You are on page 1of 59

A PRELIMENERY REPORT ON

“VIDEO COPYRIGHT SYSTEM USING DIGITAL


WATERMARKING”

SUBMITTED TO THE SAVITRIBAI PHULE PUNE UNIVERSITY, PUNE


IN THE PARTIAL FULFILLMENT OF THE REQUIREMENTS
FOR THE AWARD OF THE DEGREE
OF

BACHELOR OF ENGINEERING

IN

COMPUTER ENGINEERING

BY

Abhishek Anand 71706611J


Swaraj Kulkarni 71707207L
Grish Nile 71813575L
Kishor Biradar 71706782D

UNDER THE GUIDANCE OF


Prof. Kirti Satpute

DEPARTMENT OF COMPUTER ENGINEERING

SCOE, VADGAON, PUNE 41

SAVITRIBAI PHULE PUNE UNIVERSITY

2020-21
CERTIFICATE

This is to certify that the project report entitles

“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

Submitted By

Abhishek Anand 71706611J


Swaraj Kulkarni 71707207L
Grish Nile 71813575L
Kishor Biradar 71706782D

are bonafide student of this institute and the work has been carried out by them under
the supervision of Prof. Kirti Satpute and it is approved for the partial fulfillment
of the requirement of Savitribai Phule Pune University, for the award of the degree
of Bachelor of Engineering (COMPUTER ENGINEERING).

Prof. Kirti Satpute Prof. M. P. Wankhade


Internal Guide Head Of Department
Dept. of Computer Engineering Dept.Computer Engineering

Dr. S.D. Lokhande


External Examiner Principal
SCOE, Pune
Place :
Date :
Acknowledgments

It gives us great pleasure in presenting the project report on ‘VIDEO COPYRIGHT


SYSTEM USING DIGITAL WATERMARKING’.

We would like to take this opportunity to thank my internal guide Prof. Kirti Satpute
for giving me all the help and guidance we needed. we are really grateful to them
for their kind support. Their valuable suggestions were very helpful.

We are also grateful to Prof. M. P. Wankhade, Head of Computer Engineering


Department, SCOE, PUNE for his indispensable support, suggestions.

Abhishek Anand
Swaraj Kulkarni
Grish Nile
Kishor Biradar
(B.E. Computer Engg.)

Department of Computer Engineering 2020-21 I


Abstract

Due to increase in growth of internet users of networks are increasing rapidly.


Owners of the digital products are concerned about illegal copying of their products.
Security and copyright protection are becoming important issues in multimedia ap-
plications and services. Digital watermarking is a technology used for copyright
protection of digital media. Here ownership information data called watermark is
embedded into the digital media without affecting its perceptual quality. In case of
any dispute, the watermark data can be detected or extracted from the media and use
as a proof of ownership. In the present era, due to the rapid advances in the field
of Information Technology digital data can be easily created, copied, processed and
distributed freely among unauthorized users. The copyright laws are not sufficient to
deal with digital data. Watermarking could be used to protect the authenticity of the
owner. We are going to use DWT technology for video watermarking. In wavelet
analysis, the Discrete Wavelet Transform (DWT) decomposes a signal into a set of
mutually orthogonal wavelet basis functions. These functions differ from sinusoidal
basis functions in that they are spatially localized that is, nonzero over only part
of the total signal length. Furthermore, wavelet functions are dilated, translated and
scaled versions of aa common function , known as the mother wavelet. As is the
case in Fourier analysis, the DWT is invertible, so that the original signal can be
completely recovered from its DWT representation.

Department of Computer Engineering 2020-21 II


INDEX

Acknowledgment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I

1 INTRODUCTION 1
1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Problem Definition and Objectives . . . . . . . . . . . . . . . . . . 2
1.3.1 Objectives: . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Project Scope and Limitations . . . . . . . . . . . . . . . . . . . . 3
1.5 Methodologies of Problem solving . . . . . . . . . . . . . . . . . . 3

2 LITERATURE SURVEY 4

3 Software Requirement Specification 8


3.1 Assumptions and Dependencies . . . . . . . . . . . . . . . . . . . 8
3.1.1 User Classes and Characteristics . . . . . . . . . . . . . . . 8
3.2 Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . 8
3.3 External Interface Requirements . . . . . . . . . . . . . . . . . . . 9
3.3.1 User Interfaces . . . . . . . . . . . . . . . . . . . . . . . . 9
3.3.2 Hardware Interfaces . . . . . . . . . . . . . . . . . . . . . 9
3.3.3 Software Interfaces . . . . . . . . . . . . . . . . . . . . . . 9
3.4 Non Functional Requirements . . . . . . . . . . . . . . . . . . . . 9
3.4.1 Performance Requirements . . . . . . . . . . . . . . . . . . 9
3.4.2 Safety Requirements . . . . . . . . . . . . . . . . . . . . . 9
3.4.3 Security Requirements . . . . . . . . . . . . . . . . . . . . 9
3.4.4 Software Quality Attributes . . . . . . . . . . . . . . . . . 10
3.5 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.5.1 Database Requirements . . . . . . . . . . . . . . . . . . . . 10
3.5.2 Software Requirements . . . . . . . . . . . . . . . . . . . . 10
3.5.3 Hardware Requirements . . . . . . . . . . . . . . . . . . . 11
3.6 Analysis Models: SDLC Model to be applied . . . . . . . . . . . . 11

4 System Design 12
4.1 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.2 MATHEMATICAL MODEL . . . . . . . . . . . . . . . . . . . . . 13
4.3 Data Flow Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . 13
4.3.1 Level 0 Data Flow Diagram . . . . . . . . . . . . . . . . . 14
4.3.2 Level 1 Data Flow Diagram . . . . . . . . . . . . . . . . . 14
4.4 Entity Relationship Diagrams . . . . . . . . . . . . . . . . . . . . . 15
4.5 UML Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
4.5.1 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . 16
4.5.2 Use Case Diagram . . . . . . . . . . . . . . . . . . . . . . 17
4.5.3 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . 18
4.5.4 Activity Diagram . . . . . . . . . . . . . . . . . . . . . . . 19

