Transcript
Page 1: Digital Water Marking For Video Piracy Detection

DIGITAL WATER DIGITAL WATER

MARKING FOR VIDEO MARKING FOR VIDEO

PIRACY DETECTIONPIRACY DETECTION

BY,BY,

NCCTNCCT

Page 2: Digital Water Marking For Video Piracy Detection

ABSTRACTABSTRACTPiracy is an important issue as far as the Piracy is an important issue as far as the

manufacturers are concerned as it can result in a huge manufacturers are concerned as it can result in a huge revenue loss.The reason behind the practice of fullrevenue loss.The reason behind the practice of full--scale piracy is mainly due to the difficulty involved in scale piracy is mainly due to the difficulty involved in tracking the source responsible for the piracy.tracking the source responsible for the piracy.

The goal of this project is to use digital The goal of this project is to use digital watermarking techniques to detect video piracy.A watermarking techniques to detect video piracy.A digital watermark is a distinguishing piece of digital watermark is a distinguishing piece of information that is adhered to the data that it is information that is adhered to the data that it is intended to protect. intended to protect.

The information watermarked includes owner, The information watermarked includes owner, recipient and/or distributor details, transaction dates, recipient and/or distributor details, transaction dates, serial numbers, etc, which play an important role in serial numbers, etc, which play an important role in determining the source of piracy.determining the source of piracy.

Page 3: Digital Water Marking For Video Piracy Detection

CONTENTSCONTENTS

�� DIGITAL WATER MARKINGDIGITAL WATER MARKING

�� GENERAL FEATURESGENERAL FEATURES

�� STRUCTURE OF A TYPICAL WATER MARKING STRUCTURE OF A TYPICAL WATER MARKING

SYSTEMSYSTEM

�� WATER MARK INSERTION UNITWATER MARK INSERTION UNIT

�� WATER MARK EXTRACTION AND DETECTION UNITWATER MARK EXTRACTION AND DETECTION UNIT

Page 4: Digital Water Marking For Video Piracy Detection

�� APPLICATIONSAPPLICATIONS

�� EXISTING SYSTEMEXISTING SYSTEM

�� PROPOSED SYSTEMPROPOSED SYSTEM

�� BLOCK DIAGRAM OF THE PROPOSED BLOCK DIAGRAM OF THE PROPOSED

SYSTEMSYSTEM

�� MODULE DESCRIPTIONMODULE DESCRIPTION

�� CONCLUSIONCONCLUSION

Page 5: Digital Water Marking For Video Piracy Detection

DIGITAL WATER DIGITAL WATER

MARKINGMARKING

Page 6: Digital Water Marking For Video Piracy Detection

Digital watermarking is a technology for Digital watermarking is a technology for

embedding various types of information in embedding various types of information in

digital content. In general, information for digital content. In general, information for

protecting copyrights and proving the validity protecting copyrights and proving the validity

of data is embedded as a watermark.of data is embedded as a watermark.

Since watermarking can be applied to Since watermarking can be applied to

various types of data, the imperceptibility various types of data, the imperceptibility

constraint will take different forms, depending constraint will take different forms, depending

on the properties of the recipient (i.e., the on the properties of the recipient (i.e., the

human senses in most practical cases).human senses in most practical cases).

Page 7: Digital Water Marking For Video Piracy Detection

The watermark should be resilient to The watermark should be resilient to standard manipulations of unintentional as standard manipulations of unintentional as well as intentional nature. well as intentional nature.

It should be statistically irremovable, that It should be statistically irremovable, that is, a statistical analysis should not produce any is, a statistical analysis should not produce any advantage from the attacking point of view.advantage from the attacking point of view.

The watermark should withstand multiple The watermark should withstand multiple watermarking to facilitate traitor tracing.watermarking to facilitate traitor tracing.

Page 8: Digital Water Marking For Video Piracy Detection

Embedding a watermark should not result Embedding a watermark should not result

in a significant increase or reduction in the in a significant increase or reduction in the

original data.original data.

