Algorithmic Analysis of Invisible Video Watermarking using LSB Encoding Over a Client-Server Framework

Reading time: 5 minute
...

📝 Abstract

Video watermarking is extensively used in many media-oriented applications for embedding watermarks, i.e. hidden digital data, in a video sequence to protect the video from illegal copying and to identify manipulations made in the video. In case of an invisible watermark, the human eye can not perceive any difference in the video, but a watermark extraction application can read the watermark and obtain the embedded information. Although numerous methodologies exist for embedding watermarks, many of them have shortcomings with respect to performance efficiency, especially over a distributed network. This paper proposes and analyses a 2-bit Least Significant Bit (LSB) parallel algorithmic approach for achieving performance efficiency to watermark and distribute videos over a client-server framework.

💡 Analysis

Video watermarking is extensively used in many media-oriented applications for embedding watermarks, i.e. hidden digital data, in a video sequence to protect the video from illegal copying and to identify manipulations made in the video. In case of an invisible watermark, the human eye can not perceive any difference in the video, but a watermark extraction application can read the watermark and obtain the embedded information. Although numerous methodologies exist for embedding watermarks, many of them have shortcomings with respect to performance efficiency, especially over a distributed network. This paper proposes and analyses a 2-bit Least Significant Bit (LSB) parallel algorithmic approach for achieving performance efficiency to watermark and distribute videos over a client-server framework.

📄 Content

International Journal of Computer Trends and Technology (IJCTT) – Volume 36 Number 3 - June 2016 ISSN: 2231-2803 http://www.ijcttjournal.org Page 143 Algorithmic Analysis of Invisible Video Watermarking using LSB Encoding over a Client-Server Framework Poorna Banerjee Dasgupta M.Tech Computer Science & Engineering, Nirma Institute of Technology Ahmedabad, Gujarat, India

Abstract — Video watermarking is extensively used in many media-oriented applications for embedding watermarks, i.e. hidden digital data, in a video sequence to protect the video from illegal copying and to identify manipulations made in the video. In case of an invisible watermark, the human eye can’t perceive any difference in the video, but a watermark extraction application can read the watermark and obtain the embedded information. Although numerous methodologies exist for embedding watermarks, many of them have shortcomings with respect to performance efficiency, especially over a distributed network. This paper proposes and analyses a 2-bit Least Significant Bit (LSB) parallelized algorithmic approach for achieving performance efficiency to watermark and distribute videos over a client-server framework.

Keywords — Video Watermarking, LSB Coding, Media Copy Control. I. INTRODUCTION
We live today in a world where sharing and distribution of digital media such as songs, photos and videos have become very popular. With this rapid increase in sharing and distribution, comes the problem of digital media copying and piracy. As mentioned earlier, video watermarking refers to the process of embedding hidden digital data in a video. Ideally in case of an invisible watermark, a user viewing the video cannot perceive a difference between the original, unmarked video and the marked video, but a watermark extraction application can read the watermark and obtain the embedded information. The extracted information can then be used to determine the authenticity of a video as well as help in differentiating between an original and a copied video. Some common applications of video watermarking include [1],[6]:

Copyright Protection: For the protection of intellectual property, the video data owner can embed a watermark representing copyright information in video data. This watermark can help prove ownership in a legal court when someone has infringed on the owner’s copyrights. For instance, embedding the original video clip by noninvertible video watermarking algorithms during the verification procedure helps to prevent the multiple ownership problems in some cases.

Video Authentication: Popular video editing software’s available today permit users to easily tamper with video content. Authentication techniques are consequently needed in order to ensure the authenticity of the content. One solution is the use of digital watermarks. Timestamp, camera ID and frame serial number are used as a watermark and embedded into every single frame of the video stream.

Video fingerprinting: To trace the source of illegal copies, a fingerprinting technique can be used. In this application, the video data owner can embed different watermarks in the copies of the data that are supplied to different customers. Fingerprinting can be compared to embedding a serial number in the data that is related to the customer’s identity. It enables the intellectual property owner to identify customers who have broken their license agreement by supplying the video data to third parties.

Copy control: The information stored in a watermark can be used to directly control digital recording devices for copy protection purposes. In this case, the watermark represents a copy- prohibit bit and watermark detectors in the digital-media recorder determine whether the video data offered to the recorder may be stored or not.

This paper presents a simple yet very efficient algorithmic approach for invisibly watermarking videos using the concept of 2-bit Least Significant Bit (LSB) encoding/decoding over a client-server framework. The following sections of this paper describe in detail how the structure of a video file can be deconstructed to isolate particular video frames for watermarking and how the encoding/decoding modules of the watermarking algorithm work using Base64 coding.

International Journal of Computer Trends and Technology (IJCTT) – Volume 36 Number 3 - June 2016 ISSN: 2231-2803 http://www.ijcttjournal.org Page 144 II. IDENTIFYING I-FRAMES FROM A VIDEO SEQUENCE Video files, such as those coded by the MPEG and H.262/H.263 standards comprise of information headers followed by a sequence of image frames [2],[3]. For the purposes of clarity and demonstration, all video codings hereby mentioned will refer to the MPEG-1 standard. The video h

This content is AI-processed based on ArXiv data.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut