SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
VIDEO WATERMARKING


Presented by:-
MANJESH KUMAR
(12100027)
                          Guided by:-
                 Dr. David Peter S.
CONTENTS

• Introduction
• Need for video watermarking
• Video watermarking terminologies
• Types for video watermarking
• Desired properties
• Application of watermarking
   Structure of a Typical Video Watermarking
     System
• An algorithm of video watermarking
• Attack on watermark
• Conclusion
• References
INTRODUCTION

Definition: A digital watermark is a digital signal or
 pattern inserted into a digital document such as
 text, graphics or multimedia, and carries
 information unique to the copyright owner.

   Video watermarking is an extension of this
    concept.
Need for video watermarking
   Protect copyright of a data.
   Video Watermarking can help
    ◦ Prove ownership
    ◦ Identify a misappropriating person
    ◦ Trace the video dissemination

   Broadcast Monitoring
   Video watermarking introduces some issues not
    present in image watermarking
   Frame averaging, frame dropping, frame
    swapping …
Video watermarking terminologies

•   Digital Video

•   Payload

•   Perceptibility

•   Robustness

•   Security
TYPES of Video Watermarking

   Two types :-

          1. Visible

          2. Invisible


   Visible watermarks
          it’s use : -

         1. To discourage unauthorized usage.
         2. As an advertisement

   Visible watermarking algorithm

        Least Significant Beat (LSB)
EXAMPLE OF VISIBLE VIDEO
WATERMARKING
Invisible watermarks

Three types of Invisible watermark :
1.    Robust Watermarks
2.    Fragile Watermarks
3.    Public and Private Watermark

    No degradation in the aesthetic quality of the
     data.

    Invisible Robust Video Watermarking Techniques
        Spatial Domain Method
        Frequency Domain Method
DESIRED PROPERTIES

   Robust
        Video watermarking ( frame averaging, frame
        dropping, frame swapping... )
   Recoverable from a document
   Removable by authorized users
   Low error probability
   Provide the original information embedded
    reliably
   Capacity
   Invisible
APPLICATION OF WATERMARKING

•   Owner Identification
•   Proof of Ownership
•   Transaction Tracking
•   Content Authentication
•   Broadcast Monitoring
•   Device Control
•   Automatic monitoring of copyrighted material on
    the Web
A Generic approach to watermarking digital
 data

   There are 3 main processes involved in
    watermarking —

        1. Insertion of a watermark

        2. Detection of a watermark

        3. Removal of a watermark
Inserting a watermark

   It consists of :-

    A watermark insertion unit that uses:-

    a. Original video
    b. Watermark
    c. A user key

    to obtain the watermarked video.
watermark insertion unit
 The user key , input video and the watermark
  are passed through a watermark insertion unit.

   This results in a watermarked video.
Watermark Extraction Unit
 Two phases:-


 1. Locating the watermark

 2. Recovering the watermark information.
Watermark Detection Unit

   Consists of :-

    a. An extraction unit to first extract the
    watermark.

     b. Compare it with the original watermark
    inserted.

    c. The output is Yes or No depending on
    whether the watermark is present.
A watermarking algorithm — The LSB
  technique
 Let’s consider still images.


   Each pixel of the color image has three
    components — red, green and blue.

   3 bytes for each pixel.

   Each color has 1 byte, or 8 bits.
   Each bits has it’s own value 2pow(n) .
The LSB technique…….
   A pixel that is bright purple in color can
    be shown as

   X0 = {R=255, G=0, B=255}

   Another pixel:

   X1 = {R=255, G=0, B=254}
The Algorithm
1.A raw bitmap image „A’ will be selected from the set of standard test images. Let
this be the base image on which the watermark will be added.
2. A raw bitmap image „B‟ will be selected from the set of standard test images. This
will be the watermark image which will be added to the base image.
3. The most significant bit henceforth will be mentioned as MSB, of watermark image
„B‟ will be read and these will be written on the least significant bit, henceforth will
be mentioned as LSB, of base image „A‟.
4. Thus, „A’ will be watermarked with ‘B’ resulting in a combined image ‘C‟.
5. ‘C’ therefore will now contain an image ‘A’ which has its LSBs replaced with
the MSBs of ‘B‟.
6. This technique is used to add an invisible and visible watermark.
Distortions and attacks
   Additive Noise.

