Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

A Block Based Novel Digital Video Watermarking Scheme Using DCT

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)

e-ISSN: 2278-2834, p- ISSN: 2278-8735. Volume 5, Issue 2 (Mar. - Apr. 2013), PP 34-44
www.iosrjournals.org
www.iosrjournals.org 34 | Page

A Block Based Novel Digital Video Watermarking Scheme Using
Dct

Palaiyappan C
1
, Raja Jeya Sekhar T
2

1
(Electronics and Communication Engineering, Mount Zion College of Engineering and Technology/Anna
University, India)
2
(Electronics and Communication Engineering, Mount Zion College of Engineering and Technology/Anna
University, India)

Abstract: The rapid growth of network distributions of images and video, there is a need for copyright
protection against piracy. For this purpose we are using video watermarking (VM). Different digital
watermarking schemes have been proposed to address this issue of ownership identification. Digital
watermarking is a process by which user specified signal(Watermark) is hidden or embedded into another
signal(Video Signal) by the watermark embedding process. Afterwards the recovery of the watermark is
achieved with the help of the watermark extraction process. The video watermark is robust against the attack of
frame dropping, averaging and statistical analysis. It leads to broad curiosity in multimedia security and
multimedia copyright protection. The most important issue in VM are the invisibility of the watermark and the
resilience of watermarking to attacks.Watermarking techniques are classified into three categories. They are
Spatial Domain Method(SDM), Transform Domain Method(TDM) and Compressed Domain Method(CDM).
Here explained about to transform domain method. This method used the discrete cosine transform(DCT),
Discrete Fourier Transform(DFT) and Discrete Wavelet Transform(DWT) for watermark embedding.DWT are
more popularity due to their spatial localization, frequency spread etc.. But DCT watermarking was to human
perception model to modify low coefficients of DCT blocks.It has a larger embedding capacity and robustness.
This technique provides better results with high accuracy.
Keywords - About five key words in alphabetical order, separated by comma (10 Italic)

I. INTRODUCTION
INFORMATION hiding can be mainly divided into three processes - cryptography, stenography and
watermarks. Cryptography is the process of converting information to an unintelligible form so that only the
authorized person with the key can decipher it. As many advances were made in the field of communication it
became rather simple to decrypt a cipher text. Hence more sophisticated methods were designed to offer better
security than what cryptography could offer. This led to the discovery of stenography and watermarking.
Stenography is the process of hiding information over a cover object such that the hidden information cannot be
perceived by the user. Thus even the existence of secret information is not known to the attacker. Watermarking
is closely related to stenography, but in watermarking the hidden information is usually related to the cover
object. Hence it is mainly used for copyright protection and owner authentication.
Every day tons of data are embedded in digital media or distributed over the internet. The data so
distributed can easily be replicated without error, putting the rights of their owners at risk. Even when encrypted
for distribution, data can easily be decrypted and copied. One way to discourage illegal duplication is to insert
information known as watermark, in potentially vulnerable data in such a way that it is impossible to separate
the watermark from the data. These challenges motivated researchers to carry out intense research in the field of
watermarking.
A watermark is a form, image or text that is impressed onto paper, which provides evidence of its
authenticity. Digital watermarking is an extension of the same concept. There are two types of watermarks:
visible watermark and invisible watermark. In this project we have concentrated on implementing watermark on
image. The main consideration for any watermarking scheme is its robustness to various attacks. Watermarking
dependency on the original image increases its robustness but at the same time we need to make sure that the
watermark is imperceptible. In this project an invisible watermarking technique (least significant bit) is
implemented. An attack is also implemented in the visible watermarked image by adding a random noise to the
watermarked image. The watermarked image is then compressed and decompressed using JPEG compression.
Finally noise is removed and the images are separated from the recovered watermarked image.



A Block Based Novel Digital Video Watermarking Scheme Using DCT
www.iosrjournals.org 35 | Page
II. TECHNIQUES AND ATTACKS OF WATER MARKING HEADING
The Watermarking techniques are divided into two broad categories-:

A. Spatial Domain Techniques
Spatial domain watermarking slightly modifies the pixels of one or two randomly selected subsets of an
image. Modifications might include flipping the low-order bit of each pixel. However, this technique is not
reliable when subjected to normal media operations such as filtering or lossy compression.

B. Frequency Domain techniques
1) Discrete cosine transform (DCT) based technique:
Discrete cosine transform is a process which converts a sequence of data points in the spatial domain to
a sum of sine and cosine waveforms with different amplitudes in the frequency domain. The DCT is a linear
transform, which maps a n-dimensional vector to set of n coefficients. A linear combination of n known basis
vectors weighted with the n coefficients will result in the original vector. The known basis vectors of
transforming from this class are sinusoidal, which means that they can be represented by sinus shaped waves
or, in other words, they are strongly localized in the frequency spectrum. Therefore one speaks about the
transformation to the frequency domain. The most popular member of this class is the Discrete Fourier
Transform (DFT). The difference between DCT and DFT is that DFT applies to complex numbers, while DCT
uses just real numbers. For real input data with even symmetry DCT and DFT are equivalent. There are eight
different variants of DCT. There is a very slight modification between these eight variants.
In JPEG compression the input data are two-dimensional, presented in 8x8 blocks. There's a need of
using two-dimensional DCT. Since each dimension can be handled separately, the two-dimensional DCT
follows straightforward form the one-dimensional DCT. A one-dimensional DCT is performed along the rows
and then along the columns, or vice versa.
The formula used for one-dimensional DCT:
(1)

Where u = 0,1,.N-1

When u=0
When 0
DCTII
The formula used for two-dimensional DCT:

(2)

Where u = 0,1,2N-1 ,v = 0,1,2M-1
when u,v =0,
when u,v 0

Applying the formulas directly requires much computational resources the therefore an implementation in
hardware can be very efficient.

2) Wavelet Transform based Watermarking
The Fourier transform is ananalys is of global frequency content in the signal. There are applications in
digital image processing wherein we need the localized frequency components. This can be done by using the

Short Time Fourier Transform. This is similar to the concept of using windowing functions. The windowed
transform is given as Where denotes the frequency and denotes the position of the window. This equation
transforms the signal f(x) in a small window around. The STFT is then performed on the signal and local
A Block Based Novel Digital Video Watermarking Scheme Using DCT
www.iosrjournals.org 36 | Page
information is extracted. The wavelet transform based watermarking technique divides the image into four
sidebands with a low resolution approximation of the tile component and the components horizontal, vertical
and diagonal frequency characteristics. The process can then be repeated iteratively to produce N scale
transform.
One of the many advantages over the wavelet transform is that it is believed to more accurately model
aspects of the human visual system (HVS) as compared to the DCT. This allows us to use higher energy
watermarks in regions that the HVS is known to be less sensitive to,such as higher resolution detail bands
{LH,HL,HH). Embedding watermarks in these regions allow us to increase the robustness of our watermark, at
little to no additional impact on image quality. One of the most straightforward techniques is to use an
embedding technique similar to that used in the DCT. In the Wavelet Domain, where Wi watermark to be
embedded, and scaling factor.To detect the watermark the same process as that used in DCT is
implemented.Furthermore,as the embedding uses the values of the transformed value in embedded, the
embedding process would be rather adaptive; storing the majority of the watermark in the larger coefficients.

3) Simple Watermarking
A very simple yet widely used technique for watermarking images is to add a pattern on top of an
existing image. Usually this pattern is an image it self-logo or something similar, which distorts the underlying
image. The figure below shows a simple watermark applied to an image, Lena, using Bytes count software.


Fig.1. Simple watermarked image of Lena
4) Attacks
Digital watermarking is not as secure as date encryption. Therefore, digital watermarking is not
immune to hacker attacks. Different types of attacks are given below.

4.1 Geometrical
Instead of removing the watermark, the watermark has distorted reducing spatial or temporal alteration
of stereo data.

4.2 Cryptographic
Brute-force attacks are used for exhaustive search to find the key to decipher. These are called
cryptographic attacks.

4.3 Active & Passive
The attacker removes or spoils the watermark. The attacker just identifies the watermark and does not
damage it.

