SlideShare a Scribd company logo
DIGITAL WATER
MARKING FOR VIDEO
PIRACY DETECTION
               BY,
        NCCT
ABSTRACT
    Piracy is an important issue as far as the
manufacturers are concerned as it can result in a huge
revenue loss.The reason behind the practice of full-
scale piracy is mainly due to the difficulty involved in
tracking the source responsible for the piracy.

    The goal of this project is to use digital
watermarking techniques to detect video piracy.A
digital watermark is a distinguishing piece of
information that is adhered to the data that it is
intended to protect.

    The information watermarked includes owner,
recipient and/or distributor details, transaction dates,
serial numbers, etc, which play an important role in
determining the source of piracy.
CONTENTS
DIGITAL WATER MARKING
   GENERAL FEATURES
   STRUCTURE OF A TYPICAL WATER MARKING
   SYSTEM
     WATER MARK INSERTION UNIT
     WATER MARK EXTRACTION AND DETECTION UNIT
APPLICATIONS
EXISTING SYSTEM
PROPOSED SYSTEM
BLOCK DIAGRAM OF THE PROPOSED
SYSTEM
MODULE DESCRIPTION
CONCLUSION
DIGITAL WATER
   MARKING
Digital watermarking is a technology for
embedding various types of information in
digital content. In general, information for
protecting copyrights and proving the validity
of data is embedded as a watermark.

    Since watermarking can be applied to
various types of data, the imperceptibility
constraint will take different forms, depending
on the properties of the recipient (i.e., the
human senses in most practical cases).
The watermark should be resilient to
standard manipulations of unintentional as
well as intentional nature.

     It should be statistically irremovable, that
is, a statistical analysis should not produce any
advantage from the attacking point of view.

   The watermark should withstand multiple
watermarking to facilitate traitor tracing.
Embedding a watermark should not result
in a significant increase or reduction in the
original data.

    Digital watermarks are added to images or
audio data in such a way that they are invisible
or inaudible and unidentifiable by human eye
or ear.
GENERAL FEATURES
1.Elements of digital content can be directly
   manipulated and information can be
   embedded in them.

2.Deterioration of the quality of digital content is
   minimized.

3.Watermarks are retained and detectable after
   the digital content is edited, compressed, or
   converted.

4.The structure of a watermark makes it difficult
   to detect or overwrite (alter) the embedded
   information (watermark contents).
5.Processing required for watermarking and
detection is simple.


6.Embedded watermark information cannot be
eliminated without diminishing the quality of the
digital content that carries the watermark.


7.The watermark information embedded in
digital content can be detected as required.
STRUCTURE OF A
 TYPICAL WATER
MARKING SYSTEM
WATER MARK
INSERTION UNIT
HIDDEN
                                       INFO.
ORIGINAL                PERCEPTUAL
IMAGE                   MASK
                                     INFORMATION
                                        HIDING
                                                   SECRET
                                                   KEY



           PERCEPTUAL                WATERMARK
            ANALYSIS                 GENERATION
Every watermarking system consists at least
of two different parts: watermark embedding
unit and watermark detection and extraction unit.

   The unmarked image is passed through a
perceptual analysis block that determines how
much a certain pixel can be altered so that the
resulting watermarked image is indistinguishable
from the original.

    After this so-called perceptual-mask has been
computed, the information to be hidden is
shaped by this mask and spread all over the
original image.
Fig 2 .ORIGINAL FABRIC   Fig 3. PERCEPTUAL MASK
         IMAGE
In our case, the main reason for this
spreading is to ensure that the hidden
information survives cropping of the image.

    Moreover, the way this spreading is
performed depends on the secret key, so it is
difficult to recover the hidden information if
one is not in possession of this key.

     Figure 3 represents the perceptual mask
that results after analyzing the image presented
in Figure 2.
WATER MARK
DETECTION AND
 EXTRACTION
    UNIT
WATERMARKED
IMAGE               PERCEPTUAL
                    MASK
                                       SECRET KEY




                                                WATERMARKED
                                                  YES/NO?

         PERCEPTUAL ANALYSIS     WATERMARK DETECTION



                                                    HIDDEN INFO.

