You are on page 1of 44

Chapter1.

INTRODUCTION
The rapid proliferation of multimedia over internet demands sophisticated
technique for secure and efficient access to information. There is growing need to
discourage unauthorized duplication and use of digital data. With the advent of digital
video, issues of copyright protection have become more important, since the
duplication of digital video signals does not result in an inherent decrease in quality
normally suffered by analog video. Steganography , data hiding, data embedding and
watermarking are techniques used for the invisible embedding of information in the
host data, with the intent information is stored/transmitted together with the host data
retaining secret information. The main difference between Steganography and
watermarking is that steganograpic methods rely on the fact that covert
communication is a point to point communication between trusting parties alone and
that is unknown to third parties. Thus steganographic methods are typically not
designed to be robust against attempted attacks. In watermarking methods the
existence of the embedded information is unknown to unauthorized parties who have
access to the data, and can attempt unlawful attacks.

Copyright protection has been a problem since the advent of compact discs.
Several methods have been implemented for preventing the copyright information
from being muddled with, like steganographic algorithms, cryptographic techniques
and the new era technology watermarking.

1.1 Objective
The objective of this project is to use digital watermarking techniques to
detect video piracy. The information watermarked includes owner, recipient and/or
distributor details, transaction dates, serial numbers, etc. which play an important role
in determining which of the copies, have been pirated.

1.2 Scope
Digital watermarking is a technique that has a plethora of applications. This
project aims at exploiting the advantages of this technique for video piracy detection.
The project's scope extends to detection of piracy in video and audio files in AVI
RIFF format thus enabling copyright protection.

1.3 Synopsis
Digital watermarking is a technology for embedding various types of
information in digital content. In general, information for protecting copyrights and
providing the validity of data is embedded as a watermark. This project embeds the
copyright information as the watermark in a video file to detect piracy.

Chapter 2:Literature Survey


2.1 Introduction
This project presents a hardware implementation of a digital watermarking system
that can insert invisible, semi fragile watermark information into compressed video
streams in real time. The watermark embedding is processed in the discrete cosine
transform domain. To achieve high performance, the proposed system architecture
employs pipeline structure and uses parallelism. Hardware implementation using field
programmable gate array has been done, and an experiment was carried out using a
custom versatile breadboard for overall performance evaluation. Experimental results
show that a hardware-Based video authentication system using this watermarking
technique features minimum video quality degradation and can withstand certain
potential attacks, i.e., cover-up attacks, cropping, and segment removal on video
sequences. Furthermore, the proposed hardware based watermarking system features
low power consumption, low cost implementation, high processing speed, and
reliability.

2.2 Steganography
Steganography is an ancient art to hide information in ways that it prevents
the detection of the hidden message. It is a very old method of passing massages in
secret.

This method of message cloaking goes back to the time of the ancient

Greeks. The historian Herodotus wrote about how an agent wrote a message warning
of an invasion on the wood part of a wax tablet. Since messages were normally
inscribed in the wax and not the wood, the tablet appeared blank to a common
observer.
Many people lump Steganography with cryptography, and while they are in
many cases means to the same ends (not letting unauthorized persons view data) they
are not the same thing. Although, they are often sibling processes and first encrypting
a message then using a steno-tool to hide it is more effective in hiding a secret
message than either method by itself. Steganography is "Hiding a secret message
within a larger one in such a way that others can not discern the presence or contents
3

of the hidden message" and Cryptography is "The process or skill of communicating


in, or deciphering secret writing or ciphers". Steganography can be used to cloak
hidden messages in image, audio and even text files.
There are three main ways to conceal the secret message/image. The first way
is straight insertion where you just put the message into the cover image. The next
way requires some analysis to find the variations in color and it puts the message in
those areas where it is less likely to be detected. The last way is to randomly insert
the message into the image.
2.2.1 USES OF STEGANOGRAPHY
Steganography can be used anytime you want to hide data. There are many
reasons to hide data but they all boil down to the desire to prevent unauthorized
persons from becoming aware of the existence of a message. In the business world
steganography can be used to hide a secret chemical formula or plans for a new
invention.
Steganography can also be used for corporate espionage by sending out trade
secrets without anyone at the company being any wiser. Steganography can also be
used in the non-commercial sector to hide information that someone wants to keep
private. Spies have used it since the time of the Greeks to pass messages undetected.
Terrorists can also use steganography to keep their communication secret and to
coordinate attacks.

