30-09-2016, 11:45 AM
1457016059-ProjectPPRIEEEFormat.doc (Size: 111.5 KB / Downloads: 4)
Abstract
Piracy is an important issue as far as the manufacturers are concerned as it can result in a huge revenue loss. The aim of this project is to detect video piracy using invisible watermark, i.e. Invisible Digital Watermarking is a technique of steganography. Invisible Digital Watermarking is a technique of steganography to manipulate frames of the video by modifying the pixels scattered across the frame. The bits are modified with reference to original RGB value and a slight modification is imposed on basis of the KEY used while watermarking. The slight shift in RGB value scattered across makes it impossible to visibly detect the difference when compared to original video.
In digital watermarking, a watermark is embedded into a cover audio / video in such a way that the resulting watermarked signal is robust to certain distortion caused by either standard data processing in a friendly environment or malicious attacks in an unfriendly environment. This project presents a digital audio / video watermarking based on discrete wavelet transform (DWT), discrete cosines transform (DCT).These watermarking can with standalone distortion due to compression and can be identify at each resolution. This is a powerful and robust method which makes it difficult to remove or destroy the watermark before resulting in savior degradation of visual fidelity, with this technique original and duplicate copies of the contents can be identify and provides safety against copyright infringement.
1. INTRODUCTION
We are living in the era of information where billions of bits of data is created in every fraction of a second and with the advent of internet, creation and delivery of digital data (video and audio files, digital repositories and libraries, web publishing) has grown many fold. Since copying a digital data is very easy and fast too so, issues like, protection of rights of the content and proving ownership, arises.
This project focuses on a technique that will protect a video from illegal access by embedding both visible and invisible watermarks into it [1]. An invisible watermark protects a video from being copied and manipulated from the internet, but if someone takes a copy of that video using a camera then he will be able to claim it as his own video. To protect the video from this type of attacks, a visible watermark will be incorporated in the video which will appear in the video frames randomly depending upon the system and will be partially visible [2]. DWT is used to embed the watermark in the video frames imperceptibly. The visible watermark is embedded depending on the user’s choice or randomly. As the video contain both invisible and visible watermarks so this algorithm will provide more security to the owner's video [3].
Watermarking is a technique for securing various copyright data such as text, image, audio and video. Copyright protection is the major part of the watermarking. Since 13th century, Digital Watermarking came into existence. In case visible watermarks, visual patterns like logos were used to get inserted into digital data. To convey the hidden information, most watermarking systems involve marking alteration on the cover data [6]. This technique is known to be invisible watermarks. On the other hand, digital watermarks are found with the advancement of internet. Thus, the idea of watermarking into digital data can be naturally extended. Due to proliferation of digital data (image, audio, and video), popularity of digital watermarking has been increased. Recently the copy right of digital images and to verify the multimedia data integrity, numerous digital watermarking algorithms are developed.
Digital watermarking came as a technique and a tool to overcome shortcomings of current copyright laws for digital data. The specialty of watermark is that it remains intact to the cover work even if it is copied [8]. So to prove ownership or copyrights of data watermark is extracted and tested. It is very difficult for counterfeiters to remove or alter watermark, so that the real owner can always have his data safe and secure.
2. EXISTING SYSTEMS
The existing systems that employ digital watermarking for video piracy detection are inviting to the hackers as the watermark is visible. The watermark is concentrated in a particular area, thus through statistical analysis the approximate location of the watermark can be identified. This enables the hackers to overwrite the copyright information with their own information. As the watermark is concentrated, the chances of it being prone to damages due to compression etc. are more.
The primary motivation behind audio / video watermarking is to decrease the excess and insignificance information from the audio / video, with the goal that it can be put away and exchanged audio / video proficiently.
Therefore, watermarking audio / video is represented by lesser number of bits in contrast with original. Thus, the mandatory storage volume will be reduced; as a result large number of audio / video s can be stored within the same memory space and moved in quicker approach to spare the time, transmission bandwidth.
LEAST SIGNIFICANT BIT (LSB)
The earliest work of digital image watermarking schemes embeds watermarks in the LSB of the pixels [8]. Given an image with pixels, and each pixel being represented by an 8-bit sequence, the watermarks are embedded in the last (i.e., least significant) bit, of selected pixels of the image. This method is easy to implement and does not generate serious distortion to the image; however, it is not very robust against attacks. For instance, an attacker could simply randomize all LSBs, which effectively destroys the hidden information.
Advantages of LSB Technique:
• LSB technique uniquely identifies the author of copyrighted work.
• It can be possibly implemented on a PC platform.
• Watermark embedding becomes easy. It can detect any tampering, if done with the image.
Disadvantages of LSB Technique:
• Watermarking doesn’t prevent image copying but we can track down and detect ownership of copied images.
• A watermark vanishes if someone manipulates the image.
Resizing, compressing images from one file type to another may diminish the watermark and it becomes unreadable.
2.2 CORRELATION BASED WATERMARKING TECHNIQUE
The technique for watermark embedding in the spatial domain is to exploit the correlation properties of additive pseudo-random noise patterns as applied to an image. Pseudo noise sequences are a good tool for watermarking because of the following reasons
• PN generator produces periodic sequences that appear to be random.
• PN sequences are generated by an algorithm that uses an initial seed.
• PN sequence generated is actually not statically random but will pass many tests of randomness.
If the algorithm and seed are known, the sequence is impractical to predict.
Advantages of correlation based watermarking:
• Gain factor can be increased resulting in increased robustness.
Disadvantages of correlation based watermarking:
• Image quality gets decreased due to very high increase in gain factor.
• The loss of the private key can enable a pirate to remove the watermarks from all the images that belong to that particular owner.
3. PROPOSED SYSTEM
3.1 OVERVIEW OF PROPOSED SYSTEM
A digital watermark is a marker that gets embedded within an audio / video such as Video, audio or image data. Digital Watermarking is the process of hiding digital information in audio / video. Digital watermarks are prominently used to verify the authenticity or integrity of the carrier signal and also to deduce the identity of its owners.
In this project the methodology which is use is the discrete cosine transform (DCT) algorithm. The discrete cosine transform (DCT) represent an image as an addition of sinusoids of varying magnitudes and frequencies [8].
The DCT has the property that, for a typical image, most of the visually important information about the image is concentrated in just small coefficients of the DCT. For this reason, the DCT is frequently used in image compression applications. For example, the DCT is at the heart of the international standard Lossy image compression algorithm known as JPEG.
The name comes from the working group that developed the standard: the Joint Photographic Experts Group. The discrete cosine transforms (DCT) help to divide the image into parts or spectral sub-bands of differing importance with respect to the image's visual feature. The DCT is similar to the discrete Fourier transform: it transforms a signal or image from the spatial domain to the frequency domain.
Also proposed a digital video watermarking technique based on identical frame extraction in 3-Level Discrete Wavelet Transform (DWT). In the proposed method, first the host video is divided into video shots. Then from each video shot one video frame called identical frame is selected for watermark embedding.
Each identical frame is decomposed into 3-level DWT, and then select the higher sub band coefficients to embed the watermark and the watermark are adaptively embedded to these coefficients and thus guarantee the perceptual invisibility of the watermark. For watermark detection, the correlation between the watermark signal and the watermarked video is compared with a threshold value obtained from embedded watermark signal.
Advantages of Proposed System:
• It provides a potential cost savings associated with sending less data over switched telephone network where cost of call is really usually based upon its duration.
• The information carried by the watermark is robust to content manipulations, compression, and so on. It not only reduces storage requirements but also overall execution time. Also the probability of transmission errors is reduced since fewer bits are transferred.
• It provides a level of security against illicit monitoring. The watermark is independent of the data format and gets a semantically meaningful pattern.
• The watermark becomes perceptually invisible with an acceptable amount of robustness.
• The user can select various options for the pattern, size and location of the watermark to be embedded. It executes in a reasonable amount of time with proper complexity which is robust against JPEG compression.