4.4 Forgery
Attacker forges new watermark and replaces the old one with the new one. Figures.9 shows the original
watermarked image, which is replaced by the attacker with Figures.10 which may look like the original image
but is not the original data. There by misleading the end receiver.
A Block Based Novel Digital Video Watermarking Scheme Using DCT
www.iosrjournals.org 37 | Page
III. PROPOSED WATERMARKING SCHEME
This project presented an efficient video watermarking technique using discrete cosine transform (DCT) to
protect the copyright protection of digital images. The efficiency of the video watermarking technique is
achieved with the aid of the following two major steps.
1) Watermark Embedding process
2) Watermark Extraction process

1) WATERMARK EMBEDDING PROCESS
Before embedding watermark pixels into the input video sequences, the following process should carry
out to enhance the security of the hiding information as well as to improve the efficiency of our proposed
approach. The process includes,
1) Shot segmentation of video sequences
2) Bit plane slicing of a grayscale image
3) Pixel permutation
4) Decomposition of an image using DCT

1) Shot segmentation of video sequence
The fundamental task of performing the video processing application like video indexing, video
summarization, video watermarking and video retrieval is video shot segmentation. The original input video
sequence is first segmented into non-overlapping units, called shots that depict different actions. Each shot is
characterized by no significant changes in its content which is determined by the background and the objects
present in the scene. Numerous researches are available in the literature for video shot segmentation using
several techniques. Here, we have used Discrete Cosine Transform and correlation measure to identify the
number of frames involved in each shot. At first, the first and second frame is divided into a set of blocks of
sizes and DCT is applied to every block of the frame. The two-dimensional DCT for an input image X and
output image you can be defined as:

1 0
1 0 ,
2
) 1 2 (
cos
2
) 1 2 (
cos
1
0
1
0
s s
s s
+ +
=

=
N q
M p
N
q n
M
p m
X Y
M
m
N
n
mn q p pq
t t
o o
(3)
Where

s s
=
=
1 1 , / 2
0 , / 1
M p M
p M
p
o
;

s s
=
=
1 1 , / 2
0 , / 1
N q N
q N
q
o

Then, the correlation coefficient is computed in between the frame 1 and 2 using the following formula.
( )( )
( ) ( ) |
.
|

\
|
|
.
|

\
|


=

m n
mn
m n
mn
m n
mn mn
Y Y X X
Y Y X X
r
2 2
(4)
) ( Y and ), ( X Y mean X mean where = =

After finding the correlation for the first and second frame, the same procedure is repeated for the
consecutive frames presented in the video. Then, the frames within a shot can be identified by maximizing the
cross correlation term which gives a measure of the degree of similarity between two frames of video.

2) Bit plane slicing of a grayscale image
Bit-Plane Slicing is a technique in which the image is sliced at different planes. Instead of highlighting
gray level images, highlighting the contribution made to the total image appearance by specific bits might be
desired. Imagine the image is composed of 8 bits, 1-bit planes ranging from bit plane1-0 (LSB) to bit plane 7
(MSB). In terms of 8-bits bytes, plane 0 contains all lowest order bits in the bytes comprising the pixels in the
image and plane 7 contains all high order bits [14]. Often by isolating particular bits of the pixel values in an
A Block Based Novel Digital Video Watermarking Scheme Using DCT
www.iosrjournals.org 38 | Page
image we can highlight interesting aspects of that image. The high-order bits usually contain most of the
significant visual information and the lower-order bits contain subtle details [15]. The advantage of doing this
method is to get the relative importance played by each bit of the image. Figure 1 shows the Bit plane slicing
concept.Significant visual information and the lower-order bits contain subtle details [15]. The advantage of
doing this method is to get the relative importance played by each bit of the image. Figure 1 shows the Bit plane
slicing concept.

Fig.2. Bit plane slicing
3) Pixel permutation
After the bit plane slicing process, the sliced images are allowed to permute each pixel value to
enhance the security of the hiding information. In this scheme, each group of pixels is taken from the image.
The pixels in the group are permuted using the key selected from the set of keys. The size of the pixel group is
same as the length of the keys, and all the keys are of the same length. If the length of the keys is more than the
size of pixel group, the perceptual information reduces. In this, the group of pixels is taken along the row
without the loss of generality, i.e., the column wise procedure would yield the same kind of results [16].

4) Decomposition of an image using DCT
Like other transforms, the Discrete Cosine Transform (DCT) attempts to de-correlate the image data.
After de-correlation each transform coefficient can be encoded independently without losing compression
efficiency.

