0% found this document useful (0 votes)
93 views4 pages

Simulation Based Watermarking For Confidential Data Security For Video Signal

The purpose of this experimental study is to measure the quality of embed watermarks in video signals and to hide confidential data over it without any change and loss of data.

Uploaded by

editor_ijarcsse
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views4 pages

Simulation Based Watermarking For Confidential Data Security For Video Signal

The purpose of this experimental study is to measure the quality of embed watermarks in video signals and to hide confidential data over it without any change and loss of data.

Uploaded by

editor_ijarcsse
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Volume 2, Issue 1, January 2012

ISSN: 2277 128X

International Journal of Advanced Research in Computer Science and Software Engineering


Research Paper Available online at: www.ijarcsse.com

Simulation Based Watermarking for Confidential Data Security for Video Signal
Amit Maharshi* Ravindra Prakash Gupta

Assistant Professor
Department of Electronic Instrumentation and Control Engineering JaganNath Gupta Institute of Engineering and Technology

Research Scholar
Department of E. C.E. Bhagwant University

Jaipur, Rajasthan, India Vijay Mohan Shrimal

Ajmer, Rajasthan, India

Assistant Professor
Department t of Computer Science and Engineering JaganNath Gupta Institute of Engineering and Technology

Jaipur, Rajasthan, India

Abstract-There are several protocols and embedding techniques which are used to hide data digitally for an object in highly sophisticated environment. These protocols and technique must fulfil a number of requirements correctly applied for steganography. The purpose of this experimental study is to measure the quality of embed watermarks in video signals and to hide confidential data over it without any change and loss of data. The main focus of this paper is that we use two video clips which are bbc.avi and apple.avi. Here we set some parameter value for both clips as mention above. We are varying the quality of referenced image from 100-20% with unit difference 20% and extract the watermarks image with the value of control parameter NC. Keywords Discrete Cosine Transform, Watermarking, Steganography, Matlab.

I. INTRODUCTION The stego object must be correct, clear and well defined whenever the hidden information will be integrated over the original image. The hidden massage must not change in any case (e.g. add addition information in stego object, loss of info) [8].If the hidden information is changed during steganography process, the whole process would be failed [1]. There are two most techniques used to ensure data confidentially as steganography and Encryption. The main difference between both of them that steganography hides the existence of secrete massage while in encryption any body can see it [8]. In present world the secrete data which would be in picture or in video format can be used for watermarking for communicate or transfer secrete data between two medium [4]. In this paper we use DCT as a technique to implement digital watermarking in a video by embedding secure image into an original video [1]. There are many techniques for transformation of image in digitalized form which is FFT, DFT, and DCT and so on. But DCT is one of the best techniques for transformation of data. In this paper we describe in Section I Introduction Section II Discrete Cosine Transform Section III Simulation Tool Section IV Imitation Parameters Section V Parameters Value

Setup Section VI Results and Analysis and section VII Conclusion. II. DISCRETE COSINE TRANSFORM (DCT) The DCT algorithm is one of the main component of the JPEG compression technique and to ensure data hiding .The DCT allows an image to be broken up into different frequency bands, and making it which easier to embed watermarking information into the middle frequency bands of an image [10]. Transform coding is specifically used to constitute the integral component of image/video processing. Transform coding works on the condition that pixels in an image inherit with their neighbouring pixels in an image inherit with their neighbouring pixels at a certain level of correlation. A video transmission system similarly uses high correlation between adjacent pixels in consecutive frames [10]. These correlations can be splitted to enhance the value of pixel from its respective neighbours [8]. The two dimensional DCT is process of JPEG to convert between the special domain and the frequency domain. The JPEG compression algorithm is used to divide an image into 8x8 blocks of pixels and DCT is applied separately to each block [7]. The DCT is a type of singular transform which can be used to transform data into a sum of cosine transform.

Volume 2, issue 1, January 2012


7 8 9 10 Image type Video compression Quality No. of color map entries

www.ijarcsse.com
Indexed none Non-zero 256

Inserted Video Clip as Watermark:TABLE II PARAMETER VALUES FOR HIDDEN IMAGE

III. SIMULATION TOOL Matlab is used for technical computing as a high performance language. It has capability for integrates computation, programming eenvironment and visualization.It has also sophesticated data structures modern programming language environment debugging tools and supporting objectoriented programming [9].These all tools make Matlab as an excellent tool for mathematical computations.t has powerful built-in programs that ensure to user for wide varity of computations.The Matlab provides easy to use graphics commands that helps to visuallize results immediately. Matlab provides tool boxes for signal processing, control theory, symbolic computation, simulations and many more.Matlab is excellent for graphics facilities where the pictures can be inserted into LATEX and word document [11]. IV. IMITATION PARAMETER In this case the extracted watermark is a visually recognizable pattern. We compare the respective result with the referenced image. The subjective measurement is reliant on expertise factor of the viwers, simulation result, programmed condition etc. A mathematical measurement is used to objective judgment of the extracting results. We defined the parallel measurement among the referenced watermarked image WM and extracted watermark image WM as: i j WM(i,j)WM(i,j) Normalized correlation (NC) = ij [WM(i,j)]
2

