Simulation Based Watermarking For Confidential Data Security For Video Signal
Simulation Based Watermarking For Confidential Data Security For Video Signal
Simulation Based Watermarking for Confidential Data Security for Video Signal
Amit Maharshi* Ravindra Prakash Gupta
Assistant Professor
Department of Electronic Instrumentation and Control Engineering JaganNath Gupta Institute of Engineering and Technology
Research Scholar
Department of E. C.E. Bhagwant University
Assistant Professor
Department t of Computer Science and Engineering JaganNath Gupta Institute of Engineering and Technology
Abstract-There are several protocols and embedding techniques which are used to hide data digitally for an object in highly sophisticated environment. These protocols and technique must fulfil a number of requirements correctly applied for steganography. The purpose of this experimental study is to measure the quality of embed watermarks in video signals and to hide confidential data over it without any change and loss of data. The main focus of this paper is that we use two video clips which are bbc.avi and apple.avi. Here we set some parameter value for both clips as mention above. We are varying the quality of referenced image from 100-20% with unit difference 20% and extract the watermarks image with the value of control parameter NC. Keywords Discrete Cosine Transform, Watermarking, Steganography, Matlab.
I. INTRODUCTION The stego object must be correct, clear and well defined whenever the hidden information will be integrated over the original image. The hidden massage must not change in any case (e.g. add addition information in stego object, loss of info) [8].If the hidden information is changed during steganography process, the whole process would be failed [1]. There are two most techniques used to ensure data confidentially as steganography and Encryption. The main difference between both of them that steganography hides the existence of secrete massage while in encryption any body can see it [8]. In present world the secrete data which would be in picture or in video format can be used for watermarking for communicate or transfer secrete data between two medium [4]. In this paper we use DCT as a technique to implement digital watermarking in a video by embedding secure image into an original video [1]. There are many techniques for transformation of image in digitalized form which is FFT, DFT, and DCT and so on. But DCT is one of the best techniques for transformation of data. In this paper we describe in Section I Introduction Section II Discrete Cosine Transform Section III Simulation Tool Section IV Imitation Parameters Section V Parameters Value
Setup Section VI Results and Analysis and section VII Conclusion. II. DISCRETE COSINE TRANSFORM (DCT) The DCT algorithm is one of the main component of the JPEG compression technique and to ensure data hiding .The DCT allows an image to be broken up into different frequency bands, and making it which easier to embed watermarking information into the middle frequency bands of an image [10]. Transform coding is specifically used to constitute the integral component of image/video processing. Transform coding works on the condition that pixels in an image inherit with their neighbouring pixels in an image inherit with their neighbouring pixels at a certain level of correlation. A video transmission system similarly uses high correlation between adjacent pixels in consecutive frames [10]. These correlations can be splitted to enhance the value of pixel from its respective neighbours [8]. The two dimensional DCT is process of JPEG to convert between the special domain and the frequency domain. The JPEG compression algorithm is used to divide an image into 8x8 blocks of pixels and DCT is applied separately to each block [7]. The DCT is a type of singular transform which can be used to transform data into a sum of cosine transform.
www.ijarcsse.com
Indexed none Non-zero 256
III. SIMULATION TOOL Matlab is used for technical computing as a high performance language. It has capability for integrates computation, programming eenvironment and visualization.It has also sophesticated data structures modern programming language environment debugging tools and supporting objectoriented programming [9].These all tools make Matlab as an excellent tool for mathematical computations.t has powerful built-in programs that ensure to user for wide varity of computations.The Matlab provides easy to use graphics commands that helps to visuallize results immediately. Matlab provides tool boxes for signal processing, control theory, symbolic computation, simulations and many more.Matlab is excellent for graphics facilities where the pictures can be inserted into LATEX and word document [11]. IV. IMITATION PARAMETER In this case the extracted watermark is a visually recognizable pattern. We compare the respective result with the referenced image. The subjective measurement is reliant on expertise factor of the viwers, simulation result, programmed condition etc. A mathematical measurement is used to objective judgment of the extracting results. We defined the parallel measurement among the referenced watermarked image WM and extracted watermark image WM as: i j WM(i,j)WM(i,j) Normalized correlation (NC) = ij [WM(i,j)]
2
S.No. 1 2 3 4 5 6 7 8 9 10
Parameter Name File name with extension File Size No. of Frames Frames per second Width Height Image type Video compression Quality No. of color map entries
VI. RESULT AND ANALYSIS In this experimental study we use two video clips which are bbc.avi and apple.avi. Here we set some parameter value for both clips as mention above. We are varying the quality of referenced image from 100-20% with unit difference 20% and extract the watermarks image with the value of control parameter NC. (A) When JPEG image Quality = 100%
