a long time to come. This presents a

problem in that digital devices can capture and digitize unprotected analog signals,

easily circumventing current copy protection mechanisms. This issue, dubbed the

"analog

Hole", is a major source of unauthorized duplication and/or redistribution.

Entertainment industry leaders have expressed their concerns about this problem.

Video content, even when delivered digitally in a protected manner, must be

converted to an unprotected analog format to be viewed on the millions of analog

television sets in consumer homes. Once content is 'in the clear' in analog form, it

can be converted back into digital format which can then be subject to widespread

unauthorized copying and redistribution including over the Internet. This problem

applies to all delivery means for audiovisual content, from DVDs to pay per view to

over the air broadcasts.

Digital watermarking is the most promising technology for "plugging the

analog hole" To help plug the analog hole, digital watermarks can be applied to

digital and analog entertainment content, and they will remain with the content even

when the content is transformed to different analog or digital formats or

manipulated/transmitted via standard digital devices.

The digital watermark helps identify the content and usage rights of

content, whatever the format, and prevent unauthorized copying. Digital

watermarks remain a part of the content and can be detected in any format

to prevent unauthorized copying.

However, the combination of the digital watermarking and encryption provide

15

content protection whether inside an encrypted channel, or rendered for consumption

and use with protection via digital watermarks.

16

Chapter 3:Software Requirement Speciation

3.1 Purpose

This project presents a hardware implementation of a digital watermarking system that can

insert invisible, semi fragile watermark information into compressed video streams in real

time. The watermark embedding is processed in the discrete cosine transform domain. To

achieve high performance, the proposed system architecture employs pipeline structure and

uses parallelism. Hardware implementation using field programmable gate array has been

done, and an experiment was carried out using a custom versatile breadboard for overall

performance evaluation. Experimental results show that a hardware-Based video

authentication system using this watermarking technique features minimum video quality

degradation and can withstand certain potential attacks, i.e., cover-up attacks, cropping,

and segment removal on video sequences. Furthermore, the proposed hardware based

watermarking system features low power consumption, low cost implementation, high

processing speed, and reliability.

3.2Product Scope

Recently, the advances in electronic and information technology, together with the rapid

growth of techniques for powerful digital signal and multimedia processing, have made the

distribution of video data much easier and faster. However, concerns regarding

authentication of the digital video are mounting, since digital video sequences are very

susceptible to manipulations and alterations using widely available editing tools. This issue

turns to be more significant when the video sequence is to be used as evidence.

In such cases, the video data should be credible. Consequently, authentication techniques

are needed in order to maintain authenticity, integrity, and security of digital video content.

As a result, digital watermarking (WM), a data hiding technique has been considered as

one of the key authentication methods. Digital watermarking is the process of embedding

an additional, identifying information within a host multimedia object, such as text, audio,

image, or video. By adding a transparent watermark to the multimedia content, it is

possible to detect hostile alterations, as well as to verify the integrity

17

3.3Overall Description

3.3.1 Product Perspective

A WM system can be implemented on either software or hardware platforms, or some

combinations of the two.

In software implementation, the WM scheme can simply be implemented in a PC

environment. The WM algorithm’s operations can be performed as machine code software

running on an embedded processor. By programming the code and making use of available

software tools, it can be easy to design and implement any WM algorithm at various levels

of complexity.

Over the last decade, numerous software implementations of WM algorithms for relatively

low data rate signals (such as audio and image data) have been invented. While the

software approach has the advantage of flexibility, computational limitations may arise

when attempting to utilize these WM methods for video signals or in portable devices.

Therefore, there is a strong incentive to apply hardware-based implementation for real-time

WM of video streams. The hardware-level design offers several distinct advantages over

the software implementation in terms of low power consumption, reduced area, and

18

reliability. It enables the addition of a tiny, fast and potentially cheap watermark embedded

as a part of portable consumer electronic devices. Such devices can be a digital camera,

camcorder, or other multimedia devices, where the multimedia data are watermarked at the

origin. On the other hand, hardware implementations of WM techniques require flexibility

in the implementation of both computational and design complexity. The algorithm must

be carefully designed to minimize any susceptibility, as well as maintaining a sufficient

level of security.

3.3.2 Product Functions

Video Compression

A video sequence is divided into multiple group of pictures (GOP), representing sets of

video frames which are neighboring in display order. An encoded MPEG-2 video sequence

is made up of two frame-encoded pictures: intraframes (I-frame) and interfaces (P-frame or

B-frame). P-frames are forward prediction frames and B-frames are bidirectional

prediction frames. Within a typical sequence of an encoded GOP, P-frames may be 10% of

the size of I-frames and Bframes are about 2% of the I-frames compression methods.

19

Watermark Generation

The block diagram of the proposed novel watermark generator is depicted in Fig. 4. A

secure watermark pattern is generated by performing expanding, scrambling, and

modulation on a primitive watermark sequence. There are two digital secret keys: Key 1 is

used for scrambling and Key 2 is used for the random number generator (RNG) module

that generates a pseudorandom sequence.

