SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) 
Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org 
Page | 18 
Paper Publications 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain Dr. Ashish M. Kothari1, Dr. Ved Vyas Dwivedi2 1Assistant Professor, Atmiya Institute of Technology & Science, Rajkot, (Gujarat) India 2Pro Vice Chancellor, C.U. Shah University, Wadhvan, (Gujarat) India Abstract: In this paper, we have suggested the spatial domain method for the digital video watermarking for both visible and invisible watermarks. The methods are used for the copyright protection as well as proof of ownership. In this paper we first extracted the frames from the video and then used spatial domain characteristics of the frames where we directly worked on the pixel value of the frame according to the watermark and calculated different parameters. Keyword: Digital video watermarking, copyright protection, spatial domain watermarking, Least Significant bit substitution I. Introduction Digital watermarking includes a number of techniques that are used to imperceptibly convey information by embedding it into the cover data. Here the cover data taken is a video sequence and the watermarking is thus called the Video Watermarking. Video watermarking is a field that is rapidly evolving in the area of multimedia and interest of the people in this field is increasing day by day because of the major factors as stated below. 
 Privacy of the digital data is required and because the copying of a video is comparatively very easy. 
 Fighting against the “Intellectual property rights breach” 
 Tempering of the digital video must be conceled. 
 Copyright protection must not be eroded. 
The figure 1 shows the idea of the video watermarking at the sending end where first of all frames is extracted from the video sequence. The next step is to divide frame into its Red, Green and Blue part. Each part is then individually given to the embedding algorithm block where the other input is a watermark that is to be embedded. After each part is watermarked the next frame is taken and the procedure is repeated untill the last frame. After the watermark is embedded in every frame, all frames are mixed to make the watermarked video which is then transmitted in the channel. The figure 2 shows the idea of the video watermarking at the receiver end the watermarked video is divided into the frames which are divided into Red, Green and Blue part from where the watermark is extracted. This Procedure is repeated for all frames so as to recover the watermark. II. Visual Quality Matrices We have mainly used the following visual quality metrics for the sake of comparison of degradation after the watermark is added to video. 푀푆퐸= 1 푀×푁 {(푓 푥,푦 −푓′(푥,푦))^2} 푁 푦=1 푀 푥=1 (1)
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) 
Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org 
Page | 19 
Paper Publications 
푃푆푁푅=10×log2552 푀푆퐸 (2) Here MSE – Mean Square Error PSNR – Peak Signal Signlal to noise Ratio f(x,y) – Original Frame of the video f’(x,y) – Watermarked Frame of the Video. The phrase peak signal-to-noise ratio, often abbreviated PSNR, is an engineering term for the ratio between the maximum possible power of a signal and the power of corrupting noise that affects the fidelity of its representation. Because many signals have a very wide dynamic range, PSNR is usually expressed in terms of the logarithmic decibel scale. A higher PSNR would normally indicate that the reconstruction is of higher quality at the receiver end. PSNR is most easily defined via the Mean Square Error(MSE) which for two m×n Frame f and f’ where one of the Frames is considered a noisy approximation of the other. 
(a) 
(b) Fig. 1 Idea of Video watermarking - Embedding a watermark
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) 
Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org 
Page | 20 
Paper Publications 
(a) 
(b) Fig. 2 Idea of Video watermarking - Extracting a watermark III. Visible watermarking Visible watermarking schemes are used to protect digital images that have to be released for some purposes, such as the contents used in learning websites or digital libraries, while illegal copying or reproduction is prohibited. A visible watermark is a secondary translucent overlay on the primary video and appears visible to a viewer on careful inspection. Visibly watermarked videos often contain recognizable but unremarkable copyright patterns indicating the identity of intellectual property rights (IPR) owners. The main advantage of using visible watermarks is that it conveys an immediate claim of ownership. It also prevents or at least discourages unauthorized use of copyrighted high quality images. A functional visible watermarking scheme should meet the following requirements: 
1. Perceptibility of host video details: all the details in the original host videos should remain perceptible after watermark embedding. 
2. Visibility of watermark patterns: the embedded watermark should be easily recognized from the watermarked video by the naked eye. 
3. Adaptive spreading over host video: the visible watermark should be adaptively spread over a large or important area of host video to prevent its deletion by clipping. 
4. Robustness: embedded watermarks should be difficult or impossible to remove unless exhaustive and costly human interventions are involved. 
5. Efficiency: the watermark patterns should be applied automatically with little human labor.
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) 
Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org 
Page | 21 
Paper Publications 
A. Embedding Algorithm 