S.No. 1 2 3 4 5 6 7 8 9 10

Parameter Name File name with extension File Size No. of Frames Frames per second Width Height Image type Video compression Quality No. of color map entries

Parameter Value apple.avi 2354202 300 1 64 64 Indexed none Non-zero 256

VI. RESULT AND ANALYSIS In this experimental study we use two video clips which are bbc.avi and apple.avi. Here we set some parameter value for both clips as mention above. We are varying the quality of referenced image from 100-20% with unit difference 20% and extract the watermarks image with the value of control parameter NC. (A) When JPEG image Quality = 100%

Fig. 1 referenced video

Fig. 1.1 Extracted

Finding parameter NC Value = 86.129 (B) When JPEG image Quality = 80%

Which is the cross-correlation normalized by the reference watermark energy to give unity as the peak correlation. V. PARAMETERS VALUE SETUP Parent Video Clip used for watermark insertion:TABLE I PARAMETER VALUES FOR REFERENCED SIGNAL

S.No. 1 2 3 4 5 6

Parameter Name File name with extension File Size No. of Frames Frames per second Width Height

Parameter Value bbc.avi 9215336 300 30 160 154

Fig. 2 Referenced Image

Fig. 2.1 Extracted Image

Finding parameter NC Value = 83.216 (C) When JPEG image Quality = 60%

2012, IJARCSSE All Rights Reserved

Volume 2, issue 1, January 2012

www.ijarcsse.com NC is linearly decreased when quality of referenced image is decreased. We can derive a formula according to simulation results as:
Normalized Correlation Quality of Referenced Image

Fig. 3 Referenced Image

Fig. 3.1 Extracted Image

Where Quality of Referenced image is varying from 100 to 20 with the interval of 20, it can be easy to determine by the histogram as shown below:
Quality V/s NC Value

Finding parameter NC Value = 74.876 (D) When JPEG image Quality = 40%
100 90 80 70

NC Value

60 50 40 30 20 10 100 86.129 80 83.216 60 74.876 40 56.601 20 29.722

Fig. 4 Referenced Image

Fig. 4.1 Extracted Image

Quality V/s NC Value

Quality%

Finding parameter NC Value = 56.601 (E) When JPEG image Quality = 20%

Fig. 7 Histogram of Quality V/S NC Values

Fig. 5 Referenced Image

Fig. 5.1 Extracted Image

VII. CONCLUSION The results of our simulations are analysed and discussed in this section. Our study provides an optimal result which is fully based on simulation and analysis. The results are analysed and discussed in case of varying quality of referenced image and respectively we determine value of control parameter Normalized Correlation of extracted image. The purpose of this experimental study is to measure the quality of embed watermarks in video signals and to hide confidential data over it without any change and loss of data. ACKNOWLEDGMENT The authors are thankful to the JaganNath Gupta Institute of Engineering and Technology, Rajasthan, India for providing research facilities and their faculty for being the constant source of inspiration. The authors would like to thank Department of Electronics and Communication, Bhagwant University, Ajmer, and BIT, Bhagwantpuram, Muzaffarnagar, UP, India for his valuable support during the preparation of this paper. REFERENCES

Finding parameter NC Value = 29.722


Quality V/s NC Value

100 90 80 70
NC Value

Quality V/s NC Quality V/s NC Value, 100, 86.129 Quality V/s NCValue, 80, 83.216 Value, 60, 74.876 Quality V/s NC Value, 40, 56.601

60 50 40 30 20 10 20 40

Quality V/s NC Value, 20, 29.722

60

80

100

[1]

Quality%

Fig. 6 Quality V/S Control parameter NC [2]

Using the DCT Techniques with setup of parameters values, we are varying the quality of referenced image from 100-20% [3] and find out the value of control parameter NC. We are getting NC values based on formula and examine that value of

