+ All Categories
Home > Documents > Live Video Watermarking Using LabVIEWThe image is broken into 8x8 groups, each containing 64 pixels....

Live Video Watermarking Using LabVIEWThe image is broken into 8x8 groups, each containing 64 pixels....

Date post: 18-Jun-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
12
Live Video Watermarking Using LabVIEW 1 Dr.M. Senthamil Selvi, 2 J. Angel Ida Chellam and 3 P.V. Kavitha 1,2,3 Department of Information Technology, Sri Ramakrishna Engineering College, Coimbatore, Tamil Nadu, India. 1 [email protected], 2 [email protected], 3 [email protected] Abstract The use of digital media applications, and copyright protection has obtained tremendous importance. Digital Watermarking is a technology used for the copyright protection of digital applications. A comprehensive approach for watermarking digital video is introduced. Hybrid digital video watermarking scheme based on Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) has been proposed. Discrete Cosine Transform (DCT) with Principal Component Analysis (PCA) helps in reducing correlation among the wavelet coefficients. Wavelet decomposition of each video frame is done thereby dispersing the watermark bits into the uncorrelated coefficients. The video frames are first decomposed using DWT. The binary watermark is embedded in the low frequency wavelet coefficients. The imperceptible high bit rate watermark embedded is robust against various attacks that can be carried out on the watermarked video, such as filtering, contrast adjustment, noise addition and geometric attacks. Key Words:Video watermarking, DWT, DCT, PCA. International Journal of Pure and Applied Mathematics Volume 119 No. 18 2018, 287-297 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ Special Issue http://www.acadpubl.eu/hub/ 287
Transcript
  • Live Video Watermarking Using LabVIEW 1Dr.M. Senthamil Selvi,

    2J. Angel Ida Chellam and

    3P.V. Kavitha

    1,2,3Department of Information Technology,

    Sri Ramakrishna Engineering College, Coimbatore,

    Tamil Nadu, India. [email protected],

    [email protected],

    [email protected]

    Abstract The use of digital media applications, and copyright protection has

    obtained tremendous importance. Digital Watermarking is a technology

    used for the copyright protection of digital applications. A comprehensive

    approach for watermarking digital video is introduced. Hybrid digital

    video watermarking scheme based on Discrete Wavelet Transform (DWT)

    and Discrete Cosine Transform (DCT) has been proposed. Discrete Cosine

    Transform (DCT) with Principal Component Analysis (PCA) helps in

    reducing correlation among the wavelet coefficients. Wavelet

    decomposition of each video frame is done thereby dispersing the

    watermark bits into the uncorrelated coefficients. The video frames are first

    decomposed using DWT. The binary watermark is embedded in the low

    frequency wavelet coefficients. The imperceptible high bit rate watermark

    embedded is robust against various attacks that can be carried out on the

    watermarked video, such as filtering, contrast adjustment, noise addition

    and geometric attacks.

    Key Words:Video watermarking, DWT, DCT, PCA.

    International Journal of Pure and Applied MathematicsVolume 119 No. 18 2018, 287-297ISSN: 1314-3395 (on-line version)url: http://www.acadpubl.eu/hub/Special Issue http://www.acadpubl.eu/hub/

    287

  • 1. Introduction

    The rapid growth of Internet and networks technique, multimedia data

    transforming and sharing is common in today’s world. Multimedia data is easily

    copied and modified, so necessity for Copyright protection is increasing. Digital

    Watermarking has been proposed as technique for Copyright protection of

    multimedia data. The process of Digital Watermarking involves embedding and

    extraction of watermarked data in order to provide security. The embedding

    method must leave the original data perceptually un-changed, yet should impose

    modifications which can be detected by using an appropriate extraction

    algorithm. The digital content could be any data that the user likes to protect.

    The watermark is mainly used to authenticate the owner to ensure copyright

    protection.

    Digital watermarking refers to embedding of watermarks into a digital content.

    However a technique named DWT method for digital video watermarking is

    divided in two parts; they are Embedding watermark and Extracting watermark.

    This presents a new image encryption algorithm, which can improve the

    security of image during transmission more effectively. As a result, it’s

    important for creators and distributors to protect their copyright and ownership

    of their digital media. In this background, watermarking technique is an

    effective method to solve the problem, and it has been widely used in the

    copyright protection. Now the digital video watermarking technique has become

    the focus of the theoretical research and practical application. Many schemes

    have achieved good results both in security and robustness. However, some

    practical technical problems have not been a better solution. Many schemes are

    at the cost of complex theory and large computational quantity in order to

    obtain a better robust scheme, which is difficult to meet the real-time

    requirement, such as the broadcast monitoring, digital television system, etc.

    2. Proposed System

    The proposed system is mainly constructed to protect the data when transmitted

    through a public network and ensure the authentication of both the data and the

    user. The proposed system comprises of six modules. They are:

    Login

    Camera Settings and Data Input

    Video Recording

    Embedding Watermark

    Extracting Watermark

    Mail

    Each module has their specific role where in each module the role are as

    respectively, Login ensures authentication of the user, the user will be able to

    select the required camera according to their need and input the patients detail

    International Journal of Pure and Applied Mathematics Special Issue

    288

  • and provide a file path to save the video, once the settings are made

    appropriately the video is recorded and the video gets embedded with the

    inputted data by using DWT in accordance with PCA, after embedding the next

    process is extraction where the patients details are extracted and displayed in the

    output panel using DCT and finally a screenshot of the video is mailed to the

    respected recipient.

    Fig 2.1.1: Methodology of the proposed System

    Video Watermark Embedding Process

    Steps involved in watermark embedding process:

    The Real time Video is captured and its various properties are measured. All the video frames are extracted using LabVIEW programming.

    Absolute difference between the successive frames is calculated, where fi (x,y) is the present image and fi+1(x,y) is the next successive image.

    The difference images are processed over morphological filter to reduce the noise.

    The area/region of the moving object is clearly noticed, marks it as M1 and coverts into Binary Images.

    𝑥 ′

    𝑦 ′ =

    11

    11

    𝑥

    𝑦 𝑚𝑜𝑑(𝑁)

    Where 𝑥 ′

    𝑦 ′ is the Arnold Transform, and the input image

    𝑥

    𝑦 and N is

    the size of the image

    The Static area/region in the video frames is marked as S1 and 2level of DWT is applied. The static area/region is divided into LL, LH, HL and

    HH, the diagonal elements LH and HL have less information content

    than LL and HH so these two regions are marked as S´1,1 and S´1,2.

    International Journal of Pure and Applied Mathematics Special Issue

    289

  • The “H” shape of the scrambled logo is embedded in morphological filter frames M´1 and 2-level of DWT is embedded in S´1,1 and S´1,2

    2-level Inverse DWT is applied and the frames are re- converted into a video which contains the watermark.

    Fig 2.1.1: Embedding Watermark

    Watermarking Extraction Process

    Steps involved in Watermarking Recovery process:

    In the process of extracting the watermark from the video, embedded video is converted into frames and static and dynamic frames are

    obtained.

    The difference /moving frames are converted to binary form and morphological filter is performed and marked as M’1 and the Static

    frames as S’1.

    The “H” shape of scrambled data is scanned from the region M’1 and the Watermarked Logo extracted from S’ 1, 1 & S’ 1, 2.

    Anti-Arnold transform is applied to the frames and 2- level DWT and Inverse DWT is applied to S’1, 1 and S’1, 2 as above process.

    The watermark logo/Image is processed from each video frame separately and checked with various types of attacks and the robustness

    is calculated.

    The video is extracted from the recovery process vice versa as the embedding process, and the block diagram is shown in the Fig.2.2.1

    Various attacks are performed and MSE and PSNR values are calculated.

    International Journal of Pure and Applied Mathematics Special Issue

    290

  • Fig 2.2.1: Extraction of Watermark

    3. Techniques Used

    DCT (Discrete Cosine Transform)

    X= DCT (video/audio input)

    Returns the discrete cosine transform of the data input

    Can be referred to as the even part of the Fourier series

    Converts an image or audio block into it’s equivalent frequency coefficients

    Concept

    The DCT transform of an image brings out a set of numbers called coefficients.

    A coefficient’s usefulness is determined by its variance.

    If the coefficient of the frames have large variance then the quality of the image is lost.

    Fig 3.1: DCT

    International Journal of Pure and Applied Mathematics Special Issue

    291

  • The image is broken into 8x8 groups, each containing 64 pixels. Three of these

    8x8 groups are enlarged in this figure, showing the values of the individual

    pixels, a single byte value between 0 and 255. [7]

    Applications

    DVD/Video CD Players

    Cable TV

    DBS Systems

    HDTV Disadvantages of DCT

    Only spatial correlation of the same block is considered whereas the neighboring block is neglected.

    High compression ratios have very low bit rates

    DCT function is fixed

    Transmission and storage of uncompressed video would be extremely costly and impractical

    It contains a large number of byte information DWT (Discrete Wavelet Theorem) Equations

    1-D wavelet transform

    wavelet transform converts an input series x0, x1, ..xm, into one high-pass

    wavelet coefficient series and one low-pass wavelet coefficient series (of length

    n/2 each)

    where sm(Z) and tm(Z) are called wavelet filters, K is the length of the filter, and i=0, ..., [n/2]-1.

    In practice,such transformation will be applied recursively on the low-pass series until the desired number of iterations is reached

    DWT for an image

    International Journal of Pure and Applied Mathematics Special Issue

    292

  • Fig 3.2.1: DWT

    Advantages

    No blocking effect

    It has good localization both in time and spatial frequency domain.

    Transformation of the whole image introduces inherent scaling

    Interpretation of data is easy Adaptive FPS(Frames per Second)

    It is a technique which is mainly used to maintain the quality of the video.

    When the video is run on the system that is been used its gets adapted to it and

    does not provide any distortion or overlapping of frames. The fps value is made

    dynamic where the rate of distortion is self-corrected. The distortion rate is

    justified through histogram.

    4. Experimental Result

    The proposed system is mainly implemented in order to authenticate the data

    when transmitted the data over a public network. The system comprises of

    embedding and extraction of watermark, where the frames are divided with the

    lowest frequency coefficients and the watermark is embedded is based on the

    quality of the video. In order to maintain the quality of the video without any

    distortion from the cover and watermarked video a technique called adaptive

    FPS is used. It helps in retaining the quality of the video and makes camera

    settings adjustable to the system being used. Since a hybrid algorithm is used

    here the disadvantages of both the DCT and DWT is overcome and provides a

    reliable system. When the data is transmitted over a public network the

    watermark is extracted by inversing the embedding process. The comparison of

    existing and proposed system is given below:

    International Journal of Pure and Applied Mathematics Special Issue

    293

  • Table 4.1: Comparison

    5. Conclusion and Future Work

    A text watermark is embedded over a real time video as and when the video is

    recorded. This enhances authentication and copyright protection when the video

    is transferred over a public network. It is found that imperceptibility is high and

    number of pixels that can be embedded in the video is also high. It is robust

    against various attacks. An adaptive FPS technique is used to automatically

    adjust the settings of the camera according to the system used. Correlations of

    the frame among wavelet coefficients are reduced and PSNR metric is enhanced

    to maintain the quality of the video. An adaptive FPS technique is used to

    automatically adjust the settings of the camera according to the system used.

    The pattern recognition is made easier and determines how to use an image into

    a computer vision application, through object detection and the use of other

    functionalities of LabView suggest that the use of LabView as an excellent

    platform to develop robotic projects as well as vision and image processing

    applications. The main disadvantage of the proposed system is that it occupies a

    large space since the number of bits to embed is higher, it can be resolved by

    either minimizing the bits or by developing an efficient algorithm. Security

    measures can be enhanced such as identifying video cracking attacks.

    References

    [1] N.Ajay Nagendra, P.S.Kishore, K.Pratap Reddy, V.V.S.Murthy (2012), “Smoothing and Optimal Compression of Encrypted Gray Scale Images”, International Journal of Engineering Research and Applications (IJERA), Vol.2, pp.23-28.

    [2] S Akshaya, A Fathima Rinosha, R Gayattri , A Soumya Jeynithi, Dr R Brindha (2016), “Real-Time Video Watermarking using LABVIEW”, International Journal of Modern Trends in Engineering and Science, Vol.03, pp.160-164.

    International Journal of Pure and Applied Mathematics Special Issue

    294

  • [3] M. Asikuzzaman, M. R. Pickering (2016), “An Overview of Digital Video Watermarking”, IEEE Transactions on circuits and systems for video technology, pp.1-23.

    [4] Md. Asikuzzaman, Md. Jahangir Alam, Andrew J. Lambert, Mark R. Pickering (2016), “Robust DT CWT-Based DIBR 3D Video Watermarking Using Chrominance Embedding”, IEEE Transactions on Multimedia, pp.1-16.