In the actual embedding algorithm we have gone through the following steps. 1. The Video is converted into the number of frames. 2. When there is a black pixel (00000000) i.e non transperent part of the message, the corresponding pixel of the frame is replaced with the black pixel so as to have a visual perception. 3. When there is a white pixel (11111111) i.e transperent part of the message, the corresponding pixel of the frame is kept as it is. 4. Next frame is taken and step 2 and 3 is repeated untill the last frame comes. 5. All watermarked frames are combined so as to have the watermarked video. 
Fig. 3 Video with visible Watermark IV. Invisible watermarking The most straight-forward method of watermark embedding would be to embed the watermark into the least-significant-bits of each frame in the video. Consider one of the MxN frames of the video where M shows number of rows and N shows number of columns. In this frame each pixel value is represented by a decimal number in the range determined by the number of bits used. In a gray- scale frame, with 8 bit precision per pixel, each pixel assumes a value between [0, 255] and each positive number β10 can be represented by: β10 = b0 + b1*G1 + b2*G2 + ….… where G = 2 (3) This property allows the decomposition of an image into a collection of binary images by separating the bi into n bit planes. Figure 4 shows LSB decomposition of one Pixel. 
Fig. 4 LSB decomposition of one pixel
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) 
Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org 
Page | 22 
Paper Publications 
Here we have first divided the video into frames and then each frame is divided into red, green and blue parts. Each of the part is considered to be a greyscale frame and the above said method can be applicable to each frame. 
Fig. 5 Bit Plane Representation of the first frame of the video 
A. Embedding Algorithm 
From the fundamentals we can say that the LSB part of the image is least important compare to the MSB and here in the invisible watermarking using least significant bit we have make use of this fundamental. We replace the LSB of each pixel of every frame with the MSB of the watermark so that the most important information of the watermark is embedded into the least important information of the frame and hence the video. Following are the stepwise representation of what we have done to achieve the invisible watermarking of video. 
1. The Video is converted into the number of frames. 
2. Since the watermark image has only two values [0 and 255] and its binary representations are 00000000 and 11111111 respectively. So here we can replace the MSB of the message image with the LSB of the frame so that there is almost no visual degradation observed in the frame. 
3. Next frame is taken and step 2 is repeated untill the last frame comes. 
Figure 6 shows the graphical representation of the method. 
(a) Binary Watermark to be embedded 
(b) First frame is divided into R,G, and B frames
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) 
Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org 
Page | 23 
Paper Publications 
(c) LSB of the frames are replaced with MSB of the watermark 
(d) Resultant Frames 
(e) Watermarked Frame 1 of the video Fig. 6 Graphical Representation of the LSB method of invisible video watermarking Following table shows the visual quality metrices for the first six frames. Table I Visual Quality Matrices Value 
Frame No. 
MSE 
PSNR (dB) 
1 
0.50059 
51.136 
2 
0.49598 
51.1762 
3 
0.50201 
51.1237 
4 
0.49937 
51.1466 
5 
0.49882 
51.1514 
6 
0.49913 
51.1486 
Here we can also embed different message in the different frames so as to have a complete sentence of the message.
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) 
Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org 
Page | 24 
Paper Publications 
B. Extraction Algorithm 
We have used the following steps to extract the watermark from the video. 
1. The Video is converted into the number of frames. 
2. Extract the last bit and apply the following condition. 
3. If the extracted bit is 1, we would place a gray level of 255(White) in the respective place. 
4. If the extracted bit is 0, we would place a gray level of 0(Black) in the respective place. 
5. Next frame is taken and step 2 is repeated until the last frame comes. 
Figure shows the extracted message. 
Fig. 7 Extracted Messages V. Conclusion The main advantage of such a technique is that the modification of the LSB plane does not affect the human perception of the overall video quality. Also the LSB method of invisible watermarking is robust against cropping attack. REFERENCES 
[1] Ingemar J. Cox, Mathew L. Miller, Jeffery A. Bloom, Jessica Fridrich, Ton Kalker, “Digital Watermarking & Steganography Second Edition” Published by Morgan Kaufman Publishers Elsevier 2007. 
[2] Michael Arnold, Martin Schmucker, Stephen D. Wolthusen, “Theory and Applications of Digital Watermarking and Content Protection”, Published by Artech House Computer Security Service. 
[3] Rafael C. Gonzalez, Richard E. Woods, Steven L. Eddins, “Digital Image Processing Using MATLAB”, Published by Pearson Education, Inc. 
[4] D. P. Mukherjee, S. Maitra, and S. T. Acton, “Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication” IEEE Transactions on Multimedia, vol. 6, no. 1, pp. 1-15, Feb. 2004 
[5] M. Kutter & F.A.P.Petitcolas, “A fair benchmark for image watermarking systems”, Electronic Imaging '99. Security and Watermarking of Multimedia Contents, vol. 3657, Sans Jose, CA, USA, 25-27 January 1999. 
[6] Christine I. Podilchuk, and Edward J. Delp, “Digital Watermarking algorithms & applications” IEEE SIGNAL PROCESSING MAGAZINE, July 2001. 
[7] F. Hartung, M. Kutter, "Multimedia watermarking techniques" Proceedings of the IEEE, vol. 87, issue 7, pp. 1079- 1107, Jul 1999.