Digital watermarks are added to images or Digital watermarks are added to images or

audio data in such a way that they are invisible audio data in such a way that they are invisible

or inaudible and unidentifiable by human eye or inaudible and unidentifiable by human eye

or ear. or ear.

Page 9: Digital Water Marking For Video Piracy Detection

GENERAL FEATURESGENERAL FEATURES

Page 10: Digital Water Marking For Video Piracy Detection

1.Elements of digital content can be directly 1.Elements of digital content can be directly manipulated and information can be manipulated and information can be embedded in them.embedded in them.

2.Deterioration of the quality of digital content is 2.Deterioration of the quality of digital content is minimized.minimized.

3.Watermarks are retained and detectable after 3.Watermarks are retained and detectable after the digital content is edited, compressed, or the digital content is edited, compressed, or converted.converted.

4.The structure of a watermark makes it difficult 4.The structure of a watermark makes it difficult to detect or overwrite (alter) the embedded to detect or overwrite (alter) the embedded information (watermark contents).information (watermark contents).

Page 11: Digital Water Marking For Video Piracy Detection

5.Processing required for watermarking and 5.Processing required for watermarking and detection is simple.detection is simple.

6.Embedded watermark information cannot be 6.Embedded watermark information cannot be eliminated without diminishing the quality of the eliminated without diminishing the quality of the digital content that carries the watermark.digital content that carries the watermark.

7.The watermark information embedded in 7.The watermark information embedded in digital content can be detected as required.digital content can be detected as required.

Page 12: Digital Water Marking For Video Piracy Detection

STRUCTURE OF A STRUCTURE OF A

TYPICAL WATER TYPICAL WATER

MARKING SYSTEMMARKING SYSTEM

Page 13: Digital Water Marking For Video Piracy Detection

WATER MARK WATER MARK

INSERTION UNITINSERTION UNIT

Page 14: Digital Water Marking For Video Piracy Detection

ORIGINAL IMAGE

PERCEPTUAL MASK

PERCEPTUALANALYSIS

WATERMARKGENERATION

INFORMATIONHIDING

SECRET KEY

HIDDEN INFO.

Page 15: Digital Water Marking For Video Piracy Detection

Every watermarking system consists at least Every watermarking system consists at least of two different parts: watermark embedding of two different parts: watermark embedding unit and watermark detection and extraction unit. unit and watermark detection and extraction unit.

The unmarked image is passed through a The unmarked image is passed through a perceptual analysis block that determines how perceptual analysis block that determines how much a certain pixel can be altered so that the much a certain pixel can be altered so that the resulting watermarked image is indistinguishable resulting watermarked image is indistinguishable from the original. from the original.

After this soAfter this so--called perceptualcalled perceptual--maskmask has been has been computed, the information to be hidden is computed, the information to be hidden is shaped by this mask and spread all over the shaped by this mask and spread all over the original image. original image.

Page 16: Digital Water Marking For Video Piracy Detection

Fig 2 .ORIGINAL FABRIC IMAGE

Fig 3. PERCEPTUAL MASK

Page 17: Digital Water Marking For Video Piracy Detection

In our case, the main reason for this In our case, the main reason for this spreading is to ensure that the hidden spreading is to ensure that the hidden information survives cropping of the image.information survives cropping of the image.

Moreover, the way this spreading is Moreover, the way this spreading is performed depends on the secret key, so it is performed depends on the secret key, so it is difficult to recover the hidden information if difficult to recover the hidden information if one is not in possession of this key.one is not in possession of this key.

Figure 3 represents the perceptual mask Figure 3 represents the perceptual mask that results after analyzing the image presented that results after analyzing the image presented in Figure 2.in Figure 2.

Page 18: Digital Water Marking For Video Piracy Detection

WATER MARK WATER MARK

DETECTION AND DETECTION AND

EXTRACTIONEXTRACTION

UNITUNIT

Page 19: Digital Water Marking For Video Piracy Detection

PERCEPTUAL ANALYSIS WATERMARK DETECTION

WATERMARK EXTRACTION

WATERMARKED IMAGE PERCEPTUAL

MASKSECRET KEY

WATERMARKED YES/NO?

