MPEG Video Watermarking Technologies: Techniques and Issues
#1

PRESENTED BY:
Deepak Sharma

[attachment=9278]
MPEG Video Watermarking Technologies: Techniques and Issues
Abstract

With the current growth rate of broadband networks, distribution of multimedia content over the Internet will become the norm. With such a growth the major concern for the content providers will be security. A lot of research is currently going on that combines public key cryptography, watermarking and other techniques. This report presents a brief overview of several watermarking techniques that may be used for protecting MPEG video files. It starts by presenting why watermarking is needed and then goes on to present some watermarking schemes.
1. Introduction
Current research will lead to computers with 2GHz microprocessors, 1 GB memory and over 80 GB of hard disk space available for only a few hundred dollars. Such computers will be able to connect to the Internet via a 1 GB connection. With the amazing configuration of these machines and networks, many things that are barely imaginable today will become feasible. Online movies (VoD – Video on Demand), audio streaming, games, ebooks, etc will be more efficient than what we know them today. With such technology available and multimedia content flowing across networks, a major issue will be developing secure technologies to protect the multimedia content. With the expanse of the Internet, online multimedia distribution is the fastest and cheapest way for the content providers to distribute their content. However, with the benefits of the Internet comes its lack of security. Research is now being focused on public key cryptography/watermarking schemes to protect multimedia content.
2. Watermarking
Digital watermarking is the enabling technology to prove ownership of copyrighted material, detect the originator of illegally made copies (also called fingerprinting), monitor the usage of copyrighted multimedia data and analyze the spread spectrum of the data over networks and servers [2]. In the two types of watermarking the first one is for ownership where an identical watermark is embedded into every copy of the digital content. Hence, it cannot be used to distinguish who is the user that distributed the illegal copy. In the other type of watermarking, called fingerprinting, different watermarks are embedded into different copies of the digital content. Hence it can be used to trace the illegal users. The disadvantage of this scheme is that it is quite expensive to resist colluding attacks. In order to prevent any copyright forgery, misuse or violation, the key to the copyright labeling technique (watermarking) is to provide security and robustness of the embedded label against a variety of threats that include
• Detecting embedding locations by comparing differently labeled versions of the same original material.
• Finding or altering the embedded label through visual or statistical analysis.
• “The IBM-attack”: Instead of introducing a new watermark with an own algorithm and claiming the authorship, a counterfeit original of the watermarked picture is produced by removing a watermark, thus claiming that the original of the real owner contains the watermark which we removed.
• Damaging or removing the embedded label using common multimedia processing.
MPEG compression itself performs multimedia processing like lossy compression and scaling, hence all necessary transformations on the frames may lead to a distortion of the embedded information and the owner cannot retrieve the label anymore.
3. Requirements for MPEG Video Watermarking
MPEG compression algorithms employ Discrete Cosine Transform (DCT) coding techniques on image blocks of 8x8, prediction and motion compensation. The resulting output stream contains a sequence of I-, P- and B- frames [2]. The following requirements are considered important for MPEG video watermarking:
• Robustness against high compression rates of the DCT compression, motion compensation and prediction.
• Robustness against scaling.
• Labeling of every single video frame (I-, P- and B- frames) to provide continuous watermarking and avoid attacks of cutting single frames.
• Ensuring correct decoding of the frame sequences without visual artifacts.
• Runtime performance for streaming video or stored video.
4. Watermarking Algorithms
4.1 Tamper Resistant Hardware

This scheme uses both public key encryption and symmetric key encryption. A tamper resistant hardware includes:
Sn  A unique serial number
SK_sn  Private key
PK_sn  Public key
WE_sn  Watermark embedding process
M  Multimedia file
K  Symmetric key
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: video watermarking ppt free download, mpeg video water marking technology with ppt, what is mpeg 2 video compression, mpeg video compression technique pdf, latest mpeg video compression technique, mpeg 2 video compression technique pdf, mpeg video compression matlab code download,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 6,236 15-04-2016, 08:04 PM
Last Post: knagpur
  Image Processing & Compression Techniques (Download Full Seminar Report) Computer Science Clay 42 23,610 07-10-2014, 07:57 PM
Last Post: seminar report asees
Brick Face Recognition using the Techniques Base on Principal Component Analysis (PCA) computer science crazy 3 2,968 04-03-2013, 01:21 PM
Last Post: Guest
Photo Digital Watermarking Full Seminar Report Download computer science crazy 83 55,556 06-02-2013, 12:33 PM
Last Post: Guest
  Digital Image Watermarking project report helper 3 5,752 19-12-2012, 11:48 AM
Last Post: seminar details
  FINGER-SCAN TECHNOLOGIES seminar projects crazy 1 3,378 03-12-2012, 02:36 PM
Last Post: seminar details
  A survey of usage of Data Mining and Data Warehousing in Academic Institution and Lib seminar class 1 2,201 29-11-2012, 12:56 PM
Last Post: seminar details
  Digital Video Editing computer science crazy 2 4,000 12-11-2012, 12:40 PM
Last Post: seminar details
  Eye Movement-Based Human-Computer Interaction Techniques computer girl 1 4,016 17-10-2012, 01:24 PM
Last Post: Guest
  Object tracking in video scenes computer science crazy 1 9,592 06-10-2012, 11:36 AM
Last Post: seminar details

Forum Jump: