DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A0454 08L31A0456 08L31A0475 08L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

A Graduate Course on Multimedia Technology 3. Multimedia Communication © Wolfgang Effelsberg Media Scaling and Media Filtering Definition of.
Data Compression CS 147 Minh Nguyen.
Time-Frequency Analysis Analyzing sounds as a sequence of frames
A Matlab Playground for JPEG Andy Pekarske Nikolay Kolev.
School of Computing Science Simon Fraser University
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
CMPT 365 Multimedia Systems
Guilford County SciVis V106.01
V Obtained from a Guildford County workshop-Summer, 2014.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Steganography detection Roland Cmorik, Martin Šumák.
Compression is the reduction in size of data in order to save space or transmission time. And its used just about everywhere. All the images you get on.
Steganography.
Knowledge Base approach for spoken digit recognition Vijetha Periyavaram.
CSCI-235 Micro-Computers in Science Hardware Part II.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
DIGITAL Video. Video Creation Video captures the real world therefore video cannot be created in the same sense that images can be created video must.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Chapter 7 – End-to-End Data Two main topics Presentation formatting Compression We will go over the main issues in presentation formatting, but not much.
Addressing Image Compression Techniques on current Internet Technologies By: Eduardo J. Moreira & Onyeka Ezenwoye CIS-6931 Term Paper.
Digital Image Processing Image Compression
An introduction to audio/video compression Dr. Malcolm Wilson.
Video Data Hiding using Forbidden Zone and Selective Embedding Submitted Under Team Members.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Marwan Al-Namari 1 Digital Representations. Bits and Bytes Devices can only be in one of two states 0 or 1, yes or no, on or off, … Bit: a unit of data.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
COMP135/COMP535 Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 2 Lecture 2 – Digital Representations.
Cryptographic Anonymity Project Alan Le
3-D WAVELET BASED VIDEO CODER By Nazia Assad Vyshali S.Kumar Supervisor Dr. Rajeev Srivastava.
Presenter : r 余芝融 1 EE lab.530. Overview  Introduction to image compression  Wavelet transform concepts  Subband Coding  Haar Wavelet  Embedded.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
IS502:M ULTIMEDIA D ESIGN FOR I NFORMATION S YSTEM M ULTIMEDIA OF D ATA C OMPRESSION Presenter Name: Mahmood A.Moneim Supervised By: Prof. Hesham A.Hefny.
Networks Standardisation & Protocols. Learning Objectives Explain the advantages of standardisation and describe some areas of standardisation such as.
Submitted To-: Submitted By-: Mrs.Sushma Rani (HOD) Aashish Kr. Goyal (IT-7th) Deepak Soni (IT-8 th )
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Digital Steganography
WAVELET VIDEO PROCESSING TECHNOLOGY
CS644 Advanced Topics in Networking
Data Compression.
Welcome
DONE BY S.MURALIRAJAN M.NIRMAL
Data Compression.
Increasing Watermarking Robustness using Turbo Codes
A Data Hiding Scheme Based Upon Block Truncation Coding
Image Transforms for Robust Coding
Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.
Presentation transcript:

DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA

CONTENTES Aim of the project Aim of the project Basic definitions Basic definitions Digital video scrambling Digital video scrambling Transformation techniques Transformation techniques LSB technique LSB technique Flow chart representation of the project Flow chart representation of the project Technology & Tools Technology & Tools Results Results Merits & Application Merits & Application Future Scope Future Scope Conclusion Conclusion References References

AIM OF THE PROJECT In broadcast service operators would like the viewing of sufficiently corrupted VIDEO/IMAGE on the screen of the unauthorized viewer to allure potential customers without sacrificing the level of robustness provided by digital encryption techniques. In broadcast service operators would like the viewing of sufficiently corrupted VIDEO/IMAGE on the screen of the unauthorized viewer to allure potential customers without sacrificing the level of robustness provided by digital encryption techniques.

BASIC DEFINITONS BASIC DEFINITONS Video: The sequence of frames put together one after another is a video sequence. Scrambling : The in order sequence of an image content. Data Embedding : In this project data which is to be transmitted with high security is embedded into the scrambled digital video, such that its presence will not be known out side. Here the data is hidden in such a way that the original video will not be degraded.

