You are on page 1of 4

ISSN 2319-8885

Vol.05,Issue.40
November-2016,
Pages:8381-8384
www.ijsetr.com

Watermarking of H.264/CAVLC Inter-Frames for Copyright Protection


SHAIK AYAT ATHAR1, C. RAJESWARI2
1
PG Scholar, Dept of ECE, G. Pulla Reddy College of Engineering & Technology(Autonomous), Kurnool, AP, India,
E-mail: ayatathar6@gmail.com.
2
Assistant Professor, Dept of ECE, G. Pulla Reddy College of Engineering & Technology(Autonomous), Kurnool, AP, India,
E-mail: rajeswari.ch@gmail.com.

Abstract: An efficient watermarking scheme for H.264/CAVLC video is proposed. The watermark information is embedded
into encrypted bit streams, which are compressed by H.264/CAVLC codec. Encrypting the codeword’s of motion vector
differences instead of directly adding the watermark is a necessity for copy right protection and confidentiality of the content.
The data hider may embed additional data in the encrypted domain by using bit wrapping technique. Experimental results have
demonstrated the feasibility and efficiency of the proposed scheme .The results shows that used method provides better
performance in terms of computational efficiency, high data security and video quality after decryption. The parameters such as
Mean square error, PSNR, correlation and SSIM are evaluated to measure its efficiency.

Keywords: H.264/CAVLC, Encryption, Video Watermarking.

I. INTRODUCTION images. To the best of knowledge, there has been no report


Video watermarking is of great interest due to its wide on the implementation of data embedding in encrypted
applicability in the context of DRM (digital rights H.264/CAVLC video streams. Only few joint data
management). This paper presents a novel watermarking embedding and encryption approaches that focus on video
technique that allows implementing watermarking of have been proposed. In[9], during H.264/AVC compression,
encrypted video which is compressed by H.264 codec. The the intra-prediction mode (IPM), motion vector difference
bit wrapping technique is used to embed text, whereas logo (MVD) and DCT coefficients’ signs are encrypted. In [12], a
is scrambled or descrambled using Arnold transform. By combined scheme of encryption and watermarking is
using this technique, addition data in the form of text or presented. In Non blind structure preserving substitution
image/logo can b embedded in the encrypted domain of watermarking of H.264/CAVLC Inter-Frames substitution
compressed video. Thus the security and privacy of the method. This watermarking algorithm enables extremely
content is provided by watermarking. This technology can efficient watermark embedding by simple bit substitutions.
also be applied to other prominent application scenarios. For The bit-substitutions change the motion vector differences.
example, when medical videos or surveillance videos have Furthermore this watermarking algorithm can be applied in
been encrypted for protecting the privacy of the people, a applications scenarios which require that watermarking
database manager may embed the personal information into preserves the length of the bit stream units (structure-
the corresponding encrypted videos to provide the data preserving watermarking).
management capabilities in the encrypted domain.
II. PROPOSED METHOD
A. Previous Work A novel scheme of data embedding in the encrypted
Till now, few successful data embedding schemes in the version of H.264/AVC videos is presented, which includes
encrypted domain have been reported.In[1], a watermarking three parts, i.e., H.264/AVC video encryption, data
in the encrypted domain using Paillier cryptosystem is embedding and data extraction. The content owner encrypts
proposed.A Walsh-Hadamard transform based image the original H.264/AVC video stream using standard stream
watermarking algorithm in the encrypted domain using ciphers with encryption keys to produce an encrypted video
Paillier cryptosystem is presented in [2].The several stream. Then, the data can be embedded into the encrypted
investigations on reversible data embedding in encrypted video stream by using Arnold transform and bit wrapping
images are reported in [3]–[7] recently. The encryption is technique. At the receiver end, the embedded data is
done by using bit-XOR (exclusive-OR) operation. In these extracted using decryption key and inverse Arnold
techniques, however, the host image is in an uncompressed transforms.
format. In [8], a robust watermarking algorithm is proposed
to watermark the compressed and encrypted JPEG2000

Copyright @ 2016 IJSETR. All rights reserved.


