METHOD OF DYNAMIC IMPLEMENTATION OF A ROBUST DIGITAL WATERMARK IN VIDEO DATA

Author(s):  
С.В. Морковин

В статье рассматривается модифицированный метод внедрения цифровых водяных знаков в видеоданные, заключающийся в дополнении уже известных методов новыми функциями, базирующихся на принципиальных отличиях видеопотока от статичной фотографии. The article discusses a modified method of introducing digital watermarks into video data, which consists in supplementing the already known methods with new functions based on the fundamental differences between the video stream and static photography.

2021 ◽  
Vol 2091 (1) ◽  
pp. 012053
Author(s):  
I M Azhmukhamedov ◽  
P I Tamkov ◽  
N D Svishchev ◽  
A V Rybakov

Abstract The work processes of the ORB-SLAM algorithm are presented. The results of experimental studies on temporal comparisons of the operation of the algorithm with different parameters and cameras are presented. The necessity of forming a visual odometry (VO) system as a local navigation of remote-controlled and autonomous underwater robots has been substantiated. The two most suitable odometry methods in the underwater environment are described, such as their advantages and disadvantages. The work processes of the ORB-SLAM algorithm are presented. The results of experimental studies on temporal comparisons of the operation of the algorithm with different parameters and cameras are presented. The procedure for preparing video data is described: processing a video stream, adjusting camera parameters for calibration. The experiments represent the testing of the ORB-SLAM3 algorithm on a sample of video filmed as part of the ecological monitoring of the Caspian shelf in 2020.


Author(s):  
Damian Wierzbicki ◽  
Anna Fryskowska

The issue of imagery data collection and its implementation in photogrammetric studies with the use of unmanned aerial vehicles is still valid and provides a wide field of research in the creation of new and expansion of existing solutions. It is particularly important to increase the accuracy of photogrammetric products. These days low altitude unmanned aerial vehicles are being used more and more often in photogrammetric applications. Compact digital cameras had acquired single, high-resolution imagery. Data obtained from low altitudes were often (and still are) used in mapping and 3D modelling. Due to the low costs of flights of UAV systems in comparison with traditional flights, applications of such platforms are also attractive for many remote sensing applications. However, due to the use of non-metric video cameras, one of the main problems when trying to automate the video data processing, is the video sequences’ relatively poor radiometric quality. The article addresses the issue of assessing the quality of the video imagery acquired from a low altitude UAV platform. The Authors presented quality Indicators dedicated to UAV video sequences. The method is based on the analysis of the video stream, obtained in the different weather and lighting conditions. As a result of the research, an objective quality index for video acquired from low altitudes was determined.


2021 ◽  
Author(s):  
◽  
Jeffrey Wu

<p>HADES is a mine scout robot designed to be deployed by first responders to assess mine conditions post-disaster. HADES requires the capability of wireless communication between HADES and the operators on the surface station. Post-disaster mine conditions pose significant challenges to communication systems. This thesis discusses a wireless solution using 802.11b ad-hoc radios. The system developed in this thesis, named HERMES, comprises of the node system RF electronics, internal firmware, and ROS interface to the endpoints. A node design is developed in conjunction with a 2.4 GHz radio module capable of transmitting basic video data. The wireless HERMES nodes are stacked in the HADES robot and deployed as the robot traverses the mine. These wireless nodes are operable for at least 8 hours and have a range of 80 m. The wireless network formed by HERMES allows both video data and sensor data to return to a base station outside the mine. A bespoke decimation in time compression video compression strategy is implemented which provides a basic monochrome video stream with 320 x 240 resolution. This enables video to be streamed through the HERMES network with an overall through-put of 160 kbps on the application level. This basic compression is investigated and evaluated and a video stream with a peak refresh-rate of 40 frames per second with an 800 millisecond response delay is achieved.</p>


2021 ◽  
Author(s):  
Venkatesh S ◽  
Saravanakumar R ◽  
SureshKumar M ◽  
sivakumar B ◽  
veeramakali T

Abstract Some technologies are technologically advanced to provide security from illegal copying. Two complementary methods are encryption and watermarking. Encryption safeguards the information throughout the communication from the sender to the receiver. The data might present a distorted image after receipt and subsequent decryption. Watermarking complements encryption through embedding data openly into the image. Therefore, the watermark continuously remains existing in the data. A digital watermark is a category of indication secretly entrenched in a noise-tolerant signal similar to audio or else image information. It is indeed applied to distinguish copyright possession of such signal. Computer-aided hiding of the given digitized information in a carrier is known as watermarking. Digital watermarks possibly will be employed to validate the authenticity or integrity of a carrier signal or to determine source uniqueness. It is evidently applied for determining copyright contraventions and aimed at banknote verification. Analogous to traditional watermarks, digital watermarks are unique only beneath certain conditions. Once a digital watermark varies a carrier in a manner that it turns out to be noticeable, formerly it is of no use. The media will be visible by traditional watermarks (similar to images or else video) but the signal might be pictures, video, audio, texts or 3D models in digital watermarking. A signal can transmit some different watermarks at the equivalent time. Image watermarking is achieved in this study using two methods known as Hidden Markov Tree–Contourlet Wavelet Transform (HMT-CWT) and Haar wavelet transform – Discrete Fourier transform (HWT-DFT). In the next HWT-DFT method, a video is given as an input and it is split into two halves (audio and image). The audio is de-watermarked through Spectral Centroid Wavelet Transform and enhanced by utilizing Firefly procedure. The images is handled through HWT in addition to DFT. Then the output watermarked images and audio combined together to form a watermarked video. The obtained video is de-watermarked to produce the original copy of the video. The process of getting back the original copy by removing the watermark from the video is called as de-watermarking.