2.3CRYPTOGRAPHY
2.3.1 DEFINITION
Cryptography is the study of mathematical techniques related to aspects of
information security such as confidentiality, data integrity, entity authentication, and
data origin authentication.

Cryptography is not the only means of providing

information security, but rather one set of techniques.


2.3.2 CRYPTOGRAPHIC GOALS
The following are the four basic objectives form a framework for the other
goals.
4

Privacy or confidentiality
Data Integrity.
Authentication
Non-repudiation.

1. Confidentiality is a service used to keep the content of information from


all but those authorized to have it. Secrecy is a term synonymous with confidentiality
and privacy.

There are numerous approaches to providing confidentiality, ranging

from physical protection to mathematical algorithms that render data unintelligible.


2. Data integrity is a service that addresses the unauthorized alteration of
data. To assure data integrity, one must have the ability to detect data manipulation
by unauthorized parties.

Data manipulation includes such things as insertion,

deletion, and substitution.


3. Authentication is a service related to identification.
applies to both entities and information itself.
communication should identify each other.

This function

Two parties entering into a

Information delivered over a channel

should be authenticated as to origin, date of origin, data content, time sent, etc.
For these reasons this aspect of cryptography is usually subdivided into two
major classes: entity authentication and data origin authentication. Data origin
authentication implicitly provides data integrity (for if a message is modified, the
source has changed).
4. Non-repudiation is a service that prevents an entity from denying previous
commitments or actions. When disputes arise due to an entity denying that certain
actions were taken, a means to resolve the situation is necessary. For example, one
entity may authorize the purchase of property by another entity and later deny such
authorization was granted. A procedure involving a trusted third party is needed to
resolve the dispute. A fundamental goal of cryptography is to adequately address
these four areas in both theory and practice. Cryptography is about the prevention
and detection of cheating and other malicious activities.

2.4 Watermarking:
We have witnessed an extraordinary growth of techniques for copyright
protection of different types of data, especially multimedia information. This interest
is not surprising in view of the simplicity of digital coping and dissemination: digital
copies can be made identical to the original and later reused or even manipulated.
Cryptography is an effective solution to the distribution problem, but in most
instances has to be tied to specialized and costly hardware to create tamper-proof
devices that avoid direct access to data in digital format (even so, there exist
software/hardware tools that allow to resample the analog output of the device with
decent results).
For instance, access control in set-boxes used for digital television
demodulation and decoding succeed in avoiding unauthorized access to programs that
are being broadcast in scrambled form, but fail in precluding further storage and
illegal dissemination actions. There is then an increasing need for software that
allows for protection of ownership rights and it is in this context where watermarking
techniques come to our help. Perceptible marks of ownership or authenticity have
been around for centuries in the form of stamps, scales, signatures or classical
watermarks,

nevertheless,

given

current

data

manipulation

technologies;

imperceptible digital watermarks are mandatory in most applications.

2.5 DIGITAL WATERMARKING


Digital watermarking is a technology for embedding various types
Of information in digital content in general, information for protecting copyrights and
proving the validity of data is embedded as a watermark.
Why do we need to embed such information in digital content using digital
watermark technology? The Internet boom is one of the reasons. It has become easy
to connect to the Internet from home computers and obtain or provide various
information using the World Wide Web (WWW).
All the information handled on the Internet is provided as digital content.
Such digital content can be easily copied in a way that makes the new file
indistinguishable from the original.

Then the content can be reproduced in large


6

quantities.
For example, if paper bank notes or stock certificates could be easily copied
and used, trust in their authenticity would greatly be reduced, resulting in a big loss.
To prevent this, currencies and stock certificates contain watermarks.

