Complete Report of Final Year Project
Complete Report of Final Year Project
Bachelor of Technology
in
ELECTRONICS & COMMUNICATION ENGINEERING
Under the supervision of
May, 2017
CERTIFICATE OF APPROVAL
This is to certify that the project titled “Designing a Fragile cum Robust Digital Watermarking
Scheme for Big Data Application” carried out by
Name Roll No. Registration No:
SOHINI MONDAL 11700313096 131170110280
ADVAITAA BISWAS 11700313002 131170110186
ARUNOTHPOL DEBNATH 11700313024 131170110208
ANIRBAN DASGUPTA 11700313008 131170110192
for the partial fulfillment of the requirements for B.Tech degree in Electronics and
Technology, West Bengal is absolutely based on his own work under the
supervision of Dr. Tirtha Sankar Das. The contents of this thesis, in full or in parts, have
not been submitted to any other Institute or University for the award of any degree or
diploma.
.........................................................
Dr./Mr./Ms./Mrs. Dr./Mr./Ms./Mrs.
Designation and Department Professor , Dept. of ECE
Institute RCC Institute of Information Technology
..........................................................
“We Do hereby declare that this submission is our own work conformed to the
norms and guidelines given in the Ethical Code of Conduct of the Institute and that, to the
best of our knowledge and belief, it contains no material previously written by another
neither person nor material (data, theoretical analysis, figures, and text) which has been
.......................................................... ..........................................................
Registration No: Registration No:
Roll No: Roll No:
.......................................................... ..........................................................
Registration No: Registration No:
Roll No: Roll No:
Date:
Place:
CERTIFICATE of ACCEPTANCE
This is to certify that the project titled “Designing a Fragile cum Robust Digital
Watermarking Scheme for Big Data Application” carried out by
Name Roll No. Registration No:
SOHINI MONDAL 11700313096 131170110280
ADVAITAA BISWAS 11700313002 131170110186
ARUNOTHPOL DEBNATH 11700313024 131170110208
ANIRBAN DASGUPTA 11700313008 131170110192
is hereby recommended to be accepted for the partial fulfillment of the requirements for
B.Tech degree in Electronics and Communication Engineering from Maulana Abul Kalam
1. ……………………………………………………………………
2.……………………………………………………………………..
3.…………………………………… ………………………………
4. ……………………………………. ………………………………
Contents
• Abstract
• Introduction
• Literature Survey
• Problem Statement
• Working Principle & Block Diagrams
• Results
• Attacks
• Conclusion
• Future Scope
• Reference
• Annexure
Abstract
In the past few years, digital multimedia distribution over the Internet has grown rapidly due to
the latest developments in technologies. As obvious, digital data can be easily shared, processed
or used without any degradation in quality. On the other hand, this leads to the serious security
problems. Therefore, protection of the digital data is becoming an utmost important issue. As a
solution to this problem, different authentication and protection techniques are being used.
Digital watermarking is one of the major technologies to embed additional information into the
host signal to ensure the security and protection of multimedia data as well. Here, a Fragile cum
Robust Digital Watermarking scheme for big data purpose is proposed. The primary objective
results are found satisfactory.
Introduction
The increase in the availability of digital data (e.g. video, audio, and images) on the World Wide
Web has led to large scale unauthorized copying and increased the opportunity for violation of
copyright and tampering with (or the modification of) content. The reason is simple — digital
representation of media facilitates access and potentially improves the portability, efficiency, and
accuracy of the information presented. As a result, there is a pressing need to manage and protect
visual material against manipulation and illegal duplication. One approach to address this
problem involves embedding an invisible structure into a host multimedia data to mark
ownership of them. To accomplish this, a large number of information hiding techniques have
been proposed in the literature. The results achieved in the last 6 years, in a number of
application areas involving audio, video, and digital images, have pointed to information hiding
as one important topic related to the area of information security. The information hiding area
brings together researchers with very different backgrounds: electrical engineering, signal and
image processing, computer science, and cryptography. The main disciplines studied so far have
focused on covert channels, steganography, anonymity, and watermarking. This classification of
information hiding techniques was first proposed by Bauer. However, other researchers consider
steganography, digital watermarking, and fingerprinting at the same level. Recent research has
pointed to steganography and digital watermarking as two areas which are generally referred to
as information hiding.
