Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

TAMPERING DETECTION IN COMPRESSED DIGITAL

VIDEO USING WATERMARKING


ABSTRACT
We

presents a method to detect video tampering and distinguish it from common video

processing operations, such as recompression, noise, and brightness increase, using a practical
watermarking scheme for real-time authentication of digital video. In our method, the watermark
signals represent the macro block's and frames indices, and are embedded into the nonzero
quantized discrete cosine transform value of blocks, mostly the last nonzero values, enabling our
method to detect spatial, temporal, and spatiotemporal tampering. Our method can be easily
configured to adjust transparency, robustness, and capacity of the system according to the
specific application at hand. In addition, our method takes advantage of content-based
cryptography and increases the security of the system.

EXISTING SYSTEM

PROPOSED SYSTEM

EXISTING CONCEPT:

PROPOSED CONCEPT:

An authentication method based on chaotic

The watermark signals not only in the LNZ

semi

timing

values, but also in other nonzero quantized

information of video frames is modulated

discrete cosine transform (DCT) value of

into the parameters of a chaotic system.

blocks
Comprehensive valuations of our algorithm

fragile

watermarking

is

and

tempering

detection,

significantly

EXISTING TECHNIQUE :

adding to or expanding the evaluations.


PROPOSED TECHNIQUE :

Semi-Fragile Watermarking

TECHNIQUE DEFINITION:

Tamper Detection

TECHNIQUE DEFINITION:

Semi-Fragile watermarking scheme for

Tamper Detection is the ability of a device

allows

to sense that an active attempt to

acceptable

manipulations

such

content-preserving
as

H.264/AVC

compromise the device integrity or the data

compression, Gaussian low-pass filtering,

associated with the device is in progress;

median filtering; it can detect content-

the detection of the threat may enable the

altering malicious manipulations such as

device to initiate appropriate defensive

removal, addition, and modification of

actions.

objects.
DRAWBACKS:

ADVANTAGES:

It is difficult to distinguish malicious tampering


from common video processing.
Mismatch between the extracted edge map

domains, which leads to detecting various

from the modified video and the watermarked

domains.
It is faster and lower complexity compared to

edge map.
It is uncompressed domain and cannot be
applied directly to H.264/AVC.

It addresses both spatial and temporal


malicious

changes

in

spatial

and

time

existing algorithms, making it practical and


suitable for real-time applications.

PROPOSED SYSTEM BLOCK DIAGRAM:

Input Video

Attacks

Decoding

Frames
Video

Encoding
Embedding

Receiving Video

Extracting Bits

Fig: block diagram of Video Watermarking

APPLICATIONS:
This technique reportedly has been used to detect the source of illegally copied movies.

Content identification and management


Content protection for audio and video content
Forensics and piracy deterrence
Content filtering (includes blocking and triggering of actions)
Communication of ownership and copyrights.

HARDWARE REQUIREMENTS:

Processor
Hard Disk
RAM
Keyboard

:
:
:
:

Pentium Dual Core 2.00GHZ


40 GB
2GB (minimum)
110 keys enhanced

SOFTWARE REQUIREMENTS:

MATLAB 7.14 Version R2012a

FUTURE ENHANCEMENT:
In the future we improve the performance of nonzero QDCT levels are more robust.

You might also like