To prevent

this, currencies and stock certificates contain watermarks. These watermarks are one
of the methods for preventing counterfeit and illegal use.
Digital watermarks apply a similar method to digital content. Watermarked
content can prove its origin, thereby protecting copyright. A watermark also
discourages piracy by silently and psychologically deterring criminals from making
illegal copies.
A digital watermark is a distinguishing piece of information that is adhered to
the data that it is intended to protect, this meaning that it should be very difficult to
extract or remove the watermark from the watermarked object. Since, watermarking
can be applied to various types of data; the imperceptibility constraint will take
different forms, depending on the properties of the recipient (i.e. the human sense in
most practical cases)
In addition to imperceptibility are some desirable characteristics that a
watermark should possess, which are somewhat related to the so-called robustness
issue.

First, the watermark should be resilient to standard manipulations of

unintentional as well as intentional nature.

Second, it should be statistically

unresolvable, that is, a statistical analysis should not produce any advantage from the
attacking point of view, finally, the watermark should withstand multiple
watermarking to facilitate trailer tracing.

2.5.1 PRINCIPLE OF DIGITAL WATERMARKS.


A. watermark on a bank note has a different transparency than the rest of the
note when a light is shined on it. However, this method is useless in the digital world.
Currently there are various techniques for embedding digital watermarks. Basically,
they all digitally write desired information directly onto images or audio data in such
a manner that the images or audio data are damaged. Embedding a watermark should
not result in a significant increase or reduction in the original data.
7

Digital watermarks are added to images or audio data in such a way that they
are invisible or inaudible and unidentifiable by human eye or ear. Furthermore, they
can be embedded in content with a variety of the file formats. Digital watermarking
is the content protection method for the multimedia era.
2.5.2. GENERAL FEATURES REQUIRED FOR DIGITAL WATERMARKS.
1. Elements of digital content can be directly manipulated and information can be
embedded in them.
2. Deterioration of the enquiry of digital content is minimized.
3. Watermarks are retained and detectable after the digital content is edited,
compressed, or converted.
4. The structure of a watermark makes it difficult to detect or overwrite (alter) the
embedded information (watermark contents)
5. Processing required for watermarking and detection is simple.
6. Embedded watermark information cannot be eliminated without diminishing the
quality of the digital content that carries the watermark.
7. The watermark information embedded in digital content can be detected as
required.

2.5.3 TYPE OF WATERMARK


Watermarks and watermarking techniques can be divided into various
categories in various ways. Watermarking techniques can be divided into four
categories according to the type of document to be watermarked as follows:
Text Watermarking
Image

Watermarking

Audio

Watermarking

Video Watermarking

In the case of imagery, several different methods enable watermarking in the spatial
domain. An alternative to spatial watermarking is frequency domain watermarking.
In other way, the digital watermarks can be divided into three different types as
follows:
Visible watermark
Invisible-Robust watermark
Invisible-Fragile watermark
Visible watermark is a secondary translucent overlaid into the primary image. The
watermark appears visible to a casual viewer on a careful inspection. The invisiblerobust watermark is embedded in such a way that alternations made to the pixel
value are perceptually not noticed and it can be recovered only with appropriate
decoding mechanism. The invisible-fragile watermark is embedded in such a way
that any manipulation or modification of the image would alter or destroy the
watermark.
From application point of view digital watermark could be:
Source based
Destination based.
Source-based watermark are desirable for ownership identification or authentication
where a unique watermark identifying the owner is introduced to all the copies of a
particular image being distributed. A source-based watermark could be used for
authentication and to determine whether a received image or other electronic data has
been tampered with. The watermark could also be destination-based where each
distributed copy gets a unique watermark identifying the particular buyer. The
destination-based watermark could be used to trace the buyer in the case of illegal
reselling.

Fig.1. Types of water marking

2.5.4 MATERIALS SUITABLE FOR WATERMAKRING

Digital watermarking is applicable to any type of digital content, including


still images, animation, and audio data. It is easy to embed watermarks in material
that has a comparatively high redundancy level ("wasted").

Such as color still

images, animation, and audio data however, it is difficult to embed watermarks in


material with a low redundancy level, such as black-and-white still images.

