DIGITAL WATERMARKING FOR IMAGES AND VIDEOS

Sneha V1, Sushmitha R2, Vibha Hande3 and Mohanesh B M4 1,2,3 CS&E, NIE, Mysuru 4Asst. Prof. CS&E, NIE, Mysuru Abstract- Digital Watermarking allows an individual to add hidden copyright or other verification messages for digital audio, video, images, and documents. Conventional techniques were visible watermarking such as copyright symbols, cooperation logos and so on. In this technique, watermark is embedded into the image, and it is very difficult to forge. In this paper, we intend to describe the technique used in a digital watermarking application, which enables users to protect digital data as well as authenticate and verify the owner of such data. Key words- Digital watermarking; copyright; images; videos; encryption; decryption

I. INTRODUCTION

Many techniques are in use to protect data against manipulations such as copying, modifications, deletions. The three main techniques in use are cryptography, steganography and watermark. Cryptography converts plaintext to a cipher text that is unintelligible to everyone else other than the intended recipient. Steganography is related to hiding data inside non-secret data, and watermark is related to steganography. One such popular technique is digital watermarking, which has been around since 1990s. It is also called data embedding. Digital watermarking protects digital data and is a practical means of achieving protection for digital data. The data hidden in watermark is related to the covered data, and thus provides authentication and verification. The motivation for this paper is to present a feasible way of protecting digital data by using encryption of media, and to check for authenticity and ownership by means of decryption.

II. IMAGES

A. ENCRYPTION Digital watermarking employed in image encryption is based on the concept of steganography. Here, a ‘key’ text that is input by the user is embedded into the image. First, the image is put into a byte array from its buffer. Then a sentinel (guard) string is copied to the array. This array serves as an indication to whether the image is encrypted or not. This is followed by the text that is input by the user. It is converted to a suitable format and copied into the array. The final encrypted image is saved in the desired location. The watermark embedded is invisible, and cannot be tampered with easily. Since it is invisible, no person can alter the watermark. It also prevents an encrypted image to be encrypted again.

Figure 1. Original Image Figure 2. Encrypted Image

@IJMTER-2016, All rights Reserved 228 International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 03, Issue 05, [May– 2016] ISSN (Online):2349–9745; ISSN (Print):2393-8161 B. DECRYPTION Decryption of image consists of extracting the text that the user embedded in the image during encryption. This allows a user to verify and authenticate the owner of the image. The image uploaded is again put into a byte array, and the sentinel (guard) string is checked within the uploaded image. If the sentinel string is not found it is concluded that the image is not encrypted and appropriate message is displayed. Else, the sentinel string is traversed and then the input text that is embedded is extracted and displayed in the appropriate format. During both encryption and decryption, a log file is maintained to ensure that the appropriate user only is performing the operation, and in the appropriate session.

Figure 3. Image decryption

III. VIDEOS- ENCRYPTION AND DECRYPTION

Video encryption and decryption is done using Advanced Encryption Standard(AES). The Advanced Encryption Standard (AES, also known as Rijndael), was established by the U.S. NIST in 2001 as a specification for the encryption of electronic data. AES is based on the Rijndael cipher which was developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen. NIST selected three members of the Rijndael family for AES, with each having a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits. AES is adopted by the U.S. government and is now used around the world. It supersedes the Data Encryption Standard (DES), published in 1977. AES is a symmetric-key algorithm, meaning the same key is used for both encryption and decryption of the data.AES is based on a design principle that uses both substitution and permutation, making it fast in both software and hardware. In our project, we have used the TagLib.dll, which is a private GitHub library, for assisting in encryption and decryption. TagLib is a library for reading and editing the metadata of several popular audio formats, and is commonly known as tags. Currently it supports both ID3v1 and ID3v2 for MP3 files, Ogg comments in ID3 tags and FLAC, MPC, , WavPack TrueAudio, WAV, AIFF, MP4 and ASF files. TagLib is licensed and distributed as a part of the GNU Lesser General Public License (LGPL) and Mozilla Public License (MPL). TagLibprovides both simple and abstract APIs, making it possible to ignore the differences between tagging formats and format specific APIs and allowing programmers to work with specific tagging schemes.

@IJMTER-2016, All rights Reserved 229 International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 03, Issue 05, [May– 2016] ISSN (Online):2349–9745; ISSN (Print):2393-8161 IV. CONCLUSION AND FUTUE ENHANCEMENTS

The Digital Watermarking application allows users to add hidden copyright or other verification messages for digital media such as images and videos. The watermarking technique adds an invisible watermark to the media file, so that it cannot be manipulated by any attackers. This provides copyrighting and verification functions to the users. The Digital Watermarking application now runs smoothly as envisioned and serves its purpose by providing copyrighting and verification functions. The future enhancements to the project could be that the application is hosted on the Internet, or as an add-on to browsers to provide its functions to a larger number of users. It can also include a paying mechanism to ensure that only certified users can make use of the application.

REFERENCES

[1] Shraddha S. Katariya, Digital Watermaking: Review, IJEIT, Feb 2012 [2] Heeba H.O. Naseriddin, Digital Watermarking A Technology Overview, IJRRAS, Jan 2011 [3] DrAjit, PreetiKalra, Sonia Dhull, Digital Watermarking, IJARCSSE, April 2013 [4] Chien-Pen Chuang, Cheng-Hung Liu, Yi-Tsai Liao, Huan-Wei Chi, A Robust Digital Watermarking With Mixed Transform Technique for Digital Image, IMECS, March 2012 [5] Koushik Pal, G. Ghosh, M. Battacharya, A Novel Digital Image Watermarking Scheme for Data Security Using Bit Replacement and Majority Algorithm Technique, Volume 1, May 2012 [6] www.wikipedia.org

@IJMTER-2016, All rights Reserved 230