Watermark Embedding

This WM algorithm, capable of inserting a semifragile invisible watermark in a

compressed image in the DCT frequency domain, was modified and then applied in

watermarking of a video stream. In general, for each DCT block of a video frame, N cells

need to be identified as “watermarkable” and modulated by the watermark sequence.

20

The chosen cells contain nonzero DCT coefficient values and are found in the mid-frequency range.

Watermark Embedding steps

Input: Original video sequence

Ov[i, j], Grayscale watermark image WI [i, j]

Output: watermarked video sequence

Wv[i, j]

1) Segment the original input video sequence

Ov[i, j]into number of non-overlapping shots

Ss[i, j] using

shot segmentation technique. Then, identify the number of frames

Fp[i, j] involved in each segmented

shots

Ss[i, j] for embedding purpose.

2) Slice the grayscale watermark image

3) Permute the sliced images SI [i, j] using a pixel permutation technique to obtain the

21

permuted grayscale

image

PI [i, j] .

4) Extract the blue components

B [i, j]

Fp

of all the partitioned frames for embedding the each sliced image

SI [i, j] into the blue components of each frame.

5) Split the image into small blocks (8 x 8) and decompose the blue components

B [i, j]

Fp

of each

partitioned frame

Fp[i, j] into AC and DC coefficients by DCT.

6) Choose the low frequency sub-bands from the transformed frames to embed the

permuted grayscale

image

PI [i, j] .

7) Find the similarity matrix of the permuted image to embed into the chosen coefficient.

The embedding process should repeat for all blocks of DCT. ] , [jiPI], WI [i, j] into 8 bit

planes SI [i, j] using bit plane slicing.

Watermrak Extraction Process

After embedding the grayscale watermark image pixels into the original video sequence,

22

we have extracted

the embedded watermark image without affecting the original video.

Input: watermarked video sequence

Wv[i, j], size of the watermark image.

Output: recovered watermark image WI [i', j']

1) Segment the watermarked video sequence

Wv[i, j] into a number of non-overlapping shot

Ss[i', j']

using the shot segmentation technique. Then, identify the number of frames

Fp[i', j'] involved in each

segmented shots

Ss[i', j'] for the extraction process.

2) Extract the blue components of all the partitioned frames for extracting the embedded

watermark pixels

3) Decompose the blue components of the frames with the aid of the DCT into AC and DC

coefficients.

4) Select the low frequency components from the transformed frames to extract the

watermark gray scale image.

5) Extract the watermark pixels from the embedding part in a zig-zag manner from the

each blocks with the aid of the following steps. If the embedded pixel

6) value is greater than the mean pixel value, then the extracted pixel value is one. If it is

lesser, then the extracted pixel is zero.

23

7) Form the matrix with the size of the watermark image and the extracted pixels are

placed in it to attain the watermark image.

8) Obtain the watermark image by applying the reverse process of permutation and bit

plane slicing.

3.3.3Operating Environment

The systems is proposed to run on computers which are connected to CCTV cameras, Or

on DVRs which in turn stores the video on hard drives.

3.4 System Features

1. Content Creation

a. Capturing

b. Compression

c. Encryption

d. Watermarking

e. Transmission/Storage

2. (Re)Distribution

a. Transcoding

b. Watermarking

c. Logo Insertion

d. Multiplexing

3. Video reception

a. In-House Transcoding

b. Decryption

c. Decompression

d. Play-Out

24

3.5. External Interface Requirement

1.HARDWARE REQUIREMENTS

* Intel Pentium III 2.4Ghz Processor

* 256 MB DDR RAM.

* 40GB HDD

* 1.44 MB FDD

* 15" Monitor

2. SOFTWARE REQUIREMENTS

Operating System; WINDOWS

Language used: JAVA

25

3.6 Analysis Model

3.6.1 Class Diagram:

26

Video file Copyright information

Watermarking

Key file

Key file Watermarked file

Dewatermarking

Copyright Protection

3.6.2 Dataflow Diagrams

Overwrite

Temporary

file

Dataflow diagram of water marking

Temporary File

Dataflow diagram of dewater marking

27

3.6.3 DFD Combined :

28

3.6.4 Block diagram

29

Chapter 4 : System Design

4.1 Introduction:

System design of the project is the most important part in implementation of the project.

System design effectively gives the flow and all the necessary information about the design

of the project.

4.2 UML Diagrams:

Use-case

30

Class Diagram

31

Activity Diagram:

32

Communication Diagram:

33

Component Diagram:

34

Sequence Diagram:

35

State Chart Diagram:

36

Interaction diagram:

37

Object Diagram:

38

Package Diagram:

39

Deployment Diagram:

40

Chapter 5: Conclusion

5.1 Advantages:

1 )Invisible watermark is really hard to identify to attacker

2) Adding key to the video file can protect from local users

3) It's really hard to find out where exactly water mark is embedded

5.2 Disadvantages:

1) While extracting the embedded watermark from video Quality of

video can't be respected

2 )Anonymous user can look into the meta-data of the video file

3 )While sharing on the network video file it takes long time

4) Long bandwidth is required from the both side

5.3 Applications Of Digital Watermarking

Video Watermarking. In this case, most considerations made in previous

sections hold. However, now the temporal axis can be exploited to increase the

redundancy of the watermark. As in the still images case, watermarks can be created

either in the spatial or in the DCT domains. In the later, the results can be directly

extrapolated to MPEG-2 sequences, although different actions must be taken for I, P

and B frames. Note that perhaps the set of attacks that can be performed intentionally

is not smaller but definitely more expensive than for still images.