5 PROJECT PLAN 20
5.0.1 Reconciled Estimates . . . . . . . . . . . . . . . . . . . . . 20
5.0.2 Project Resources . . . . . . . . . . . . . . . . . . . . . . . 21
5.1 Risk Management . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.2 Project Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
5.2.1 Project task set . . . . . . . . . . . . . . . . . . . . . . . . 23
5.2.2 Timeline Chart . . . . . . . . . . . . . . . . . . . . . . . . 24
5.3 Team Organization . . . . . . . . . . . . . . . . . . . . . . . . . . 24
5.3.1 Team Structure . . . . . . . . . . . . . . . . . . . . . . . . 24

6 Project Implementation 26
6.1 Tools and Technologies Used: . . . . . . . . . . . . . . . . . . . . 26
6.2 Algorithm Details: . . . . . . . . . . . . . . . . . . . . . . . . . . 27

Department of Computer Engineering 2020-21 IV


7 Conclusion 29
7.1 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

8 REFERENCES 30

Annexure A 32

Department of Computer Engineering 2020-21 V


List of Figures

3.1 Waterfall Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

4.1 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . 12


4.2 Level 0 Data Flow Diagram . . . . . . . . . . . . . . . . . . . . . . 14
4.3 Level 1 Data Flow Diagram . . . . . . . . . . . . . . . . . . . . . . 14
4.4 Entity Relationship Diagrams . . . . . . . . . . . . . . . . . . . . . 15
4.5 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
4.6 Use Case Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . 17
4.7 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4.8 Activity Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

5.1 Timeline Chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

A.1 NP Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
A.2 NP Problem Complete . . . . . . . . . . . . . . . . . . . . . . . . 33
List of Tables

5.1 LINE OF CODE Based estimation . . . . . . . . . . . . . . . . . . 21


5.2 Time line Chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
CHAPTER 1

INTRODUCTION

1.1 OVERVIEW

Nowadays, Digital video is one of the popular multimedia data exchanged in the in-
ternet. Commercial activity on the internet and media require protection to enhance
security. The 2D Barcode with a digital watermark is a widely interesting research
in the security field. In this project we proposed a video watermarking with text data
(verification message) by using the Quick Response (QR) code technique. The QR
Code is prepared to be watermarked via a robust video watermarking scheme based
on the DWT. In addition to that logo (or) watermark gives the authorized ownership
of video document. In this project mainly two processes, first embedding where
original video is watermarked with verification message. Second, extracting pro-
cess where embedded logo and verification is retrieved from the watermarked video.
With an astounding improvement in the fields of science and technology, there has
been radical growth in the Internet. With the increase in demand of internet, broad-
band communication has also taken its own pace. This leads to the digital transfer
of data such as images, videos, etc. Hence, it is important to avoid the unwanted
redistribution of such data or unauthorized access by the illegal users. Digital Water-
marking is one of the appealing methods to protect the copyright and unauthorized
access to the content. Such type of watermarking can be applied to images, audio,
videos etc. These watermarks should not alter the quality of content and it should
be robust to the various attacks and distortion. Lot of work has been done on im-
age watermarking and few has been done on video. This paper presents the digital
“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

watermarking applied on videos. The digital video watermarking is used to protect


the video from digital manipulation and provides the copyright authentication. The
two video watermarking methodologies to embed the watermark bit are Spatial Do-
main Watermarking and Spectral Domain Watermarking. Spatial Domain method
is not robust to many signal processing attacks. Spectral Domain method ensures
the robustness of watermark. Frequently used transforms are the Discrete Fourier
Transform (DFT), Discrete Cosine Transform (DCT) and Discrete Wavelet Trans-
form (DWT). The Discrete wavelet transform is more frequently use because of its
excellent multi-resolution and spatial localization characteristics.

1.2 MOTIVATION

The motivation of this project is to formulate the watermark decoding distortions,


i.e. the differences between the extracted and reference watermarks, with a linear
combination of two models. The new model of the watermark decoding distortions,
in this propose system, a new general EDHVW method called CaDEED by further
assigning different weights to the embedding distortions according to the different
cover video content and the differences between the reference and revealed secret
pattern. With the problem formulation of CaDEED, we solve the optimization prob-
lem to obtain a relaxed optimal solution.

1.3 PROBLEM DEFINITION AND OBJECTIVES

Proposed the system to provide potential solution for protection and prohibiting
copyright infringement of multimedia using video watermarks. This system has sus-
tainable capability to withstand against various attacks, influences the applications
and its performance in protection of copyright and authentication.

1.3.1 Objectives:

1. User can see content of the text before and after sending.

2. Allows us to send any kind of text.

3. User can see the size of file.

Department of Computer Engineering 2020-21 2


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

4. Provide Video Watermark Support for Video File.

5. Provide security to user by playing the video in a Video-player.

6. Standard format for our application, so it is easy to handle for the user.

7. To make it user-friendly, so that anyone can handle it.

1.4 PROJECT SCOPE AND LIMITATIONS

The Scope Of the system is:

1. This project can be used anywhere for securing the video, or we can send
confidential message by using QR-code.

2. This project can be used in any organization where secrete message should be
transferred securely.

3. This project is also used for provide an ownership to the video.

1.5 METHODOLOGIES OF PROBLEM SOLVING

Proposed the system to provide potential solution for protection and prohibiting
copyright infringement of multimedia using video watermarks. This system has sus-
tainable capability to withstand against various attacks, influences the applications
and its performance in protection of copyright and authentication.

