hiding and this mainly focuses on the hardware implementation part. People from all parts of the world tried to implement data hiding schemes which includes the process of steganography, cryptography and watermarking. Various data hiding techniques and their implementation strategies are discussed below. Hardware implementation: Generally Video will be in MPEG format, Tsung-Han Tsai and Chih-Yen wu[1] proposed an configurable digital watermarking system in MPEG video encoder in which they deal with the raw video sequence and it is based on the pseudo numbering of the images or frames. This is combined with the present video watermarking standards such as MPEG-I/2/4, H.26x , motion JPEG to achieve real time intellectual protection . This architecture consists of 3 parts namely data path & insulating component, pseudo noise generator and watermark information function which also includes the error correction function. Ashish S. Bhaisare, Prof .A.H.Karode[2] they are dealing with the watermark which is invisible an semi fragile and the embedder is processed by the discrete cosine transform. The watermark generator generate a watermark which consists of a secret key. Each video frame consists of following data’s such as time , data, camera ID & serial number. A relationship is developed between the watermarked video frames and when any kind of attacks are made on it such a cropping frame dropping etc. can be found out easily. Sonjoy Deb Roy ,Xin Li, Yonatan Shoshan, Alexander Fish and Orly Yadid-Pecht[3] they worked on the uncompressed video which is beneficial for the practical watermarking applications and implemented this on the FPGA board rather than a software which produces a semi-fragile watermarking algorithm and is suited to surveillance video camera for real time watermarking. This approach is basically in DCT domain with the compression standards like JPEG,MPEG and H.26x which allows in merging of the compression and watermarking blocks into a single system at the time of implementation. Embedding process starts after the quantitation process which makes the watermark robust. The mid-range frequency components are used for embedding the watermark. This also operates in parallel and pipelined architectures to embed the watermark on to the frames. Anand Darji, Dr. A. N. Chandorkar, Dr. S.N.Merchant [4] this paper is based on the watermark encoder which processes in DWT and used in digital the still cameras. Every picture captured by the camera will have the watermark embedded in it and the watermark will be blind one. This deals with the multi resolution properties of the DWT. Water is embedded in the LL band and it is proved that it can withstand various attacks. A secure key is also provided in the process. The original watermark image is not required by extractor because each of them are controlled by processor. Wessam S. Elaraby ,Ahmed H. Madian , Mahmoud A. Ashour[5] the watermarking process is based on the invisible watermark at low frequency DCT domain by the Pseudo Number(PN) and the hardware realization is using the VHDL & implemented on FPGA. The video is divided into frames and each frame is subjected to the DCT , the watermark image is also subjected to the DCT and the watermark is embedded using Pseudo Number technique. The watermarked image is obtained by applying IDCT. Amit Joshi, Vivekanand Mishra and Rajendra Patrikar [6] In the real time applications ,watermarking is done on the raw video sequences. They are using integer DCT for the transformation ,which is based on the H.26x standards used for video teleconferences and video broadcasting using the mobile phones and digital cameras. In this method each frame of the video is divided in the number of 8x8 blocks for 2D integer DCT. They are following 2 different architectures of Integer DCT which are developed for better speed and area. This algorithm uses a Scene change detection technique for watermark embedding which can resist over temporal attacks. Korrapati Rajitha , Usha Rani. Nelakuditi , Venkata Naresh Madhala and Tai –hoon Kim[7] This deals with the implementation of the watermark using Xilinx System Generator on FPGA. FPGA is preferred over the ASIC and Programmable DSP because of the following factors Power consumption , development cost, time, flexibility and programmable software. A bit stream file (*. bit) is developed from Simulink environment which is necessary for the programming of FPGA. Watermarking comprises of 2 stages embedding and extraction, in the embedding process original image and the key image are taken in which the key image is embedded into the original image which is also known as the cover image. The watermarked image in the extraction process is given to the XOR gate which removes the external noises and the original image is separated from the key image. Wim J. C. Melis, Peter Y. K. Cheung ,Wayne Luk[8] This deals with the hardware implementation which is targeted in the geometric distortion section. This is done through motion vector estimation and the watermark is inserted to original image ‘O’ while the watermarked output is ‘W’ which is passed through the geometric distortion function ‘T’ gives an output ‘C’ which is a corrupted image. The difference between the original image ‘O’ and the corrupted image ‘C’ gives the distortion function ‘T’ and the inverse of ‘T’ gives estimate which helps in adjusting the distortion. Yong –Jae Jeong , Kwang –Seok Moon, Jong-Nam Kim [9] This is hardware implementation of watermark using the haar wavelet transform on the FPGA board . This algorithm is in the transform domain and this approach reduces the computational complexity which are actually present in the transform domain. This is suitable for real time applications such as the video broadcasting and movie producing. The image is wavelet transformed and strengthened using the strength generator which is calculated by video property such as variance of pixels in localized area. Single level haar wavelet transform splits into multi-frequencies [LL,LH,HL,HH] . Except in LL band the watermark is inserted into remaining 3 bands. Hitesh Patel , Jignesh Patoliya , Pradip Panchal , R. N. Patel [10] This refers to the DWT scheme in which each frame of the video is watermarked individually. This watermarking scheme is known as novel watermarking. The robustness of the watermark increase as every image is watermarked individually. The original image and the watermark image are not required at the decoder side. The video sequence and watermark are split into frames and each frame is split into three regions (R, B ,G) and the key is added to them. The watermark is added to every 5th frame of the sequence. The watermark is inserted in the LH4, LH3, HL3, LH2, HL2, HL, LH bands.
(Lecture Notes in Electrical Engineering 84) Manuel Duarte Ortigueira (Auth.) - Fractional Calculus For Scientists and Engineers-Springer Netherlands (2011) PDF