More Related Content

What's hot

Wavelet video processing tecnology
Wavelet video processing tecnologyWavelet video processing tecnology
Wavelet video processing tecnology
Prashant Madnavat
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
sipij
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Iaetsd wavelet transform based latency optimized image compression for
Iaetsd wavelet transform based latency optimized image compression forIaetsd wavelet transform based latency optimized image compression for
Iaetsd wavelet transform based latency optimized image compression for
Iaetsd Iaetsd
 
Discrete cosine transform
Discrete cosine transformDiscrete cosine transform
Discrete cosine transform
aniruddh Tyagi
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 

What's hot (19)

G0523444
G0523444G0523444
G0523444
 
Wavelet video processing tecnology
Wavelet video processing tecnologyWavelet video processing tecnology
Wavelet video processing tecnology
 
H017524854
H017524854H017524854
H017524854
 
EFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODEC
EFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODECEFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODEC
EFFICIENT STEREO VIDEO ENCODING FOR MOBILE APPLICATIONS USING THE 3D+F CODEC
 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
robust image watermarking
robust image watermarkingrobust image watermarking
robust image watermarking
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...
 
Iaetsd wavelet transform based latency optimized image compression for
Iaetsd wavelet transform based latency optimized image compression forIaetsd wavelet transform based latency optimized image compression for
Iaetsd wavelet transform based latency optimized image compression for
 
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
 
Discrete cosine transform
Discrete cosine transformDiscrete cosine transform
Discrete cosine transform
 
Depth estimation do we need to throw old things away
Depth estimation do we need to throw old things awayDepth estimation do we need to throw old things away
Depth estimation do we need to throw old things away
 
A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...
A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...
A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 

Viewers also liked

Factors Affecting On Customer Retention: A Case Study of Cellular Industry o...
 Factors Affecting On Customer Retention: A Case Study of Cellular Industry o... Factors Affecting On Customer Retention: A Case Study of Cellular Industry o...
Factors Affecting On Customer Retention: A Case Study of Cellular Industry o...
paperpublications3
 
A study on service quality of telecommunication service providers using servqual
A study on service quality of telecommunication service providers using servqualA study on service quality of telecommunication service providers using servqual
A study on service quality of telecommunication service providers using servqual
devrulez
 
Questionnaire on mobile phones
Questionnaire on mobile phonesQuestionnaire on mobile phones
Questionnaire on mobile phones
Bethany13
 
Questionnaire mba project
Questionnaire  mba  projectQuestionnaire  mba  project
Questionnaire mba project
Aashi Yadav
 
Thesis questionnaire
Thesis questionnaireThesis questionnaire
Thesis questionnaire
Maliha Ahmed
 
Brand questionnaire
Brand questionnaireBrand questionnaire
Brand questionnaire
yasiniub
 
Research proposal sample
Research proposal sampleResearch proposal sample
Research proposal sample
Vanessa Cuesta
 

Viewers also liked (20)

Indian telecom thesis
Indian telecom thesisIndian telecom thesis
Indian telecom thesis
 
Customer preference and experiences with mobile phone services in j.p.nagar, ...
Customer preference and experiences with mobile phone services in j.p.nagar, ...Customer preference and experiences with mobile phone services in j.p.nagar, ...
Customer preference and experiences with mobile phone services in j.p.nagar, ...
 
identify servqual for college mess
identify servqual for college messidentify servqual for college mess
identify servqual for college mess
 
Customer satisfaction of tata docomo
Customer satisfaction of tata docomoCustomer satisfaction of tata docomo
Customer satisfaction of tata docomo
 
Factors Affecting On Customer Retention: A Case Study of Cellular Industry o...
 Factors Affecting On Customer Retention: A Case Study of Cellular Industry o... Factors Affecting On Customer Retention: A Case Study of Cellular Industry o...
Factors Affecting On Customer Retention: A Case Study of Cellular Industry o...
 