2020 ◽  
Vol 24 (2) ◽  
pp. 136-152
Author(s):  
O. O. Shumskaya ◽  
A. О. Iskhakova

Purpose of research. The article is devoted to the issue of ensuring the safe transmission of control signals between the elements of a multi-agent robotic system. The purpose of the work is to provide hidden data transmission with the possibility of unambiguous extraction of control signals.Methods. To solve the task set, an algorithm based on the methods of digital watermarks and digital steganography was proposed. The method of forming a digital watermark in the form of a ring with symmetry allows not only ensuring maximum imperceptibility of embedding (insignificant distortion of the container during concealment), but also to protect the transmitted signal from such complex distortions as image rotation. The steganographic concealment method allows regulating the intensity of embedding using the force factor; it is computationally simple and straightforward. The proposed approach to identifying and understanding the transmitted signal differs from modern methods of cryptography and steganalysis in that it does not require 100% correct signal extraction. After several modifications, the method allows minimizing the time spent on formation (adaptive width of the ring with signal bits) and embedding of a digital watermark (minimization of the processed area of the container for embedding).Results. The proposed approach makes it possible to transmit control signals in a hidden way within the framework of the transmission of digital objects; the conducted experiments have shown that the control signal is unambiguously understood even with such distortions as a decrease or increase in contrast or brightness, image rotation, and compression.Conclusion. Application of the proposed technique for transmitting control signals in a multi-agent robotic system will male it possible to receive the necessary information timely and safe, with a minimum probability of loss.


Author(s):  
Sof'ya A. Serebryakova ◽  
◽  
Mikhail V. Filippov ◽  

Nowadays authors of cinematographic works are often faced to protect copyright need. One way to resolve such an issue is to use digital watermarks. Digital watermarks are some kind of encrypted message that allows distinguishing the original work from its forgery. At the same time the audio or video file with a built-in message looks no different from a file without a digital watermark, what is a key advantage of its use and at the same time it makes difficult to playback the file illegally. A set of methods for undetectable hiding some bit sequences in others is called digital steganography. An important advantage of steganography over cryptographic methods is the hiding the fact of embedding a code message. Embedding digital watermarks by using the least significant bit method allows embedding a digital watermark in such a way that a person will not notice any changes in the video file. The article considers the known methods of embedding digital watermarks and the structure of the AVI file format. It presents an algorithm for embedding and extracting digital watermarks for AVI video files based on LSB method with using hash-function. The algorithm provides a counteraction to the spread of counterfeit products.


2014 ◽  
Vol 543-547 ◽  
pp. 3561-3564
Author(s):  
Dong Yu Feng ◽  
Li Gu Zhu ◽  
Lei Zhang ◽  
Chen Chen Huang

This paper research video stream collected and compressed to H.264 format in video surveillance system, saving as readable video file via network. On the basis of introducing H.264 standard and AVI format, the paper analyzed video data acquisition in the condition of multi-channel and packet losing in network, and proposed the corresponding method. According to the analysis and method, the paper proposed the storage algorithm implementation steps of storing H.264 video stream in AVI format file.


2016 ◽  
Vol 2016 ◽  
pp. 1-7 ◽  
Author(s):  
Yeongpil Cho ◽  
Oparin Mikhail ◽  
Yunheung Paek ◽  
Kwangman Ko

Recent growth in popularity of mobile video services raises a demand for one of the most popular and convenient methods of delivering multimedia data, video streaming. However, heterogeneity of currently existing mobile devices involves an issue of separate video transcoding for each type of mobile devices such as smartphones, tablet PCs, and smart TVs. As a result additional burden comes to media servers, which pretranscode multimedia data for number of clients. Regarding even higher increase of video data in the Internet in the future, the problem of media servers overload is impending. To struggle against the problem an offloading method is introduced in this paper. By the use of SorTube offloading framework video transcoding process is shifted from the centralized media server to the local offloading server. Thus, clients can receive personally customized video stream; meanwhile the overload of centralized servers is reduced.


Author(s):  
Jacob D. Oury ◽  
Frank E. Ritter ◽  
Fatoumata B. Cissé

Abstract Objective: Lack of mask use during large public events might spread COVID-19. It is possible now to measure this and similar public health information using publicly available webcams. We demonstrate a rapid assessment approach for measuring mask usage at a public event. Method: We monitored crowds at public areas in Sturgis, SD using a live, high-definition, town-sponsored video stream to analyze the prevalence of mask wearing. We developed a rapid coding procedure for mask wearing and analyzed brief (5 to 25 min) video segments to assess mask-wearing compliance in outdoor public areas. We calculated compliance estimates and compared reliability among the human coders. Results: We were able to observe and quantify public behavior on the public streets. This approach rapidly estimated public health information (e.g., 512 people observed over 25 minutes with 2.3% mask usage) available on the same day. Coders produced reliable estimates across a sample of videos for counting masked users and mask-wearing proportion. Our video data is stored in Databrary.org. Conclusions: This approach has implications for disaster responses and public health. The approach is easy to use, can provide same day results, and can provide public health stakeholders with key information on public behavior.


2019 ◽  
Vol 5 (3) ◽  
pp. 75-85
Author(s):  
V. Korzhik ◽  
D. Flaksman

In this paper it is presented Digital Watermark System for color images. The main feature of this system is an ability to extract digital watermarks even after printing and following scanning of watermarked images. There is a description of algorithms for embedding and extracting of additional information. These methods are based on the usage of spread-spectrum signals in the frequency domain. Furthermore, there is described algorithms of distortion correction after printing out and following scanning the paper copies of digital data. The results of the experimental research on evaluation of a possible embedding volume and the reliability after extraction of the embedded data are also presented.


Sign in / Sign up

Export Citation Format

Share Document