DEVELOPMENT OF AN ALGORITHM FOR EMBEDDING AND EXTRACTING DIGITAL WATERMARKS FOR VIDEO FILES OF THE AVI FORMAT

Author(s):  
Sof'ya A. Serebryakova ◽  
◽  
Mikhail V. Filippov ◽  

Nowadays authors of cinematographic works are often faced to protect copyright need. One way to resolve such an issue is to use digital watermarks. Digital watermarks are some kind of encrypted message that allows distinguishing the original work from its forgery. At the same time the audio or video file with a built-in message looks no different from a file without a digital watermark, what is a key advantage of its use and at the same time it makes difficult to playback the file illegally. A set of methods for undetectable hiding some bit sequences in others is called digital steganography. An important advantage of steganography over cryptographic methods is the hiding the fact of embedding a code message. Embedding digital watermarks by using the least significant bit method allows embedding a digital watermark in such a way that a person will not notice any changes in the video file. The article considers the known methods of embedding digital watermarks and the structure of the AVI file format. It presents an algorithm for embedding and extracting digital watermarks for AVI video files based on LSB method with using hash-function. The algorithm provides a counteraction to the spread of counterfeit products.

Author(s):  
Pinky Saikia Dutta ◽  
Sauvik Chakraborty

Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which to protect data. Steganography techniques can be applied to images, a video file or an audio file. Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal. Whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned both with concealing the fact that a secret message is being sent and its contents. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol.


2019 ◽  
Vol 14 (6) ◽  
pp. 1999-2006
Author(s):  
Wessam Lahmod Nados ◽  
Nada A. Rasheed

2021 ◽  
Author(s):  
Venkatesh S ◽  
Saravanakumar R ◽  
SureshKumar M ◽  
sivakumar B ◽  
veeramakali T

Abstract Some technologies are technologically advanced to provide security from illegal copying. Two complementary methods are encryption and watermarking. Encryption safeguards the information throughout the communication from the sender to the receiver. The data might present a distorted image after receipt and subsequent decryption. Watermarking complements encryption through embedding data openly into the image. Therefore, the watermark continuously remains existing in the data. A digital watermark is a category of indication secretly entrenched in a noise-tolerant signal similar to audio or else image information. It is indeed applied to distinguish copyright possession of such signal. Computer-aided hiding of the given digitized information in a carrier is known as watermarking. Digital watermarks possibly will be employed to validate the authenticity or integrity of a carrier signal or to determine source uniqueness. It is evidently applied for determining copyright contraventions and aimed at banknote verification. Analogous to traditional watermarks, digital watermarks are unique only beneath certain conditions. Once a digital watermark varies a carrier in a manner that it turns out to be noticeable, formerly it is of no use. The media will be visible by traditional watermarks (similar to images or else video) but the signal might be pictures, video, audio, texts or 3D models in digital watermarking. A signal can transmit some different watermarks at the equivalent time. Image watermarking is achieved in this study using two methods known as Hidden Markov Tree–Contourlet Wavelet Transform (HMT-CWT) and Haar wavelet transform – Discrete Fourier transform (HWT-DFT). In the next HWT-DFT method, a video is given as an input and it is split into two halves (audio and image). The audio is de-watermarked through Spectral Centroid Wavelet Transform and enhanced by utilizing Firefly procedure. The images is handled through HWT in addition to DFT. Then the output watermarked images and audio combined together to form a watermarked video. The obtained video is de-watermarked to produce the original copy of the video. The process of getting back the original copy by removing the watermark from the video is called as de-watermarking.


2020 ◽  
Vol 24 (2) ◽  
pp. 136-152
Author(s):  
O. O. Shumskaya ◽  
A. О. Iskhakova

Purpose of research. The article is devoted to the issue of ensuring the safe transmission of control signals between the elements of a multi-agent robotic system. The purpose of the work is to provide hidden data transmission with the possibility of unambiguous extraction of control signals.Methods. To solve the task set, an algorithm based on the methods of digital watermarks and digital steganography was proposed. The method of forming a digital watermark in the form of a ring with symmetry allows not only ensuring maximum imperceptibility of embedding (insignificant distortion of the container during concealment), but also to protect the transmitted signal from such complex distortions as image rotation. The steganographic concealment method allows regulating the intensity of embedding using the force factor; it is computationally simple and straightforward. The proposed approach to identifying and understanding the transmitted signal differs from modern methods of cryptography and steganalysis in that it does not require 100% correct signal extraction. After several modifications, the method allows minimizing the time spent on formation (adaptive width of the ring with signal bits) and embedding of a digital watermark (minimization of the processed area of the container for embedding).Results. The proposed approach makes it possible to transmit control signals in a hidden way within the framework of the transmission of digital objects; the conducted experiments have shown that the control signal is unambiguously understood even with such distortions as a decrease or increase in contrast or brightness, image rotation, and compression.Conclusion. Application of the proposed technique for transmitting control signals in a multi-agent robotic system will male it possible to receive the necessary information timely and safe, with a minimum probability of loss.