Covert Channels: Lampson introduced and illustrated many covert channels in his Confinement
Problem paper. This technique was defined in the context of multilevel secure systems (e.g.
military computer systems), in which communication paths which were not designed to transfer
information at all. Instead, these channels were used by untrustworthy programs to leak
information to their owner while performing a service for another program. For instance, let us
suppose that a program A (service) processes some information for a program B (customer). The
customer program will want to ensure that the service program cannot access (read or modify)
any of its data except those items to which it explicitly grants access. In addition, the service
program must be protected from intrusion by the customer program, since the service program
may have its own private data. Such communications channels have been studied to find ways to
confine these programs, i.e., some secure systems need to safeguard data from unauthorized
access or modification or programs from unauthorized execution.
Anonymity:The main purpose of this technique is to find ways to hide the meta-content of
messages, i.e., the sender and the recipients of a message. The basic idea is that one can obscure
the trail of a message by using a set of remailers or routers as long as the intermediaries do not
collude. As a result, trust remains the cornerstone of these tools. There are different varieties,
depending on who is anonymz'zed: the sender, the receiver, or both. Web applications have
focused on receiver anonymity, whereas e-mail users are concerned with sender anonymity.
(a) the information hidden by a watermarking system is always associated with the digital
object to be protected or its owner, whereas steganographic systems simply hide any
information;
(b) the robustness criteria are also different, since steganography is mainly concerned with
the detection of the hidden message, while watermarking is concerned with removal by a pirate;
(c) steganographic communication is usually point-to-point (between the sender and the
receiver), whereas watermarking techniques are usually one-to-many.
Classification:
Types of Digital Watermarks:
Watermarks and watermarking techniques can be divided into various categories in various ways.
Why Digital Watermarking for Video?
Digital watermarking is defined as imperceptibly altering a work in order to embed information
about that work. In the recent years copyright protection of digital content became a serious
problem due to rapid development in technology. Watermarking is one of the alternatives to
copyright-protection problem.
The most common and easily available source of big data is a video. Video watermarking
introduces some issues not present in image watermarking. Due to large amounts of data and
inherent redundancy between frames, video signals are highly susceptible to pirate attacks,
including frame averaging, frame dropping, frame swapping, statistical analysis, etc.
1.Transaction Tracking: Transaction tracking is used to track how content was distributed
through a system or transmitted between multiple points. A unique identifier is embedded into
the media at the time of playback, which can later be extracted. In the case of illegal distribution
of the content, it should ideally be possible to identify the source from where the distribution
occurred, possibly identifying the misappropriating party.
3.Copy Control: Copy control aims to disable the duplication of copyrighted material on
devices equipped with special watermark detectors. The watermark is used to indicate copy
control information, such as copy_never, copy_once or copy_freely. By implementing
watermark extraction and embedding in devices, the user can be allowed or denied permission to
duplicate content.
6.Fingerprinting: This category is only included for clarity, as there exist at least two definitions
of fingerprinting, each with specific characteristics and applications. The first definition of media
fingerprinting is “the art, or algorithm, of identifying component characteristics of a source and
then reducing it into a fingerprint that can uniquely identify it.”These techniques do not add any
additional information to the media, but rather generates a compact signature based on the unique
properties of the content.
Properties of Watermarking:
Robustness
A digital watermark is called "fragile" if it fails to be detectable after the slightest modification.
Fragile watermarks are commonly used for tamper detection (integrity proof). Modifications to
an original work that clearly are noticeable commonly are not referred to as watermarks, but as
generalized barcodes.
A digital watermark is called semi-fragile if it resists benign transformations, but fails detection
after malignant transformations. Semi-fragile watermarks commonly are used to detect malignant
transformations.
A digital watermark is called robust if it resists a designated class of transformations. Robust
watermarks may be used in copy protection applications to carry copy and no access control
information.
Imperceptibility
A digital watermark is called imperceptible if the original cover signal and the marked signal are
perceptually indistinguishable.
A digital watermark is called perceptible if its presence in the marked signal is noticeable (e.g.
Digital On-screen Graphics like a Network Logo, Content Bug, Codes, Opaque images). On
videos and images, some are made transparent/translucent for convenience for consumers due to
the fact that they block portion of the view; therefore degrading it.