    [5] Athi Narayanan.S, Neena.P.M, Kamal Bijlani (2015), “Copyright Protection For E-Learning Videos Using Digital Watermarking”, IEEE Fifth International Conference on Advances in Computing and Communications, pp.447-450.

    [6] Antoine Robert, Gwenael Doerr (2013), “Impact of Content Mastering on the Throughput of a Bit Stream Video Watermarking System”, International Conference on Image Processing, pp.4532-4535.

    [7] R.Bharathi, D.Jeyakumari (2016), “Digital Watermarking using LABVIEW using DCT Algorithm”, International Journal On Engineering Technology and Sciences, Vol.3, pp.41-53.

    [8] A.Bhattacharya, Sarbani Palit, Dipabali Sarkar (2013), “A Blind quality assessment of video using fragile watermarking”, 28th International Conference on Image and Vision Computing New Zealand, pp.489-493.

    [9] Mr. Bighneswar Panda, Mr. Y. Sridhar (2011), “Scalable Coding of PRNG Encrypted Images”, International Journal of Science Engineering and Advance Technology, Vol.1, pp.95-102.

    [10] Chiou-Ting Hsu, Ja-Ling Wu (1998), “DCT-based Watermarking for Video”, IEEE Transactions on Consumer Electronics, Vol.44, No.1, pp.206-216.

    [11] Chunxing Wang, Xiaomei Zhuang (2011), “The Video Watermarking Scheme based on H.264 Coding Standard”, IEEE 13th International Conference on Communication Technology, pp.864-867.

    [12] Dolley Shukla, Manisha Sharma , “Video Watermarking using Dyadic filter and Discrete Wavelet Transform”, IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp.1647-1650, 2015.

    [13] Duan Dinh Nguyen,Tuan Thanh Nguyen (2015), ”A Robust Blind Video Watermarking in DCT Domain Using Even-Odd Quantization Technique”, 2015 International Conference on Advanced Technologies for Communications (ATC), pp.439- 444.

    International Journal of Pure and Applied Mathematics Special Issue

    295

  • [14] Dr.G.R.Gnana King, L.Nithya Devi, E.Pavithra, T.Sahana, A.Subhashini (2016), “An Efficient Video Watermarking Scheme for Concealing Data Records using LABVIEW”, International Journal of Recent Trends in Engineering and Research, pp.95-100.

    [15] S.V.V.D.Jagadeesh, T.Sudha Rani (2013), “An Effective Approach Of Compressing Encrypted Images”, International Journal of Research in Computer and Communication Technology, Vol.2, pp.1108-1111.

    [16] A.G.Keskar, Sneha Kadu, Ch.Naveen, V.R.Satpute, (2016), “Discrete Wavelet Transform Based Video Watermarking Technique”, IEEE Micro Electronics Computing and Communications International Conference, pp.1-6.

    [17] V. Kannan, Koyi Lakshmi Prasad, T. Ch. Malleswara Rao (2015), “A Novel Semi-Blind Video Watermarking using KAZE-PCA- 2D Haar DWT Scheme”, IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp.1- 8.

    [18] Milad Ghalejughi, Mohammad Ali Akhaee (2016), “Video Watermarking in the DT-CWT Domain Using Hyperbolic Function”,13th International ISC Conference on Information Security and Cryptology, pp.97-100.

    [19] Nisreen I. Yassin, Nancy M. Salem, Mohamed I. El Adawy (2013), “Medical Video Watermarking Scheme for Electronic Patient Records“, International Journal of Computer Applications, Vol.76, No.1, pp.12- 17.

    [20] Poorna Banerjee Dasgupta (2016), “Algorithmic Analysis of Invisible Video Watermarking using LSB Encoding over a Client-Server Framework”, International Journal of Computer Trends and Technology (IJCTT), Vol.36, No.3, pp.143-146.

    [21] Pratibha Sharma, Shanti Swami, “Digital Image Watermarking Using 3 level Discrete Wavelet Transform”, Conference on Advances in Communication and Control Systems, pp.129-133, 2013.

    [22] A.V. Sreedhanya, K.P. Soman (2013), “Ensuring Security to the Compressed Sensing Data Using a Steganographic Approach”, Bonfring International Journal of Advances in Image Processing, Vol.3, No.1, pp.1-7.

    International Journal of Pure and Applied Mathematics Special Issue

    296

  • 297

  • 298


Recommended