In this project we can mainly use 3 techniques. In this project we can mainly use 3 techniques. 1.Video scrambling technique: The process of corrupting a video in a particular order is called as video scrambling. 1.Video scrambling technique: The process of corrupting a video in a particular order is called as video scrambling. 2.Transformation technique: Conversion of one form of data into another form. 2.Transformation technique: Conversion of one form of data into another form. 3. LSB technique: Stands for least significant bit technique. It is the one of the data embedding technique. 3. LSB technique: Stands for least significant bit technique. It is the one of the data embedding technique.

1.VIDEO SCRAMBLING TECHNIQUE : 1.VIDEO SCRAMBLING TECHNIQUE : Video scrambling or video encryption is an extremely useful method for the stopping unwanted interception and viewing of any transmitted video or other information. Video scrambling or video encryption is an extremely useful method for the stopping unwanted interception and viewing of any transmitted video or other information. Steps in digital video scrambling are Steps in digital video scrambling are Digital video and its formats Digital video and its formats Frame conversion Frame conversion Frame to image conversion Frame to image conversion Scrambling of each image Scrambling of each image

2.TRANSFORMATION TECHNIQUE : Transformation : one form of data is converted into another form. Transformation : one form of data is converted into another form. Need for Transformation : Need for Transformation : To analyze the image. To analyze the image. To know the frequency contents that exists in the To know the frequency contents that exists in the image. image. To detailed information of the image. To detailed information of the image.

TYPES OF TRANSFORMATION TECHNIQUES: Fourier Transform Fourier Transform Short term Fourier Transform Short term Fourier Transform Wavelet Transform. Wavelet Transform. WAVELET TRANSFORM : WAVELET TRANSFORM : A wavelet is a wave form of effectively limited duration that has an average value of zero A wavelet is a wave form of effectively limited duration that has an average value of zero

PLOT OF FOURIER & WAVELET : Fourier coefficients gives a flat spectrum with two peaks respectively. Fourier coefficients gives a flat spectrum with two peaks respectively. Wavelet coefficients clearly shows the exact location in time of the discontinues. Wavelet coefficients clearly shows the exact location in time of the discontinues.

WAVELETS ARE TWO TYPES : CWT(Continuous wavelet transformations ) CWT(Continuous wavelet transformations ) DWT(Discrete wavelet transformations ) DWT(Discrete wavelet transformations ) DWT : DWT gives the complete description of the image DWT gives the complete description of the image by using three level decomposition. by using three level decomposition. [A,H,V,D] = dwt2(I, ’haar’); stores high intensity (approximate ) values. A= stores high intensity (approximate ) values. stores horizontal,vertical, diagonal h, v, d = stores horizontal,vertical, diagonal (low intensity)values (low intensity)values basic filter. Haar = basic filter.

Advantages of Wavelet transforms over other transforms : The wavelet transform is a multi-resolution description of an VIDEO/IMAGE The wavelet transform is a multi-resolution description of an VIDEO/IMAGE The wavelet transform is closer to the human visual system than the DCT. The wavelet transform is closer to the human visual system than the DCT. The wavelet transform generates a data structure known as scale-space representation. The wavelet transform generates a data structure known as scale-space representation. The spatial resolution of the wavelet transforms increases with frequency. The spatial resolution of the wavelet transforms increases with frequency.

3.LSB METHOD FOR DATA HIDING : LSB insertion is a common simple approach to embedding information in a image LSB insertion is a common simple approach to embedding information in a image But it is vulnerable to even slight image manipulation. But it is vulnerable to even slight image manipulation. Converting image from a format like GIF or BMP Converting image from a format like GIF or BMP to JPEG and back could destroy the information to JPEG and back could destroy the information hidden in LSBs. hidden in LSBs.

