SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
VIDEO WATERMARKING


Presented by:-
MANJESH KUMAR
(12100027)
                          Guided by:-
                 Dr. David Peter S.
CONTENTS

• Introduction
• Need for video watermarking
• Video watermarking terminologies
• Types for video watermarking
• Desired properties
• Application of watermarking
   Structure of a Typical Video Watermarking
     System
• An algorithm of video watermarking
• Attack on watermark
• Conclusion
• References
INTRODUCTION

Definition: A digital watermark is a digital signal or
 pattern inserted into a digital document such as
 text, graphics or multimedia, and carries
 information unique to the copyright owner.

   Video watermarking is an extension of this
    concept.
Need for video watermarking
   Protect copyright of a data.
   Video Watermarking can help
    ◦ Prove ownership
    ◦ Identify a misappropriating person
    ◦ Trace the video dissemination

   Broadcast Monitoring
   Video watermarking introduces some issues not
    present in image watermarking
   Frame averaging, frame dropping, frame
    swapping …
Video watermarking terminologies

•   Digital Video

•   Payload

•   Perceptibility

•   Robustness

•   Security
TYPES of Video Watermarking

   Two types :-

          1. Visible

          2. Invisible


   Visible watermarks
          it’s use : -

         1. To discourage unauthorized usage.
         2. As an advertisement

   Visible watermarking algorithm

        Least Significant Beat (LSB)
EXAMPLE OF VISIBLE VIDEO
WATERMARKING
Invisible watermarks

Three types of Invisible watermark :
1.    Robust Watermarks
2.    Fragile Watermarks
3.    Public and Private Watermark

    No degradation in the aesthetic quality of the
     data.

    Invisible Robust Video Watermarking Techniques
        Spatial Domain Method
        Frequency Domain Method
DESIRED PROPERTIES

   Robust
        Video watermarking ( frame averaging, frame
        dropping, frame swapping... )
   Recoverable from a document
   Removable by authorized users
   Low error probability
   Provide the original information embedded
    reliably
   Capacity
   Invisible
APPLICATION OF WATERMARKING

•   Owner Identification
•   Proof of Ownership
•   Transaction Tracking
•   Content Authentication
•   Broadcast Monitoring
•   Device Control
•   Automatic monitoring of copyrighted material on
    the Web
A Generic approach to watermarking digital
 data

   There are 3 main processes involved in
    watermarking —

        1. Insertion of a watermark

        2. Detection of a watermark

        3. Removal of a watermark
Inserting a watermark

   It consists of :-

    A watermark insertion unit that uses:-

    a. Original video
    b. Watermark
    c. A user key

    to obtain the watermarked video.
watermark insertion unit
 The user key , input video and the watermark
  are passed through a watermark insertion unit.

   This results in a watermarked video.
Watermark Extraction Unit
 Two phases:-


 1. Locating the watermark

 2. Recovering the watermark information.
Watermark Detection Unit

   Consists of :-

    a. An extraction unit to first extract the
    watermark.

     b. Compare it with the original watermark
    inserted.

    c. The output is Yes or No depending on
    whether the watermark is present.
A watermarking algorithm — The LSB
  technique
 Let’s consider still images.


   Each pixel of the color image has three
    components — red, green and blue.

   3 bytes for each pixel.

   Each color has 1 byte, or 8 bits.
   Each bits has it’s own value 2pow(n) .
The LSB technique…….
   A pixel that is bright purple in color can
    be shown as

   X0 = {R=255, G=0, B=255}

   Another pixel:

   X1 = {R=255, G=0, B=254}
The Algorithm
1.A raw bitmap image „A’ will be selected from the set of standard test images. Let
this be the base image on which the watermark will be added.
2. A raw bitmap image „B‟ will be selected from the set of standard test images. This
will be the watermark image which will be added to the base image.
3. The most significant bit henceforth will be mentioned as MSB, of watermark image
„B‟ will be read and these will be written on the least significant bit, henceforth will
be mentioned as LSB, of base image „A‟.
4. Thus, „A’ will be watermarked with ‘B’ resulting in a combined image ‘C‟.
5. ‘C’ therefore will now contain an image ‘A’ which has its LSBs replaced with
the MSBs of ‘B‟.
6. This technique is used to add an invisible and visible watermark.
Distortions and attacks
   Additive Noise.