SHAIK AYAT ATHAR, C. RAJESWARI
A. Input Video and Frame Separation compression performance. Typical applications are in the
context of mobile devices (720p has become the resolution
of the lead devices), where power and computational
constraints outweigh compression labeled “Codeword”).

TABLE I: CAVLC: Coding of MVDS

Fig.1. Input video.


A separate MVD is coded for the x- and y-direction. The
The input video is of aviformat. It is subjected to frame code words of MVD are listed in table 1.
separation as shown in Fig.1. The frames are converted into
still images as shown in Fig.2. The process flow is as follows
C. Video Encryption
Motion Vector Difference (MVD) Encryption: In order
to protect both texture information and motion information,
the motion vectors should be encrypted. In H.264/CAVLC,
motion vector prediction is further performed on the motion
vectors, which yields MVD. In H.264/CAVLC baseline
profile, Exp-Golomb entropy coding is used to encode MVD.
The last bit of the codeword is encrypted by applying the
bitwise XOR operation with a standard stream cipher, which
is determined by an encryption

Watermark Embedding: The logo and text are embedded


into encrypted bit streams using Arnold transform and bit
Fig.2. Frame separation. wrapping method. The text is embedded using following
steps.
B. Video Compression using H.264/CAVLC Codec Step1: The encrypted bits should be converted in binary
The design of H.264 follows the hybrid video coding form.
approach[11]. The frames are processed in macroblocks. Step2: The encrypted bits be Ebits and the embedding bits
Each macro block can be predicted using previously be M bits. If Ebit = Mbit ,then M bit is unchanged.
processed macro blocks of the same frame (intra-prediction) Step3: If Ebit>Mbit, then they are bit ored.
or other frames (inter-prediction). The macro blocks can be Step 4: If Ebit<Mbit,then they are bit anded.
further subdivided (sub-macroblock partitions), the smallest
block size is . A coded video sequence always starts with the For embedding logo ,each frame to be embedded is
coded data of an intra-predicted frame (Iframe). The added to logo multiplied by alpha as shown in Fig.3. The
distortion of I frames spreads on all subsequently decoded alpha value should lie between 0 and 1.
frames due to inter prediction. After an I frame inter-
predicted frames that may use one reference frame (P frame)
or two reference frames (B frame) follow. Frames (even P
and B frames)may be used as reference, frames which are
not used for inter-frame prediction are called non-reference
frames. Inter-prediction is conducted by motion estimation
and motion compensation, which are conducted with quarter
pixel accuracy. The motion vectors(MVs)of a block a
Fig.3.logo.
repredicted by neighbouring blocks (a detailed description
can be found in [12]) and the motion vector difference
For embedding logo shown above, watermarked frame will
(MVD) is actually coded in the bitstream (which codes
be as below
quarter pixel differences). There are two distinct coding
modes in H.264, namely CAVLC and CABAC. CAVLC is WF=I+ logo(alpha)
computationally less expensive (at the cost of a lower
Where WF is watermarked frame
compression performance) and thus is employed in cases
where computational complexity constraints outweigh the Alpha is a constant that lies between 0 and 1.

International Journal of Scientific Engineering and Technology Research


Volume.05, IssueNo.40, November-2016, Pages: 8381-8384
Watermarking of H.264/CAVLC Inter-Frames for Copyright Protection
Watermark Extraction: Watermark extraction is reverse TABLE II: Parameter Analysis For Different Inputs
process of watermark embedding as shown in Fig.4. After Compression
Applying inverse Arnold transform logo is extracted, which
could be decrypted using decryption Key as shown in Fig.5.

TABLE III: Parameter Values for Different Input


Videos And QP Values In Decrypted Videos

Fig.4.Recovered watermark logo.

Fig.5. Recovered frames.

III. EXPERIMENTAL RESULTS AND ANALYSIS


The Quality of the reconstructed image is measured in
terms of mean square error (MSE) and peak signal to noise
ratio (PSNR) ratio.

