semi video2
TRANSCRIPT
-
8/18/2019 Semi Video2
1/16
Presented by:-
K.Nihal Reddy(070)
G.Shiva Kumar(082) T.Nishanth(106)
Guided by:-
Pr!. K."sha
#$%&' T&R*RK$NG
-
8/18/2019 Semi Video2
2/16
CONTENTS Introduction Types of watermarking Desired properties Need for video watermarking A generic approach to watermarking digital data Structure of a Typical Video Watermarking System An algorithm of video watermarking
Attack on watermark Applications of watermarking Conclusion eferences
-
8/18/2019 Semi Video2
3/16
INTRODUCTION
Definition! A digital watermark is a digital signal orpattern inserted into a digital document such aste"t# graphics or multimedia# and carries
information uni$ue to the copyright owner%
Video watermarking is an e"tension of thisconcept%
$ma+e #ide udi
-
8/18/2019 Semi Video2
4/16
Types of Video Watermarking
&%Visi'le watermarking
it’s use : -1. To discourage unauthorized usage.
2. s an ad!ertise"ent
#isi$%e &ater"ar' is a trans%ucent o!er%aid intoan i"age and is !isi$%e to the !ie&er. #isi$%e
&ater"ar'ing is used to indicate o&nershi( and)or co(*right (rotection.
'ri+inal atermar,ed
NSN
+ater"ar'
-
8/18/2019 Semi Video2
5/16
2.In!isi$%e &ater"ar's
• In!isi$%e &ater"ar' is e"$edded into the data insuch a &a* that the changes "ade to the (i,e%!a%ues are (erce(tua%%* not noticed. In!isi$%e
&ater"ar' is used as e!idence o) o&nershi( andto detect "isa((ro(riated i"ages.
• Its "ain use is to send secret in)or"ation.
'ri+inal
$ma+e
atermar,ed
$ma+e
-
8/18/2019 Semi Video2
6/16
DESIRED ROERTIES o'ust
Video watermarking ( frame averaging# framedropping# frame swapping%%% )
ecovera'le from a document emova'le 'y authori*ed users +ow error pro'a'ility ,rovide the original information em'edded
relia'ly Capacity Invisi'le
-
8/18/2019 Semi Video2
7/16
Need )or !ideo &ater"ar'ing
,rotect copyright of a data% Video Watermarking can help
• ,rove ownership• Identify a misappropriating person
• Trace the video dissemination -roadcast .onitoring
Video watermarking introduces some issues notpresent in image watermarking
/rame averaging# frame dropping# frameswapping …
-
8/18/2019 Semi Video2
8/16
eneric a((roach to &ater"ar'ingdigita% data
There are 0 main processes involved inwatermarking 1
&% Insertion of a watermark
2% Detection of a watermark
0% emoval of a watermark
-
8/18/2019 Semi Video2
9/16
watermark insertion unit
The user key # input video and the watermarkare passed through a watermark insertion unit%
This results in a watermarked video%
-
8/18/2019 Semi Video2
10/16
Watermark 3"traction 4nit Two phases!5
&% +ocating the watermark
2% ecovering the watermark information%
-
8/18/2019 Semi Video2
11/16
+ater"ar' Detection Unit Consists of !5
An e"traction unit to first e"tract the watermark%
Compare it with the original watermark inserted%
The output is 6es or No depending on whether the watermark is present%
-
8/18/2019 Semi Video2
12/16
-'/RT
-
8/18/2019 Semi Video2
13/16
%gorith" )or +ater"ar' E"$edding
using /S0 Techniueirst the !ideo is di!ided in nu"$er o) )ra"es using 3T/0
)unction in $"( 4%e )or"at5$"( 4%e )or"at is unco"(ressed4%e )or"at 6 this )or"at restores the $inar* data in "uchsa)e &a*7.
Then the nu"$er &hich &e need to encr*(t 5as a 'e*7 is
con!erted in $inar* )or".
This 'e* nu"$er is then (%aced in "essage at /S0 (osition.
Then )or each )ra"e 8"essage is &ater"ar'ed at res(ecti!e
/S0 (osition.t end a%% )ra"es are again co"$ined and !ideo is )or"ed
&ith unco"(ressed 4%e )or"at to restore the data integrit*.
+hi%e e,tracting &e get the e,act "essage i"age and the'e* encr*(ted into the "essage i"age.
-
8/18/2019 Semi Video2
14/16
• O&ner Identi4cation
• irac* (re!ention in CDs
• 9idden co""unication
• Transaction Trac'ing
• Content uthentication
•
0roadcast 3onitoring• De!ice Contro%
• uto"atic "onitoring o) co(*righted "ateria% on
the +e$
A,,+ICATI7NS 7/ WAT3.A8IN9
-
8/18/2019 Semi Video2
15/16
CONC/USION
Digita% &ater"ar' is an i"(ortant ste( to&ard "anage"ento) co(*righted and secured docu"ents. n* 'ind o) digita%data %i'e !ideo 5consists o) i"age )ra"es78 audio8 te,t caneasi%* &ater"ar'ed.
#isi$%e &ater"ar'ing techniue is used $* the Te%e!isionchanne%s to restrict the i%%ega% trans"ission 6 $roadcasting o) T.#. (rogra"s $* inserting the &ater"ar' at the corner o) thechanne% signa%s.
I%%ega% use o) the &ater"ar'ing techniue can $e done $* the
terrorists or Other (ersons &ho are against the co""unit* $*trans)erring the hiding in)or"ation through &ater"ar's.
0ut there are &ater"ar'ing agents &hich act as a detecti!ethrough the trans"ission 6 rece(tion o) datain)or"ation.
So8 the &ater"ar'ing techniue is !er* "uch (o(u%ar in
these da*s8 on%* thing &e need no& da*s is reco!er* o)Di ita% &ater"ar' i) there is attac' on it.
-
8/18/2019 Semi Video2
16/16