2.5.5 STRUCTURE OF A TYPICAL WATERMARKING SYSTEM

10

Fig.2. Watermarking structure


Watermarking, like cryptography, also uses secret keys to map information to
owners, although the way this mapping is actually performed considerably differs
from what is done in cryptography, mainly because the watermarked object should
keep its intelligibility. In most watermarking applications embedment of additional
information is necessary. This information includes identifies of the owner, recipient
and/or distributor, transaction dates, serial numbers, etc. which play a crucial role in
adding value to watermarking products.

Every watermarking system consists at least of two different parts:


Watermark embedding unit and watermark detection and extraction unit. Figure 1
shows an example of embedding unit for still images. The unmarked image is passed
through a perceptual analysis block that determines how much a certain pixel can be
altered so that the resulting
Watermarked image is indistinguishable from the original. This takes into account
the human eye sensitivity to changes in flat areas and its relatively high tolerance to
small in edges. After this so-called perceptual-mask has been computed, the
information to be hidden is shaped by this mask and spread all over the original
11

image.

This spreading technique is similar to the interleaving used in other

applications involving coding, such as compact disc storage, to prevent damage of the
information caused by scratches or dust.
In our case, the main reason for this spreading is to ensure that the hidden
information services cropping of the image.

Moreover, the way this spreading is

performed depends on the secret key, so it is difficult to recover the hidden


information if one is not in possession of this key. In fact, a similar technique is used
in spread spectrum systems (more precisely, in Code-Division Multiple Access) to
extract the desired information from noise or other users. Addition key-dependent
uncertainly can be introduced in pixel amplitudes (recall that the added mask imposes
only an upper limit) finally; watermark is added to the original image.
Higher intensity (i.e. whiter) levels imply that higher perturbations can be
made at those pixels without perceptible distortion. Thus, the higher capacity areas
for hiding information correspond to edges. These masks are computed by using
some known results on how the human eye works in the spatial domain. Different
results are obtained when working on other domains, such as the DCT (Discreate
Cosine Transform) or Wavelet transform.

In fact, when working on the DCT

coefficients domain one may take advantage of the relative independence between the
maximum allowable perturbations at every coefficient. This is useful when dealing
with the mask for watermarking purposes.
Watermark detection involves deciding whether a certain image has been
watermarked with a given key. Note then that a watermark detector produces a
binary output. Important considerations here are the probability of correct detection
PD (i.e., the probability of correctly deciding that a watermark is present) and the
probability

of false alarm PF (i.e., the probability of incorrectly deciding that

an image has been watermarked with a certain key). These two measures allow us
to compare different watermarking schemes. One method will be superior if achieves
a higher PT) for a fixed PF. Note also that for a watermarking algorithm to be useful
it must work with extremely low probabilities of false alarm. Watermark detection
is usually done by correcting the watermarked image with a locally generated version
of the watermark at the receiver side. This correlation yields a high value when the
watermark has been obtained with the proper key.

It is possible to improve the


12

performance of the detector by eliminating original image-induced noise with signal


processing. It is worthy of remark that some authors propose using the original image
in the detection process. Although this simplifies further treatment of the watermark
in the receiver end, it is quite unrealistic for most applications, particularly those
related to E-commerce.

Once the presence of the watermark has been correctly detected, it is


possible to extract the hidden information. The procedure is also generally done by
means of a cross-correlation but in this case, an independent decision has to be taken
for every information bit with a sign slicer.

In fact, we have also shown that this

correlation structure has not been well founded and significant improvements are
achievable when image statistics are available.

Obviously, when extracting the information the most adequate parameter for
comparison purposes is the probability of bit error pb, identical to that used in digital
communications.

This is not surprising because watermarking creates a hidden

(sometimes called steganogrphic


Channel on which information is conveyed.

As stated above digital watermarking is often performed by masking. The


reason for digital watermarking is very different from Steganography. Where the
goal of Steganography is to transmit a message undetected, a digital watermark is
created as a sign of ownership/authorship. Since digital copies are inherently exact
replicas of the original unless noise or some type of lossy operation is performed,
there will be no way to tell them apart.