2021 ◽  
Vol 6 (4) ◽  
pp. 54
Author(s):  
Bako Zawali ◽  
Richard A. Ikuesan ◽  
Victor R. Kebande ◽  
Steven Furnell ◽  
Arafat A-Dhaqm

Complexity and sophistication among multimedia-based tools have made it easy for perpetrators to conduct digital crimes such as counterfeiting, modification, and alteration without being detected. It may not be easy to verify the integrity of video content that, for example, has been manipulated digitally. To address this perennial investigative challenge, this paper proposes the integration of a forensically sound push button forensic modality (PBFM) model for the investigation of the MP4 video file format as a step towards automated video forensic investigation. An open-source multimedia forensic tool was developed based on the proposed PBFM model. A comprehensive evaluation of the efficiency of the tool against file alteration showed that the tool was capable of identifying falsified files, which satisfied the underlying assertion of the PBFM model. Furthermore, the outcome can be used as a complementary process for enhancing the evidence admissibility of MP4 video for forensic investigation.


2019 ◽  
Vol 29 (1) ◽  
pp. 1216-1225 ◽  
Author(s):  
Zeyad Safaa Younus ◽  
Ghada Thanoon Younus

Abstract This paper aims to propose a method for data hiding in video by utilizing the least significant bit (LSB) method and improving it by utilizing the knight tour algorithm for concealing the data inside the AVI video file and using a key function encryption method for encrypting the secret message. First, the secret message is encrypted by utilizing a mathematical equation. The key used in the equation is a set of random numbers. These numbers differ in each implementation to warrant the safety of the hidden message and to increase the security of the secret message. Then, the cover video was converted from a set of frames into separated images to take the advantage of the large size of video file. Afterward, the knight tour algorithm is utilized for random selecting of the pixels inside the frame utilized for embedding the secret message inside it to overcome the shortcoming of the conventional LSB method that utilized the serial selection of pixel and to increase the robustness and security of the proposed method. Afterward, the encrypted secret message is embedded inside the selected pixels by utilizing the LSB method in bits (7 and 8). The observational results have drawn that the proposed method has a superior performance compared to the previous steganography method in terms of quality by a high PSNR of 67.3638 dB and the lowest MSE of 0.2578. Furthermore, this method preserves the security where the secret message cannot be drawn out without knowing the decoding rules.


2019 ◽  
Vol 5 (3) ◽  
pp. 75-85
Author(s):  
V. Korzhik ◽  
D. Flaksman

In this paper it is presented Digital Watermark System for color images. The main feature of this system is an ability to extract digital watermarks even after printing and following scanning of watermarked images. There is a description of algorithms for embedding and extracting of additional information. These methods are based on the usage of spread-spectrum signals in the frequency domain. Furthermore, there is described algorithms of distortion correction after printing out and following scanning the paper copies of digital data. The results of the experimental research on evaluation of a possible embedding volume and the reliability after extraction of the embedded data are also presented.


Author(s):  
Samir Bandyopadhyay ◽  
Payal Bose ◽  
Vishal Goyel

In today’s digital media data communication over the internet increasing day by day. Therefore the data security becomes the most important issue over the internet. With the increase of data transmission, the number of intruders also increases. That’s the reason it is needed to transmit the data over the internet very securely. Steganography is a popular method in this field. This method hides the secret data with a cover medium in a way so that the intruders cannot predict the existence of the data. Here a steganography method is proposed which uses a video file as a cover medium. This method has five main steps. First, convert the video file into video frames. Then a particular frame is selected for embedded the secret data. Second, the Least Significant Bit (LSB) Coding technique is used with the double key security technique. Third, an 8 characters password verification process. Fourth, reverse the encrypted video. Fifth, signature verification process to verify the encryption and decryption process. These five steps are followed by both the encrypting and decrypting processes.


2012 ◽  
Vol 6 (1) ◽  
pp. 8
Author(s):  
Khalid Ahmed Ibrahim ◽  
G.K. Viju

Factors like Secrecy, Authentication, Non-repudiation and Integrity are considered in dealing with security. Watermarking is one such security measure. Watermarking technology generally permits authors to hide their names in the image behind their original work. In this proposed work, a segment based model is developed wherein the original image is partitioned into various segments and the information is made confidential. At the receiver’s end the segments are combined to obtain the original image and the secret information. The model facilitates both watermark embedding and extraction. Besides copyright protection, authentication, security, digital watermarks can also serve as invisible labels and content links.


Sign in / Sign up

Export Citation Format

Share Document