SECRET KEY

HIDDEN INFO.

Page 20: Digital Water Marking For Video Piracy Detection

This figure shows the typical configuration This figure shows the typical configuration of a watermark detection and extraction unit. of a watermark detection and extraction unit.

Watermark detection involves deciding Watermark detection involves deciding whether a certain image has been watermarked whether a certain image has been watermarked with a given key. with a given key.

Once the presence of the watermark has Once the presence of the watermark has been correctly detected, it is possible to extract been correctly detected, it is possible to extract the hidden information. the hidden information.

Page 21: Digital Water Marking For Video Piracy Detection

Since digital copies are inherently exact Since digital copies are inherently exact replicas of the original, there will be no way to replicas of the original, there will be no way to tell them apart. tell them apart.

Therein lies the authorship/ownership Therein lies the authorship/ownership problem due to the likeness of the original and problem due to the likeness of the original and the copy. the copy.

Digital watermarks can be used to show Digital watermarks can be used to show proof of ownership by having your mark put proof of ownership by having your mark put into the file, so even if both images are the into the file, so even if both images are the same, if they contain your mark then you have same, if they contain your mark then you have a much stronger case for copyright or a much stronger case for copyright or ownership disputes.ownership disputes.

Page 22: Digital Water Marking For Video Piracy Detection

Watermarks can be visible or invisible Watermarks can be visible or invisible

depending on the luminance in the mask. The depending on the luminance in the mask. The

higher the luminance, the greater the visibility higher the luminance, the greater the visibility

of the watermark.of the watermark.

Attackers can use different types of image Attackers can use different types of image

processing to remove or degrade the processing to remove or degrade the

watermark until it is illegible .watermark until it is illegible .

Page 23: Digital Water Marking For Video Piracy Detection

APPLICATIONSAPPLICATIONS

Page 24: Digital Water Marking For Video Piracy Detection

The various applications are as follows:The various applications are as follows:�� VIDEO WATER MARKINGVIDEO WATER MARKING

�� AUDIO WATER MARKINGAUDIO WATER MARKING

�� TEXT WATERMARKINGTEXT WATERMARKING

�� LABELLING LABELLING

�� FINGERPRINTINGFINGERPRINTING

�� AUTHENTICATIONAUTHENTICATION

�� COPY AND PLAYBACK CONTROLCOPY AND PLAYBACK CONTROL

Page 25: Digital Water Marking For Video Piracy Detection

In this case, most considerations made in previous In this case, most considerations made in previous sections hold. However, now the temporal axis can be sections hold. However, now the temporal axis can be exploited to increase the redundancy of the watermark. As exploited to increase the redundancy of the watermark. As in the still images case, watermarks can be created either in in the still images case, watermarks can be created either in the spatial or in the DCT domains. In the latter, the results the spatial or in the DCT domains. In the latter, the results can be directly extrapolated to MPEGcan be directly extrapolated to MPEG--2 sequences, 2 sequences, although different actions must be taken for I, P and B although different actions must be taken for I, P and B frames. Note that perhaps the set of attacks that can be frames. Note that perhaps the set of attacks that can be performed intentionally is not smaller but definitely more performed intentionally is not smaller but definitely more expensive than for still images.expensive than for still images.

Page 26: Digital Water Marking For Video Piracy Detection

Again, previous considerations are valid. In this case, Again, previous considerations are valid. In this case,

time and frequency masking properties of the human ear are time and frequency masking properties of the human ear are

used to conceal the watermark and make it inaudible. The used to conceal the watermark and make it inaudible. The

greatest difficulty lies in synchronizing the watermark and greatest difficulty lies in synchronizing the watermark and

the watermarked audio file, but techniques that overcome the watermarked audio file, but techniques that overcome

this problem have been proposed.this problem have been proposed.