                                  WATERMARK EXTRACTION


                                             SECRET KEY
This figure shows the typical configuration
of a watermark detection and extraction unit.

   Watermark detection involves deciding
whether a certain image has been watermarked
with a given key.

    Once the presence of the watermark has
been correctly detected, it is possible to extract
the hidden information.
Since digital copies are inherently exact
replicas of the original, there will be no way to
tell them apart.
     Therein lies the authorship/ownership
problem due to the likeness of the original and
the copy.
     Digital watermarks can be used to show
proof of ownership by having your mark put
into the file, so even if both images are the
same, if they contain your mark then you have
a much stronger case for copyright or
ownership disputes.
Watermarks can be visible or invisible
depending on the luminance in the mask. The
higher the luminance, the greater the visibility
of the watermark.

    Attackers can use different types of image
processing to remove or degrade the
watermark until it is illegible .
APPLICATIONS
The various applications are as follows:
    VIDEO WATER MARKING
    AUDIO WATER MARKING
    TEXT WATERMARKING
    LABELLING
    FINGERPRINTING
    AUTHENTICATION
    COPY AND PLAYBACK CONTROL
In this case, most considerations made in previous
sections hold. However, now the temporal axis can be
exploited to increase the redundancy of the watermark. As
in the still images case, watermarks can be created either in
the spatial or in the DCT domains. In the latter, the results
can be directly extrapolated to MPEG-2 sequences,
although different actions must be taken for I, P and B
frames. Note that perhaps the set of attacks that can be
performed intentionally is not smaller but definitely more
expensive than for still images.
Again, previous considerations are valid. In this case,
time and frequency masking properties of the human ear are
used to conceal the watermark and make it inaudible. The
greatest difficulty lies in synchronizing the watermark and
the watermarked audio file, but techniques that overcome
this problem have been proposed.
This problem, which in fact was one of the first that
was studied within the information hiding area can be
solved at two levels. At the printout level, information can
be encoded in the way the text lines or words are separated
(this facilitates the survival of the watermark even to
photocopying). At the semantic level (necessary when raw
text files are provided), equivalences between words or
expressions can be used, although special care has to be
taken not to destruct the possible intention of the author.
The hidden message could also contain labels
that allow for example to annotate images or audio.
Of course, the annotation may also been included in
a separate file, but with watermarking it results
more difficult to destroy or loose this label, since it
becomes closely tied to the object that annotates.
This is especially useful in medical applications
since it prevents dangerous errors.
This is similar to the previous application and allows
acquisition devices (such as video cameras, audio recorders,
etc) to insert information about the specific device (e.g., an
ID number) and date of creation. This can also be done with
conventional digital signature techniques but with
watermarking it becomes considerably more difficult to
excise or alter the signature. Some digital cameras already
include this feature.
This is a variant of the previous application, in an area
where cryptographic techniques have already made their
way. However, there are two significant benefits that arise
from using watermarking: first, as in the previous case, the
signature becomes embedded in the message, second, it is
possible to create ‘soft authentication’ algorithms that offer
a multi valued ‘perceptual closeness’ measure that accounts
for different unintentional transformations that the data may
have suffered (an example is image compression with
different levels), instead of the classical yes/no answer given
by cryptography-based authentication. Unfortunately, the
major drawback of watermarking-based authentication is the
lack of public key algorithms that force either to put secret
keys in risk or to resort to trusted parties.
The message carried by the watermark may also
contain information regarding copy and display
permissions. Then, a secure module can be added in copy or
playback equipment to automatically extract this permission
information and block further processing if required. In
order to be effective, this protection approach requires
agreements between content providers and consumer
electronics manufacturers to introduce compliant watermark
detectors in their video players and recorders. This approach
is being taken in Digital Video Disc (DVD).
EXISTING SYSTEM
The existing systems that employ digital
watermarking for video piracy detection are
inviting to the hackers as the watermark is
visible.
    The watermark is concentrated in a
particular area, thus through statistical analysis
the approximate location of the watermark can
be identified. This enables the hackers to
overwrite the copyright information with their
own information.
   As the watermark is concentrated, the
chances of it being prone to damages due to
compression etc are more.
PROPOSED SYSTEM
In the proposed system the video file is
watermarked with the copyright information.
The copyright information includes data about
the vendor, buyer, a serial number and other
information.

