Beruflich Dokumente
Kultur Dokumente
By
Pathak Utsav Atulkumar
Prof. Ketki Pathak
(Assistance Professor)
A Thesis Submitted to
Gujarat Technological University in Partial
Fulfillment of the Requirements for
the Degree of Engineering in Electronics & Communication
December 2014
Department
Of
ELECTRONICS & COMMUNICATION ENGINEERING
Sarvajanik College of Engineering & Technology
Dr. R.K. Desai Road,
Athwalines, Surat - 395001, India.
Certificate
This is to certify that research work embodied in this thesis entitled Watermarking For
Video Authentication was carried out by Mr. Pathak Utsav Atulkumar (Enrollment No.
130420704023) studying at Sarvajanik College of Engineering and Technology (042) for
partial fulfillment of Master of Engineering degree to be awarded by Gujarat
Technological University. This research work has been carried out under my guidance
and supervision and it is up to my satisfaction.
Date:
Place: Sarvajanik College of Engineering and Technology, Surat
Seal of Institute
Compliance Certificate
This is to certify that research work embodied in this thesis entitled Watermarking For
Video Authentication was carried out by Mr. Pathak Utsav Atulkumar (Enrollment No.
130420704023) at Sarvajanik College of Engineering and Technology (042) for partial
fulfillment of Master of Engineering degree to be awarded by Gujarat Technological
University. He has complied to the comments given by the Dissertation phase I as well
as Mid Semester Thesis Reviewer to my satisfaction.
Date:
Signature of Student:
Signature of Guide:
ii
Declaration Of Originality
We hereby certify that we are the sole authors of this thesis and that neither any part of
this thesis nor the whole of the thesis has been submitted for a degree to any other
University or Institution.
We certify that, to the best of our knowledge, the current thesis does not infringe upon
anyones copyright nor violate any proprietary rights and that any ideas, techniques,
quotations or any other material from the work of other people included in our thesis,
published or otherwise, are fully acknowledged in accordance with the standard
referencing practices. Furthermore, to the extent that we have included copyrighted
material that surpasses the boundary of fair dealing within the meaning of the Indian
Copyright (Amendment) Act 2012, we certify that we have obtained a written permission
from the copyright owner(s) to include such material(s) in the current thesis and have
included copies of such copyright clearances to our appendix.
We declare that this is a true copy of thesis, including any final revisions, as approved by
thesis review committee.
We have checked write up of the present thesis using anti-plagiarism database and it is in
allowable limit. Even though later on in case of any complaint pertaining of plagiarism,
we are sole responsible for the same and we understand that as per UGC norms,
University can even revoke Master of Engineering degree conferred to the student
submitting this thesis.
Date:
Place: Sarvajanik College of Engineering and Technology, Surat
Signature of Student:
Signature of Guide:
Institute Code:042
iii
Acknowledgement
I would like to express my deep sense of gratitude to my guide, Prof. Ketki Pathak,
for imparting me valuable guidance and priceless suggestions during the dissertation
and in creating such an excellent report and also for her full dedication and devotion
of time.
I would further like to thank our Head of Department, Prof. Niteen B. Patel and all the
faculty members for giving me this opportunity. I also wish to communicate my deep
sense of gratitude and thanks to the Almighty God.
I would like to express thanks, gratitude and respect to my parents for giving me
valuable advice and support at all times and in all possible ways. Last but not least,
Acknowledgement will not be over without mentioning a word of thanks to all my
friends & my family members who have provided immeasurable support throughout
this journey.
iv
Table of Content
Certificate ............................................................................................................................. i
Compliance Certificate ....................................................................................................... ii
Declaration Of Originality ................................................................................................. iii
Acknowledgement ............................................................................................................. iv
Table of Content ..................................................................................................................v
List of Figures ................................................................................................................... vii
Abstract ............................................................................................................................ viii
1.
Introduction ..................................................................................................................1
1.1 Requirement of Digital Watermarking ..................................................................... 2
1.2 Basic Watermarking Principle .................................................................................. 3
1.3 Purpose of the Study ................................................................................................. 5
2.
3.
4.
5.
