Video Watermarking: Subhajit Brojabasi Prof. Mihir Singh
Video Watermarking: Subhajit Brojabasi Prof. Mihir Singh
Video Watermarking: Subhajit Brojabasi Prof. Mihir Singh
Presented by:-
Subhajit Brojabasi
Guided by:-
prof. Mihir singh
1
CONTENTS
• Introduction
• Need of video watermarking
• Video watermarking terminologies
• Types
• Desired properties
• Application of watermarking
Structure of a Typical Video Watermarking
System
• An algorithm of video watermarking
• Attack on watermark
• Applications
• Conclusion
• References
2
INTRODUCTION
3
Need of video watermarking
Protect copyright of a data.
Video Watermarking can help
◦ Prove ownership
◦ Identify a misappropriating person
◦ Trace the video dissemination
4
Video watermarking terminologies
• Digital Video
• Payload
• Perceptibility
• Robustness
• Security
5
TYPES
6
DESIRED PROPERTIES
Robust
Video watermarking ( frame averaging, frame
dropping, frame swapping, statistical analysis,
interpolation... )
Recoverable from a document
Removable by authorized users
Low error probability
Provide the original information embedded
reliably
Capacity
Invisible
7
APPLICATION OF WATERMARKING
• Owner Identification
• Proof of Ownership
• Transaction Tracking
• Content Authentication
• Broadcast Monitoring
• Copy Control
• Device Control
• Automatic monitoring of copyrighted material on
the Web
8
A Generic approach to watermarking digital
data
1. Insertion of a watermark
2. Detection of a watermark
3. Removal of a watermark
9
Inserting a watermark
It consists of :-
a. Original video
b. Watermark
c. A user key
10
watermark insertion unit
The user key , input video and the watermark
are passed through a watermark insertion unit.
11
Watermark Extraction Unit
Two phases:-
12
Watermark Detection Unit
Consists of :-
13
14
Current Techniques — The LSB technique
Let’s consider still images.
Each
pixel of the color image has three
components — red, green and blue.
15
16
The LSB technique…….
A pixel that is bright purple in color can
be shown as
Another pixel:
17
The algorithm
Let W be watermarking information
For every pixel in the image, Xi
Do Loop:
Store the next bit from W in the LSB
position of Xi [red] byte
Store the next bit from W in the LSB
position of Xi [green] byte
Store the next bit from W in the LSB
position of Xi [blue] byte
End Loop
18
Distortions and attacks
Additive Noise.
Cropping.
Compression.
Statistical Averaging.
Multiple Watermarking.
Mosaic Attack
19
20
Current VIDEO WATERMARKING Techniques
22
Advantage of DWT
Prevent from frame dropping
Prevent from adding noise / another video
23
Watermark Preprocess
Safe from frame averaging
Hard to reconstruct the watermark
17
m7
0
0 4
25 1 5
8 bit-
6 2 6
planes 3 7
Total 8 images is
obtained
24
Watermark Embedding
LL HL 170
LH HH
HL3
HL2 0 4
LH3 HH3
HL1
256 1 5
LH2 HH2 2 6
3 7
Watermark mi
LH1 HH1
25
Watermark Detection
4. Compare
Original video frames
170
85 6. Combine 8 bit-planes 0 4
64 Watermark mi 256 1 5
7. Get different part of W 2 6
from different scene and 3 7
m0 m4 reconstruct the large image Extracted Original
256 m1 m5
m2 m6
8. Correlate and verify E O
m3 m7
170
26
ATTACK ON WATERMARK
27
Future Scope
Implement and use do experiment on the
scheme
28
CONCLUSION
Need due to Copyright protection
Different from image watermarking
Brief review of current technologies
DWT-based Video Watermarking
Scheme with Scramble Watermark
Future Direction
Inadequate for general use
Different tools offering this
Set to grow
29
REFERENCES
Yeo and M.M. Yeung, “Analysis and synthesis for new digital
video applications,” icip, International Conference on Image
Processing (ICIP'97),vol. 1, pp.1,1997.
30
31