    When it is detected that the video is
pirated, it is possible to dewater mark the file
to retrieve the copyright information. With this
information we can trace back to the sources of
piracy.
In the proposed system the watermark is
made invisible.

      The watermark is spread throughout the
image, so it’s location cannot be traced easily.
The spreading of the watermark also prevents
data loss from manipulations like compression
etc.
Apart from these advantages, the
digital watermark in the proposed system can't
be erased or overwritten.
      It is also robust and completely unaffected
by common audio or video processing
operations.
      It combines enormous versatility with ease
of installation, integration and operation. It offers
wide range of applications, including audio and
video copyright control.
BLOCK DIAGRAM
COPYRIGHT
              WATERMARKING     WATER MARKED
INFORMATION
                                  IMAGE




 VIDEO FILE                     RETRIEVED
INFORMATION   DEWATERMARKING
                                COPYRIGHT
                               INFORMATION
As shown in the block diagram of the
proposed system, the copyright information in
text format along with the video file content in
AVI format is given as input to the
watermarking module.
    In this module the textual information is
converted compatible to the video file data and
the bits in the video file are altered according
to the copyright information.
     In the dewater marking module, the
copyright information is retrieved from the
watermarked file using the key file.
MODULE DESCRIPTION
The various modules in the proposed system
 are:
   VIDEO HEADER INFORMATION
   FILE HANDLING
   WATER MARKING
   DEWATER MARKING
   INTERGRATION AND ERROR HANDLING
VIDEO HEADER INFORMATION

     The video information is stored in AVI
 RIFF format. The various headers and chunks
 are identified and declared.

     Thus by identifying the header information
 the location of the data is found.
FILE HANDLING
    The information about the owner,
recipient/distributor, serial number and other
copyright related data is stored in a text file.
This information is read from the text file.

    The header information is read from the
video file and is written into the key file and
the temporary file. The file-handling module is
carried out both during watermarking and
dewater marking.
WATERMARKING
    The image is watermarked with the
copyright information in such a way that the
video information does not lose its property.

    Changing a few data bits of the video file
depending on the copyright information does
this. The key file generated in this process
should be kept secret and should be protected
from any corruption.
DEWATERMARKING

    The data from the watermarked video file
is fetched during check for piracy. Using the
key file the copyright information is extracted
from the watermarked data.
    From the copyright information it is
possible to find the source of piracy and thus
necessary action can be taken.
ERROR HANDLING AND
      INTEGRATION

    Errors in each of the modules are handled
separately. Once this is done, the various
modules are integrated and the errors that
follow are handled
CONCLUSION
Though there are several other techniques
available for copyright protection and several
other similar issues, digital watermarking is
the only preferred algorithm because of its
basic advantages like being robust, fragile and
imperceptible.
    Several proposals have been made to
exploit the benefits of this algorithm for video
piracy detection, but the problem is still far off
from a solution.
The proposed system in this project has
used digital watermarking technique to detect
video piracy and has overcome most of the
major shortcomings of the existing systems.
The proposed system has several advantages
when compared to existing system.

  Though this system is competent enough to
be used in the market there are few
challenges yet to be solved. Few among them
are as follows:
The proposed system works for only
those video images which are in the AVI
RIFF format.
        This software helps to detect the
source of piracy, when the video is
distributed through compact discs. However
with a few changes to the software it is
possible to distribute the video file through
the Internet.
        Despite the various ways in which the
software can be enhanced, the proposed
system is no less competitive and its
efficiency is beyond question
Digital Water Marking For Video Piracy Detection

More Related Content

What's hot

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Jaykrishna Thakkar
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
nafees321
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
vasanthimuniasamy
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwt
IAEME Publication
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
Shiraz University
 