References ..........................................................................................................................20
vi
List of Figures
Figure 1.1 watermark embedding process[5]................................................................. 4
Figure 1.2 watermark extraction process[5] .................................................................. 4
Figure 1.3 different types of watermarking methodologies[5] ...................................... 4
Figure 2.1 principle of video watermarking[4] .............................................................. 6
Figure 2.2 video watermarking model[4] ...................................................................... 7
Figure 2.3 video watermarking algorithm[4] ................................................................. 9
Figure 2.4 Two band decomposition-reconstruction wavelet filter bank[2]................ 11
Figure 3.1 different spatial tampering attacks[5] ......................................................... 12
Figure 3.2 object removal attack[5] ............................................................................. 13
Figure 3.3 object addition attack[5] ............................................................................. 13
Figure 3.4 frame addition attack[5] ............................................................................. 14
Figure 3.5 frame removal attack[5] ............................................................................. 15
Figure 3.6 frame shuffling attack[5] ............................................................................ 15
Figure 5.1 Frame taken from AVI video sequence ...................................................... 17
Figure 5.2 2-D DWT applied on the selected frame to obtain four sub-bands
LL,LH,HL,HH ............................................................................................................. 18
Figure 5.3 Original frame and watermarked frame obtained for proposed method .... 18
vii
Abstract
As the H.264/AVC based video products become more and more popular, issues of
copyright protection and authentication that are appropriate for this standard will be
very important. Here in this dissertation different watermarking techniques for video
authentication are studied. For authentication different parameters are used for video
like PSNR, NC, BER.
viii
1. Introduction
Multimedia production and distribution, as we see it today, is all digital, from the
authoring tools of content providers to the receivers. The advantages of digital processing
and distribution, like noise-free transmission, software instead of hardware processing,
and improved reconfigurability of systems, are all well known and obvious. Not so
obvious are the disadvantages of digital media distribution. For example, from the
viewpoint of media producers and content providers, the possibility for unlimited copying
of digital data without loss of fidelity is undesirable because it may cause considerable
financial loss. Digital copy protection or copy prevention mechanisms are only of limited
value because access to clear text versions of protected data must at least be granted to
paying recipients which can then produce and distribute illegal copies. Technical attempts
to prevent copying have in reality always been circumvented.
One remaining method for the protection of intellectual property rights (IPR) is the
embedding of digital watermarks into multimedia data. The watermark is a digital code
unremovably, robustly, and imperceptibly embedded in the host data and typically
contains information about origin, status, and/or destination of the data. Although not
directly used for copy protection, it can at least help identifying source and destination of
multimedia data and, as a last line of defense, enable appropriate follow-up actions in
case of suspected copyright violations.
While copyright protection is the most prominent application of watermarking
techniques, others exist, including data authentication by means of fragile watermarks
which are impaired or destroyed by manipulations, embedded transmission of value
added services within multimedia data, and embedded data labeling for other purposes
than copyright protection, such as data monitoring and tracking. An example for a datamonitoring system is the automatic registration and monitoring of broadcasted radio
programs such that royalties are automatically paid to the IPR owners of the broadcast
data.
The development of watermarking methods involves several design tradeoffs.
Watermarks should be robust against standard data manipulations, including digital-to
analog conversion and digital format conversion. Security is a special concern, and
watermarks should resist even attempted attacks by knowledgeable individuals. On the
other hand, watermarks should be imperceptible and convey as much information as
1
possible. In general, watermark embedding and retrieval should have low complexity
because for various applications, real-time watermarking is desirable.
mixture but can partly or fully be recovered from the signal mixture later on if the correct
cryptographically secure key needed for recovery is used.
Watermark embedding process is shown below in Fig.1.1
watermark
Digital
Data
Watermarking
Watermarked data
Digital
image
Watermarked data
Watermarking
Watermark
image
2. Video Watermarking
2.1 Introduction:
Video watermarking is loaded in the digital watermark on the video, which uses video
data redundancy and embeds the copyright information into the original video data,
thereby protecting the copyright of digital products or the legitimate interests of copyright
holders. In video watermarking, the movement of video properties and the defect of
human visual model make video watermarking technology fall behind the image
watermark technology. Current video coding technologies (such as H. 264), some special
attacks, the blind video watermarking detection and real-time features, have brought new
challenges to video watermarking.