Department of Computer Engineering 2020-21 3


CHAPTER 2

LITERATURE SURVEY

1. A Robust QR- Code Video Watermarking Scheme Based On SVD and DWT
Composite Domain Nowadays, Digital video is one of the popular multime-
dia data exchanged in the internet. Commercial activity on the internet and
media require protection to enhance security. The 2D Barcode with a digital
watermark is a widely interesting research in the security field. In this paper
propose a video wa- termarking with text data (verification message) by using
the Quick Response (QR) Code technique. The QR Code is prepared to be
watermarked via a robust video watermarking scheme based on the (singular
value decomposi- tion)SVD and (Discrete Wavelet Transform)DWT. In addi-
tion to that logo (or) watermark gives the authorized ownership of video docu-
ment.SVD is an at- tractive algebraic transformfor watermarking applications.
SVD is applied to the cover I-frame. The extracted diagonal value is fused
with logo (or) water- mark. DWT is applied on SVD cover image and QR
code image. The inverse transform on watermarked image and add the frame
into video this water- marked (include logo and QR code image) the video
file sends to authorized customers. In the reverse process check the logo and
QR code for authorized ownership. These experimental results can achieved
acceptable imperceptibil- ity and certain robustness in video processing.

2. An Optimized Un-compressed Video Watermarking Scheme based on SVD


and DWT In this paper, we presents a novel fast and robust video watermark-
ing scheme for RGB uncompressed AVI video sequence in discrete wavelet
transform (DWT) domain using singular value decomposition (SVD). For em-
“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

bedding scene change detection is performed. The singular values of a binary


water- mark are embedded within the singular values of the LL3 sub-band
coefficients of the video frames. The resultant signed video exhibits good
quality. To test the robustness of the proposed algorithm six different video
processing opera- tions are performed. The high computed PSNR values in-
dicate that the visual quality of the signed and attacked video is good. The
low bit error rate and high normalized cross correlation values indicate a high
correlation between the extracted and embedded watermark. Time complexity
analysis shows that the proposed scheme is suitable for real time application.
It is concluded that the embedding and extraction of the proposed algorithm
are well optimized. The algorithm is robust and shows an improvement over
other similar reported methods.

3. Content -Dependent Spatio-Temporal Video Watermarking using 3 -Dimensional


Discrete Cosine Transform In this paper we propose a content-dependent spatio-
temporal watermarking scheme for digital videos. Content dependency is
achieved by incorporating the hash of the video sequence into the watermark.
The video sequence is treated as a 3-dimensional spatio-temporal signal for the
purposes of video hash computation and watermark embedding and detection.
Our experiments show that the video hash algorithm has good discriminating
power and robust- ness against various attacks. The watermark is also shown
in the experiments to have good robustness against a variety of attacks, in par-
ticular when the watermark is copied from one video sequence to another.

4. Video Watermarking Scheme Based On Robust QR-Code Nowadays, one of


the popular multimedia data exchanged in the internet is Digital video. Pro-
tection requires in requires enhancing safety in commercial activity on the in-
ternet as well as media. A widely interesting research is the 2D Barcode with
a digital watermark is in the field of security. By using the Quick Response
(QR) Code technique, in this paper we recommend a video watermarking with
text data. Via a robust video watermarking scheme the QR Code is prepared to
be watermarked based on the SVD (singular value decomposition) and DWT
(Discrete Wavelet Transform). SVD is an attrac- tive arithmetical transform

Department of Computer Engineering 2020-21 5


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

for watermarking applications. In addition to that logo (or) watermark gives


the authorized ownership of video document. For the cover I-frame the SVD
is applied. With logo (or) watermark there fused the extracted diagonal value.
For SVD cover image and QR code image the SVD is applied. The water-
marked image inverse transform and add the frame into video, to authorized
customers this watermarked videofile sends. In the reverse process for au-
thorized ownership check the logo and QR code. Acceptable imperceptibility
achieved by these experimental results and in video processing there certain
robustness.

5. A Watermark Technique based on SVD and DWT composite Function with


QR-code Nowadays, due to development in digital image and internet tech-
nology com- mon users can easily copy important data and produce illegal
copies of im- age. So digital multimedia data exchange through internet is
main idea which requires protection to enhance security, to resolve the copy-
right protection problem of various multimedia data and image, we propose
different water- mark technique used for data hiding by applying the QR Code
technique. By using QR code we have propose DWT (Discrete-Wavelet-
Transform), SWT (Stationary-Wavelet-Transform), SVD (singular-value de-
composition) method- ology for watermarking technique. The 2D barcode
with a digital watermark is a widely interest research in security. The com-
bination of DWT and SWT with SVD give better security, robustness and
imperceptibility.

6. Digital Video Watermarking Using DWT-DFT Transforms and SVD Tech-


nique In modern years there is no difficulty to make perfect copies which guide
extensive unauthorized copying, which is an immense concern to the film,
music, software and book publishing industries. Because of this unease over
copyright issues, many technologies are developed to defend against illegal
copying. Use of digital watermarks is one of these technologies. Watermark-
ing does the embedding an ownership signal into the data directly. So that,
the signal is always present with the data (image, audio, video). DWTDFT-
SVD techniques are used in the proposed scheme to improve the robustness

Department of Computer Engineering 2020-21 6


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

and overall computation requirements. The proposed algorithm is tested using


three video sequences of different format. In this approach achieved PSNR of
the original and watermarked video signal is more than 60 dB. The proposed
scheme shows high robustness against several attacks.