Page 27: Digital Water Marking For Video Piracy Detection

This problem, which in fact was one of the first that This problem, which in fact was one of the first that was studied within the information hiding area can be was studied within the information hiding area can be solved at two levels. At the printout level, information can solved at two levels. At the printout level, information can be encoded in the way the text lines or words are separated be encoded in the way the text lines or words are separated (this facilitates the survival of the watermark even to (this facilitates the survival of the watermark even to photocopying). At the semantic level (necessary when raw photocopying). At the semantic level (necessary when raw text files are provided), equivalences between words or text files are provided), equivalences between words or expressions can be used, although special care has to be expressions can be used, although special care has to be taken not to destruct the possible intention of the author. taken not to destruct the possible intention of the author.

Page 28: Digital Water Marking For Video Piracy Detection

The hidden message could also contain labels The hidden message could also contain labels that allow for example to annotate images or audio. that allow for example to annotate images or audio. Of course, the annotation may also been included in Of course, the annotation may also been included in a separate file, but with watermarking it results a separate file, but with watermarking it results more difficult to destroy or loose this label, since it more difficult to destroy or loose this label, since it becomes closely tied to the object that annotates. becomes closely tied to the object that annotates. This is especially useful in medical applications This is especially useful in medical applications since it prevents dangerous errors.since it prevents dangerous errors.

Page 29: Digital Water Marking For Video Piracy Detection

This is similar to the previous application and allows This is similar to the previous application and allows

acquisition devices (such as video cameras, audio recorders, acquisition devices (such as video cameras, audio recorders,

etc) to insert information about the specific device (e.g., an etc) to insert information about the specific device (e.g., an

ID number) and date of creation. This can also be done with ID number) and date of creation. This can also be done with

conventional digital signature techniques but with conventional digital signature techniques but with

watermarking it becomes considerably more difficult to watermarking it becomes considerably more difficult to

excise or alter the signature. Some digital cameras already excise or alter the signature. Some digital cameras already

include this feature.include this feature.

Page 30: Digital Water Marking For Video Piracy Detection

This is a variant of the previous application, in an area This is a variant of the previous application, in an area where cryptographic techniques have already made their where cryptographic techniques have already made their way. However, there are two significant benefits that arise way. However, there are two significant benefits that arise from using watermarking: first, as in the previous case, the from using watermarking: first, as in the previous case, the signature becomes embedded in the message, second, it is signature becomes embedded in the message, second, it is possible to create ‘soft authentication’ algorithms that offer possible to create ‘soft authentication’ algorithms that offer a multi valued ‘perceptual closeness’ measure that accounts a multi valued ‘perceptual closeness’ measure that accounts for different unintentional transformations that the data may for different unintentional transformations that the data may have suffered (an example is image compression with have suffered (an example is image compression with different levels), instead of the classical yes/no answer given different levels), instead of the classical yes/no answer given by cryptographyby cryptography--based authentication. Unfortunately, the based authentication. Unfortunately, the major drawback of watermarkingmajor drawback of watermarking--based authentication is the based authentication is the lack of public key algorithms that force either to put secret lack of public key algorithms that force either to put secret keys in risk or to resort to trusted parties.keys in risk or to resort to trusted parties.

Page 31: Digital Water Marking For Video Piracy Detection

The message carried by the watermark may also The message carried by the watermark may also contain information regarding copy and display contain information regarding copy and display permissions. Then, a secure module can be added in copy or permissions. Then, a secure module can be added in copy or playback equipment to automatically extract this permission playback equipment to automatically extract this permission information and block further processing if required. In information and block further processing if required. In order to be effective, this protection approach requires order to be effective, this protection approach requires agreements between content providers and consumer agreements between content providers and consumer electronics manufacturers to introduce compliant watermark electronics manufacturers to introduce compliant watermark detectors in their video players and recorders. This approach detectors in their video players and recorders. This approach is being taken in Digital Video Disc (DVD).is being taken in Digital Video Disc (DVD).

Page 32: Digital Water Marking For Video Piracy Detection

EXISTING SYSTEMEXISTING SYSTEM

Page 33: Digital Water Marking For Video Piracy Detection

The existing systems that employ digital The existing systems that employ digital watermarking for video piracy detection are watermarking for video piracy detection are inviting to the hackers as the watermark is inviting to the hackers as the watermark is visible. visible.

