semi video2

Upload: shivagurram

Post on 07-Jul-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/18/2019 Semi Video2

    1/16

    Presented by:-

    K.Nihal Reddy(070)

      G.Shiva Kumar(082)  T.Nishanth(106)

    Guided by:-

    Pr!. K."sha

    #$%&' T&R*RK$NG

  • 8/18/2019 Semi Video2

    2/16

    CONTENTS  Introduction  Types of watermarking  Desired properties  Need for video watermarking  A generic approach to watermarking digital data   Structure of a Typical Video Watermarking System  An algorithm of video watermarking

     Attack on watermark  Applications of watermarking  Conclusion  eferences

  • 8/18/2019 Semi Video2

    3/16

    INTRODUCTION

      Definition! A digital watermark is a digital signal orpattern inserted into a digital document such aste"t# graphics or multimedia# and carries

    information uni$ue to the copyright owner%

    Video watermarking is an e"tension of thisconcept%

    $ma+e #ide udi

  • 8/18/2019 Semi Video2

    4/16

     Types of Video Watermarking

      &%Visi'le watermarking

      it’s use : -1. To discourage unauthorized usage.

    2. s an ad!ertise"ent

     

    #isi$%e &ater"ar' is a trans%ucent o!er%aid intoan i"age and is !isi$%e to the !ie&er. #isi$%e

    &ater"ar'ing is used to indicate o&nershi( and)or co(*right (rotection.

    'ri+inal atermar,ed

    NSN

    +ater"ar'

  • 8/18/2019 Semi Video2

    5/16

     2.In!isi$%e &ater"ar's

    • In!isi$%e &ater"ar' is e"$edded into the data insuch a &a* that the changes "ade to the (i,e%!a%ues are (erce(tua%%* not noticed. In!isi$%e

    &ater"ar' is used as e!idence o) o&nershi( andto detect "isa((ro(riated i"ages.

    • Its "ain use is to send secret in)or"ation.

    'ri+inal

    $ma+e

    atermar,ed

    $ma+e

  • 8/18/2019 Semi Video2

    6/16

    DESIRED ROERTIES o'ust

    Video watermarking ( frame averaging# framedropping# frame swapping%%% )

    ecovera'le from a document emova'le 'y authori*ed users +ow error pro'a'ility ,rovide the original information em'edded

    relia'ly Capacity Invisi'le

  • 8/18/2019 Semi Video2

    7/16

    Need )or !ideo &ater"ar'ing

    ,rotect copyright of a data% Video Watermarking can help

    • ,rove ownership• Identify a misappropriating person

    • Trace the video dissemination -roadcast .onitoring

    Video watermarking introduces some issues notpresent in image watermarking

    /rame averaging# frame dropping# frameswapping …

  • 8/18/2019 Semi Video2

    8/16

      eneric a((roach to &ater"ar'ingdigita% data

    There are 0 main processes involved inwatermarking 1

    &% Insertion of a watermark

    2% Detection of a watermark

    0% emoval of a watermark

  • 8/18/2019 Semi Video2

    9/16

    watermark insertion unit

    The user key # input video and the watermarkare passed through a watermark insertion unit%

    This results in a watermarked video%

  • 8/18/2019 Semi Video2

    10/16

      Watermark 3"traction 4nit  Two phases!5

    &% +ocating the watermark

    2% ecovering the watermark information%

  • 8/18/2019 Semi Video2

    11/16

    +ater"ar' Detection Unit  Consists of !5

    An e"traction unit to first e"tract the watermark%

    Compare it with the original watermark inserted%

    The output is 6es or No depending on  whether the watermark is present%

  • 8/18/2019 Semi Video2

    12/16

    -'/RT

  • 8/18/2019 Semi Video2

    13/16

    %gorith" )or +ater"ar' E"$edding

    using /S0 Techniueirst the !ideo is di!ided in nu"$er o) )ra"es using 3T/0

    )unction in $"( 4%e )or"at5$"( 4%e )or"at is unco"(ressed4%e )or"at 6 this )or"at restores the $inar* data in "uchsa)e &a*7.

     Then the nu"$er &hich &e need to encr*(t 5as a 'e*7 is

    con!erted in $inar* )or".

     This 'e* nu"$er is then (%aced in "essage at /S0 (osition.

     Then )or each )ra"e 8"essage is &ater"ar'ed at res(ecti!e

    /S0 (osition.t end a%% )ra"es are again co"$ined and !ideo is )or"ed

    &ith unco"(ressed 4%e )or"at to restore the data integrit*.

    +hi%e e,tracting &e get the e,act "essage i"age and the'e* encr*(ted into the "essage i"age.

  • 8/18/2019 Semi Video2

    14/16

    • O&ner Identi4cation

    • irac* (re!ention in CDs

    • 9idden co""unication

    •  Transaction Trac'ing

    • Content uthentication

    0roadcast 3onitoring• De!ice Contro%

    • uto"atic "onitoring o) co(*righted "ateria% on

    the +e$

    A,,+ICATI7NS 7/ WAT3.A8IN9

  • 8/18/2019 Semi Video2

    15/16

     CONC/USION

    Digita% &ater"ar' is an i"(ortant ste( to&ard "anage"ento) co(*righted and secured docu"ents. n* 'ind o) digita%data %i'e !ideo 5consists o) i"age )ra"es78 audio8 te,t caneasi%* &ater"ar'ed.

    #isi$%e &ater"ar'ing techniue is used $* the Te%e!isionchanne%s to restrict the i%%ega% trans"ission 6 $roadcasting o) T.#. (rogra"s $* inserting the &ater"ar' at the corner o) thechanne% signa%s.

    I%%ega% use o) the &ater"ar'ing techniue can $e done $* the

    terrorists or Other (ersons &ho are against the co""unit* $*trans)erring the hiding in)or"ation through &ater"ar's.

    0ut there are &ater"ar'ing agents &hich act as a detecti!ethrough the trans"ission 6 rece(tion o) datain)or"ation.

    So8 the &ater"ar'ing techniue is !er* "uch (o(u%ar in

    these da*s8 on%* thing &e need no& da*s is reco!er* o)Di ita% &ater"ar' i) there is attac' on it.

  • 8/18/2019 Semi Video2

    16/16