7. Robust QR Code Video Watermarking Nowadays, on the internet digital video


is popular multimedia data exchanged. To improve security media required the
protection as it was commercial ac- tivity on internet. Hence in the security
field 2D barcode is more interest- ing research on the internet. In these studies
we proposed video watermark- ing with text massage (Verification Massage)
by using Quick response Code (QR Code) technique. The QR Code is pre-
pared to be watermarked via a robust video watermarking scheme based on the
(singular value decomposition) SVD and (Discrete Wavelet Transform) DWT.
With help with watermarking we can gives copyrights of these video docu-
ment. For watermarking appli- cations SVD is an attractive algebraic trans-
form. SVD is applied to the cover I-frame. The extracted diagonal value is
fused with logo (or) watermark. DWT is applied on SVD cover image and QR
code image. The invers transform of watermarking image and add the frame
into video with logo and QR code im- age send these video file to authorized
user. In the reverse process check the logo and QR code for authorized owner-
ship. It can be achieved acceptable imperceptibility and certain robustness in
video processing.

Department of Computer Engineering 2020-21 7


CHAPTER 3

SOFTWARE REQUIREMENT
SPECIFICATION

3.1 ASSUMPTIONS AND DEPENDENCIES

This document will provide a general description of project, including user re-
quirements, product perspective, and overview of requirements, general constraints.
In addition, it will also provide the specific requirements and functionality needed
for this project such as interface, functional requirements and performance require-
ments.

3.1.1 User Classes and Characteristics

Find the different user classes that you anticipate will use this product. User
classes can be differentiated based on use frequency or product functions subset
used or technical expertise or privilege levels or educational level and experience.
It also describe the pertinent behavior or characteristics of each user class. Few
requirements may limited only to specific user classes. Differentiate the very most
important or useful user classes for this item or product from those who are less
significant to satisfy.

3.2 FUNCTIONAL REQUIREMENTS

Functional user requirements is nothing but very high-level statements about


what the system should and also it should describe clearly an overview of system
“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

services in detail.

3.3 EXTERNAL INTERFACE REQUIREMENTS

3.3.1 User Interfaces

The user interface or UI for the software should be compatible to be used by any
standard browser such as IE, Mozilla or Google chrome. Using this UI user can have
access to the system. The UI or user interface can be developed by using many tool
or software package like JFrame.

3.3.2 Hardware Interfaces

A hardware interface is needed to run the software. Java (JDK) and NetBeans
compatible hardware is required which is minimal requirement.

3.3.3 Software Interfaces

It uses Java as the front end programming tool. MySQL has been used as back
end application tool. Latest version of java anything higher than 7.0 can be used.

3.4 NON FUNCTIONAL REQUIREMENTS

3.4.1 Performance Requirements

• System can work optimal or faster on 4 GB or more of RAM.

• The system is targeted to be available all time. Once there is a fatal error or
system down, the system will provide understandable feedback to the user.

3.4.2 Safety Requirements

• The system is designed in modules where errors can be detected.

3.4.3 Security Requirements

• The system is designed in modules where errors can be detected and fixed
easily.

Department of Computer Engineering 2020-21 9


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

3.4.4 Software Quality Attributes

• Usability:
This relates to how easily people can use app/website. A measure of us-
ability could be the time it takes for end users to become familiar with my
app/website functions, without training or help.

• Reliability:
This can be defined as the available time or UP time of software.

• Performance:
This is essentially how fast app/website works. A performance requirement
for the app/website could be start in less than 20 seconds.

• Security :
Say that app/website saves all the previous code and lets you reuse a saved
code.

3.5 SYSTEM REQUIREMENTS

3.5.1 Database Requirements

MySQL Database
MySQL is on open source database which is mainly a RDBMS i.e. relational
database management system. As a database server, primary function of this soft-
ware is to storing and retrieving data as requested by other from end software ap-
plications like java which may Or may not run either on the same computer or on
different computer. This can be across the network either in internet or intranet.

3.5.2 Software Requirements

1. Operating System: Microsoft Windows 7 and Above

2. Programming Language: Java

3. IDE: Netbeans

Department of Computer Engineering 2020-21 10


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

3.5.3 Hardware Requirements

1. Processor: Intel Core I3 or Higher

2. RAM: 4 GB or Higher

3. Hard Disk: 100 GB (min)

3.6 ANALYSIS MODELS: SDLC MODEL TO BE APPLIED

SDLC model to be applied


Waterfall Model:
The Waterfall Model is among very first and old model of software development
life cycle. It is also called as a linear-sequential life cycle model. This is very simple
in nature and easy to understand or use. This is step by step method so next step can
only be begin once earlier has been completed. This is mainly used for small scale
project. Constant or fixed requirement should be there for this type of model.

Figure 3.1: Waterfall Model

Department of Computer Engineering 2020-21 11


CHAPTER 4

SYSTEM DESIGN

4.1 SYSTEM ARCHITECTURE

Figure 4.1: System Architecture


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

4.2 MATHEMATICAL MODEL

Let
S be Closed system defined as, S = Ip, Op, Ss, Su, Fi, A
To select the input from the system and perform various actions from the set
of actions A so that Su state can be attained.
S=Ip,Op,Ss,Su,Fi,A
Where,
IP1=Username,Password, file
Set of actions=A=F1,F2,F3,F4
Where
F1= Setup
F2= Upload Video
F3= Fetch Frames
F4= Embed Data
S=Set of users
Ss=rest state, registration state, login state
Su- success state is successful analysis
Fi- failure state
Objects:
1) Input1: Ip1 = Username, Password
2) Input2 : Ip2= Video
1) Output1 : Op1 = Video
2) Output2 : Op2 = QR COde
3) Output3 : Op3 = Data

4.3 DATA FLOW DIAGRAMS

A data flow diagram (DFD) is a graphical representation of the “flow” of data


through an information system, modeling its process aspects. A DFD is often used as
a preliminary step to create an overview of the system, which can later be elaborated.
DFDs can also be used for the visualization of data processing.