The Audio watermarking
The Audio watermarkingThe Audio watermarking
Watermark
WatermarkWatermark
Watermark
ravi33s
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
OECLIB Odisha Electronics Control Library
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
Subhash Basistha
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
pallavikhandekar212
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Watermarking
WatermarkingWatermarking
Watermarking
Pushkar Dutt
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
sudip nandi
 

What's hot (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermark
WatermarkWatermark
Watermark
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwt
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Steganography
SteganographySteganography
Steganography
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
The Audio watermarking
The Audio watermarkingThe Audio watermarking
The Audio watermarking
 
Watermark
WatermarkWatermark
Watermark
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 

Viewers also liked

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
Qaisar Ayub
 
A blind and robust video watermarking scheme in the DT CWT and SVD domain
A blind and robust video watermarking scheme in the DT CWT and SVD domainA blind and robust video watermarking scheme in the DT CWT and SVD domain
A blind and robust video watermarking scheme in the DT CWT and SVD domain
Abhishek Nath
 
Robust Watermarking of Video Streams
Robust Watermarking of Video StreamsRobust Watermarking of Video Streams
Robust Watermarking of Video Streams
Tamás Polyák
 
60 312-318
60 312-31860 312-318
60 312-318
idescitation
 
Digital Water marking
Digital Water markingDigital Water marking
Digital Water marking
Sourav Kanti Gayen
 
Image processing research proposal
Image processing research proposalImage processing research proposal
Image processing research proposal
Iftikhar Ahmad
 
Watermarking
WatermarkingWatermarking
Watermarking
Vikas Garg
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarkingLikan Patra
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networksSalahuddin Jokhio
 
Kalyaniallu (1)
Kalyaniallu (1)Kalyaniallu (1)
Kalyaniallu (1)
chandu pedakota
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
Surit Datta
 

Viewers also liked (15)

Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
A blind and robust video watermarking scheme in the DT CWT and SVD domain
A blind and robust video watermarking scheme in the DT CWT and SVD domainA blind and robust video watermarking scheme in the DT CWT and SVD domain
A blind and robust video watermarking scheme in the DT CWT and SVD domain
 
Robust Watermarking of Video Streams
Robust Watermarking of Video StreamsRobust Watermarking of Video Streams
Robust Watermarking of Video Streams
 
Digital plus No watermark
Digital plus No watermarkDigital plus No watermark
Digital plus No watermark
 
60 312-318
60 312-31860 312-318
60 312-318
 
Digital Water marking
Digital Water markingDigital Water marking
Digital Water marking
 
Ppt nc
Ppt ncPpt nc
Ppt nc
 
Image processing research proposal
Image processing research proposalImage processing research proposal
Image processing research proposal
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
 
Kalyaniallu (1)
Kalyaniallu (1)Kalyaniallu (1)
Kalyaniallu (1)
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 

Similar to Digital Water Marking For Video Piracy Detection

Digital water marking
Digital water markingDigital water marking
Digital water marking
Md Aktar
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
IOSR Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
IOSR Journals
 
Ki2417591763
Ki2417591763Ki2417591763
Ki2417591763
IJERA Editor
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
IJNSA Journal
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Editor IJCATR
 
50120130406038
5012013040603850120130406038
50120130406038
IAEME Publication
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
theijes
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000authority12
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
prdpgpt
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ijistjournal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ijistjournal
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
eSAT Journals
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
eSAT Publishing House
 
Dz31840846
Dz31840846Dz31840846
Dz31840846
IJERA Editor
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
Alexander Decker
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET Journal
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
IJSRD
 

Similar to Digital Water Marking For Video Piracy Detection (20)

Digital water marking
Digital water markingDigital water marking
Digital water marking
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
Ki2417591763
Ki2417591763Ki2417591763
Ki2417591763
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
50120130406038
5012013040603850120130406038
50120130406038
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
Dz31840846
Dz31840846Dz31840846
Dz31840846
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 

More from ncct

Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological SignalsBiomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
ncct
 
Self Repairing Tree Topology Enabling Content Based Routing In Local Area Ne...
Self Repairing Tree Topology Enabling  Content Based Routing In Local Area Ne...Self Repairing Tree Topology Enabling  Content Based Routing In Local Area Ne...
Self Repairing Tree Topology Enabling Content Based Routing In Local Area Ne...
ncct
 