A Video Watermarking Algorithm Based on the Human Visual System Properties Ji-Young Moon and Yo-Sung Ho Samsung Electronics Co., Paldal-gu, Suwon-si, Gyenggi-do,Korea Kwangju Instituteof Scienceand Technology(K-ST) Kwangju,500-712,Korea. An Efficient Digital Image-in-Image Watermarking Algorithm Using the Integer Discrete Cosine Transform (IntDCT) . J. Zhang, Anthony T. S. Ho ICICS-PCM 2003 15-18 December 2003 Singapore IEEE 2003 C. Cachin, An Information-Theoretic Model for Steganography, Proceedings of 2nd Workshop on information Hiding, MIT Laboratory for Computer Science, May 1998

2012, IJARCSSE All Rights Reserved

Volume 2, issue 1, January 2012


[4] M. D. Swanson, B. Zhu and A. H. Tewfik, Robust Data Hiding for Image, IEEE Digital Signal Processing Workshop, pp. 37-40, Department of Electrical Engineering, University of Minnesota, http://www.assuredigit.com/tech_doc/more/Swanson_dsp96_robust_da tahiding.pdf, September 1999 Voloshynovskiy Sviatolsav, Joachim J. and Su Jonathan K., Attacks on Digital Watermarks: Classification, Estimation-Based Attacks, and Benchmarks Proceedings of IEEE Communications Magazine, vol. , 39, pages 118--126, August 2001. C. I. Podilchuk and W. Zeng, Image-adaptive watermarking using visual models, IEEE J. Select. Areas Common. vol. 16, pp. 525 539, May 1998. An efficient watermark embedding technique Ahmed A. Ab delwahab, E.M. Saad , Nessrin I. Yassin NRSC (2005) March 15-17, 2005 cairo Egypt Steganography and digital watermarking Jonathan Cummins ,Patrick Diskin, Samuel Lau and Robert Parlett, School of computer science, The University of Birmingham. DCT based Digital video Watermarking using HVS properties. David Houcque,Introduction to MATLAB for Engineering Students,northwestern university, version 1.2, August 2005 Anibal J.S. Ferreira. An odd-DFT based approach to time-scale expansion of audio signals. IEEE Trans. Speech and audio Proc., 7(4):441-453, 1999. K. R. Coombes, B. R. Hunt, R. L. Lipsman, J. E. Osborn, and G. J. Stuck. Differential Equations with MATLAB, John Wiley and Sons, 2000

www.ijarcsse.com published national and International papers in India and abroad. Ravindra Prakash Gupta S/o Mr. S.P. Gupta was born on 27-10-1973. He completed his B. Tech Degree in Electronics and Communication Engineering from Marathwada University, Aurangabad in year 1998 and Master Degree in Electronic and Communication from Malviya National Institute of Technology, Jaipur, India in year 2004. Presently he is a research scholar of Bhagwant University, Ajmer, India. His area of interests includes Signal Processing, Digital Communication, Wireless Communication, Wireless Sensor Networks and Design of Computer Network. He is presently working as Associate Professor in Electronic and Communication Department in Jaipur National University, Jaipur. He has more than 13 years Academic/Research experience. He has worked with the prestigious Military College of Telecommunication Engineering, Mhow, Indore, India. He is a Life-Member of Indian Society of Technical Education (ISTE), New Delhi, The Institution of Electronics and Telecommunication Engineers (IETE), New Delhi and Member of International Association of Engineers (IAENG). He has guided several projects and dissertations in B. Tech and M. Tech courses. He had published International papers in India and abroad.

[5]

[6]

[7]

[8]

[9] [10]

[11]

Amit Maharshi S/o Mr. M.M. Sharma was born on 18-041986. He completed his Bachelor of Engineering in Electronic Instrumentation and Control Engineering from Rajasthan University, India in 2007. His area of interests lies in the field of Control simulator, Image processing, Embedded System, Real time system Transformation of signals and many other areas. He is working as an Assistant Professor in EIC Department of JNIT College, Jaipur. He has four years Academic/Research experience. He is a Member of International Association of Computer science and Information technology and International Association of Engineers. He had published national and International papers in India and abroad. Vijay Mohan Shrimal S/o Mr. M.L. Shrimal was born on 31-12-1983. He completed his Bachelor of Engineering in Computer Science from Rajasthan University, India in 2007. His area of interests lies in the field of Network Simulator, Operating System, Image Compression, Embedded System, Computer Architecture and Principles of Programming Languages and many other areas. He is working as an Assistant Professor in CSE/IT Department of JNIT College, Jaipur. He has four years Academic/Research experience. He is a Member of Computer Science of Teachers Association Collaborate with Association of Computing Machinery, International Association of Computer science and Information technology and International Association of Engineers. He has guided several projects in B. Tech. He had

2012, IJARCSSE All Rights Reserved

You might also like