Mean Square Error:The MSE is often called reconstruction


error variance q2. The MSE between the original image f
and the reconstructed image g at decoder is defined as:

(1) Fig.6. Comparison between PSNR and NSI for existing


Where the sum over j, k denotes the sum over all pixels in and proposed methods.
the image and N is the number of pixels in each image. From
that the peak signal-to-noise ratio is defined as the ratio The PSNR and NSI comparison for existed and proposed
between signal variance and reconstruction error variance. method. Thus, PSNR increases for proposed method as
Peak Signal to Noise Ratio: The PSNR between two images shown in Fig.6.
having 8 bits per pixel in terms of decibels (dBs) is given by: IV. CONCLUSION
Data hiding and watermarking in encrypted media is a new
topic that has started to draw attention because of the
privacy-preserving requirements from cloud data
(2) management. In this paper, an algorithm to embed additional
International Journal of Scientific Engineering and Technology Research
Volume.05, IssueNo.40, November-2016, Pages: 8381-8384
SHAIK AYAT ATHAR, C. RAJESWARI
data in encrypted H.264/AVC bit stream is presented, which [11]E. G. Richardson, H.264 and MPEG-4 Video
consists of video encryption, data embedding, logo Compression: Video Coding for Next Generation
watermarking and data, watermark extraction phases. The Multimedia. New York, NY, USA: Wiley, 2003 ITU-T
algorithm can preserve the bit-rate exactly even after H.264, “Advanced video coding for generic audiovisual
encryption and data, watermark embedding, and is simple to services,” Nov. 2007.
implement as it is directly performed in the compressed and
encrypted domain, Since hiding is completed entirely in the
encrypted domain, our method can preserve the
confidentiality of the content completely. With an encrypted
video containing hidden data, data extraction can be carried
out either in encrypted or decrypted domain, which provides
two different practical applications. Another advantage is
that it is fully compliant with the H.264/CAVLC syntax and
the embed logo is used for copyright protection.
Experimental results have shown that the proposed
encryption, data and logo embedding scheme can preserve
file-size, whereas the degradation in video quality caused by
hiding is quite small. Further we can implement by
combination of cryptography, steganography and
watermarking for high resolution video.

V. REFERENCES
[1]B. Zhao, W. D. Kou, and H. Li, “Effective watermarking
scheme in the encrypted domain for buyer-seller
watermarking protocol,” Inf. Sci., vol. 180, no. 23, pp. 4672–
4684, 2010.
[2]P. J. Zheng and J. W. Huang, “Walsh-Hadamard
transform in the homomorphic encrypted domain and its
application in image watermarking,” in Proc. 14th Inf.
Hiding Conf., Berkeley, CA, USA, 2012, pp. 1–15
[3]W. Puech, M. Chaumont, and O. Strauss, “A reversible
data hiding method for encrypted images,” Proc. SPIE, vol.
6819, pp. 68191E-1–68191E-9, Jan. 2008.
[4]X. P. Zhang, “Reversible data hiding in encrypted image,”
IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr.
2011.
[5]W. Hong, T. S. Chen, and H. Y. Wu, “An improved
reversible data hiding in encrypted images using side
match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–
202, Apr. 2012.
[6]X. P. Zhang, “Separable reversible data hiding in
encrypted image,” IEEE Trans. Inf. Forensics Security, vol.
7, no. 2, pp. 826–832, Apr. 2012.
[7]K. D. Ma, W. M. Zhang, X. F. Zhao, N. Yu, and F. Li,
“Reversible data hiding in encrypted images by reserving
room before encryption,” IEEE Trans. Inf. Forensics
Security, vol. 8, no. 3, pp. 553–562, Mar. 2013
[8]V. Subramanyam, S. Emmanuel, and M. S. Kankanhalli,
“Robust watermarking of compressed and encrypted
JPEG2000 images,” IEEE Trans. Multimedia, vol. 14, no. 3,
pp. 703–716, Jun. 2012.
[9]S. G. Lian, Z. X. Liu, and Z. Ren, “Commutative
encryption and watermarking in video compression,” IEEE
Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774–
778, Jun. 2007.
[10]S. W. Park and S. U. Shin, “Combined scheme of
encryption and watermarking in H.264/scalable video coding
(SVC),” New Directions Intell. Interact. Multimedia, vol.
142, no. 1, pp. 351–361, 2008.
International Journal of Scientific Engineering and Technology Research
Volume.05, IssueNo.40, November-2016, Pages: 8381-8384

You might also like