Cockpit White Box
Cockpit White BoxCockpit White Box
Cockpit White Box
ncct
 
Rail Track Inspector
Rail Track InspectorRail Track Inspector
Rail Track Inspector
ncct
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
ncct
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detector
ncct
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protection
ncct
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
ncct
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
ncct
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projects
ncct
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
ncct
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
ncct
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
ncct
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
ncct
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
ncct
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S P
ncct
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C T
ncct
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projects
ncct
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computing
ncct
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projects
ncct
 

More from ncct (20)

Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological SignalsBiomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
 
Self Repairing Tree Topology Enabling Content Based Routing In Local Area Ne...
Self Repairing Tree Topology Enabling  Content Based Routing In Local Area Ne...Self Repairing Tree Topology Enabling  Content Based Routing In Local Area Ne...
Self Repairing Tree Topology Enabling Content Based Routing In Local Area Ne...
 
Cockpit White Box
Cockpit White BoxCockpit White Box
Cockpit White Box
 
Rail Track Inspector
Rail Track InspectorRail Track Inspector
Rail Track Inspector
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detector
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protection
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projects
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S P
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C T
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projects
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computing
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projects
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Digital Water Marking For Video Piracy Detection

  • 1. DIGITAL WATER MARKING FOR VIDEO PIRACY DETECTION BY, NCCT
  • 2. ABSTRACT Piracy is an important issue as far as the manufacturers are concerned as it can result in a huge revenue loss.The reason behind the practice of full- scale piracy is mainly due to the difficulty involved in tracking the source responsible for the piracy. The goal of this project is to use digital watermarking techniques to detect video piracy.A digital watermark is a distinguishing piece of information that is adhered to the data that it is intended to protect. The information watermarked includes owner, recipient and/or distributor details, transaction dates, serial numbers, etc, which play an important role in determining the source of piracy.
  • 3. CONTENTS DIGITAL WATER MARKING GENERAL FEATURES STRUCTURE OF A TYPICAL WATER MARKING SYSTEM WATER MARK INSERTION UNIT WATER MARK EXTRACTION AND DETECTION UNIT
  • 4. APPLICATIONS EXISTING SYSTEM PROPOSED SYSTEM BLOCK DIAGRAM OF THE PROPOSED SYSTEM MODULE DESCRIPTION CONCLUSION
  • 5. DIGITAL WATER MARKING
  • 6. Digital watermarking is a technology for embedding various types of information in digital content. In general, information for protecting copyrights and proving the validity of data is embedded as a watermark. Since watermarking can be applied to various types of data, the imperceptibility constraint will take different forms, depending on the properties of the recipient (i.e., the human senses in most practical cases).
  • 7. The watermark should be resilient to standard manipulations of unintentional as well as intentional nature. It should be statistically irremovable, that is, a statistical analysis should not produce any advantage from the attacking point of view. The watermark should withstand multiple watermarking to facilitate traitor tracing.
  • 8. Embedding a watermark should not result in a significant increase or reduction in the original data. Digital watermarks are added to images or audio data in such a way that they are invisible or inaudible and unidentifiable by human eye or ear.
  • 10. 1.Elements of digital content can be directly manipulated and information can be embedded in them. 2.Deterioration of the quality of digital content is minimized. 3.Watermarks are retained and detectable after the digital content is edited, compressed, or converted. 4.The structure of a watermark makes it difficult to detect or overwrite (alter) the embedded information (watermark contents).
  • 11. 5.Processing required for watermarking and detection is simple. 6.Embedded watermark information cannot be eliminated without diminishing the quality of the digital content that carries the watermark. 7.The watermark information embedded in digital content can be detected as required.
  • 12. STRUCTURE OF A TYPICAL WATER MARKING SYSTEM
  • 14. HIDDEN INFO. ORIGINAL PERCEPTUAL IMAGE MASK INFORMATION HIDING SECRET KEY PERCEPTUAL WATERMARK ANALYSIS GENERATION