Finding parameter NC Value = 86.129 (B) When JPEG image Quality = 80%
Which is the cross-correlation normalized by the reference watermark energy to give unity as the peak correlation. V. PARAMETERS VALUE SETUP Parent Video Clip used for watermark insertion:TABLE I PARAMETER VALUES FOR REFERENCED SIGNAL
S.No. 1 2 3 4 5 6
Parameter Name File name with extension File Size No. of Frames Frames per second Width Height
Finding parameter NC Value = 83.216 (C) When JPEG image Quality = 60%
www.ijarcsse.com NC is linearly decreased when quality of referenced image is decreased. We can derive a formula according to simulation results as:
Normalized Correlation Quality of Referenced Image
Where Quality of Referenced image is varying from 100 to 20 with the interval of 20, it can be easy to determine by the histogram as shown below:
Quality V/s NC Value
Finding parameter NC Value = 74.876 (D) When JPEG image Quality = 40%
100 90 80 70
NC Value
Quality%
Finding parameter NC Value = 56.601 (E) When JPEG image Quality = 20%
VII. CONCLUSION The results of our simulations are analysed and discussed in this section. Our study provides an optimal result which is fully based on simulation and analysis. The results are analysed and discussed in case of varying quality of referenced image and respectively we determine value of control parameter Normalized Correlation of extracted image. The purpose of this experimental study is to measure the quality of embed watermarks in video signals and to hide confidential data over it without any change and loss of data. ACKNOWLEDGMENT The authors are thankful to the JaganNath Gupta Institute of Engineering and Technology, Rajasthan, India for providing research facilities and their faculty for being the constant source of inspiration. The authors would like to thank Department of Electronics and Communication, Bhagwant University, Ajmer, and BIT, Bhagwantpuram, Muzaffarnagar, UP, India for his valuable support during the preparation of this paper. REFERENCES
100 90 80 70
NC Value
Quality V/s NC Quality V/s NC Value, 100, 86.129 Quality V/s NCValue, 80, 83.216 Value, 60, 74.876 Quality V/s NC Value, 40, 56.601
60 50 40 30 20 10 20 40
60
80
100
[1]
Quality%
Using the DCT Techniques with setup of parameters values, we are varying the quality of referenced image from 100-20% [3] and find out the value of control parameter NC. We are getting NC values based on formula and examine that value of
A Video Watermarking Algorithm Based on the Human Visual System Properties Ji-Young Moon and Yo-Sung Ho Samsung Electronics Co., Paldal-gu, Suwon-si, Gyenggi-do,Korea Kwangju Instituteof Scienceand Technology(K-ST) Kwangju,500-712,Korea. An Efficient Digital Image-in-Image Watermarking Algorithm Using the Integer Discrete Cosine Transform (IntDCT) . J. Zhang, Anthony T. S. Ho ICICS-PCM 2003 15-18 December 2003 Singapore IEEE 2003 C. Cachin, An Information-Theoretic Model for Steganography, Proceedings of 2nd Workshop on information Hiding, MIT Laboratory for Computer Science, May 1998
www.ijarcsse.com published national and International papers in India and abroad. Ravindra Prakash Gupta S/o Mr. S.P. Gupta was born on 27-10-1973. He completed his B. Tech Degree in Electronics and Communication Engineering from Marathwada University, Aurangabad in year 1998 and Master Degree in Electronic and Communication from Malviya National Institute of Technology, Jaipur, India in year 2004. Presently he is a research scholar of Bhagwant University, Ajmer, India. His area of interests includes Signal Processing, Digital Communication, Wireless Communication, Wireless Sensor Networks and Design of Computer Network. He is presently working as Associate Professor in Electronic and Communication Department in Jaipur National University, Jaipur. He has more than 13 years Academic/Research experience. He has worked with the prestigious Military College of Telecommunication Engineering, Mhow, Indore, India. He is a Life-Member of Indian Society of Technical Education (ISTE), New Delhi, The Institution of Electronics and Telecommunication Engineers (IETE), New Delhi and Member of International Association of Engineers (IAENG). He has guided several projects and dissertations in B. Tech and M. Tech courses. He had published International papers in India and abroad.
[5]
[6]
[7]
[8]
[9] [10]
[11]
Amit Maharshi S/o Mr. M.M. Sharma was born on 18-041986. He completed his Bachelor of Engineering in Electronic Instrumentation and Control Engineering from Rajasthan University, India in 2007. His area of interests lies in the field of Control simulator, Image processing, Embedded System, Real time system Transformation of signals and many other areas. He is working as an Assistant Professor in EIC Department of JNIT College, Jaipur. He has four years Academic/Research experience. He is a Member of International Association of Computer science and Information technology and International Association of Engineers. He had published national and International papers in India and abroad. Vijay Mohan Shrimal S/o Mr. M.L. Shrimal was born on 31-12-1983. He completed his Bachelor of Engineering in Computer Science from Rajasthan University, India in 2007. His area of interests lies in the field of Network Simulator, Operating System, Image Compression, Embedded System, Computer Architecture and Principles of Programming Languages and many other areas. He is working as an Assistant Professor in CSE/IT Department of JNIT College, Jaipur. He has four years Academic/Research experience. He is a Member of Computer Science of Teachers Association Collaborate with Association of Computing Machinery, International Association of Computer science and Information technology and International Association of Engineers. He has guided several projects in B. Tech. He had