02-03-2010, 06:21 AM
plz send me source code of this project
02-03-2010, 06:21 AM
plz send me source code of this project
15-06-2012, 05:47 PM
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO.ppt (Size: 1.67 MB / Downloads: 54) AIM OF THE PROJECT In broadcast service operators would like the viewing of sufficiently corrupted VIDEO/IMAGE on the screen of the unauthorized viewer to allure potential customers without sacrificing the level of robustness provided by digital encryption techniques. BASIC DEFINITONS Video: The sequence of frames put together one after another is a video sequence. Scrambling : The in order sequence of an image content. Data Embedding : In this project data which is to be transmitted withhigh security is embedded into the scrambled digital video, such that its presence will not be known out side. Here the data is hidden in such a way that the original video will not be degraded. .VIDEO SCRAMBLING TECHNIQUE Video scrambling or video encryption is an extremely useful method for the stopping unwanted interception and viewing of any transmitted video or other information . Steps in digital video scrambling are Digital video and its formats Frame conversion Frame to image conversion Scrambling of each image Advantages of Wavelet transforms over other transforms The wavelet transform is a multi-resolution description of an VIDEO/IMAGE The wavelet transform is closer to the human visual system than the DCT. The wavelet transform generates a data structure known as scale-space representation. The spatial resolution of the wavelet transforms increases with frequency. LSB METHOD FOR DATA HIDING LSB insertion is a common simple approach to embedding information in a image But it is vulnerable to even slight image manipulation. Converting image from a format like GIF or BMP to JPEG and back could destroy the information hidden in LSBs.
04-07-2012, 11:05 AM
Data Embedding in Scrambled Digital VIDEO/IMAGE Data Embedding.doc (Size: 1.64 MB / Downloads: 71) Abstract In broadcast service operators would like the viewing of such a sufficiently corrupted VIDEO/IMAGE on the screen of the unauthorized viewer to allure potential customers without sacrificing the level of robustness provided by digital encryption techniques. A technique for embedding data in scrambled AVI VIDEO/IMAGE is described. The embedding technique is applied to the VIDEO/IMAGE sequence jointly with the VIDEO/IMAGE scrambling algorithm. The scrambling operation together with the data embedding process are performed prior to AVI encoding, and the scrambled and data-embedded VIDEO/IMAGE is AVI encoded with a minimal increase in the AVI bitrate. The applied technique uses premanipulation of the block scrambling parameters to generate interblock differentials to embed the data bits. Embedded data has sufficient robustness to resist the AVI encoding attack. INTRODUCTION: A AVI transparent VIDEO/IMAGE scrambling technique that allows the unauthorized user to have an arbitrarily degraded view of the current program has been proposed earlier . Some broadcast service operators would like the viewing of such a sufficiently corrupted VIDEO/IMAGE on the screen of the unauthorized viewer to allure potential customers without sacrificing the level of robustness provided by digital encryption techniques. In this technique, the scrambling is performed prior to the AVI encoding, and the scrambled VIDEO/IMAGE is AVI encoded with only a minimal increase in the AVI transport stream (TS) bitrate (or alternately a minimal degradation of the picture at fixed bitrate). This is achieved by performing a linear scrambling of the VIDEO/IMAGE in blocks as follows: The incoming picture frames are split into scrambler blocks (SB) of size equal to integer multiples of an AVI macro-block size. The SB boundaries are block-synchronous with the AVI block structure. DIGITAL VIDEO/IMAGE PROCESSING VIDEO/IMAGE is a sequence of frames put together one after another. BACKGROUND: Digital VIDEO/IMAGE processing is an area characterized by the need for extensive experimental work to establish the viability of proposed solutions to a given problem. An important characteristic underlying the design of VIDEO/IMAGE processing systems is the significant level of testing & experimentation that normally is required before arriving at an acceptable solution. This characteristic implies that the ability to formulate approaches &quickly prototype candidate solutions generally plays a major role in reducing the cost & time required to arrive at a viable system implementation. Back ground of Steganography Stenography today is a computer technique to make confidential information imperceptible to human eyes by embedding it in some innocent looking "vessel" data (aka "carrier", "cover" or "dummy" data) such as a digital image or a speech sound. A typical vessel is a color image having Red, Green, and Blue color components in a multi-bit data structure. The embedded information can only be extracted by using a special extracting program and a key, the technique of steganography we are talking here is definitely different from what is called a "file deception" or "file camouflage" technique. Data Embedding in Scrambled VIDEO/IMAGE The descrambler needs to know the parameters and rules used by the scrambler, and the scrambling status of the incoming stream. In addition, subscriber control data such as entitlement control/management messages (ECM and EMM data, respectively) are also required as in all systems with conditional access. Hence, there is a need for a data channel particularly in the broadcast applications of the scrambler. In this system, a novel data embedding scheme has been designed to provide an integrated solution. The data transmission requirement of the system is handled in two parts. The scrambling status information is the first part; all the remaining data to be sent constitute the second part. The scrambling status information is considered separately from the data channel. In this system, a 2-bit (or more) information regarding the scrambling status of the VIDEO/IMAGE stream is sent openly but in a special robust manner in a logo area. This 2-bit data informs the scrambler whether the next GOP and the GOP afterwards are scrambled or not. ENCODING METHODS: Data transmission and storage cost money. The more information being dealt with, the more it costs. In spite of this, most digital data are not stored in the most compact form. Rather, they are stored in whatever way makes them easiest to use, such as: ASCII text from word processors, binary code that can be executed on a computer, individual samples from a data acquisition system, etc. Typically, these easy-to-use encoding methods require data files about twice as large as actually needed to represent the information. Data compression is the general term for the various algorithms and programs developed to address this problem. A compression program is used to convert data from an easy-to-use format to one optimized for compactness. Likewise, an un-compression program returns the information to its original form. We examine five techniques for data compression in this chapter. |
|