Questionnaire for mobile servey
Questionnaire for mobile servey Questionnaire for mobile servey
Questionnaire for mobile servey
 
A study on service quality of telecommunication service providers using servqual
A study on service quality of telecommunication service providers using servqualA study on service quality of telecommunication service providers using servqual
A study on service quality of telecommunication service providers using servqual
 
Factors Influencing Brand Switching in Telecommunication Industry of United K...
Factors Influencing Brand Switching in Telecommunication Industry of United K...Factors Influencing Brand Switching in Telecommunication Industry of United K...
Factors Influencing Brand Switching in Telecommunication Industry of United K...
 
Service quality and customer satisfaction with reference to insurance sector ...
Service quality and customer satisfaction with reference to insurance sector ...Service quality and customer satisfaction with reference to insurance sector ...
Service quality and customer satisfaction with reference to insurance sector ...
 
Questionnaire on mobile phones
Questionnaire on mobile phonesQuestionnaire on mobile phones
Questionnaire on mobile phones
 
Questionnaire
QuestionnaireQuestionnaire
Questionnaire
 
Factors Affecting Customer Satisfaction in Telecommunication Sector in Nepal
Factors Affecting Customer Satisfaction in Telecommunication Sector in NepalFactors Affecting Customer Satisfaction in Telecommunication Sector in Nepal
Factors Affecting Customer Satisfaction in Telecommunication Sector in Nepal
 
Project report on 'customer satisfaction towards whatsapp'
Project report on 'customer satisfaction towards whatsapp'Project report on 'customer satisfaction towards whatsapp'
Project report on 'customer satisfaction towards whatsapp'
 
Questionnaire mba project
Questionnaire  mba  projectQuestionnaire  mba  project
Questionnaire mba project
 
Validity and reliability of questionnaires
Validity and reliability of questionnairesValidity and reliability of questionnaires
Validity and reliability of questionnaires
 
Thesis questionnaire
Thesis questionnaireThesis questionnaire
Thesis questionnaire
 
Brand questionnaire
Brand questionnaireBrand questionnaire
Brand questionnaire
 
Sample Questionnaire
Sample QuestionnaireSample Questionnaire
Sample Questionnaire
 
Questionnaire
QuestionnaireQuestionnaire
Questionnaire
 
Research proposal sample
Research proposal sampleResearch proposal sample
Research proposal sample
 

Similar to Performance Analysis of Digital Watermarking Of Video in the Spatial Domain

Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd Iaetsd
 

Similar to Performance Analysis of Digital Watermarking Of Video in the Spatial Domain (20)

Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
 
Effective Compression of Digital Video
Effective Compression of Digital VideoEffective Compression of Digital Video
Effective Compression of Digital Video
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
20120140505013
2012014050501320120140505013
20120140505013
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWT
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor network
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor network
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
 
A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSION
A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSIONA REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSION
A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSION
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
 
A04840107
A04840107A04840107
A04840107
 
Z03301550160
Z03301550160Z03301550160
Z03301550160
 
A0540106
A0540106A0540106
A0540106
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domains
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &
 

Recently uploaded

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Recently uploaded (20)

