CFP last date
20 December 2024
Reseach Article

Anti-Piracy for movies using Forensic Watermarking

by M. Adimoolam, A. John, M. Gunashanthi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 4
Year of Publication: 2013
Authors: M. Adimoolam, A. John, M. Gunashanthi
10.5120/10454-5161

M. Adimoolam, A. John, M. Gunashanthi . Anti-Piracy for movies using Forensic Watermarking. International Journal of Computer Applications. 63, 4 ( February 2013), 26-32. DOI=10.5120/10454-5161

@article{ 10.5120/10454-5161,
author = { M. Adimoolam, A. John, M. Gunashanthi },
title = { Anti-Piracy for movies using Forensic Watermarking },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 4 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 26-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number4/10454-5161/ },
doi = { 10.5120/10454-5161 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:13:17.059886+05:30
%A M. Adimoolam
%A A. John
%A M. Gunashanthi
%T Anti-Piracy for movies using Forensic Watermarking
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 4
%P 26-32
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the past decade internet worked perfectly with distribution of the digital data for pictures, music and videos. Although digital data have many advantages over analogue data, the rightful ownership of the digital data source is at of risk. The copyright protection for digital media becomes an important issue of piracy. Watermarking is a very important field for copyrights of various electronic documents and multimedia. This paper presents a digital forensic watermarking method for authorization against copying or piracy of digital video. The core idea is to use biometric generated keys in the embedding process of watermark. The host video is first randomized by Heisenberg decomposition and Discrete Fourier Transform (DFT). The invisible watermark is embedded in the I-frame of the host video. The watermarks are embedded in the least significant bit (LSB) of the each block. The forensic watermark provides "The Chain of Custody" throughout the life cycle of the video distribution. The experimental result of test sequence demonstrates that the proposed work gives high security and robustness.

References
  1. Cox, I. J. , Miller, M. L. , Bloom, J. A. : Digital Watermarking. Morgan Kaufmann, San Francisco (2001)
  2. R. G. Schynded, A. Tirkel and C. Osborne, "A digital watermark, Proc. IEEE Int. Conf. Image Processing (ICIP), pp. 86-90, 1994.
  3. E. J. Delp and R. B. Wolfgang "A watermark for digital images", in Image Processing, Lausanne Switzerland, vol. 3, pp. 215-218, Sept. 1996.
  4. Digital watermarking schemes for authorization Against copying or piracy of color images.
  5. "Study on copyright piracy in India", ministry of human resource development Government of India, N. K. Nair, A. K. Barman, Utpal Chattopadhyay,
  6. Cox et al, Digital watermarking: principles and practice, Morgan Kaufmann, 2002.
  7. Cox, A Secure Robust Watermark for Multimedia,
  8. T. Kalker, G. Depovere, M. Maes, J. Haitsma, , "The Video watermarking System for broadcast monitoring", proceedings of the SPIE, vol. 3657, pp. 103-112, (1999).
  9. G. C. Langelaar, I. Setyawan, R. I. Lagendijik, Watermarking digital image and video data, IEEE Signal Processing Magazine 17 (5) (2000) 20–46.
  10. Information Hiding in Computer Science, Vol. 1174, pp. 183-206, 1996
  11. "Pease FFT Algorithm", J. R. Johnson nov 3, 1998.
  12. "Biometrics inspired watermarking based on a fractional dual tree complex Wavelet transform", Gaurav Bhatnagar, Q. M. Jonathan Wu, Department of Electrical and Computer Engineering, University of Windsor, Windsor, Ontario, ON, N9B 3P4, Canada, Future Generation Computer Systems 29 (2013) 182–195.
  13. "Speeded-Up Robust Features (SURF)", Herbert Bay a , Andreas Ess , Tinne Tuytelaars, and Luc Van Gool .
  14. "Image hiding by optimal LSB substitution and genetic algorithm" Ran-Zan Wang, Chi-Fang Lin, Ja-Chen Lin, Elsevier Pattern Recognition Volume 34, Issue 3, March 2001, Pages 671-683.
  15. "Watermarking digital 3D volumes in the Discrete Fourier Transform domain", Vassilios Solachidis, Member, IEEE, and Ioannis Pitas, Fellow, IEEE.
  16. J. W. Cooley, P. A. Lewis, and P. D. Welch. History of the fast Fourier transform. In Proc. IEEE, volume 55, pages 1675–1677, October 1967
  17. J. W. Cooley and J. W. Tukey. "An algorithm for machine calculation of complex Fourier series". Mathematics of Computation, 19:297–301, 1965.
  18. "Generation of 1D and 2D FFT function in MATLAB", Parul Goyal, Department of Electronics & Communication Engineering, Uttaranchal Institute of Technology, International Journal of Science, Technology & Management; December-2010.
  19. Swiss Federal Institute of Technology Zurich, "Fast Fourier Transform", Numerical Analysis Seminar; Stefan Worner.
  20. S. Perreault and P. Hebert. Median Filtering in Constant Time. IEEE Transactions on Image Processing, 16 (9) : 2389-2394, 2007.
  21. Daugman, John. (2004). How Iris Recognition Works. IEEE Trans. CSVT, 14 (1), 21-30.
  22. Daugman, John. (2003). Demodulation by Complex-valued Wavelets for Stochastic Pattern Recognition. International Journal of Wavelets, Multi-resolution and Information Processing, 1 (1), 1-17.
  23. "How Iris Recognition Works", John Daugman, PhD, OBE, University of Cambridge, The Computer Laboratory, Cambridge CB2 3QG, U. K.
  24. "Effect of Server Image Compression on Iris Recognition Performance", Information Forensics and Security, IEEE Transaction on March 2008, Daugman J, Dowing C, University of Cambridge, Cambridge. Volume:3, Issue: 1page (s): 52-6.
Index Terms

Computer Science
Information Sciences

Keywords

Forensic watermarking Discrete Fourier Transform (DFT) the Least Significant Bit (LSB) piracy