The watermark is concentrated in a The watermark is concentrated in a particular area, thus through statistical analysis particular area, thus through statistical analysis the approximate location of the watermark can the approximate location of the watermark can be identified. This enables the hackers to be identified. This enables the hackers to overwrite the copyright information with their overwrite the copyright information with their own information. own information.

As the watermark is concentrated, the As the watermark is concentrated, the chances of it being prone to damages due to chances of it being prone to damages due to compression etc are more.compression etc are more.

Page 34: Digital Water Marking For Video Piracy Detection

PROPOSED SYSTEMPROPOSED SYSTEM

Page 35: Digital Water Marking For Video Piracy Detection

In the proposed system the video file is In the proposed system the video file is watermarked with the copyright information. watermarked with the copyright information. The copyright information includes data about The copyright information includes data about the vendor, buyer, a serial number and other the vendor, buyer, a serial number and other information.information.

When it is detected that the video is When it is detected that the video is pirated, it is possible to dewater mark the file pirated, it is possible to dewater mark the file to retrieve the copyright information. With this to retrieve the copyright information. With this information we can trace back to the sources of information we can trace back to the sources of piracy.piracy.

Page 36: Digital Water Marking For Video Piracy Detection

In the proposed system the watermark is In the proposed system the watermark is

made invisible. made invisible.

The watermark is spread throughout the The watermark is spread throughout the

image, so it’s location cannot be traced easily. image, so it’s location cannot be traced easily.

The spreading of the watermark also prevents The spreading of the watermark also prevents

data loss from manipulations like compression data loss from manipulations like compression

etc.etc.

Page 37: Digital Water Marking For Video Piracy Detection

Apart from these advantages, the Apart from these advantages, the

digital watermark in the proposed system can't digital watermark in the proposed system can't

be erased or overwritten. be erased or overwritten.

It is also robust and completely unaffected It is also robust and completely unaffected

by common audio or video processing by common audio or video processing

operations. operations.

It combines enormous versatility with ease It combines enormous versatility with ease

of installation, integration and operation. It offers of installation, integration and operation. It offers

wide range of applications, including audio and wide range of applications, including audio and

video copyright control. video copyright control.

Page 38: Digital Water Marking For Video Piracy Detection

BLOCK DIAGRAMBLOCK DIAGRAM

Page 39: Digital Water Marking For Video Piracy Detection

COPYRIGHT INFORMATION

VIDEO FILEINFORMATION

WATERMARKING

DEWATERMARKING

WATER MARKEDIMAGE

RETRIEVED COPYRIGHT

INFORMATION

Page 40: Digital Water Marking For Video Piracy Detection

As shown in the block diagram of the As shown in the block diagram of the proposed system, the copyright information in proposed system, the copyright information in text format along with the video file content in text format along with the video file content in AVI format is given as input to the AVI format is given as input to the watermarking module. watermarking module.

In this module the textual information is In this module the textual information is converted compatible to the video file data and converted compatible to the video file data and the bits in the video file are altered according the bits in the video file are altered according to the copyright information.to the copyright information.

In the dewater marking module, the In the dewater marking module, the copyright information is retrieved from the copyright information is retrieved from the watermarked file using the key file.watermarked file using the key file.

Page 41: Digital Water Marking For Video Piracy Detection

MODULE DESCRIPTIONMODULE DESCRIPTION

Page 42: Digital Water Marking For Video Piracy Detection

The various modules in the proposed system The various modules in the proposed system

are:are:

�� VIDEO HEADER INFORMATIONVIDEO HEADER INFORMATION

�� FILE HANDLINGFILE HANDLING

�� WATER MARKINGWATER MARKING

�� DEWATER MARKINGDEWATER MARKING

�� INTERGRATION AND ERROR HANDLINGINTERGRATION AND ERROR HANDLING

Page 43: Digital Water Marking For Video Piracy Detection

VIDEO HEADER INFORMATIONVIDEO HEADER INFORMATION

The video information is stored in AVI The video information is stored in AVI RIFF format. The various headers and chunks RIFF format. The various headers and chunks are identified and declared. are identified and declared.