   Cropping.

   Compression.

   Statistical Averaging.

   Multiple Watermarking.

   Mosaic Attack
An Algorithm of Invisible Video Watermarking


   Raw video watermarking

    ◦ DWT (Discrete wavelet transform)

    ◦ DCT ( Discrete cosine transform)

    ◦ DFT ( Discrete frequency transform)
Discrete Wavelet Transform
 Normalized to 256 X 256 pixel size


   Perform DWT for each frame
Advantage of DWT
   Prevent from frame dropping
   Prevent from adding noise / another video




      Mark with m1   Mark with m3       Mark with m0     Mark with m6




                                    Scene change occur
Watermark Preprocess
   Safe from frame averaging
   Hard to reconstruct the watermark

                                                              Place the bit-
                                                              planes side by
                                                                   side
                           85       Bit
                                                                    17
                                                             m0
                      64            Decomposition                   0
                            0   4                               0        4
               Crop         1   5                            25 1        5
                            2   6                   8 bit-
                                                             6 2         6
                            3   7                   planes      3        7



                                                                    17
                                                             m7
                                                                    0
                                                                0        4
                                                             25 1        5
                                                    8 bit-
                                                             6 2         6
                                                    planes      3        7
                                                              Total 8 images
                                                               is obtained
Watermark Embedding

 C[i] = C[i] + 1     , if W[j] = 1
 C[i] = C[i]         , otherwise
 LL, HH is not watermark


         LL HL                             170
         LH HH
               HL3
                       HL2             0         4
         LH3 HH3
                             HL1
                                   256 1         5
           LH2         HH2             2         6
                                       3         7
                                       Watermark mi

                 LH1         HH1
Watermark Detection

                                                      Mark with m1       Mark with m3        Mark with m0          Mark with m6



                                                                                        Scene change occur
       1. Video Frame
                                   3. DWT
          256 X 256                                           2. Detect the scene change


                                                                  4. Compare
                                                                                                               Original video frames

              DWT result frames
                                                                          5. Averaging the watermark
                                                                           get from different frames



                                                                         170
             85             6. Combine 8 bit-planes                  0            4
64    Watermark mi                                    256            1            5
                         7. Get different part of W                  2            6
                         from different scene and                    3            7
      m0         m4     reconstruct the large image                                                          Extracted            Original
256   m1         m5
      m2         m6
                                                        8. Correlate and verify                                E                  O
      m3         m7
           170
Future Direction

   Implement and use do experiment on the
    scheme

   Identifiable from very short segment of video

   Change to blind watermarking scheme
ATTACK ON WATERMARK



   Compression           •   Frame averaging
   Rescaling             •   Frame dropping
   Cropping              •   Frame swapping
   Multiple watermarks   •   Statistical analysis
CONCLUSION

 Need due to Copyright protection
 Different from image watermarking
 Brief review of current technologies
 DWT-based Video Watermarking Scheme with
  Scramble Watermark
 Future Direction
 Inadequate for general use
 Different tools offering this watermarking
 Set to grow
REFERENCES

   F. Hartung and M. Kutter, “Multimedia watermarking techniques”,Proceedings of the
    IEEE, vol. 87, no. 7 , July1999.
   I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking
    for images, audio and video,” in Proc. IEEE Int. Conf. Image Processing (ICIP 96),
    Lausanne, Switzerland, Sept. 1996.
   Yeo and M.M. Yeung, “Analysis and synthesis for new digital video applications,” icip,
    International Conference on Image Processing (ICIP'97),vol. 1, pp.1,1997.
   Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom “Digital Watermarking” Morgan
    Kaufmann Publishers ISBN: 1-55860-714-5
   http://www-ee.uta.edu/dip/Courses/EE5355/jpeg.html
   “Privacy principles for digital watermarking”, Ver. 1.0, May 2008. Website:
    https://www.cdt.org/
Video watermarking
Video watermarking