This should not be confused with perceptual, that is, watermarking which uses the limitations of
human perception to be imperceptible.
Capacity
The capacity or payload size of a watermark is an indication of the amount of information that
can be embedded with a watermark. The payload size varies with the application, but in general
an identifier packet of 64 bits is considered appropriate for most applications.
Attacks On Watermarks:
A successful attack on a watermarking technique refers to a case where the watermark has been
removed or modified to prevent successful extraction, without degrading the quality of the
watermarked content significantly. A successful attack on a watermark does not necessarily
mean that the content was restored to the original, un-watermarked state, but instead that the
watermark detection and extraction processes were defeated. Intentional attacks are deliberate
attempts to prevent successful extraction of embedded watermarks. Unintentional attacks, on the
other hand, are caused by normal signal conversions and compression that may be introduced in
a distribution chain. Normal signal conversion operations.
Literature Survey
Maher El’Arbi, Chokri Ben Amar and Henri Nicolas has proposed a video watermarking scheme
based on multi resolution motionestimation and artificial neural network. The results show that
embedding watermark where picture content is moving is less perceptible.The proposed scheme
is also shown to be robust against common video processing attacks. [1]
Mr Mohan A Chimanna , Prof. S.R. Khot has proposed a compressive approach for digital video
watermarking ,where watermark image is embedded into the video frame and each video frame
is decomposed into sub images using 2 level Discrete Wavelet Transform (DWT) and Principal
Component Analysis (PCA) Transform is applied for each block in the two bands LL & HH.The
results show no visible difference between watermark frame and original video frame, it shows
the robustness against a wide range of attack such as Gaussian noise, salt & pepper Noise
,median filtering , rotation, cropping etc. The proposed algorithm is however,a non blind
algorithm. [2]
Tahani Al-Khatib, Ali Al-Haj, Lama Rajab and Hiba Mohammed proposed an algorithm based
on a cascade of two powerful mathematical transforms; Discrete Wavelets Transform (DWT)
and Singular Value Decomposition (SVD).In the proposed hybrid algorithm, the watermark bits
are not embedded directly on the wavelet coefficients, but rather on the elements of singular
values of the frames' DWT sub-bands. [4]
Jaya Jeswani, Dr. Tanuja Sarode proposed an algorithm in which cover video is divided into
frames and watermark is inserted into selected frames. For selected video frames twodimensional
8×8 discrete cosine transform is carried out on luminance component. Finally binary watermark
is embedded into mid frequency DC coefficients by adjusting coefficients DCT (4, 3) and DCT
(5,2).This algorithm does not embed watermark in all the frames. Also, the result against attacks
like Gaussian Noise, Salt and Pepper Noise etc does not show satisfactory results. [5]
Past Challenges:
Each watermarking application has its own set of attributes of the watermarking system which
determines the choice of techniques used for embedding and detecting the watermark.
Commonly discussed attributes of real world systems include:
• First issue is to maintain balance between imperceptibility, robustness and capacity as
increasing one factor adversely effect on other and a good digital watermarking system
possess all three features. To achieve good imperceptibility, watermark should be
embedded in high frequency component whereas robustness occurs in low frequency
component.
• Another one is in fragile watermarking, where data recovery against cropping is a
challenging issue. In fragile watermarking, slight distortion results in destruction of
watermark.
• In the age of Big Data, capacity of the watermarking system is a very important
factor.More capacity means imperceptibility is compromised. So, equilibrium needs to be
maintained.
• Next issue is robustness.The watermarking technique should be universal so that it is
robust against various kinds of attacks.
• Other issue is computational cost i.e. cost of inserting and detecting watermark that
should be minimized.
Problem Statement
Design a fragile cum robust digital watermarking scheme for Big Data application. In our
project we have tried to resolve the issues of
• copyright protection
• tampering detection
• capacity
Working Principle
Although existing literature on watermarking embedding techniques deals with image, video and
audio files, most of publications refer to images. Based on recent publications, we roughly
divided watermarking techniques into two classes taking, into account the domain in which the
watermark signal is embedded. The first class refers to spatial domain techniques which embed
the data by directly modifying the pixel values of the original image. The other class lays on
transform domain methods which embed the data by modulating the transform domain
coefficients.