Department of Computer Engineering 2020-21 13


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

4.3.1 Level 0 Data Flow Diagram

Figure 4.2: Level 0 Data Flow Diagram

4.3.2 Level 1 Data Flow Diagram

Figure 4.3: Level 1 Data Flow Diagram

Department of Computer Engineering 2020-21 14


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

4.4 ENTITY RELATIONSHIP DIAGRAMS

An entity relationship diagram (ERD) shows the relationships of entity sets stored
in a database. An entity in this context is an object, a component of data. An entity
set is a collection of similar entities. These entities can have attributes that define its
properties. By defining the entities, their attributes, and showing the relationships
between them, an ER diagram illustrates the logical structure of databases.

Figure 4.4: Entity Relationship Diagrams

Department of Computer Engineering 2020-21 15


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

4.5 UML DIAGRAMS

4.5.1 Class Diagram

A class diagram in the world of Unified Modeling Language or UML can be


defined as a type of static structure diagram which mainly defines the structure of a
system. It works by showing the systems classes and their attributes and operations
or methods also the relationships among objects.

Figure 4.5: Class Diagram

Department of Computer Engineering 2020-21 16


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

4.5.2 Use Case Diagram

Dynamic behavior is most important aspect to capture the model of any system.
Dynamic behavior can be defined as the behavior of the system when it is running
or operating. Static behavior is not sufficient to model a system rather dynamic
behavior is more important than static behavior.

Figure 4.6: Use Case Diagram

Department of Computer Engineering 2020-21 17


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

4.5.3 Sequence Diagram

Sequence diagrams can be used to provide a graphical representation of object


interactions or object coordination over the time. These basically displays a actor
or user, and the objects and components they interact with in the execution of a
use case. The sequence diagrams displays the own of messages from one object to
another object, and as such correspond to the methods and events supported by a
class/object.

Figure 4.7: Sequence Diagram

Department of Computer Engineering 2020-21 18


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

4.5.4 Activity Diagram

Activity diagram can be defined as a flowchart to display the flow from one
activity to another activity. These activities could be described as an operation of
the system. The control flow usually is drawn from one operation of application to
another. This can be branched or sequential, or concurrent also. Activity diagrams
can deal with all or many type of flow control and used different elements such as
join or fork.

Figure 4.8: Activity Diagram

Department of Computer Engineering 2020-21 19


CHAPTER 5

PROJECT PLAN

Phase Task Description

Phase 1 Analysis Analyze the information related to Project Topic

Phase 2 System Design Assign the module and design the process flow Control

Phase 3 Implementation Implement the code for all the modules and integrate
all the modules

Phase 4 Testing Test the code and overall process weather the pro-
cess works properly Test the code and over all process
weather the process works properly

Phase 5 Maintenance Modification of a software product after delivery to im-


prove performance or maintainability.

5.0.1 Reconciled Estimates

Time Estimate
Costs of the getting knowledge is depends on the resources and efforts needed
for the development of the system.
Line of Code (LoC): Estimating LOC for this project is difficult at estimation
stages this project is of research or innovative type project. Average estimation of
this project is five hundred to six hundred line of code.
MAN MONTH UTILIZATION: Estimation of the man month is divide into
following sub activities 1- Technical training of the team member: - This will take
“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

nearly 3 to 4 weeks. This will include Java language 2- Research:-Being an innova-


tive project research for the project is an impor- tant part currently it seems to have
1 to 2 months
LINE OF CODE Based estimation: Efforts in Person in months E = 3.2
(KLOC)1.05 E = 3.2 9.01.05to11.0 4.21.05 E = 24.62to25.05months Development
time in months D=E/N, Where E=Efforts in Person in months N=Number of persons
required D=24.62/4 to 25.2/4 Cost Estimates
Function Estimated KLOC
GUI design 7 1.5-2.0
Logical code 1.8-2.2
Client side validation 1.5-1.8
Training Phase 2.0-2.2
Testing Phase 2.5-2.8
Total 9.0-10.11

Table 5.1: LINE OF CODE Based estimation

Cost of project
C=N*Cp C=4*5KC=20K
The cost of the project is approximately 20,000

5.0.2 Project Resources

1. Designer: To design system and perform requirement gathering.


2.Developer: To develop system and provide to tester for testing

5.1 RISK MANAGEMENT

Risk Identification

For risks identification, review of scope document, requirements specifications and


schedule is done. Answers to questionnaire revealed some risks. Each risk is cate-

Department of Computer Engineering 2020-21 21


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

gorized as per the categories mentioned in [?].You can refereed following risk iden-
tification questionnaire.
1. Have top software and customer managers formally committed to support
the project? Answer : Yes
2. Are end-users enthusiastically committed to the project and the system/product
to be built? Answer : Yes
3. Are requirements fully understood by the software engineering team and
its customers? Answer : Yes
4. Have customers been involved fully in the definition of requirements? An-
swer : Yes
5. Do end-users have realistic expectations? Answer : Yes
6. Does the software engineering team have the right mix of skills? Answer :
Yes
7. Are project requirements stable? Answer : Yes
8. Is the number of people on the project team adequate to do the job? Answer
: Yes
9. Do all customer/user constituencies agree on the importance of the project
and on the requirements for the system/product to be built? Answer : Yes
5.2.2 NP Hard
A problem is NP-hard if solving it in polynomial time would make it possible
to solve all problems in class NP in polynomial time. Some NP-hard problems are
also in NP (these are called NP-complete), some are not. If you could reduce an NP
problem to an NP-hard problem and then solve it in polynomial time, you could
solve all NP problems. Also, there are decision problems in NP-hard but are
not NP-complete, such as the infamous halting problem
5.2.3 Risk Analysis
Technical Risk: The probability of loss incurred through the execution of a
technical process in which the outcome is uncertain. Untested engineering, techno-
logical or manufacturing procedures entail some level technical risk that can result
in the loss of time, resources, and possibly harm to individuals and facilities. Like
mobile phone battery off, network error in user and server, multiple requests at time.