Contenu connexe

Tendances

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Ankush Kr
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Ankush Kr
 
An analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domainAn analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domain
Likan Patra
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
divya sri
 

Tendances (20)

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Watermark
WatermarkWatermark
Watermark
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
robust image watermarking
robust image watermarkingrobust image watermarking
robust image watermarking
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
An analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domainAn analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domain
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 
Seminar PPT on Crypto Watermarking B.Tech
Seminar PPT on Crypto Watermarking B.TechSeminar PPT on Crypto Watermarking B.Tech
Seminar PPT on Crypto Watermarking B.Tech
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 

Similaire à Video watermarking

Video Compression Basics by sahil jain
Video Compression Basics by sahil jainVideo Compression Basics by sahil jain
Video Compression Basics by sahil jain
Sahil Jain
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
CODE BLUE
 
Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943
IJMER
 
Workshopvin4 Region Of Interest Advanced Video Coding
Workshopvin4 Region Of Interest Advanced Video CodingWorkshopvin4 Region Of Interest Advanced Video Coding
Workshopvin4 Region Of Interest Advanced Video Coding
imec.archive
 
Robust region of interest determination based on user attention model through...
Robust region of interest determination based on user attention model through...Robust region of interest determination based on user attention model through...
Robust region of interest determination based on user attention model through...
Hongwei Huang
 

Similaire à Video watermarking (20)

An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
 
/Home/nvlogic/desktop/spraaf3
/Home/nvlogic/desktop/spraaf3/Home/nvlogic/desktop/spraaf3
/Home/nvlogic/desktop/spraaf3
 
"3D from 2D: Theory, Implementation, and Applications of Structure from Motio...
"3D from 2D: Theory, Implementation, and Applications of Structure from Motio..."3D from 2D: Theory, Implementation, and Applications of Structure from Motio...
"3D from 2D: Theory, Implementation, and Applications of Structure from Motio...
 
Next Stop, Android
Next Stop, AndroidNext Stop, Android
Next Stop, Android
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
DCT_TR802
DCT_TR802DCT_TR802
DCT_TR802
 
DCT_TR802
DCT_TR802DCT_TR802
DCT_TR802
 
DCT_TR802
DCT_TR802DCT_TR802
DCT_TR802
 
Triangle Visibility buffer
Triangle Visibility bufferTriangle Visibility buffer
Triangle Visibility buffer
 
Video Compression Basics by sahil jain
Video Compression Basics by sahil jainVideo Compression Basics by sahil jain
Video Compression Basics by sahil jain
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
Dino2 - the Amazing Evolution of the VA Smalltalk Virtual Machine
Dino2 - the Amazing Evolution of the VA Smalltalk Virtual MachineDino2 - the Amazing Evolution of the VA Smalltalk Virtual Machine
Dino2 - the Amazing Evolution of the VA Smalltalk Virtual Machine
 
D0941824
D0941824D0941824
D0941824
 
Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943
 
Lev
LevLev
Lev
 
Android RenderScript on LLVM
Android RenderScript on LLVMAndroid RenderScript on LLVM
Android RenderScript on LLVM
 
Workshopvin4 Region Of Interest Advanced Video Coding
Workshopvin4 Region Of Interest Advanced Video CodingWorkshopvin4 Region Of Interest Advanced Video Coding
Workshopvin4 Region Of Interest Advanced Video Coding
 
Domain-Specific Program Checking
Domain-Specific Program CheckingDomain-Specific Program Checking
Domain-Specific Program Checking
 
How video codec work
How video codec work How video codec work
How video codec work
 
Robust region of interest determination based on user attention model through...
Robust region of interest determination based on user attention model through...Robust region of interest determination based on user attention model through...
Robust region of interest determination based on user attention model through...
 