LSB WORKING RULE : LSB WORKING RULE : Taking advantage of the way the human eye perceives images, this technique involves replacing the N least significant bits of each pixel of a container image with the data of a hidden message. Taking advantage of the way the human eye perceives images, this technique involves replacing the N least significant bits of each pixel of a container image with the data of a hidden message. Example: Consider 1 pixel of an 8 bit grayscale Image Example: Consider 1 pixel of an 8 bit grayscale Image E.g.. gray level intensity E.g.. gray level intensity 156 = = Hide data at say N= Hide data at say N= New value = 159 New value = 159

The famous ‘Lena’ image.(8 bit grayscale) “We can not see “We can not see difference” difference” ’Lena’ with 2 bits replaced using LSB

FLOW CHART INPUT VIDEO VIDEO FRAME CONVERSION FRAME TO IMAGE CONVERSION IMAGE SCRAMBLLING DECOMPOSITION OF A SCRAMBLED IMAGE EMBEDDING TEXT INTO IMAGE ENCODING (HUFFMAN) ENCODE THE TEXT DATA READ THE CHARACTERS INPUT TEXT ENCODING: SCRAMBLING TRANSFORMATION LSB TECHNIQUE

DECODING : DECODING (HUFFMAN)) EXTRACTING TEXT & IMAGE OUTPUT TEXT IMAGE TO FRAME CONVERSION VIDEO FORMATION OUTPUT VIDEO DECODING OF SCRAMBLED IMAGE

We can use MAT Lab to develop this project because, ADVANTAGES OF MATLAB :  MATLAB is a high performance language for technical computing  Math and computation  Algorithm development  Data acquisition  Data analysis,exploration ands visualization  Scientific and engineering graphics TECHNOLOGY & TOOLS TECHNOLOGY & TOOLS

MATLAB MATLAB Programming language User written / Built in functions Graphics 2-D graphics 3-D graphics Color and lighting Animation Computation Linear algebra Signal processing Quadrature Etc External interface Interface with C and FORTRAN Programs Tool boxes 1.Signal processing 2.Image processing 3.Control systems 4.Neural Networks 5.Communications 6.Robust control 7.Statistics

Graphical User Interface Browsing Input AVI VIDEO RESULTS

Frame Separation and Scrambling Data Embedding Process

Data Retrieval Process Output Video

MERITS & APPLICATIONS  Confidential communication and secret data storing.  Protection of data alteration.  Used in military for secret communication.  Data hiding over authorized web pages DISADVANTAGES:  Only small amount of data is effectively transmitted  LSB technique is not efficient for large data

 To gain more security over this project, the text message will also be scrambled together with the video.  Both the scrambled text and video are embedded and transmitted for higher securities. FUTURE SCOPE

 The embedding of the randomized data into the scrambled VIDEO, will not effect the retrieval of original video.  A data embedding technique for sending data within an AVI transparent scrambled VIDEO system was designed and tested successfully. CONCLUSION

REFERENCES BOOKS: BOOKS: Communication systems 4 th Edition by SIMON HAYKIN Communication systems 4 th Edition by SIMON HAYKIN Digital image/VIDEO/IMAGE processing by Gonzalez Digital image/VIDEO/IMAGE processing by Gonzalez Digital signal processing by Prokis Digital signal processing by Prokis REFERENCES(JOURNALS): REFERENCES(JOURNALS): ISO/IEC 13818:1996, “Coding of Moving Pictures and Associated Audio (AVI-2); Part 1: Systems, Part 2: VIDEO/IMAGE”. ISO/IEC 13818:1996, “Coding of Moving Pictures and Associated Audio (AVI-2); Part 1: Systems, Part 2: VIDEO/IMAGE”. J.L. Mitchell, W.B. Pennebaker, C.E. Fogg, D.J. LeGall, AVI VIDEO/IMAGE Compression Standard, Chapman&Hall, 1996 J.L. Mitchell, W.B. Pennebaker, C.E. Fogg, D.J. LeGall, AVI VIDEO/IMAGE Compression Standard, Chapman&Hall, 1996 M. Pazarci, V. Dipçin, “A AVI2-Transparent Scrambling Technique”, IEEE Transactions on Consumer Electronics, Vol. 48, No. 2, May M. Pazarci, V. Dipçin, “A AVI2-Transparent Scrambling Technique”, IEEE Transactions on Consumer Electronics, Vol. 48, No. 2, May 2002.

QUERIES ???? QUERIES ????

THANK YOU THANK YOU