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 

Performance Analysis of Digital Watermarking Of Video in the Spatial Domain

  • 1. International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org Page | 18 Paper Publications Performance Analysis of Digital Watermarking Of Video in the Spatial Domain Dr. Ashish M. Kothari1, Dr. Ved Vyas Dwivedi2 1Assistant Professor, Atmiya Institute of Technology & Science, Rajkot, (Gujarat) India 2Pro Vice Chancellor, C.U. Shah University, Wadhvan, (Gujarat) India Abstract: In this paper, we have suggested the spatial domain method for the digital video watermarking for both visible and invisible watermarks. The methods are used for the copyright protection as well as proof of ownership. In this paper we first extracted the frames from the video and then used spatial domain characteristics of the frames where we directly worked on the pixel value of the frame according to the watermark and calculated different parameters. Keyword: Digital video watermarking, copyright protection, spatial domain watermarking, Least Significant bit substitution I. Introduction Digital watermarking includes a number of techniques that are used to imperceptibly convey information by embedding it into the cover data. Here the cover data taken is a video sequence and the watermarking is thus called the Video Watermarking. Video watermarking is a field that is rapidly evolving in the area of multimedia and interest of the people in this field is increasing day by day because of the major factors as stated below.  Privacy of the digital data is required and because the copying of a video is comparatively very easy.  Fighting against the “Intellectual property rights breach”  Tempering of the digital video must be conceled.  Copyright protection must not be eroded. The figure 1 shows the idea of the video watermarking at the sending end where first of all frames is extracted from the video sequence. The next step is to divide frame into its Red, Green and Blue part. Each part is then individually given to the embedding algorithm block where the other input is a watermark that is to be embedded. After each part is watermarked the next frame is taken and the procedure is repeated untill the last frame. After the watermark is embedded in every frame, all frames are mixed to make the watermarked video which is then transmitted in the channel. The figure 2 shows the idea of the video watermarking at the receiver end the watermarked video is divided into the frames which are divided into Red, Green and Blue part from where the watermark is extracted. This Procedure is repeated for all frames so as to recover the watermark. II. Visual Quality Matrices We have mainly used the following visual quality metrics for the sake of comparison of degradation after the watermark is added to video. 푀푆퐸= 1 푀×푁 {(푓 푥,푦 −푓′(푥,푦))^2} 푁 푦=1 푀 푥=1 (1)
  • 2. International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org Page | 19 Paper Publications 푃푆푁푅=10×log2552 푀푆퐸 (2) Here MSE – Mean Square Error PSNR – Peak Signal Signlal to noise Ratio f(x,y) – Original Frame of the video f’(x,y) – Watermarked Frame of the Video. The phrase peak signal-to-noise ratio, often abbreviated PSNR, is an engineering term for the ratio between the maximum possible power of a signal and the power of corrupting noise that affects the fidelity of its representation. Because many signals have a very wide dynamic range, PSNR is usually expressed in terms of the logarithmic decibel scale. A higher PSNR would normally indicate that the reconstruction is of higher quality at the receiver end. PSNR is most easily defined via the Mean Square Error(MSE) which for two m×n Frame f and f’ where one of the Frames is considered a noisy approximation of the other. (a) (b) Fig. 1 Idea of Video watermarking - Embedding a watermark
  • 3. International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org Page | 20 Paper Publications (a) (b) Fig. 2 Idea of Video watermarking - Extracting a watermark III. Visible watermarking Visible watermarking schemes are used to protect digital images that have to be released for some purposes, such as the contents used in learning websites or digital libraries, while illegal copying or reproduction is prohibited. A visible watermark is a secondary translucent overlay on the primary video and appears visible to a viewer on careful inspection. Visibly watermarked videos often contain recognizable but unremarkable copyright patterns indicating the identity of intellectual property rights (IPR) owners. The main advantage of using visible watermarks is that it conveys an immediate claim of ownership. It also prevents or at least discourages unauthorized use of copyrighted high quality images. A functional visible watermarking scheme should meet the following requirements: 1. Perceptibility of host video details: all the details in the original host videos should remain perceptible after watermark embedding. 2. Visibility of watermark patterns: the embedded watermark should be easily recognized from the watermarked video by the naked eye. 3. Adaptive spreading over host video: the visible watermark should be adaptively spread over a large or important area of host video to prevent its deletion by clipping. 4. Robustness: embedded watermarks should be difficult or impossible to remove unless exhaustive and costly human interventions are involved. 5. Efficiency: the watermark patterns should be applied automatically with little human labor.