Watermark Embedding steps
Input: Original video sequence
] , [ j i O
v
, Grayscale watermark image
] , [ j i W
I

Output: watermarked video sequence
] , [ j i W
v

1) Segment the original input video sequence
] , [ j i O
v
into number of non-overlapping shots
] , [ j i S
s
using
shot segmentation technique. Then, identify the number of frames
] , [ j i F
p
involved in each segmented
shots
] , [ j i S
s
for embedding purpose.
2) Slice the grayscale watermark image
3) Permute the sliced images
] , [ j i S
I
using a pixel permutation technique to obtain the permuted grayscale
image
] , [ j i P
I
.
4) Extract the blue components
] , [ j i B
p
F
of all the partitioned frames for embedding the each sliced image
] , [ j i S
I
into the blue components of each frame.
5) Split the image into small blocks (8 x 8) and decompose the blue components
] , [ j i B
p
F
of each
partitioned frame
] , [ j i F
p
into AC and DC coefficients by DCT.
6) Choose the low frequency sub-bands from the transformed frames to embed the permuted grayscale
image
] , [ j i P
I
.
7) Find the similarity matrix of the permuted image
] , [ j i P
I
to embed into the chosen coefficient. The
embedding process should repeat for all blocks of DCT.
A Block Based Novel Digital Video Watermarking Scheme Using DCT
www.iosrjournals.org 39 | Page
] , [ j i W
I
into 8 bit planes
] , [ j i S
I
using bit plane slicing

Case 1: for embedding the watermark pixel 1.
The values in the embedding part
] , [ y x E
p
are compared against the maximum value
) max(
p
E
and
modified as follows: If the value in the chosen embedding part is greater than 1, take the absolute value and
embed the same. Otherwise, if the value in the embedding part is lesser than the 1, add the corresponding
pixel with the maximum value and embed the modified value.
then E if
i p
1
) (
>

] [ ] , [
) (i p p
E Abs y x E <<

else

) max( ] , [
) ( p i p p
E E y x E + <<

if end

Case 2: for embedding the watermark pixel 0.
If the value in the embedding part
] , [ y x E
p
is lesser than the 0, take the absolute value and embed the
same. Otherwise, if the value in the embedding part is greater than the 1, subtract the corresponding pixel
with the maximum value
) max(
p
E
and embed the modified value.
then E if
i p
0
) (
<

] [ ] , [
) (i p p
E Abs y x E <<

else

) max( ] , [
) ( p i p p
E E y x E <<

if end


2) WATERMARK EXTRACTION PROCESS
After embedding the grayscale watermark image pixels into the original video sequence, we have extracted
the embedded watermark image without affecting the original video.
Input: watermarked video sequence
] , [ j i W
v
, size of the watermark image.
Output: recovered watermark image
] ' , ' [ j i W
I


1) Segment the watermarked video sequence
] , [ j i W
v
into a number of non-overlapping shot
] ' , ' [ j i S
s

using the shot segmentation technique. Then, identify the number of frames
] ' , ' [ j i F
p
involved in each
segmented shots
] ' , ' [ j i S
s
for the extraction process.

A Block Based Novel Digital Video Watermarking Scheme Using DCT
www.iosrjournals.org 40 | Page




Fig.3. Proposed Watermarking Scheme
A Block Based Novel Digital Video Watermarking Scheme Using DCT
www.iosrjournals.org 41 | Page


2) Extract the blue components
] ' , ' [ j i B
p
F
of all the partitioned frames for extracting the embedded
watermark pixels.
3) Decompose the blue components of the frames with the aid of the DCT into AC and DC coefficients.
4) Select the low frequency components from the transformed frames to extract the watermark gray scale
image.
5) Extract the watermark pixels from the embedding part in a zig-zag manner from the each blocks with
the aid of the following steps. If the embedded pixel
6) value is greater than the mean pixel value, then the extracted pixel value is one. If it is lesser, then the
extracted pixel is zero.

< < >


=
otherwise
n i where E mean i E
j i W
p p
I
, 0
0 ), ( ) ( , 1
] ' , ' [

7) Form the matrix with the size of the watermark image and the extracted pixels are placed in it to attain
the watermark image.
8) Obtain the watermark image
] ' , ' [ j i W
I
by applying the reverse process of permutation and bit plane
slicing. The block diagram of the watermark extraction process is shown in figure 4

A Block Based Novel Digital Video Watermarking Scheme Using DCT
www.iosrjournals.org 42 | Page
IV. EXPERIMENTAL ANALYSIS


Fig.5.Input Watermark Image





Fig.7. Output of Video segmentation

Fig.6. Input Video
A Block Based Novel Digital Video Watermarking Scheme Using DCT
www.iosrjournals.org 43 | Page
Fig.8. Extracted watermark Image






V. CONCLUSION
A conclusion section must be included and should indicate clearly the advantages, limitations, and
possible applications of the paper. Although a conclusion may review the main points of the paper, do not
replicate the abstract as the conclusion. A conclusion might elaborate on the importance of the work or suggest
applications and extentions.