Dernier

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdfFinancial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
MinawBelay
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
17thcssbs2
 

Dernier (20)

slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
 
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdfFinancial Accounting IFRS, 3rd Edition-dikompresi.pdf
Financial Accounting IFRS, 3rd Edition-dikompresi.pdf
 
How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17
 
How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 Inventory
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
 

Video watermarking

  • 1. VIDEO WATERMARKING Presented by:- MANJESH KUMAR (12100027) Guided by:- Dr. David Peter S.
  • 2. CONTENTS • Introduction • Need for video watermarking • Video watermarking terminologies • Types for video watermarking • Desired properties • Application of watermarking  Structure of a Typical Video Watermarking System • An algorithm of video watermarking • Attack on watermark • Conclusion • References
  • 3. INTRODUCTION Definition: A digital watermark is a digital signal or pattern inserted into a digital document such as text, graphics or multimedia, and carries information unique to the copyright owner.  Video watermarking is an extension of this concept.
  • 4. Need for video watermarking  Protect copyright of a data.  Video Watermarking can help ◦ Prove ownership ◦ Identify a misappropriating person ◦ Trace the video dissemination  Broadcast Monitoring  Video watermarking introduces some issues not present in image watermarking  Frame averaging, frame dropping, frame swapping …
  • 5. Video watermarking terminologies • Digital Video • Payload • Perceptibility • Robustness • Security
  • 6. TYPES of Video Watermarking  Two types :- 1. Visible 2. Invisible  Visible watermarks it’s use : - 1. To discourage unauthorized usage. 2. As an advertisement  Visible watermarking algorithm Least Significant Beat (LSB)
  • 7. EXAMPLE OF VISIBLE VIDEO WATERMARKING
  • 8. Invisible watermarks Three types of Invisible watermark : 1. Robust Watermarks 2. Fragile Watermarks 3. Public and Private Watermark  No degradation in the aesthetic quality of the data.  Invisible Robust Video Watermarking Techniques  Spatial Domain Method  Frequency Domain Method
  • 9. DESIRED PROPERTIES  Robust Video watermarking ( frame averaging, frame dropping, frame swapping... )  Recoverable from a document  Removable by authorized users  Low error probability  Provide the original information embedded reliably  Capacity  Invisible
  • 10. APPLICATION OF WATERMARKING • Owner Identification • Proof of Ownership • Transaction Tracking • Content Authentication • Broadcast Monitoring • Device Control • Automatic monitoring of copyrighted material on the Web
  • 11. A Generic approach to watermarking digital data  There are 3 main processes involved in watermarking — 1. Insertion of a watermark 2. Detection of a watermark 3. Removal of a watermark
  • 12. Inserting a watermark  It consists of :- A watermark insertion unit that uses:- a. Original video b. Watermark c. A user key to obtain the watermarked video.
  • 13. watermark insertion unit  The user key , input video and the watermark are passed through a watermark insertion unit.  This results in a watermarked video.
  • 14. Watermark Extraction Unit  Two phases:- 1. Locating the watermark 2. Recovering the watermark information.
  • 15. Watermark Detection Unit  Consists of :- a. An extraction unit to first extract the watermark. b. Compare it with the original watermark inserted. c. The output is Yes or No depending on whether the watermark is present.
  • 16.
  • 17. A watermarking algorithm — The LSB technique  Let’s consider still images.  Each pixel of the color image has three components — red, green and blue.  3 bytes for each pixel.  Each color has 1 byte, or 8 bits.  Each bits has it’s own value 2pow(n) .