  • 15. Every watermarking system consists at least of two different parts: watermark embedding unit and watermark detection and extraction unit. The unmarked image is passed through a perceptual analysis block that determines how much a certain pixel can be altered so that the resulting watermarked image is indistinguishable from the original. After this so-called perceptual-mask has been computed, the information to be hidden is shaped by this mask and spread all over the original image.
  • 16. Fig 2 .ORIGINAL FABRIC Fig 3. PERCEPTUAL MASK IMAGE
  • 17. In our case, the main reason for this spreading is to ensure that the hidden information survives cropping of the image. Moreover, the way this spreading is performed depends on the secret key, so it is difficult to recover the hidden information if one is not in possession of this key. Figure 3 represents the perceptual mask that results after analyzing the image presented in Figure 2.
  • 18. WATER MARK DETECTION AND EXTRACTION UNIT
  • 19. WATERMARKED IMAGE PERCEPTUAL MASK SECRET KEY WATERMARKED YES/NO? PERCEPTUAL ANALYSIS WATERMARK DETECTION HIDDEN INFO. WATERMARK EXTRACTION SECRET KEY
  • 20. This figure shows the typical configuration of a watermark detection and extraction unit. Watermark detection involves deciding whether a certain image has been watermarked with a given key. Once the presence of the watermark has been correctly detected, it is possible to extract the hidden information.
  • 21. Since digital copies are inherently exact replicas of the original, there will be no way to tell them apart. Therein lies the authorship/ownership problem due to the likeness of the original and the copy. Digital watermarks can be used to show proof of ownership by having your mark put into the file, so even if both images are the same, if they contain your mark then you have a much stronger case for copyright or ownership disputes.
  • 22. Watermarks can be visible or invisible depending on the luminance in the mask. The higher the luminance, the greater the visibility of the watermark. Attackers can use different types of image processing to remove or degrade the watermark until it is illegible .
  • 24. The various applications are as follows: VIDEO WATER MARKING AUDIO WATER MARKING TEXT WATERMARKING LABELLING FINGERPRINTING AUTHENTICATION COPY AND PLAYBACK CONTROL
  • 25. In this case, most considerations made in previous sections hold. However, now the temporal axis can be exploited to increase the redundancy of the watermark. As in the still images case, watermarks can be created either in the spatial or in the DCT domains. In the latter, the results can be directly extrapolated to MPEG-2 sequences, although different actions must be taken for I, P and B frames. Note that perhaps the set of attacks that can be performed intentionally is not smaller but definitely more expensive than for still images.
  • 26. Again, previous considerations are valid. In this case, time and frequency masking properties of the human ear are used to conceal the watermark and make it inaudible. The greatest difficulty lies in synchronizing the watermark and the watermarked audio file, but techniques that overcome this problem have been proposed.
  • 27. This problem, which in fact was one of the first that was studied within the information hiding area can be solved at two levels. At the printout level, information can be encoded in the way the text lines or words are separated (this facilitates the survival of the watermark even to photocopying). At the semantic level (necessary when raw text files are provided), equivalences between words or expressions can be used, although special care has to be taken not to destruct the possible intention of the author.
  • 28. The hidden message could also contain labels that allow for example to annotate images or audio. Of course, the annotation may also been included in a separate file, but with watermarking it results more difficult to destroy or loose this label, since it becomes closely tied to the object that annotates. This is especially useful in medical applications since it prevents dangerous errors.
  • 29. This is similar to the previous application and allows acquisition devices (such as video cameras, audio recorders, etc) to insert information about the specific device (e.g., an ID number) and date of creation. This can also be done with conventional digital signature techniques but with watermarking it becomes considerably more difficult to excise or alter the signature. Some digital cameras already include this feature.
  • 30. This is a variant of the previous application, in an area where cryptographic techniques have already made their way. However, there are two significant benefits that arise from using watermarking: first, as in the previous case, the signature becomes embedded in the message, second, it is possible to create ‘soft authentication’ algorithms that offer a multi valued ‘perceptual closeness’ measure that accounts for different unintentional transformations that the data may have suffered (an example is image compression with different levels), instead of the classical yes/no answer given by cryptography-based authentication. Unfortunately, the major drawback of watermarking-based authentication is the lack of public key algorithms that force either to put secret keys in risk or to resort to trusted parties.