   Cropping.

   Compression.

   Statistical Averaging.

   Multiple Watermarking.

   Mosaic Attack
An Algorithm of Invisible Video Watermarking


   Raw video watermarking

    ◦ DWT (Discrete wavelet transform)

    ◦ DCT ( Discrete cosine transform)

    ◦ DFT ( Discrete frequency transform)
Discrete Wavelet Transform
 Normalized to 256 X 256 pixel size


   Perform DWT for each frame
Advantage of DWT
   Prevent from frame dropping
   Prevent from adding noise / another video




      Mark with m1   Mark with m3       Mark with m0     Mark with m6




                                    Scene change occur
Watermark Preprocess
   Safe from frame averaging
   Hard to reconstruct the watermark

                                                              Place the bit-
                                                              planes side by
                                                                   side
                           85       Bit
                                                                    17
                                                             m0
                      64            Decomposition                   0
                            0   4                               0        4
               Crop         1   5                            25 1        5
                            2   6                   8 bit-
                                                             6 2         6
                            3   7                   planes      3        7



                                                                    17
                                                             m7
                                                                    0
                                                                0        4
                                                             25 1        5
                                                    8 bit-
                                                             6 2         6
                                                    planes      3        7
                                                              Total 8 images
                                                               is obtained
Watermark Embedding

 C[i] = C[i] + 1     , if W[j] = 1
 C[i] = C[i]         , otherwise
 LL, HH is not watermark


         LL HL                             170
         LH HH
               HL3
                       HL2             0         4
         LH3 HH3
                             HL1
                                   256 1         5
           LH2         HH2             2         6
                                       3         7
                                       Watermark mi

                 LH1         HH1
Watermark Detection

                                                      Mark with m1       Mark with m3        Mark with m0          Mark with m6



                                                                                        Scene change occur
       1. Video Frame
                                   3. DWT
          256 X 256                                           2. Detect the scene change


                                                                  4. Compare
                                                                                                               Original video frames

              DWT result frames
                                                                          5. Averaging the watermark
                                                                           get from different frames



                                                                         170
             85             6. Combine 8 bit-planes                  0            4
64    Watermark mi                                    256            1            5
                         7. Get different part of W                  2            6
                         from different scene and                    3            7
      m0         m4     reconstruct the large image                                                          Extracted            Original
256   m1         m5
      m2         m6
                                                        8. Correlate and verify                                E                  O
      m3         m7
           170
Future Direction

   Implement and use do experiment on the
    scheme

   Identifiable from very short segment of video

   Change to blind watermarking scheme
ATTACK ON WATERMARK



   Compression           •   Frame averaging
   Rescaling             •   Frame dropping
   Cropping              •   Frame swapping
   Multiple watermarks   •   Statistical analysis
CONCLUSION

 Need due to Copyright protection
 Different from image watermarking
 Brief review of current technologies
 DWT-based Video Watermarking Scheme with
  Scramble Watermark
 Future Direction
 Inadequate for general use
 Different tools offering this watermarking
 Set to grow
REFERENCES

   F. Hartung and M. Kutter, “Multimedia watermarking techniques”,Proceedings of the
    IEEE, vol. 87, no. 7 , July1999.
   I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking
    for images, audio and video,” in Proc. IEEE Int. Conf. Image Processing (ICIP 96),
    Lausanne, Switzerland, Sept. 1996.
   Yeo and M.M. Yeung, “Analysis and synthesis for new digital video applications,” icip,
    International Conference on Image Processing (ICIP'97),vol. 1, pp.1,1997.
   Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom “Digital Watermarking” Morgan
    Kaufmann Publishers ISBN: 1-55860-714-5
   http://www-ee.uta.edu/dip/Courses/EE5355/jpeg.html
   “Privacy principles for digital watermarking”, Ver. 1.0, May 2008. Website:
    https://www.cdt.org/
Video watermarking
Video watermarking