  • 18.
  • 19. The LSB technique…….  A pixel that is bright purple in color can be shown as  X0 = {R=255, G=0, B=255}  Another pixel:  X1 = {R=255, G=0, B=254}
  • 20. The Algorithm 1.A raw bitmap image „A’ will be selected from the set of standard test images. Let this be the base image on which the watermark will be added. 2. A raw bitmap image „B‟ will be selected from the set of standard test images. This will be the watermark image which will be added to the base image. 3. The most significant bit henceforth will be mentioned as MSB, of watermark image „B‟ will be read and these will be written on the least significant bit, henceforth will be mentioned as LSB, of base image „A‟. 4. Thus, „A’ will be watermarked with ‘B’ resulting in a combined image ‘C‟. 5. ‘C’ therefore will now contain an image ‘A’ which has its LSBs replaced with the MSBs of ‘B‟. 6. This technique is used to add an invisible and visible watermark.
  • 21. Distortions and attacks  Additive Noise.  Cropping.  Compression.  Statistical Averaging.  Multiple Watermarking.  Mosaic Attack
  • 22.
  • 23. An Algorithm of Invisible Video Watermarking  Raw video watermarking ◦ DWT (Discrete wavelet transform) ◦ DCT ( Discrete cosine transform) ◦ DFT ( Discrete frequency transform)
  • 24. Discrete Wavelet Transform  Normalized to 256 X 256 pixel size  Perform DWT for each frame
  • 25. Advantage of DWT  Prevent from frame dropping  Prevent from adding noise / another video Mark with m1 Mark with m3 Mark with m0 Mark with m6 Scene change occur
  • 26. Watermark Preprocess  Safe from frame averaging  Hard to reconstruct the watermark Place the bit- planes side by side 85 Bit 17 m0 64 Decomposition 0 0 4 0 4 Crop 1 5 25 1 5 2 6 8 bit- 6 2 6 3 7 planes 3 7 17 m7 0 0 4 25 1 5 8 bit- 6 2 6 planes 3 7 Total 8 images is obtained
  • 27. Watermark Embedding  C[i] = C[i] + 1 , if W[j] = 1  C[i] = C[i] , otherwise  LL, HH is not watermark LL HL 170 LH HH HL3 HL2 0 4 LH3 HH3 HL1 256 1 5 LH2 HH2 2 6 3 7 Watermark mi LH1 HH1
  • 28. Watermark Detection Mark with m1 Mark with m3 Mark with m0 Mark with m6 Scene change occur 1. Video Frame 3. DWT 256 X 256 2. Detect the scene change 4. Compare Original video frames DWT result frames 5. Averaging the watermark get from different frames 170 85 6. Combine 8 bit-planes 0 4 64 Watermark mi 256 1 5 7. Get different part of W 2 6 from different scene and 3 7 m0 m4 reconstruct the large image Extracted Original 256 m1 m5 m2 m6 8. Correlate and verify E O m3 m7 170
  • 29. Future Direction  Implement and use do experiment on the scheme  Identifiable from very short segment of video  Change to blind watermarking scheme
  • 30. ATTACK ON WATERMARK  Compression • Frame averaging  Rescaling • Frame dropping  Cropping • Frame swapping  Multiple watermarks • Statistical analysis
  • 31. CONCLUSION  Need due to Copyright protection  Different from image watermarking  Brief review of current technologies  DWT-based Video Watermarking Scheme with Scramble Watermark  Future Direction  Inadequate for general use  Different tools offering this watermarking  Set to grow
  • 32. REFERENCES  F. Hartung and M. Kutter, “Multimedia watermarking techniques”,Proceedings of the IEEE, vol. 87, no. 7 , July1999.  I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for images, audio and video,” in Proc. IEEE Int. Conf. Image Processing (ICIP 96), Lausanne, Switzerland, Sept. 1996.  Yeo and M.M. Yeung, “Analysis and synthesis for new digital video applications,” icip, International Conference on Image Processing (ICIP'97),vol. 1, pp.1,1997.  Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom “Digital Watermarking” Morgan Kaufmann Publishers ISBN: 1-55860-714-5  http://www-ee.uta.edu/dip/Courses/EE5355/jpeg.html  “Privacy principles for digital watermarking”, Ver. 1.0, May 2008. Website: https://www.cdt.org/