High real-time. Three-dimensional video signal has more the amount of data than the
image does. So calculation quality is larger and embedding / detection needs more
times. The procession of embedding, using video compression standard for these
specific structures such as motion vector coding, VLC code word, etc., can achieve
efficient algorithms.
Random detection. The watermark is detected in any position of the video rather
than the position according to the video playback order to detect the watermark.
Better robustness. Video watermarking scheme must ensure it can resist almost
kinds of processing or attacks.
Blind detection scheme. Non-blind detection needs the original host signal, but it is
very inconvenient to use the original data, because of the huge video data. Blind
detection does not need the original host signal.
coding standard and the video compression algorithms. This algorithm takes advantage of
video compression coding standard without the compressed video stream re-encoding and
full decoding. It has a lower computational complexity and a higher rate of embedded
watermark. But its disadvantages are that the capable of deal channel interference is bad;
the watermark can be destroyed by adding random bits labeled the least bit amplitude in
the VLC code using the same algorithm; traditional filtering, resampling and time-domain
scaling processing will also effect the extraction of the watermark. Some algorithms are
also proposed to embed watermark in motion vector or in the range of larger and small
phase angle change motion vectors. In the compressed video sequences, most of the
frames are the frame motion compensation coding, so the motion vector hide the
watermark information can be more effective to use the information of video bit stream.
DCT
Original
video
video
Compressed
video
Spatial
domain
DWT
Frequency
domain
DFT
DCT
coefficient
DHT
Motion
vector
SVD
Inter-frame
correlation
It can obtain the original video data. It can embed/extract watermarks into the
original video and the process is quite simple.
It can only get the code video data. So the encode video is decoded and then
embedded/extracted the watermarks.
G 0( z ) ( z 1)
1
G1( z ) ( z 1)
2
H 1( z ) ( z 1 1)
11
Spatial
Tampering
Attacks
Object
Removal Attack
Attack On
Foreground
Object
Attack on
Background
Object
Object
Modification
Attack
Object Addition
Attack
Attack On
Foreground
Object
Attack on
Background
Object
Attack On
Foreground
Object
Attack on
Background
Object
12
14
15
PSNR
PSNR
i 1
nr _ frames
2552
PSNR 10 * log(
)
MSE
y
x
( Ai , j Bi , j ) 2
MSE
x* y
i 1 j 1
Where x=width of frame/image
y=height of frame/image
1 P
wout ( j ) win ( j )
P j 1
Where wout is the extracted watermark, win is the original watermark and P is the size of
the watermark.
w (i, j )w (i, j )
[w (i, j )]
i
in
out
in
Where win is the original watermark and wout is the extracted watermark.
16
17
LL band of image
LH band of image
HL band of image
HH band of image
Figure 5.2 2-D DWT applied on the selected frame to obtain four sub-bands
LL,LH,HL,HH
Figure 5.3 Original frame and watermarked frame obtained for proposed method
18
19
References
[1] Dawen Xu, Rangding Wang, Jicheng Wang, A novel watermarking scheme for
H.264/AVC video authentication , Signal Processing: Image Communication(Elsevier)
26 (2011)267279
[2] Osama S. Faragallah, Efficient video watermarking based on singular value
decomposition in the discrete wavelet transform domain, Int. J. Electron. Commun.
(Elsevier) 67 (2013) 189 196
[3] Po-Chyi Su, Chin-Song Wu, Ing-Fan Chen, Ching-Yu Wu, Ying-Chang Wu, A
practical design of digital video watermarking in H.264/AVC for content authentication ,
Signal Processing: Image Communication(Elsevier) 26 (2011)413426
[4] Xing Chang, Weilin Wang, Jianyu Zhao, Li Zhang, A Survey of Digital Video
Watermarking, Seventh International Conference on Natural Computation 2011 IEEE
[5] Richa Singh, Mayank Vatsa, Sanjay K. Singh, Saurabh Upadhyay, Integrating SVM
classification with SVD watermarking for intelligent video authentication, Telecommun
Syst(Springer) (2009) 40: 515
[6] Hartung, F.; Kutter, M., "Multimedia watermarking techniques," Proceedings of the
IEEE , vol.87, no.7, pp.1079-1107, Jul 1999
20