Department of Computer Engineering 2020-21 22


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

Operational Risk: Operational risk is the prospect of loss resulting from inadequate
or failed procedures, systems or policies. Employee errors. Systems failures. Fraud
or other criminal activity. Any event that disrupts business processes. Like user reg-
istration, login, send request to service provider.

Schedule Risk: Schedule risk is the risk that the project takes longer than scheduled.
It can lead to cost risks, as longer projects always cost more, and to performance
risk, if the project is completed too late to perform its intended tasks fully.

Business Risk: Business risk is the possibilities a company will have lower than
anticipated profits or experience a loss rather than taking a profit. Business risk is
influ- enced by numerous factors, including sales volume, per-unit price, input costs,
competition, and the overall economic climate and government regulations.

5.2 PROJECT SCHEDULE

5.2.1 Project task set

Major Tasks in the Project stages are:

Priority (High to Risks Back-up plan


low)

1 Schedule Overtime

2 Operational Validation

3 Business Marketing

4 Technical -

Task 1: Requirement Gathering

Department of Computer Engineering 2020-21 23


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

Task 2: Literature Survey


Task 3: System Design
Task 4: Functionality Implementation
Task 5: Testing

5.2.2 Timeline Chart

Figure 5.1: Timeline Chart

5.3 TEAM ORGANIZATION

5.3.1 Team Structure

Whatever activities are done related to the project that we all showing all details log
to our guide. All the reporting are noted to the guide.

Department of Computer Engineering 2020-21 24


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

Work Task Description Duration


Literature Search Related work done for conceptual 6 weeks
data similarity
System analysis Critical analysis and comparison 4 weeks
of technologies studied and results
achieved in research
Design and Planning Modeling and design and dataset 8 weeks
searching or creation
Implementation Divided into phases
Phase A Implementation module 1 2 weeks
Phase B Implementation module 2 2 weeks
Phase C Implementation module 3 2 weeks
System Testing Test system quality, fix errors if any 3 weeks
and improve if needed. Test system
for different data sets
Final Report Prepare and upload Initial Report 2 weeks
Initial Report Prepare and upload Initial Report 2 weeks

Table 5.2: Time line Chart

Department of Computer Engineering 2020-21 25


CHAPTER 6

PROJECT IMPLEMENTATION

6.1 TOOLS AND TECHNOLOGIES USED:

JDK 1.8 Installation 1. Double click jdk-8-ea-bin-b32-windows-i586 to run the in-


stallation program. JDK License dialog displayed. Accept the license in order to
install JDK.
2. The JRE Custom setup dialog enables you to choose a custom directory for
JRE Files. 3. The complete dialog indicates a successful installation.
Net Beans IDE 7.3.1 Installation To install the software:
1. After the download completes, run the installer. For Windows, the installer
executable file has the .exe extension. Double-click the installer file to run it. 2. If
you downloaded the All bundle, you can customize your installation. Per- form the
following steps at the Welcome page of the installation wizard: a. Click Customize.
b. In the Customize Installation dialog box, make your selections.
At the Welcome page of the installation wizard, click Next. At the License
agreement page, review the license agreement, click the acceptance check box, and
click Next. At the JUnit License Agreement page, decide if you want to install JUnit
and click the appropriate option, click Next. At the NetBeans IDE installation page,
do the following: Accept the default installation directory for the NetBeans IDE or
specify an- other directory. Note: The installation directory must be empty and the
user profile you are using to run the installer must have read/ write permissions for
this directory. Accept the default JDK installation to use with the NetBeans IDE or
select a different installation from the drop-down list. If the installation wizard did
“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

not find a compatible JDK installation to use with the Net-Beans IDE, your JDK is
not installed in the default location. In this case, specify the path to an installed JDK
and click Next, or cancel the current installation. After installing the required JDK
version you can restart the installation.
If you are installing Apache Tomcat, on its installation page, accept the de-
fault installation directory or specify another installation location. Click Next. At
the Summary page, verify that the list of components to be installed is correct and
that you have adequate space on your system for the installation. Click Install to
begin the installation. At the Setup Complete page, provide anonymous usage data
if desired, and click Finish.
MySQL Database
Microsoft SQL Server is a relational database management system developed
by Mi- crosoft. As a database server, it is a software product with the primary func-
tion of storing and retrieving data as requested by other software applications which
may run either on the same computer or on another computer across a network
(includ- ing the Internet). Microsoft markets at least a dozen different editions of
Microsoft SQL Server, aimed at different audiences and for workloads ranging from
small single-machine applications to large Internet-facing applications with many
concur- rent users.