Contenu connexe

Tendances

Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domain
Ashish Kumar
 
Image segmentation 2
Image segmentation 2 Image segmentation 2
Image segmentation 2
Rumah Belajar
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
Deepak Kumar
 

Tendances (20)

Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domain
 
Region based segmentation
Region based segmentationRegion based segmentation
Region based segmentation
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Image segmentation 2
Image segmentation 2 Image segmentation 2
Image segmentation 2
 
Object Detection and Recognition
Object Detection and Recognition Object Detection and Recognition
Object Detection and Recognition
 
ImageProcessing10-Segmentation(Thresholding) (1).ppt
ImageProcessing10-Segmentation(Thresholding) (1).pptImageProcessing10-Segmentation(Thresholding) (1).ppt
ImageProcessing10-Segmentation(Thresholding) (1).ppt
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Raster animation
Raster animationRaster animation
Raster animation
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Multimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMultimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital libraries
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Video Segmentation
Video SegmentationVideo Segmentation
Video Segmentation
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Region filling
Region fillingRegion filling
Region filling
 
Lec14 multiview stereo
Lec14 multiview stereoLec14 multiview stereo
Lec14 multiview stereo
 
Object detection
Object detectionObject detection
Object detection
 
Introduction to OpenCV
Introduction to OpenCVIntroduction to OpenCV
Introduction to OpenCV
 
Deep Learning in Computer Vision
Deep Learning in Computer VisionDeep Learning in Computer Vision
Deep Learning in Computer Vision
 
image compression ppt
image compression pptimage compression ppt
image compression ppt
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image Segmentation
 

Similaire à Video watermarking

Video Compression Basics by sahil jain
Video Compression Basics by sahil jainVideo Compression Basics by sahil jain
Video Compression Basics by sahil jain
Sahil Jain
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
CODE BLUE
 
Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943
IJMER
 
Workshopvin4 Region Of Interest Advanced Video Coding
Workshopvin4 Region Of Interest Advanced Video CodingWorkshopvin4 Region Of Interest Advanced Video Coding
Workshopvin4 Region Of Interest Advanced Video Coding
imec.archive
 

Similaire à Video watermarking (20)

An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
 
/Home/nvlogic/desktop/spraaf3
/Home/nvlogic/desktop/spraaf3/Home/nvlogic/desktop/spraaf3
/Home/nvlogic/desktop/spraaf3
 
"3D from 2D: Theory, Implementation, and Applications of Structure from Motio...
"3D from 2D: Theory, Implementation, and Applications of Structure from Motio..."3D from 2D: Theory, Implementation, and Applications of Structure from Motio...
"3D from 2D: Theory, Implementation, and Applications of Structure from Motio...
 
Next Stop, Android
Next Stop, AndroidNext Stop, Android
Next Stop, Android
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
DCT_TR802
DCT_TR802DCT_TR802
DCT_TR802
 
DCT_TR802
DCT_TR802DCT_TR802
DCT_TR802
 
DCT_TR802
DCT_TR802DCT_TR802
DCT_TR802
 
Watermark
WatermarkWatermark
Watermark
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
Triangle Visibility buffer
Triangle Visibility bufferTriangle Visibility buffer
Triangle Visibility buffer
 
Video Compression Basics by sahil jain
Video Compression Basics by sahil jainVideo Compression Basics by sahil jain
Video Compression Basics by sahil jain
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
Dino2 - the Amazing Evolution of the VA Smalltalk Virtual Machine
Dino2 - the Amazing Evolution of the VA Smalltalk Virtual MachineDino2 - the Amazing Evolution of the VA Smalltalk Virtual Machine
Dino2 - the Amazing Evolution of the VA Smalltalk Virtual Machine
 
D0941824
D0941824D0941824
D0941824
 
Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943
 
Lev
LevLev
Lev
 
Android RenderScript on LLVM
Android RenderScript on LLVMAndroid RenderScript on LLVM
Android RenderScript on LLVM
 