Therein lays the authorship/ownership

problem due to the likeness of the original and the copy. Digital watermarks can be
used to show proof of ownership by having your mark put into the file, so even if
both images are the same, if they contain your mark then you have a much stronger
case for copyright of ownership disputes.

Watermarks can be visible or invisible depending on the luminance in the


mask.

The higher the luminance, the greater the visibility of the watermark.
13

Attackers can use different types of image processing to remove or degrade the
watermark until it is illegible.

There are different recovery techniques but it is

usually helpful to have the original image when trying to recover the watermark.

2.5.6 ANALOG HOLE AND DIGITAL WATERMARK


While the entertainment industry may be moving towards an all-digital future,
environment, analog connections to the hundreds of millions of conventional
televisions, VCRs and the like will remain for a long time to come. This presents a
problem in that digital devices can capture and digitize unprotected analog signals,
easily circumventing current copy protection mechanisms. This issue, dubbed the
"analog
Hole", is a major source of unauthorized duplication and/or redistribution.
Entertainment industry leaders have expressed their concerns about this problem.

Video content, even when delivered digitally in a protected manner, must be


converted to an unprotected analog format to be viewed on the millions of analog
television sets in consumer homes. Once content is 'in the clear' in analog form, it
can be converted back into digital format which can then be subject to widespread
unauthorized copying and redistribution including over the Internet.

This problem

applies to all delivery means for audiovisual content, from DVDs to pay per view to
over the air broadcasts.
Digital watermarking is the most promising technology for "plugging the
analog hole" To help plug the analog hole, digital watermarks can be applied to
digital and analog entertainment content, and they will remain with the content even
when the content is transformed to different analog or digital formats or
manipulated/transmitted via standard digital devices.
The digital watermark helps identify the content and usage rights of
content, whatever the format, and prevent unauthorized copying. Digital
watermarks remain a part of the content and can be detected in any format
to prevent unauthorized copying.
However, the combination of the digital watermarking and encryption provide
14

content protection whether inside an encrypted channel, or rendered for consumption


and use with protection via digital watermarks.

15

Chapter 3:Software Requirement Speciation


3.1 Purpose
This project presents a hardware implementation of a digital watermarking system that can
insert invisible, semi fragile watermark information into compressed video streams in real
time. The watermark embedding is processed in the discrete cosine transform domain. To
achieve high performance, the proposed system architecture employs pipeline structure and
uses parallelism. Hardware implementation using field programmable gate array has been
done, and an experiment was carried out using a custom versatile breadboard for overall
performance evaluation. Experimental results show that a hardware-Based video
authentication system using this watermarking technique features minimum video quality
degradation and can withstand certain potential attacks, i.e., cover-up attacks, cropping,
and segment removal on video sequences. Furthermore, the proposed hardware based
watermarking system features low power consumption, low cost implementation, high
processing speed, and reliability.

3.2Product Scope
Recently, the advances in electronic and information technology, together with the rapid
growth of techniques for powerful digital signal and multimedia processing, have made the
distribution of video data much easier and faster. However, concerns regarding
authentication of the digital video are mounting, since digital video sequences are very
susceptible to manipulations and alterations using widely available editing tools. This issue
turns to be more significant when the video sequence is to be used as evidence.
In such cases, the video data should be credible. Consequently, authentication techniques
are needed in order to maintain authenticity, integrity, and security of digital video content.
As a result, digital watermarking (WM), a data hiding technique has been considered as
one of the key authentication methods. Digital watermarking is the process of embedding
an additional, identifying information within a host multimedia object, such as text, audio,
image, or video. By adding a transparent watermark to the multimedia content, it is
possible to detect hostile alterations, as well as to verify the integrity
16

3.3Overall Description
3.3.1 Product Perspective
A WM system can be implemented on either software or hardware platforms, or some
combinations of the two.
In software implementation, the WM scheme can simply be implemented in a PC
environment. The WM algorithms operations can be performed as machine code software
running on an embedded processor. By programming the code and making use of available
software tools, it can be easy to design and implement any WM algorithm at various levels
of complexity.
Over the last decade, numerous software implementations of WM algorithms for relatively
low data rate signals (such as audio and image data) have been invented. While the
software approach has the advantage of flexibility, computational limitations may arise
when attempting to utilize these WM methods for video signals or in portable devices.

Therefore, there is a strong incentive to apply hardware-based implementation for real-time


WM of video streams. The hardware-level design offers several distinct advantages over
the software implementation in terms of low power consumption, reduced area, and
17

reliability. It enables the addition of a tiny, fast and potentially cheap watermark embedded
as a part of portable consumer electronic devices. Such devices can be a digital camera,
camcorder, or other multimedia devices, where the multimedia data are watermarked at the
origin. On the other hand, hardware implementations of WM techniques require flexibility
in the implementation of both computational and design complexity. The algorithm must
be carefully designed to minimize any susceptibility, as well as maintaining a sufficient
level of security.

3.3.2 Product Functions

Video Compression

A video sequence is divided into multiple group of pictures (GOP), representing sets of
video frames which are neighboring in display order. An encoded MPEG-2 video sequence
is made up of two frame-encoded pictures: intraframes (I-frame) and interfaces (P-frame or
B-frame). P-frames are forward prediction frames and B-frames are bidirectional
prediction frames. Within a typical sequence of an encoded GOP, P-frames may be 10% of
the size of I-frames and Bframes are about 2% of the I-frames compression methods.

18

Watermark Generation

The block diagram of the proposed novel watermark generator is depicted in Fig. 4. A
secure watermark pattern is generated by performing expanding, scrambling, and
modulation on a primitive watermark sequence. There are two digital secret keys: Key 1 is
used for scrambling and Key 2 is used for the random number generator (RNG) module
that generates a pseudorandom sequence.

Watermark Embedding
This WM algorithm, capable of inserting a semifragile invisible watermark in a
compressed image in the DCT frequency domain, was modified and then applied in
watermarking of a video stream. In general, for each DCT block of a video frame, N cells
need to be identified as watermarkable and modulated by the watermark sequence.

19

The chosen cells contain nonzero DCT coefficient values and are found in the mid-frequency range.

Watermark Embedding steps


Input: Original video sequence
Ov[i, j], Grayscale watermark image WI [i, j]

Output: watermarked video sequence


Wv[i, j]

1) Segment the original input video sequence


Ov[i, j]into number of non-overlapping shots
Ss[i, j] using
shot segmentation technique. Then, identify the number of frames
Fp[i, j] involved in each segmented
shots
Ss[i, j] for embedding purpose.

2) Slice the grayscale watermark image

3) Permute the sliced images SI [i, j] using a pixel permutation technique to obtain the
20

permuted grayscale
image
PI [i, j] .

4) Extract the blue components


B [i, j]
Fp
of all the partitioned frames for embedding the each sliced image
SI [i, j] into the blue components of each frame.

5) Split the image into small blocks (8 x 8) and decompose the blue components
B [i, j]
Fp
of each
partitioned frame
Fp[i, j] into AC and DC coefficients by DCT.

6) Choose the low frequency sub-bands from the transformed frames to embed the
permuted grayscale
image
PI [i, j] .

7) Find the similarity matrix of the permuted image to embed into the chosen coefficient.
The embedding process should repeat for all blocks of DCT. ] , [jiPI], WI [i, j] into 8 bit
planes SI [i, j] using bit plane slicing.

Watermrak Extraction Process


After embedding the grayscale watermark image pixels into the original video sequence,
21

we have extracted
the embedded watermark image without affecting the original video.

Input: watermarked video sequence


Wv[i, j], size of the watermark image.

Output: recovered watermark image WI [i', j']

1) Segment the watermarked video sequence


Wv[i, j] into a number of non-overlapping shot
Ss[i', j']
using the shot segmentation technique. Then, identify the number of frames
Fp[i', j'] involved in each
segmented shots
Ss[i', j'] for the extraction process.