  • 4. International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org Page | 21 Paper Publications A. Embedding Algorithm In the actual embedding algorithm we have gone through the following steps. 1. The Video is converted into the number of frames. 2. When there is a black pixel (00000000) i.e non transperent part of the message, the corresponding pixel of the frame is replaced with the black pixel so as to have a visual perception. 3. When there is a white pixel (11111111) i.e transperent part of the message, the corresponding pixel of the frame is kept as it is. 4. Next frame is taken and step 2 and 3 is repeated untill the last frame comes. 5. All watermarked frames are combined so as to have the watermarked video. Fig. 3 Video with visible Watermark IV. Invisible watermarking The most straight-forward method of watermark embedding would be to embed the watermark into the least-significant-bits of each frame in the video. Consider one of the MxN frames of the video where M shows number of rows and N shows number of columns. In this frame each pixel value is represented by a decimal number in the range determined by the number of bits used. In a gray- scale frame, with 8 bit precision per pixel, each pixel assumes a value between [0, 255] and each positive number β10 can be represented by: β10 = b0 + b1*G1 + b2*G2 + ….… where G = 2 (3) This property allows the decomposition of an image into a collection of binary images by separating the bi into n bit planes. Figure 4 shows LSB decomposition of one Pixel. Fig. 4 LSB decomposition of one pixel
  • 5. International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org Page | 22 Paper Publications Here we have first divided the video into frames and then each frame is divided into red, green and blue parts. Each of the part is considered to be a greyscale frame and the above said method can be applicable to each frame. Fig. 5 Bit Plane Representation of the first frame of the video A. Embedding Algorithm From the fundamentals we can say that the LSB part of the image is least important compare to the MSB and here in the invisible watermarking using least significant bit we have make use of this fundamental. We replace the LSB of each pixel of every frame with the MSB of the watermark so that the most important information of the watermark is embedded into the least important information of the frame and hence the video. Following are the stepwise representation of what we have done to achieve the invisible watermarking of video. 1. The Video is converted into the number of frames. 2. Since the watermark image has only two values [0 and 255] and its binary representations are 00000000 and 11111111 respectively. So here we can replace the MSB of the message image with the LSB of the frame so that there is almost no visual degradation observed in the frame. 3. Next frame is taken and step 2 is repeated untill the last frame comes. Figure 6 shows the graphical representation of the method. (a) Binary Watermark to be embedded (b) First frame is divided into R,G, and B frames
  • 6. International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org Page | 23 Paper Publications (c) LSB of the frames are replaced with MSB of the watermark (d) Resultant Frames (e) Watermarked Frame 1 of the video Fig. 6 Graphical Representation of the LSB method of invisible video watermarking Following table shows the visual quality metrices for the first six frames. Table I Visual Quality Matrices Value Frame No. MSE PSNR (dB) 1 0.50059 51.136 2 0.49598 51.1762 3 0.50201 51.1237 4 0.49937 51.1466 5 0.49882 51.1514 6 0.49913 51.1486 Here we can also embed different message in the different frames so as to have a complete sentence of the message.
  • 7. International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) Vol. 1, Issue 1, pp: (18-24), Month: April - June 2014, Available at: www.paperpublications.org Page | 24 Paper Publications B. Extraction Algorithm We have used the following steps to extract the watermark from the video. 1. The Video is converted into the number of frames. 2. Extract the last bit and apply the following condition. 3. If the extracted bit is 1, we would place a gray level of 255(White) in the respective place. 4. If the extracted bit is 0, we would place a gray level of 0(Black) in the respective place. 5. Next frame is taken and step 2 is repeated until the last frame comes. Figure shows the extracted message. Fig. 7 Extracted Messages V. Conclusion The main advantage of such a technique is that the modification of the LSB plane does not affect the human perception of the overall video quality. Also the LSB method of invisible watermarking is robust against cropping attack. REFERENCES [1] Ingemar J. Cox, Mathew L. Miller, Jeffery A. Bloom, Jessica Fridrich, Ton Kalker, “Digital Watermarking & Steganography Second Edition” Published by Morgan Kaufman Publishers Elsevier 2007. [2] Michael Arnold, Martin Schmucker, Stephen D. Wolthusen, “Theory and Applications of Digital Watermarking and Content Protection”, Published by Artech House Computer Security Service. [3] Rafael C. Gonzalez, Richard E. Woods, Steven L. Eddins, “Digital Image Processing Using MATLAB”, Published by Pearson Education, Inc. [4] D. P. Mukherjee, S. Maitra, and S. T. Acton, “Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication” IEEE Transactions on Multimedia, vol. 6, no. 1, pp. 1-15, Feb. 2004 [5] M. Kutter & F.A.P.Petitcolas, “A fair benchmark for image watermarking systems”, Electronic Imaging '99. Security and Watermarking of Multimedia Contents, vol. 3657, Sans Jose, CA, USA, 25-27 January 1999. [6] Christine I. Podilchuk, and Edward J. Delp, “Digital Watermarking algorithms & applications” IEEE SIGNAL PROCESSING MAGAZINE, July 2001. [7] F. Hartung, M. Kutter, "Multimedia watermarking techniques" Proceedings of the IEEE, vol. 87, issue 7, pp. 1079- 1107, Jul 1999.