Workshopvin4 Region Of Interest Advanced Video Coding
Workshopvin4 Region Of Interest Advanced Video CodingWorkshopvin4 Region Of Interest Advanced Video Coding
Workshopvin4 Region Of Interest Advanced Video Coding
 
Domain-Specific Program Checking
Domain-Specific Program CheckingDomain-Specific Program Checking
Domain-Specific Program Checking
 

Dernier

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Dernier (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 

Video watermarking

  • 1. VIDEO WATERMARKING Presented by:- MANJESH KUMAR (12100027) Guided by:- Dr. David Peter S.
  • 2. CONTENTS • Introduction • Need for video watermarking • Video watermarking terminologies • Types for video watermarking • Desired properties • Application of watermarking  Structure of a Typical Video Watermarking System • An algorithm of video watermarking • Attack on watermark • Conclusion • References
  • 3. INTRODUCTION Definition: A digital watermark is a digital signal or pattern inserted into a digital document such as text, graphics or multimedia, and carries information unique to the copyright owner.  Video watermarking is an extension of this concept.
  • 4. Need for video watermarking  Protect copyright of a data.  Video Watermarking can help ◦ Prove ownership ◦ Identify a misappropriating person ◦ Trace the video dissemination  Broadcast Monitoring  Video watermarking introduces some issues not present in image watermarking  Frame averaging, frame dropping, frame swapping …
  • 5. Video watermarking terminologies • Digital Video • Payload • Perceptibility • Robustness • Security
  • 6. TYPES of Video Watermarking  Two types :- 1. Visible 2. Invisible  Visible watermarks it’s use : - 1. To discourage unauthorized usage. 2. As an advertisement  Visible watermarking algorithm Least Significant Beat (LSB)
  • 7. EXAMPLE OF VISIBLE VIDEO WATERMARKING
  • 8. Invisible watermarks Three types of Invisible watermark : 1. Robust Watermarks 2. Fragile Watermarks 3. Public and Private Watermark  No degradation in the aesthetic quality of the data.  Invisible Robust Video Watermarking Techniques  Spatial Domain Method  Frequency Domain Method
  • 9. DESIRED PROPERTIES  Robust Video watermarking ( frame averaging, frame dropping, frame swapping... )  Recoverable from a document  Removable by authorized users  Low error probability  Provide the original information embedded reliably  Capacity  Invisible
  • 10. APPLICATION OF WATERMARKING • Owner Identification • Proof of Ownership • Transaction Tracking • Content Authentication • Broadcast Monitoring • Device Control • Automatic monitoring of copyrighted material on the Web
  • 11. A Generic approach to watermarking digital data  There are 3 main processes involved in watermarking — 1. Insertion of a watermark 2. Detection of a watermark 3. Removal of a watermark
  • 12. Inserting a watermark  It consists of :- A watermark insertion unit that uses:- a. Original video b. Watermark c. A user key to obtain the watermarked video.
  • 13. watermark insertion unit  The user key , input video and the watermark are passed through a watermark insertion unit.  This results in a watermarked video.
  • 14. Watermark Extraction Unit  Two phases:- 1. Locating the watermark 2. Recovering the watermark information.
  • 15. Watermark Detection Unit  Consists of :- a. An extraction unit to first extract the watermark. b. Compare it with the original watermark inserted. c. The output is Yes or No depending on whether the watermark is present.
  • 16.
  • 17. A watermarking algorithm — The LSB technique  Let’s consider still images.  Each pixel of the color image has three components — red, green and blue.  3 bytes for each pixel.  Each color has 1 byte, or 8 bits.  Each bits has it’s own value 2pow(n) .
  • 18.