Audio Watermarking. Again, previous considerations are valid. In this

case, time and frequency masking properties of the human car are used to conceal the

watermark and make it inaudible. The greatest difficulty lies in synchronizing the

41

watermark and the watermarked audio file, but techniques that overcome this problem

have been proposed.

Hardware/Software Watermarking. This is a good paradigm that allows us

to understand how almost every kind of data can be copyright protected. If one is

able to find two different ways of expressing the same information, then one bit of

information can be concealed, something that can be easily generalized to any

number of bits. This is why it is generally said that a perfect compression scheme

does not leave room for watermarking. In the hardware context, Boolean

equivalences can be exploited to yield instances that use different types of gates and

that can be addressed by the hidden information bits. Software can be also protected

not only by finding equivalences between instructions,

Variable names, or memory address, but also by altering the order of non-critical

instructions. All this can be accomplished at computer level.

Text Watermarking: This problem, which in fact was one of the first that

was studied within the information hiding area, can be solved at two levels. At the

printout level, information can be encoded in the way the text times or words are

separated (this facilitates the survival of the watermark even to photocopying). At

the semantic level (necessary when raw text files are provided). Equivalences

between words or expressions can be used, although special care has to be taken not

to destruct the possible intention of the author.

Executable Watermarks. Once the hidden channel has been created it is

possible to include even contents, provided that the corresponding applet is running

on the end user side.

Labeling. The hidden message could also contain labels that allow for

example to annotate images or audio. Of course, the annotation may also been

included in a separate file, but with watermarking it results more difficult to destroy

or loose this label, since it becomes closely tied to the object that annotates. This is

especially useful in medical applications since it prevents dangerous errors.

Fingerprinting. This is similar to the previous application and allows

42

acquisition devices (such as video cameras, audio recorders, etc.) to insert

information about the specific device (e.g. an ID number) and date of creation.

This can also be done with conventional digital

Signature techniques but with watermarking it becomes considerably more difficult to

excise or alter the signature. Some digital cameras include this feature.

Authentication. This is a variant of the previous application, in an area

where cryptographic techniques have already made their way. However, there are

two significant benefits that arise from using watermarking: first, as in the previous

case, the signature becomes embedded in the message, second, it is possible to create

'soft authentication' algorithms, that offer a multi valued 'perceptual closeness'

measure that accounts for different unintentional transformations that the data may

have suffered (an example is image compression with different levels), instead of the

classical yes/no answer given by cryptography-based authentication. Unfortunately,

the major drawback of watermarking-based authentication is the lack public key

algorithms that force either to put secret keys in risk or to resort to trusted parties.

Copy and Playback Control. The message carried by the watermark may

also contain information regarding copy and display permissions. Then, a secure

module can be added in copy or playback equipment to automatically extract this

permission information and block further processing if required. In order to be

effective, this protection approach requires agreements between content providers and

consumer electronics manufacturers to introduce complaint watermark detectors in

their video players and recorders. This approach is being taken in Digital video Disc

Signaling. The imperceptibility constraint is helpful when transmitting

signaling information in the hidden channel. The advantage of using this channel is

that no bandwidth increase is required. An interesting application in broadcasting

consists in watermarking commercials with signaling information that permits an

automatic counting device to assess the number of times that the commercial has been

broadcast during a certain period. An alternative to this would require complex

recognition software.

43

5.4 Conclusion:

Digital watermarking has been proposed as a possible brick of multimedia content

protection systems, but its application in realistic scenarios has raised several issues.

Secure watermarking has then been designed to solve some of these issues.

In this project, we propose a robust digital video watermarking procedure to embed

and extract the watermark image into digital video frames by using DCT.

44

Chapter 6: Bibliography

• “Secure Watermarking for Multimedia Content Protection”1053

5888/13/$31.00©2013IEEE IEEE SIGNAL PROCESSING MAGAZINE [87]

march 2013.

• “A Block Based Novel Digital Video Watermarking Scheme Using Dct” IOSR

Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN:

2278-2834, p- ISSN: 2278-8735. Volume 5, Issue 2 (Mar. - Apr. 2013)

• “Hardware Implementation of a Digital Watermarking System for Video

Authentication” IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR

VIDEO TECHNOLOGY, VOL. 23, NO. 2, FEBRUARY 2013.

• “Block Based Video Watermarking Scheme Using Wavelet Transform and

Principle Component Analysis” IJCSI International Journal of Computer Science

Issues, Vol. 9, Issue 1, No 3, January 2012

• “Digital Video Watermarking Using Discrete Cosine Transform And Perceptual

Analaysis” International Journal Of Computational Engineering Research

(ijceronline.com) Vol. 2 Issue. 5 ,September| 2012