2) Extract the blue components of all the partitioned frames for extracting the embedded
watermark pixels
3) Decompose the blue components of the frames with the aid of the DCT into AC and DC
coefficients.
4) Select the low frequency components from the transformed frames to extract the
watermark gray scale image.

5) Extract the watermark pixels from the embedding part in a zig-zag manner from the
each blocks with the aid of the following steps. If the embedded pixel

6) value is greater than the mean pixel value, then the extracted pixel value is one. If it is
lesser, then the extracted pixel is zero.
22

7) Form the matrix with the size of the watermark image and the extracted pixels are
placed in it to attain the watermark image.

8) Obtain the watermark image by applying the reverse process of permutation and bit
plane slicing.

3.3.3Operating Environment
The systems is proposed to run on computers which are connected to CCTV cameras, Or
on DVRs which in turn stores the video on hard drives.

3.4 System Features


1. Content Creation
a. Capturing
b. Compression
c. Encryption
d. Watermarking
e. Transmission/Storage
2. (Re)Distribution
a. Transcoding
b. Watermarking
c. Logo Insertion
d. Multiplexing
3. Video reception
a. In-House Transcoding
b. Decryption
c. Decompression
d. Play-Out

23

3.5. External Interface Requirement


1.HARDWARE REQUIREMENTS
*

Intel Pentium III 2.4Ghz Processor

256 MB DDR RAM.

*
*

40GB HDD
1.44 MB FDD

15" Monitor

2. SOFTWARE REQUIREMENTS
Operating System; WINDOWS
Language used: JAVA

24

3.6 Analysis Model

3.6.1 Class Diagram:

25

3.6.2 Dataflow Diagrams

Copyright information

Video file

Overwrite

Temporary
file

Watermarking

Key file

Dataflow diagram of water marking

Watermarked file

Key file

Temporary File
Dewatermarking

Copyright Protection

Dataflow diagram of dewater marking


26

3.6.3 DFD Combined :

27

3.6.4 Block diagram

28

Chapter 4 : System Design


4.1 Introduction:
System design of the project is the most important part in implementation of the project.
System design effectively gives the flow and all the necessary information about the design
of the project.

4.2 UML Diagrams:

Use-case

29

Class Diagram

30

Activity Diagram:

31

Communication Diagram:

32

Component Diagram:

33

Sequence Diagram:

34

State Chart Diagram:

35

Interaction diagram:

36

Object Diagram:

37

Package Diagram:

38

Deployment Diagram:

39

Chapter 5: Conclusion

5.1 Advantages:
1 )Invisible watermark is really hard to identify to attacker
2) Adding key to the video file can protect from local users
3) It's really hard to find out where exactly water mark is embedded

5.2 Disadvantages:
1) While extracting the embedded watermark from video Quality of
video can't be respected
2 )Anonymous user can look into the meta-data of the video file
3 )While sharing on the network video file it takes long time
4) Long bandwidth is required from the both side

5.3 Applications Of Digital Watermarking


Video Watermarking. In this case, most considerations made in previous
sections hold. However, now the temporal axis can be exploited to increase the
redundancy of the watermark. As in the still images case, watermarks can be created
either in the spatial or in the DCT domains. In the later, the results can be directly
extrapolated to MPEG-2 sequences, although different actions must be taken for I, P
and B frames. Note that perhaps the set of attacks that can be performed intentionally
is not smaller but definitely more expensive than for still images.
Audio Watermarking. Again, previous considerations are valid. In this
case, time and frequency masking properties of the human car are used to conceal the
watermark and make it inaudible.

The greatest difficulty lies in synchronizing the


40

watermark and the watermarked audio file, but techniques that overcome this problem
have been proposed.
Hardware/Software Watermarking. This is a good paradigm that allows us
to understand how almost every kind of data can be copyright protected. If one is
able to find two different ways of expressing the same information, then one bit of
information can be concealed, something that can be easily generalized to any
number of bits. This is why it is generally said that a perfect compression scheme
does not leave room for watermarking.

