final video
DESCRIPTION
i am uploading video watermarking using lsb tech ppt.TRANSCRIPT
VIDEO WATERMARKING
P r e s e n t e d by: - 2451-12-735-0702451-12-735-0822451-12-735-109
G u i d e d by: -K.Usha
.
CONTENTS Introduction Types of watermarking Desired properties Need for video watermarking A generic approach to watermarking digital data Structure of a Typical Video Watermarking System An algorithm of video watermarking Attack on watermark Applications of watermarking Conclusion References
INTRODUCTION
Definition: A digital watermark is a digital signal or pattern inserted into a digital document such as text, graphics or multimedia, and carries information unique to the copyright owner.
Video watermarking is an extension of thisconcept.
Image Video Audio
Types of Video Watermarking 1.Visible watermarking
it’s use : -1. To discourage unauthorized usage.2. As an advertisement
Visible watermark is a translucent overlaid into an image and is visible to the viewer. Visible watermarking is used to indicate ownership and for copyright protection.
Original Image Watermarked Image
NSN Watermark
2.Invisible watermarks
• Invisible watermark is embedded into the data in such a way that the changes made to the pixel values are perceptually not noticed. Invisible watermark is used as evidence of ownership and to detect misappropriated images.
• Its main use is to send secret information.
Original Image Watermarked Image
DESIRED PROPERTIES Robust
Video watermarking ( frame averaging, frame dropping, frame swapping... )
Recoverable from a document Removable by authorized users Low error probability Provide the original information embedded
reliably Capacity Invisible
Need for video watermarking Protect copyright of a data. Video Watermarking can help• Prove ownership• Identify a misappropriating person• Trace the video dissemination
Broadcast Monitoring Video watermarking introduces some issues not
present in image watermarking Frame averaging, frame dropping, frame
swapping …
A Generic approach to watermarking digital data
There are 3 main processes involved in watermarking —
1. Insertion of a watermark
2. Detection of a watermark
3. Removal of a watermark
watermark insertion unit The user key , input video and the watermark
are passed through a watermark insertion unit.
This results in a watermarked video.
Watermark Extraction Unit Two phases:-
1. Locating the watermark
2. Recovering the watermark information.
Watermark Detection Unit Consists of :- An extraction unit to first extract the watermark. Compare it with the original watermark inserted. The output is Yes or No depending on whether the watermark is present.
FLOWCHART
Algorithm for Watermark Embedding using LSB TechniqueFirst the video is divided in number of frames using
MATLAB function in bmp file format(bmp file format is uncompressed file format & this format restores the binary data in much safe way).
Then the number which we need to encrypt (as a key) is converted in binary form. This key number is then placed in message at LSB position. Then for each frame ,message is watermarked at respective
LSB position.At end all frames are again combined and video is formed
with uncompressed file format to restore the data integrity.While extracting we get the exact message image and the
key encrypted into the message image.
ATTACKS ON WATERMARK Compression Rescaling Cropping Multiple watermarks
Frame averaging Frame dropping Frame swapping Statistical analysis
• Owner Identification• Piracy prevention in CDs• Hidden communication• Transaction Tracking• Content Authentication• Broadcast Monitoring• Device Control• Automatic monitoring of copyrighted material
onthe Web
APPLICATIONS OF WATERMARKING
CONCLUSIONDigital watermark is an important step toward management
of copyrighted and secured documents. Any kind of digital data like video (consists of image frames), audio, text can easily watermarked.
Visible watermarking technique is used by the Television channels to restrict the illegal transmission & broadcasting of T.V. programs by inserting the watermark at the corner of the channel signals.
Illegal use of the watermarking technique can be done by the terrorists or Other persons who are against the community by transferring the hiding information through watermarks.
But there are watermarking agents which act as a detective through the transmission & reception of data/information.
So, the watermarking technique is very much popular in these days, only thing we need now days is recovery of Digital watermark if there is attack on it.
REFERENCES F. Hartung and M. Kutter, “Multimedia watermarking techniques”,Proceedings of
the IEEE, vol. 87, no. 7 , July1999.
I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum
watermarking for images, audio and video,” in Proc. IEEE Int. Conf. Image
Processing (ICIP 96), Lausanne, Switzerland, Sept. 1996.
Yeo and M.M. Yeung, “Analysis and synthesis for new digital video applications,”
icip, International Conference on Image Processing (ICIP'97),vol. 1, pp.1,1997.
Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom “Digital Watermarking”
Morgan Kaufmann Publishers ISBN: 1-55860-714-5
1.0, May2008.
Website:
http://www-ee.uta.edu/dip/Courses/EE5355/jpeg.html
“Privacy principles for digital watermarking”, Ver. https://www.cdt.org/