Original Video
Extraction of
Frames
RGB to Gray
conversion
Application of
DWT
Generation of
binary pattern
Key=Binary pattern
XOR Watermark
Embedding the
Key in the frames
Application of
IDWT
Watermarked
video
Discrete Wavelet Transform:
The Discrete Wavelet Transform (DWT) yields the fast computation of Wavelet transform. In
this algorithm, DWT is applied on each frame and the video watermarking is done on every
frame to which DWT is applied. For 2-D frame, applying DWT means applying 1-D filter in two
dimensions. The filter then divide the frame into four non overlapping sub-bands called as LL1,
LH1, HL1 and HH1. In this paper, L stands for low pass, H stands for high pass, while, the
number indicates the level of DWT applied. To obtain the next level, the LL1 sub-band is
selected and again it is divided into four non overlapping sub-bands named - LL2, LH2, HL2 and
HH2.In this way we applied level 3 DWT on each frame.
Part 1: Key Generation & Watermark Embedding
The watermarking embedding procedure for each frame can be described in the following steps:
Step 1: Decompose the video in individual frames and convert the frames in Gray scale images.
Step 2: Apply Level 6, 2D DWT on each frame to decompose into various sub-bands using db2
Wavelet. This leads to LL6 frequency band.
Step3: For each frame, calculate mean of low freq coefficient using:
; k = 1,2,...P
where P = total number of frames available in the video
N = the total number of coefficients available in LL6 component of corresponding
frame
ak = low frequency DWT coefficients.
Hence Tk represents a vector consisting of P thresholds for the video frames.
Step 4: Compare the low frequency coefficient with the mean value Tk for k-th frame obtained in
step 3, to generate a binary pattern:
Wk = 1, if ak ≥ Tk
= 0, if ak < Tk; k = frame number
This leads to generation of a binary pattern corresponding to the importance of DWT coefficients
in LL6 part, based on the threshold obtained.This can be termed as weights of the coefficients to
generate the key.
Step 5: Generate the key ' Kk ' by applying XOR operation between Wk and the watermark
image- G, for k-th frame. Let the dimension of the key Kk be m×n.
Kk = Wk (i) XOR G(i)
Now, Kk is the key to extract the watermark during extraction process.
Kk(i)==1
HH’ = HH + g *pns
else
HH’ = HH - g *pns
where k=k-th frame in the video
G= Gain
pns= PN sequence
Step-8: Applying IDWT, reconstruct the video from the modified frames to get the watermarked
video.
Extraction of Watermark:
Watermarked video
Extraction of
Frames
Application of
DWT
Co-relating to
PN sequence
Generation of
Binary Pattern
Key Extraction
Generation of
Watermark
The watermarking extraction procedure for each frame can be described in the following steps:
Step 1: Decompose the watermarked video in individual frames and convert the frames in Gray
scale images.
Step 2: Apply Level 1, 2D DWT on each frame to decompose into various sub-bands using db2
Wavelet.
Step3: For each frame, calculate mean of low freq coefficient using:
; k = 1,2,...P
Where P = total number of frames available in the video,
N = the total number of coefficients available in LL3
component of corresponding frame,
ak = low frequency DWT coefficients.
Hence Tk represents a vector consisting of P thresholds for the video frames.
Step 4: Corelate the HH coefficient matrix at Level-1 with the PN sequences generated using the
saved states. The values are saved in the matrix cor_coef(i).
if cor_coef(i) >= 0
cor_value(i) = 1; else
cor_value(i) = 0;
where cor_value matrix is the retrieved key matrix Kr ; r = r-th frame from the reconstructed
video.
Step 5: Apply level 6 DWT.Compare the low frequency coefficient with the mean value Tk for
rth frame, to generate a binary pattern:
Wr = 1, if ar ≥ Tr
= 0, if ar< Tr; r = frame number.
Step-6: Generate the watermark ' G’ ' by applying XOR operation between cor_value and the
binary pattern Wr, for r-th frame.
G’ = Wr (i) XOR cor_value(i) Where
G’ is the reconstructed watermark.
