You are on page 1of 7

Literature survey

From the past few years works were done on data


hiding and this mainly focuses on the hardware
implementation part. People from all parts of the
world tried to implement data hiding schemes
which includes the process of steganography,
cryptography and watermarking. Various data
hiding techniques and their implementation
strategies are discussed below.
Hardware implementation:
Generally Video will be in MPEG format, Tsung-Han
Tsai and Chih-Yen wu[1] proposed an configurable
digital watermarking system in MPEG video
encoder in which they deal with the raw video
sequence and it is based on the pseudo
numbering of the images or frames. This is
combined with the present video watermarking
standards such as MPEG-I/2/4, H.26x , motion JPEG
to achieve real time intellectual protection . This
architecture consists of 3 parts namely data path &
insulating component, pseudo noise generator and
watermark information function which also
includes the error correction function. Ashish S.
Bhaisare, Prof .A.H.Karode[2] they are dealing with
the watermark which is invisible an semi fragile
and the embedder is processed by the discrete
cosine transform. The watermark generator
generate a watermark which consists of a secret
key. Each video frame consists of following data’s
such as time , data, camera ID & serial number. A
relationship is developed between the
watermarked video frames and when any kind of
attacks are made on it such a cropping frame
dropping etc. can be found out easily. Sonjoy Deb
Roy ,Xin Li, Yonatan Shoshan, Alexander Fish and
Orly Yadid-Pecht[3] they worked on the
uncompressed video which is beneficial for the
practical watermarking applications and
implemented this on the FPGA board rather than a
software which produces a semi-fragile
watermarking algorithm and is suited to
surveillance video camera for real time
watermarking. This approach is basically in DCT
domain with the compression standards like
JPEG,MPEG and H.26x which allows in merging of
the compression and watermarking blocks into a
single system at the time of implementation.
Embedding process starts after the quantitation
process which makes the watermark robust. The
mid-range frequency components are used for
embedding the watermark. This also operates in
parallel and pipelined architectures to embed the
watermark on to the frames. Anand Darji, Dr. A. N.
Chandorkar, Dr. S.N.Merchant [4] this paper is
based on the watermark encoder which processes
in DWT and used in digital the still cameras. Every
picture captured by the camera will have the
watermark embedded in it and the watermark will
be blind one. This deals with the multi resolution
properties of the DWT. Water is embedded in the
LL band and it is proved that it can withstand
various attacks. A secure key is also provided in the
process. The original watermark image is not
required by extractor because each of them are
controlled by processor. Wessam S. Elaraby
,Ahmed H. Madian , Mahmoud A. Ashour[5] the
watermarking process is based on the invisible
watermark at low frequency DCT domain by the
Pseudo Number(PN) and the hardware realization
is using the VHDL & implemented on FPGA. The
video is divided into frames and each frame is
subjected to the DCT , the watermark image is also
subjected to the DCT and the watermark is
embedded using Pseudo Number technique. The
watermarked image is obtained by applying IDCT.
Amit Joshi, Vivekanand Mishra and Rajendra
Patrikar [6] In the real time applications
,watermarking is done on the raw video
sequences. They are using integer DCT for the
transformation ,which is based on the H.26x
standards used for video teleconferences and
video broadcasting using the mobile phones and
digital cameras. In this method each frame of the
video is divided in the number of 8x8 blocks for 2D
integer DCT. They are following 2 different
architectures of Integer DCT which are developed
for better speed and area. This algorithm uses a
Scene change detection technique for watermark
embedding which can resist over temporal attacks.
Korrapati Rajitha , Usha Rani. Nelakuditi , Venkata
Naresh Madhala and Tai –hoon Kim[7] This deals
with the implementation of the watermark using
Xilinx System Generator on FPGA. FPGA is
preferred over the ASIC and Programmable DSP
because of the following factors Power
consumption , development cost, time, flexibility
and programmable software. A bit stream file
(*. bit) is developed from Simulink environment
which is necessary for the programming of FPGA.
Watermarking comprises of 2 stages embedding
and extraction, in the embedding process original
image and the key image are taken in which the
key image is embedded into the original image
which is also known as the cover image. The
watermarked image in the extraction process is
given to the XOR gate which removes the external
noises and the original image is separated from the
key image. Wim J. C. Melis, Peter Y. K. Cheung
,Wayne Luk[8] This deals with the hardware
implementation which is targeted in the geometric
distortion section. This is done through motion
vector estimation and the watermark is inserted to
original image ‘O’ while the watermarked output is
‘W’ which is passed through the geometric
distortion function ‘T’ gives an output ‘C’ which is
a corrupted image. The difference between the
original image ‘O’ and the corrupted image ‘C’
gives the distortion function ‘T’ and the inverse of
‘T’ gives estimate which helps in adjusting the
distortion. Yong –Jae Jeong , Kwang –Seok Moon,
Jong-Nam Kim [9] This is hardware implementation
of watermark using the haar wavelet transform on
the FPGA board . This algorithm is in the transform
domain and this approach reduces the
computational complexity which are actually
present in the transform domain. This is suitable
for real time applications such as the video
broadcasting and movie producing. The image is
wavelet transformed and strengthened using the
strength generator which is calculated by video
property such as variance of pixels in localized
area. Single level haar wavelet transform splits into
multi-frequencies [LL,LH,HL,HH] . Except in LL band
the watermark is inserted into remaining 3 bands.
Hitesh Patel , Jignesh Patoliya , Pradip Panchal ,
R. N. Patel [10] This refers to the DWT scheme in
which each frame of the video is watermarked
individually. This watermarking scheme is known
as novel watermarking. The robustness of the
watermark increase as every image is
watermarked individually. The original image and
the watermark image are not required at the
decoder side. The video sequence and watermark
are split into frames and each frame is split into
three regions (R, B ,G) and the key is added to
them. The watermark is added to every 5th frame
of the sequence. The watermark is inserted in the
LH4, LH3, HL3, LH2, HL2, HL, LH bands.

You might also like