REFERENCES
[1] A. Mitra, Y. V. SubbaRao and S. R. M. Prasanna, "A New Image Encryption Approach using Combinational Permutation
Techniques", International Journal of Electrical and Computer Engineering, Vol: 1, No: 2, pp: 127-131, 2006.18
[2] Aree A.Mohammed and Jamal A.Husssein, Efficent video watermarking using motion estimation approach,2009,Eighth IEEE/ACIS
Internation conference on Compter And Information Science.4
[3] 3. Chih-Chin Lai ,A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm, Digital
Signal Processing, in 2011, pp. 1128-1134.2
[4] Gandhe S.T., Potdar U. and Talele K.T., "Dual Watermarking in Video Using Discrete Wavelet Transform", in Proceedings of
Second International Conference on Machine Vision, pp. 216 - 219, 2009.7
[5] Gonzalez R.C., Woods R.E., Digital Image Processing, Addison Wesley, 2002.16
[6] Jing Zhang, Anthony T. S. Ho, Gang Qiu, PinaMarziliano, "Robust Video Watermarking of H.264/AVC", IEEE Transactions on
Circuits and Systems II: Express Briefs, Vol: 54, No: 2, pp: 205 - 209, 2007.14
[7] K. AitSaadi, A. Guessoum, A. Bouridane, "Efficient pre-processing watermark for robust video watermarking of H.264&#47; AVC",
International Journal of Advanced Media and Communication, Vol: 4, No: 3, pp: 219-234, 2010.10
[8] Kareem Ahmed, Ibrahim El-Henawy and Ahmed Atwan, "Novel DWT video watermarking schema ", Machine Graphics & Vision
Fig.10. Distance between frames
Fig.9. Performance Graph(Compression
Quality vs NC value)
A Block Based Novel Digital Video Watermarking Scheme Using DCT
www.iosrjournals.org 44 | Page
International Journal archive, Vol. 18, No. 3, pp. 363-380, 2009.12
[9] M. Mohammed Sathik, N.RaviaShabnamParveen, "Feature extraction on colored x-ray images by bit-plane slicing technique",
International Journal of Engineering Science and Technology, Vol. 2, No: 7, pp: 2820-2824, 2010.17
[10] Patrizio Campisi and Alessandro Neri, "Perceptual Video Watermarking in the 3D-DWT Domain Using a Multiplicative Approach ",
Lecture Notes in Computer Science, Vol. 3710, pp. 432-443, 2005.15
[11] PikWah Chan, Student Member, IEEE, Michael R. Lyu, Fellow, IEEE, and Roland T. Chin A Novel Scheme for Hybrid
Digital Video Watermarking: Approach, Evaluation and ExperimentationIEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS
FOR VIDEO TECHNOLOGY, VOL. 15, NO. 12, DECEMBER 20053
[12] Radu O. Preda ,Dragos N. Vizireanu A robust digital watermarking scheme for video copyright protection in the wavelet
domain, 2010 Published by Elsevier Ltd. 1
[13] Reyes R., Cruz C., Nakano-Miyatake M. and Perez-Meana H., "Digital Video Watermarking in DWT Domain Using Chaotic
Mixtures, IEEE Latin America Transactions, Vol. 8, No.3, pp. 304 - 310, 2010.6
[14] Xinghao Jiang, Tanfeng Sun, Jianhua Li and Ye Yun, "A Novel Real-Time MPEG-2 Video Watermarking Scheme in Copyright
Protection", Digital Watermarking, Lecture Notes in Computer Science, Vol: 5450, pp:45-51, 2009.11
[15] Xinxing Jing,Yan Liu, Xi Chen, Ping Zhou, The Domain Block Video watermarking Scheme Based video sequences characteristics
and DCT,2012.The 7
th
International Conference on Computer Science and Education. Australia5
[16] Yan Liua and Jiying Zhao ," A new video watermarking algorithm based on 1D DFT and Radon transform ",Signal Processing, Vol.
90, No. 2, pp. 626-639, 2010.13

You might also like