  • 19. The LSB technique…….  A pixel that is bright purple in color can be shown as  X0 = {R=255, G=0, B=255}  Another pixel:  X1 = {R=255, G=0, B=254}
  • 20. The Algorithm 1.A raw bitmap image „A’ will be selected from the set of standard test images. Let this be the base image on which the watermark will be added. 2. A raw bitmap image „B‟ will be selected from the set of standard test images. This will be the watermark image which will be added to the base image. 3. The most significant bit henceforth will be mentioned as MSB, of watermark image „B‟ will be read and these will be written on the least significant bit, henceforth will be mentioned as LSB, of base image „A‟. 4. Thus, „A’ will be watermarked with ‘B’ resulting in a combined image ‘C‟. 5. ‘C’ therefore will now contain an image ‘A’ which has its LSBs replaced with the MSBs of ‘B‟. 6. This technique is used to add an invisible and visible watermark.
  • 21. Distortions and attacks  Additive Noise.  Cropping.  Compression.  Statistical Averaging.  Multiple Watermarking.  Mosaic Attack
  • 22.
  • 23. An Algorithm of Invisible Video Watermarking  Raw video watermarking ◦ DWT (Discrete wavelet transform) ◦ DCT ( Discrete cosine transform) ◦ DFT ( Discrete frequency transform)
  • 24. Discrete Wavelet Transform  Normalized to 256 X 256 pixel size  Perform DWT for each frame
  • 25. Advantage of DWT  Prevent from frame dropping  Prevent from adding noise / another video Mark with m1 Mark with m3 Mark with m0 Mark with m6 Scene change occur
  • 26. Watermark Preprocess  Safe from frame averaging  Hard to reconstruct the watermark Place the bit- planes side by side 85 Bit 17 m0 64 Decomposition 0 0 4 0 4 Crop 1 5 25 1 5 2 6 8 bit- 6 2 6 3 7 planes 3 7 17 m7 0 0 4 25 1 5 8 bit- 6 2 6 planes 3 7 Total 8 images is obtained
  • 27. Watermark Embedding  C[i] = C[i] + 1 , if W[j] = 1  C[i] = C[i] , otherwise  LL, HH is not watermark LL HL 170 LH HH HL3 HL2 0 4 LH3 HH3 HL1 256 1 5 LH2 HH2 2 6 3 7 Watermark mi LH1 HH1
  • 28. Watermark Detection Mark with m1 Mark with m3 Mark with m0 Mark with m6 Scene change occur 1. Video Frame 3. DWT 256 X 256 2. Detect the scene change 4. Compare Original video frames DWT result frames 5. Averaging the watermark get from different frames 170 85 6. Combine 8 bit-planes 0 4 64 Watermark mi 256 1 5 7. Get different part of W 2 6 from different scene and 3 7 m0 m4 reconstruct the large image Extracted Original 256 m1 m5 m2 m6 8. Correlate and verify E O m3 m7 170
  • 29. Future Direction  Implement and use do experiment on the scheme  Identifiable from very short segment of video  Change to blind watermarking scheme
  • 30. ATTACK ON WATERMARK  Compression • Frame averaging  Rescaling • Frame dropping  Cropping • Frame swapping  Multiple watermarks • Statistical analysis
  • 31. CONCLUSION  Need due to Copyright protection  Different from image watermarking  Brief review of current technologies  DWT-based Video Watermarking Scheme with Scramble Watermark  Future Direction  Inadequate for general use  Different tools offering this watermarking  Set to grow
  • 32. REFERENCES  F. Hartung and M. Kutter, “Multimedia watermarking techniques”,Proceedings of the IEEE, vol. 87, no. 7 , July1999.  I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for images, audio and video,” in Proc. IEEE Int. Conf. Image Processing (ICIP 96), Lausanne, Switzerland, Sept. 1996.  Yeo and M.M. Yeung, “Analysis and synthesis for new digital video applications,” icip, International Conference on Image Processing (ICIP'97),vol. 1, pp.1,1997.  Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom “Digital Watermarking” Morgan Kaufmann Publishers ISBN: 1-55860-714-5  http://www-ee.uta.edu/dip/Courses/EE5355/jpeg.html  “Privacy principles for digital watermarking”, Ver. 1.0, May 2008. Website: https://www.cdt.org/