6.2 ALGORITHM DETAILS:

Algorithm:
1. Embedding Process For watermark embedding process proposing a follow-
ing Algorithm:
Step 1: In first step we convert the host video into number of frames as image
database in jpeg format f
Step 2: Convert all the frames from RGB to Gray. As m1 = rgb2gray(f)
Step 3: Resize the frames m2 as [256 256]
Step 4: Apply DWT on the host frame m2 called first level DWT.
Step 5: Again apply DWT for second level DWT on LL Band of size [64 64]
Step 6: Now Apply SVD on LL1 band of size [32 32] This singular value decom-

Department of Computer Engineering 2020-21 27


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

position decompose LL1 band into three matrices as U x S x V Where, U is an


orthogonal matrix, S is a diagonal matrix and V is a transpose of an orthogonal ma-
trix
Step 7: Apply FFT on HH1 Band of size [32 32] as FFTHH1
Step 8: For Embedding watermark image into host frame of the video, embed the
coefficients matrices with some scaling factor J as Wimage1 = SL + SL L1 For Wa-
termarked Video Arrange all the decomposed matrices after embedding Let us take
inverse of SVD as ALL1 = UL Wimage1 VLJ Take inverse of FFT as Wimagelevel1
= i f f t2(Wimage2, 32, 32) Take inverse discrete wavelet transform for first reverse
level AWW1 = idwt2 (ALL1, LH1, HL1, HH1) Now for second level IDWT AWW2
= idwt2 (AWW1, LH, HL, HH) This AWW2 will be the watermarked video
2. Watermark Extraction Process For watermark extraction process we will
take watermark embedded video or frame AWW2, from which we will extract the
watermark image or symbol in proof of ownership.
Step 1: Take watermarked video AWW2 and applies first level DWT on it. Which
decompose it into four different sub-bands.
Step 2: Select LL sub-band from first level DWT and apply second level DWT which
further decompose it into four sub-bands.
Step 3: Extracted watermark image = (Watermarked Original) 1/ WM1 = (SX SL)
1/ WM2 = (FFTX FFTHH1) 1/ Where is a scaling factor
Step 4: Take inverse of SVD, IFFT, and IDWT to rebuild the water- mark. f inalx-
tract1 = UL L1 WM1 VL L1 finalxtract2 = ifft2 (WM2, 32, 32) finalxtract3 = idct2
(WM3, 32, 32)
Step 5: Apply inverse DWT at first level finalxtract4 = idwt2 (finalxtract1, LH1,
HL1, HH1)
Step 6: Apply inverse DWT at second level f inalxtract5 = idwt2( f inalxtract4, L
H, H L, H H) Finalxtract5 is the extracted watermark image All paragraphs must be
indented. All paragraphs must be justified, i.e. both left-justified and right-justified

Department of Computer Engineering 2020-21 28


CHAPTER 7

SOFTWARE TESTING

7.1 TYPES OF TESTING

7.1.1 Unit Testing

Unit testing is the testing of an individual unit or group of related units. It falls under
the class of white box testing. It is often done by the programmer to test that the unit
he/she has implemented is producing expected output against given input.

7.1.2 Alpha Testing

It is the most common type of testing used in the Software industry. The objective
of this testing is to identify all possible issues or defects before releasing it into
the market or to the user. Alpha testing is carried out at the end of the software
development phase but before the Beta Testing. Still, minor design changes may be
made as a result of such testing. Alpha testing is conducted at the developers site.
In-house virtual user environment can be created for this type of testing.

7.1.3 Acceptance Testing

An acceptance test is performed by the client and verifies whether the end to end
the flow of the system is as per the business requirements or not and if it is as per
the needs of the end user. Client accepts the software only when all the features and
functionalities work as expected. It is the last phase of the testing, after which the
software goes into production. This is also called User Acceptance Testing (UAT).
“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

7.1.4 Beta Testing

Beta Testing is a formal type of software testing which is carried out by the customer.
It is performed in the Real Environment before releasing the product to the market
for the actual end users. Beta testing is carried out to ensure that there are no major
failures in the software or product and it satisfies the business requirements from
an end-user perspective. Beta testing is successful when the customer accepts the
software. Usually, this testing is typically done by end-users or others. It is the
final testing done before releasing an application for commercial purpose. Usually,
the Beta version of the software or product released is limited to a certain number
of users in a specific area. So end user actually uses the software and shares the
feedback to the company. Company then takes necessary action before releasing the
software to the worldwide.

7.1.5 Performance Testing

This term is often used interchangeably with stress and load testing. Performance
Testing is done to check whether the system meets the performance requirements.
Different performance and load tools are used to do this testing.

7.1.6 Security Testing

It is a type of testing performed by a special team of testers. A system can be pen-


etrated by any hacking way. Security Testing is done to check how the software or
application or website is secure from internal and external threats. This testing in-
cludes how much software is secure from the malicious program, viruses and how
secure and strong the authorization and authentication processes are. It also checks
how software behaves for any hackers attack and malicious programs and how soft-
ware is maintained for data security after such a hacker attack.

7.1.7 White Box Testing

White Box testing is based on the knowledge about the internal logic of an appli-
cations code. It is also known as Glass box Testing. Internal software and code

Department of Computer Engineering 2020-21 30


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

working should be known for performing this type of testing. Under these tests are
based on the coverage of code statements, branches, paths, conditions etc.

7.1.8 Black Box Testing

Black Box testing also known as Behavioral testing, is a software testing method
in which the internal structure or design or implementation of the item being tested
is not known to the tester. These test can be functional or non-functional, through
usually functional. This method is named as so because the software program, in
the eyes of the tester, is like a black box, inside which one cannot see. This method
attempts to find error like incorrect or missing functions, interface error, behavior or
performance error etc.

7.1.9 Regression Testing

Testing an application as a whole for the modification in any module or functionality


is termed as Regression Testing. It is difficult to cover all the system in Regression
Testing, so typically automation testing tools are used for these types of testing.

7.1.10 System Testing

Under System Testing technique, the entire system is tested as per the requirements.
It is a Black-box type testing that is based on overall requirement specifications and
covers all the combined parts of a system.

7.1.11 Smoke Testing

Whenever a new build is provided by the development team then the software testing
team validates the build and ensures that no major issue exists. The testing team
ensures that the build is stable and a detailed level of testing is carried out further.
Smoke Testing checks that no show stopper defect exists in the build which will
prevent the testing team to test the application in detail. If testers find that the major
critical functionality is broken down at the initial stage itself then testing team can
reject the build and inform accordingly to the development team. Smoke Testing is
carried out to a detailed level of any functional or regression testing.