  • 31. The message carried by the watermark may also contain information regarding copy and display permissions. Then, a secure module can be added in copy or playback equipment to automatically extract this permission information and block further processing if required. In order to be effective, this protection approach requires agreements between content providers and consumer electronics manufacturers to introduce compliant watermark detectors in their video players and recorders. This approach is being taken in Digital Video Disc (DVD).
  • 33. The existing systems that employ digital watermarking for video piracy detection are inviting to the hackers as the watermark is visible. The watermark is concentrated in a particular area, thus through statistical analysis the approximate location of the watermark can be identified. This enables the hackers to overwrite the copyright information with their own information. As the watermark is concentrated, the chances of it being prone to damages due to compression etc are more.
  • 35. In the proposed system the video file is watermarked with the copyright information. The copyright information includes data about the vendor, buyer, a serial number and other information. When it is detected that the video is pirated, it is possible to dewater mark the file to retrieve the copyright information. With this information we can trace back to the sources of piracy.
  • 36. In the proposed system the watermark is made invisible. The watermark is spread throughout the image, so it’s location cannot be traced easily. The spreading of the watermark also prevents data loss from manipulations like compression etc.
  • 37. Apart from these advantages, the digital watermark in the proposed system can't be erased or overwritten. It is also robust and completely unaffected by common audio or video processing operations. It combines enormous versatility with ease of installation, integration and operation. It offers wide range of applications, including audio and video copyright control.
  • 39. COPYRIGHT WATERMARKING WATER MARKED INFORMATION IMAGE VIDEO FILE RETRIEVED INFORMATION DEWATERMARKING COPYRIGHT INFORMATION
  • 40. As shown in the block diagram of the proposed system, the copyright information in text format along with the video file content in AVI format is given as input to the watermarking module. In this module the textual information is converted compatible to the video file data and the bits in the video file are altered according to the copyright information. In the dewater marking module, the copyright information is retrieved from the watermarked file using the key file.
  • 42. The various modules in the proposed system are: VIDEO HEADER INFORMATION FILE HANDLING WATER MARKING DEWATER MARKING INTERGRATION AND ERROR HANDLING
  • 43. VIDEO HEADER INFORMATION The video information is stored in AVI RIFF format. The various headers and chunks are identified and declared. Thus by identifying the header information the location of the data is found.
  • 44. FILE HANDLING The information about the owner, recipient/distributor, serial number and other copyright related data is stored in a text file. This information is read from the text file. The header information is read from the video file and is written into the key file and the temporary file. The file-handling module is carried out both during watermarking and dewater marking.
  • 45. WATERMARKING The image is watermarked with the copyright information in such a way that the video information does not lose its property. Changing a few data bits of the video file depending on the copyright information does this. The key file generated in this process should be kept secret and should be protected from any corruption.
  • 46. DEWATERMARKING The data from the watermarked video file is fetched during check for piracy. Using the key file the copyright information is extracted from the watermarked data. From the copyright information it is possible to find the source of piracy and thus necessary action can be taken.
  • 47. ERROR HANDLING AND INTEGRATION Errors in each of the modules are handled separately. Once this is done, the various modules are integrated and the errors that follow are handled
  • 49. Though there are several other techniques available for copyright protection and several other similar issues, digital watermarking is the only preferred algorithm because of its basic advantages like being robust, fragile and imperceptible. Several proposals have been made to exploit the benefits of this algorithm for video piracy detection, but the problem is still far off from a solution.
  • 50. The proposed system in this project has used digital watermarking technique to detect video piracy and has overcome most of the major shortcomings of the existing systems. The proposed system has several advantages when compared to existing system. Though this system is competent enough to be used in the market there are few challenges yet to be solved. Few among them are as follows:
  • 51. The proposed system works for only those video images which are in the AVI RIFF format. This software helps to detect the source of piracy, when the video is distributed through compact discs. However with a few changes to the software it is possible to distribute the video file through the Internet. Despite the various ways in which the software can be enhanced, the proposed system is no less competitive and its efficiency is beyond question