2. CONTENTS
• Introduction
• Need for video watermarking
• Video watermarking terminologies
• Types for video watermarking
• Desired properties
• Application of watermarking
Structure of a Typical Video Watermarking
System
• An algorithm of video watermarking
• Attack on watermark
• Conclusion
• References
3. INTRODUCTION
Definition: A digital watermark is a digital signal or
pattern inserted into a digital document such as
text, graphics or multimedia, and carries
information unique to the copyright owner.
Video watermarking is an extension of this
concept.
4. Need for video watermarking
Protect copyright of a data.
Video Watermarking can help
◦ Prove ownership
◦ Identify a misappropriating person
◦ Trace the video dissemination
Broadcast Monitoring
Video watermarking introduces some issues not
present in image watermarking
Frame averaging, frame dropping, frame
swapping …
6. TYPES of Video Watermarking
Two types :-
1. Visible
2. Invisible
Visible watermarks
it’s use : -
1. To discourage unauthorized usage.
2. As an advertisement
Visible watermarking algorithm
Least Significant Beat (LSB)
8. Invisible watermarks
Three types of Invisible watermark :
1. Robust Watermarks
2. Fragile Watermarks
3. Public and Private Watermark
No degradation in the aesthetic quality of the
data.
Invisible Robust Video Watermarking Techniques
Spatial Domain Method
Frequency Domain Method
9. DESIRED PROPERTIES
Robust
Video watermarking ( frame averaging, frame
dropping, frame swapping... )
Recoverable from a document
Removable by authorized users
Low error probability
Provide the original information embedded
reliably
Capacity
Invisible
10. APPLICATION OF WATERMARKING
• Owner Identification
• Proof of Ownership
• Transaction Tracking
• Content Authentication
• Broadcast Monitoring
• Device Control
• Automatic monitoring of copyrighted material on
the Web
11. A Generic approach to watermarking digital
data
There are 3 main processes involved in
watermarking —
1. Insertion of a watermark
2. Detection of a watermark
3. Removal of a watermark
12. Inserting a watermark
It consists of :-
A watermark insertion unit that uses:-
a. Original video
b. Watermark
c. A user key
to obtain the watermarked video.
13. watermark insertion unit
The user key , input video and the watermark
are passed through a watermark insertion unit.
This results in a watermarked video.
15. Watermark Detection Unit
Consists of :-
a. An extraction unit to first extract the
watermark.
b. Compare it with the original watermark
inserted.
c. The output is Yes or No depending on
whether the watermark is present.
16.
17. A watermarking algorithm — The LSB
technique
Let’s consider still images.
Each pixel of the color image has three
components — red, green and blue.
3 bytes for each pixel.
Each color has 1 byte, or 8 bits.
Each bits has it’s own value 2pow(n) .
18.
19. The LSB technique…….
A pixel that is bright purple in color can
be shown as
X0 = {R=255, G=0, B=255}
Another pixel:
X1 = {R=255, G=0, B=254}
20. The Algorithm
1.A raw bitmap image „A’ will be selected from the set of standard test images. Let
this be the base image on which the watermark will be added.
2. A raw bitmap image „B‟ will be selected from the set of standard test images. This
will be the watermark image which will be added to the base image.
3. The most significant bit henceforth will be mentioned as MSB, of watermark image
„B‟ will be read and these will be written on the least significant bit, henceforth will
be mentioned as LSB, of base image „A‟.
4. Thus, „A’ will be watermarked with ‘B’ resulting in a combined image ‘C‟.
5. ‘C’ therefore will now contain an image ‘A’ which has its LSBs replaced with
the MSBs of ‘B‟.
6. This technique is used to add an invisible and visible watermark.
23. An Algorithm of Invisible Video Watermarking
Raw video watermarking
◦ DWT (Discrete wavelet transform)
◦ DCT ( Discrete cosine transform)
◦ DFT ( Discrete frequency transform)
25. Advantage of DWT
Prevent from frame dropping
Prevent from adding noise / another video
Mark with m1 Mark with m3 Mark with m0 Mark with m6
Scene change occur
26. Watermark Preprocess
Safe from frame averaging
Hard to reconstruct the watermark
Place the bit-
planes side by
side
85 Bit
17
m0
64 Decomposition 0
0 4 0 4
Crop 1 5 25 1 5
2 6 8 bit-
6 2 6
3 7 planes 3 7
17
m7
0
0 4
25 1 5
8 bit-
6 2 6
planes 3 7
Total 8 images
is obtained
28. Watermark Detection
Mark with m1 Mark with m3 Mark with m0 Mark with m6
Scene change occur
1. Video Frame
3. DWT
256 X 256 2. Detect the scene change
4. Compare
Original video frames
DWT result frames
5. Averaging the watermark
get from different frames
170
85 6. Combine 8 bit-planes 0 4
64 Watermark mi 256 1 5
7. Get different part of W 2 6
from different scene and 3 7
m0 m4 reconstruct the large image Extracted Original
256 m1 m5
m2 m6
8. Correlate and verify E O
m3 m7
170
29. Future Direction
Implement and use do experiment on the
scheme
Identifiable from very short segment of video
Change to blind watermarking scheme
31. CONCLUSION
Need due to Copyright protection
Different from image watermarking
Brief review of current technologies
DWT-based Video Watermarking Scheme with
Scramble Watermark
Future Direction
Inadequate for general use
Different tools offering this watermarking
Set to grow
32. REFERENCES
F. Hartung and M. Kutter, “Multimedia watermarking techniques”,Proceedings of the
IEEE, vol. 87, no. 7 , July1999.
I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking
for images, audio and video,” in Proc. IEEE Int. Conf. Image Processing (ICIP 96),
Lausanne, Switzerland, Sept. 1996.
Yeo and M.M. Yeung, “Analysis and synthesis for new digital video applications,” icip,
International Conference on Image Processing (ICIP'97),vol. 1, pp.1,1997.
Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom “Digital Watermarking” Morgan
Kaufmann Publishers ISBN: 1-55860-714-5
http://www-ee.uta.edu/dip/Courses/EE5355/jpeg.html
“Privacy principles for digital watermarking”, Ver. 1.0, May 2008. Website:
https://www.cdt.org/