In the hardware context, Boolean

equivalences can be exploited to yield instances that use different types of gates and
that can be addressed by the hidden information bits. Software can be also protected
not only by finding equivalences between instructions,
Variable names, or memory address, but also by altering the order of non-critical
instructions. All this can be accomplished at computer level.

Text Watermarking: This problem, which in fact was one of the first that
was studied within the information hiding area, can be solved at two levels. At the
printout level, information can be encoded in the way the text times or words are
separated (this facilitates the survival of the watermark even to photocopying).
the semantic level (necessary when raw text files are provided).

At

Equivalences

between words or expressions can be used, although special care has to be taken not
to destruct the possible intention of the author.

Executable Watermarks. Once the hidden channel has been created it is


possible to include even contents, provided that the corresponding applet is running
on the end user side.
Labeling.

The hidden message could also contain labels that allow for

example to annotate images or audio.

Of course, the annotation may also been

included in a separate file, but with watermarking it results more difficult to destroy
or loose this label, since it becomes closely tied to the object that annotates. This is
especially useful in medical applications since it prevents dangerous errors.
Fingerprinting.

This is similar to the previous application and allows


41

acquisition devices (such as video cameras, audio recorders, etc.) to insert


information about the specific device (e.g. an ID number) and date

of creation.

This can also be done with conventional digital


Signature techniques but with watermarking it becomes considerably more difficult to
excise or alter the signature. Some digital cameras include this feature.

Authentication. This is a variant of the previous application, in an area


where cryptographic techniques have already made their way. However, there are
two significant benefits that arise from using watermarking: first, as in the previous
case, the signature becomes embedded in the message, second, it is possible to create
'soft authentication' algorithms,

that offer a multi valued 'perceptual closeness'

measure that accounts for different unintentional transformations that the data may
have suffered (an example is image compression with different levels), instead of the
classical yes/no answer given by cryptography-based authentication. Unfortunately,
the major drawback of watermarking-based authentication is the lack public key
algorithms that force either to put secret keys in risk or to resort to trusted parties.
Copy and Playback Control. The message carried by the watermark may
also contain information regarding copy and display permissions.

Then, a secure

module can be added in copy or playback equipment to automatically extract this


permission information and block further processing if required.

In order to be

effective, this protection approach requires agreements between content providers and
consumer electronics manufacturers to introduce complaint watermark detectors in
their video players and recorders. This approach is being taken in Digital video Disc
Signaling.

The imperceptibility constraint is helpful when transmitting

signaling information in the hidden channel. The advantage of using this channel is
that no bandwidth increase is required. An interesting application in broadcasting
consists in watermarking commercials with signaling information that permits an
automatic counting device to assess the number of times that the commercial has been
broadcast during a certain period.

An alternative to this would require complex

recognition software.

42

5.4 Conclusion:

Digital watermarking has been proposed as a possible brick of multimedia content


protection systems, but its application in realistic scenarios has raised several issues.
Secure watermarking has then been designed to solve some of these issues.
In this project, we propose a robust digital video watermarking procedure to embed
and extract the watermark image into digital video frames by using DCT.

43

Chapter 6: Bibliography

Secure

A Block Based Novel Digital Video Watermarking Scheme Using Dct IOSR
Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN:
2278-2834, p- ISSN: 2278-8735. Volume 5, Issue 2 (Mar. - Apr. 2013)

Hardware Implementation of a Digital Watermarking System for Video


Authentication IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR
VIDEO TECHNOLOGY, VOL. 23, NO. 2, FEBRUARY 2013.

Block Based Video Watermarking Scheme Using Wavelet Transform and


Principle Component Analysis IJCSI International Journal of Computer Science
Issues, Vol. 9, Issue 1, No 3, January 2012

Digital Video Watermarking Using Discrete Cosine Transform And Perceptual


Analaysis International Journal Of Computational Engineering Research
(ijceronline.com) Vol. 2 Issue. 5 ,September| 2012

Watermarking
for
Multimedia
Content
Protection1053
5888/13/$31.002013IEEE IEEE SIGNAL PROCESSING MAGAZINE [87]
march 2013.

44

You might also like