Thus by identifying the header information Thus by identifying the header information the location of the data is found. the location of the data is found.

Page 44: Digital Water Marking For Video Piracy Detection

FILE HANDLINGFILE HANDLINGThe information about the owner, The information about the owner,

recipient/distributor, serial number and other recipient/distributor, serial number and other

copyright related data is stored in a text file. copyright related data is stored in a text file.

This information is read from the text file. This information is read from the text file.

The header information is read from the The header information is read from the

video file and is written into the key file and video file and is written into the key file and

the temporary file. The filethe temporary file. The file--handling module is handling module is

carried out both during watermarking and carried out both during watermarking and

dewater marking. dewater marking.

Page 45: Digital Water Marking For Video Piracy Detection

WATERMARKINGWATERMARKING

The image is watermarked with the The image is watermarked with the

copyright information in such a way that the copyright information in such a way that the

video information does not lose its property. video information does not lose its property.

Changing a few data bits of the video file Changing a few data bits of the video file

depending on the copyright information does depending on the copyright information does

this. The key file generated in this process this. The key file generated in this process

should be kept secret and should be protected should be kept secret and should be protected

from any corruption. from any corruption.

Page 46: Digital Water Marking For Video Piracy Detection

DEWATERMARKINGDEWATERMARKING

The data from the watermarked video file The data from the watermarked video file

is fetched during check for piracy. Using the is fetched during check for piracy. Using the

key file the copyright information is extracted key file the copyright information is extracted

from the watermarked data. from the watermarked data.

From the copyright information it is From the copyright information it is

possible to find the source of piracy and thus possible to find the source of piracy and thus

necessary action can be taken.necessary action can be taken.

Page 47: Digital Water Marking For Video Piracy Detection

ERROR HANDLING AND ERROR HANDLING AND

INTEGRATIONINTEGRATION

Errors in each of the modules are handled Errors in each of the modules are handled

separately. Once this is done, the various separately. Once this is done, the various

modules are integrated and the errors that modules are integrated and the errors that

follow are handled follow are handled

Page 48: Digital Water Marking For Video Piracy Detection

CONCLUSIONCONCLUSION

Page 49: Digital Water Marking For Video Piracy Detection

Though there are several other techniques Though there are several other techniques

available for copyright protection and several available for copyright protection and several

other similar issues, digital watermarking is other similar issues, digital watermarking is

the only preferred algorithm because of its the only preferred algorithm because of its

basic advantages like being robust, fragile and basic advantages like being robust, fragile and

imperceptible. imperceptible.

Several proposals have been made to Several proposals have been made to

exploit the benefits of this algorithm for video exploit the benefits of this algorithm for video

piracy detection, but the problem is still far off piracy detection, but the problem is still far off

from a solution.from a solution.

Page 50: Digital Water Marking For Video Piracy Detection

The proposed system in this project has The proposed system in this project has used digital watermarking technique to detect used digital watermarking technique to detect video piracy and has overcome most of the video piracy and has overcome most of the major shortcomings of the existing systems. major shortcomings of the existing systems. The proposed system has several advantages The proposed system has several advantages when compared to existing system. when compared to existing system.

Though this system is competent enough to Though this system is competent enough to be used in the market there are few be used in the market there are few challenges yet to be solved. Few among them challenges yet to be solved. Few among them are as follows:are as follows:

Page 51: Digital Water Marking For Video Piracy Detection

The proposed system works for only The proposed system works for only those video images which are in the AVI those video images which are in the AVI RIFF format. RIFF format.

This software helps to detect the This software helps to detect the source of piracy, when the video is source of piracy, when the video is distributed through compact discs. However distributed through compact discs. However with a few changes to the software it is with a few changes to the software it is possible to distribute the video file through possible to distribute the video file through the Internet. the Internet.

Despite the various ways in which the Despite the various ways in which the software can be enhanced, the proposed software can be enhanced, the proposed system is no less competitive and its system is no less competitive and its efficiency is beyond questionefficiency is beyond question

Page 52: Digital Water Marking For Video Piracy Detection

Top Related