Results
The proposed algorithm was tested for four different videos. The PSNR value is calculated for
the reconstructed frames with respect to the original frame. The PSNR computes the peak
signalto-noise ratio, in decibels, between two images. This ratio is often used as a quality
measurement between the original and a compressed image. The higher the PSNR, the better the
quality of the compressed, or reconstructed image. The MSE represents the cumulative squared
error between the compressed and the original image. The lower the value of MSE, the lower the
error.
How much the extracted watermark from each frame deviates from the embedded watermark is
also calculated by:
mismatch percentage =
Video File 1:
For specific frames from 'Page 394' video the results are:
# Frame: 4.png
• The binary patterns from original and reconstructed frames are exactly same.
• The embedded watermark and the extracted watermarks are exactly same, no error.
• For this frame, PSNR = 34.3 dB and MSE = 24.18
#Frame: 79.png
• The embedded watermark and the extracted watermarks are not exactly same, in this case
two mismatches occurred in the extracted frame, i.e. 0.65% error.
• For this frame, PSNR = 34.2 dB and MSE = 22.43
Video file 2:
For specific frames from 'Walter Mitty' video the results are: #
Frame: 214.png
• The embedded watermark and the extracted watermarks are exactly same, no error.
• For this frame, PSNR = 34.36 dB and MSE = 24.42
For specific frames from 'Lion King' video the results are:
# Frame: 344.png
• The embedded watermark and the extracted watermarks are exactly same, no error.
• For this frame, PSNR = 35.42 dB and MSE = 19.35
For specific frame from 'Cosmos' video the results are:
# Frame: 69.png
• The embedded watermark and the extracted watermarks are not exactly same, two
mismatches occurred in the extracted frame, i.e. 0.65% error.
• For this frame, PSNR = 34.53 dB and MSE = 25.62
Attacks
The results of these attacks are shown below for a particular frame.
• The extracted watermark doesn't match with the embedded one exactly. One mismatch
occurred when Salt & Pepper noise of noise density 0.05 was introduced.
• For this noise-affected frame, PSNR = 17.53 dB and MSE = 127.13
# Median Filter:
• The extracted watermark doesn't match with the embedded one . 15 mismatches occurred
in newly extracted watermark when 2D median filtering was performed; 5% error.
• For this filter applied frame, PSNR = 41.87 dB and MSE = 4.127
# Cropping:
• The extracted watermark doesn't match with the embedded one . 40 mismatches occurred
in newly extracted watermark when a portion of the image was cropped; 13% error.
• For this filter cropped frame, PSNR = 17.46 dB and MSE = 1167
Result summary:
Future Scope
•
The algorithm can be made more robust by embedding watermark in both the
approximation as well as detail coefficients.
•
The gain for embedding the watermark can be made adaptive.
•
The capacity can be improved by multi bit embedding procedure.
•
PN sequences used can be modified so as to get better correlation values.
Reference
[1] M. El'arbi, C. B. Amar and H. Nicolas, "Video Watermarking Based on Neural
Networks" 2006 IEEE International Conference on Multimedia and Expo, Toronto, Ont., 2006, pp.
1577-1580.
doi: 10.1109/ICME.2006.262846
[2] “ Digital Video Watermarking Techniques for Secure Multimedia Creation and
Delivery”, Mr Mohan A Chimanna, Prof.S.R.Khot / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March
April 2013, pp.839-844
[4] “A Robust Video Watermarking Algorithm”,Tahani Al-Khatib, Ali Al-Haj, Lama Rajab
and Hiba Mohammed, Journal of Computer Science 4 (11): 910-915, 2008
ISSN 1549-3636,© 2008 Science Publications
[5] “A New DCT based Color Video Watermarking using Luminance Component”,Jaya
Jeswani, Dr. Tanuja Sarode, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN:
22780661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 83-90
www.iosrjournals.org https://in.mathworks.com/help/wavelet/discrete-wavelet-analysis.html
https://pdos.csail.mit.edu/archive/decouto/papers/pickholtz82.pdf
https://en.wikipedia.org/wiki/Discrete_wavelet_transform
https://www.mathworks.com/discovery/matlab-gui.html
“Efficient Video Watermarking in Selected Frames Based on Fibonacci Series for Ownership
Proof”,Mahesh Sanghavi, Rajeev Mathur and Archana Rajurkar
“Digital Image Processing using MATLAB” Book by Rafael C. Gonzalez and Richard Eugene
Woods
Annexure