Department of Computer Engineering 2020-21 31


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

7.1.12 Integration Testing

Integration testing is testing in which a group of components are combined to pro-


duce output. Also, the interaction between software and hardware is tested in inte-
gration testing if software and hardware components have any relation. It may fall
under both white box testing and black box testing. It has two testing under it. These
are- (a) Top to bottom. (b) Bottom to top. (a) Top to bottom:In this, the system is
divided into different modules. Each and every module is tested from top to bottom.
(b) Bottom to top: In this type of testing, every module is tested individually and at
the end all modules are integrated.

7.2 TEST CASES

Department of Computer Engineering 2020-21 32


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

No. Test User Input Expected Re- Actual Result Status


Case sult
1. Register User gives all Registration Registration Pass
User the credentials successful successful
asked by the
system
1. Register If User miss Registration Registration Pass
User any infor- Failed Unsuccessful
mation to please Try
enter again
2. Login System takes Login success- Successful Pass
the username ful
and password
2. Login If incorrect Login failed Login failed, Pass
information is please give
entered correct pass-
word or
username
3. Browse Click on Unless image Button is dis- Pass
Video browse Button is selected but- abled Unless
ton should re- proper image
main disabled is selected
4. Browse Click on Browse File Browse file Pass
Button browse Button Dialog should dialog opened
open successfully
5. Select Select image Error message Error mes- Pass
non to be shown saged Is seen
Video
file

Table 7.1: Test Cases

Department of Computer Engineering 2020-21 33


CHAPTER 8

RESULTS

8.1 OUTCOME

:
Watermarked video embedded with company name and logo.

8.2 SCREENSHOTS
“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

Figure 8.1: Registration Page

Department of Computer Engineering 2020-21 35


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

Figure 8.2: Login Page

Department of Computer Engineering 2020-21 36


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

Figure 8.3: Browse Video

Department of Computer Engineering 2020-21 37


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

Figure 8.4: Video Watermarking

Department of Computer Engineering 2020-21 38


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

Figure 8.5: Choose Logo

Department of Computer Engineering 2020-21 39


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

Figure 8.6: Browse Watermarked Video

Department of Computer Engineering 2020-21 40


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

Figure 8.7: Extract Frames

Department of Computer Engineering 2020-21 41


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

Figure 8.8: Extracted Frames

Department of Computer Engineering 2020-21 42


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

Figure 8.9: Watermark Embedding

Department of Computer Engineering 2020-21 43


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

Figure 8.10: Image Impainting

Department of Computer Engineering 2020-21 44


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

Figure 8.11: Logo

Department of Computer Engineering 2020-21 45


CHAPTER 9

CONCLUSION

:
Thus we have implemented a system for content copyright using video wa-
termarking using DWT technology. The prototype model has been developed using
java as a programming language. The application will be a windows stand alone
application. The proposed system will be helpful to protect the content from being
theft.

9.1 APPLICATIONS

1. Public Clouds
2. Government Organizations
3. Banking Sector.
4. Educational System
CHAPTER 10

REFERENCES

1 G. Prabakaran, R. Bhavani, M. Ramesh, A Robust QR- Code Video Water-


marking Scheme Based On SVD and DWT Composite Domain, Proceedings
of the 2013 International Conference on Pattern Recognition, Informatics and
Mobile Engineering (PRIME) February 2013.

2 Bhavna Goel, Charu Agarwal, An Optimized Un-compressed Video Water-


marking Scheme based on SVD and DWT, IEEE, 2013.

3 Iwan Setyawan, Ivanna K. Timotius, Content -Dependent Spatio-Temporal


Video Watermarking using 3 -Dimensional Discrete Cosine Transform, IEEE,
2013.

4 Rituja S. Darandale, Siddhi S. Kasabe, Tripti D. Chikhale, Video Watermark-


ing Scheme Based On Robust QR-Code, International Journal of Advanced
Research in Electrical, Electronics and Instrumentation Engineering, 2015.

5 Kor Ashwini N, N. M. Kazi, A Watermark Technique based on SVD and DWT


composite Function with QR-code, International Journal of Application or In-
novation in Engineering and Management (IJAIEM), 2014.

6 Supriya Hasarmani, Mangal Patil, P. R. Naregalkar, Digital Video Watermark-


ing Using DWT-DFT Transforms and SVD Technique, International Journal
of Computer Science and Network, Volume 4, Issue 6, December 2015.

7 Siddhi S. Kasabe, Rituja S. Darandale, Tripti D. Chikhale, Prof. Nitesh S. Jad-


hav, Robust QR Code Video Watermarking, International Journal of Innova-
“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

tive Research in Computer and Communication Engineering, Vol. 4, Issue 4,


April 2016.

8 Xingguang Song, Yuting Su, Yu Liu, Zhong Ji, A Video Watermarking Scheme
for AVS Based on Motion Vectors, 11th IEEE International Confer- ence on
Communication Technology Proceedings, 2008.

9 Shahid and Pradeep Kumar, Digital Video Watermarking: Issues and Chal-
lenges, International Journal of Advanced Research in Computer Engi- neer-
ing and Technology (IJARCET), Volume 7, Issue 4, April 2018.

10 Xiaohong Li, Keke Hu, Guofu Zhang, Jianguo Jiang, Zhaopin Su, An Adap-
tive Video Watermarking Based On Secret Image Sharing , Fifth International
Symposium on Computational Intelligence and Design, 2012.

Department of Computer Engineering 2020-21 48


ANNEXURE A

• Definitions: P, NP, NP-Hard, NP-Complete Problems:

• P Class of problems: Solutions to P class of problems have deterministic al-


gorithms running in polynomial.

• NP Class of problems: Solutions to NP class of problems have non-deterministic


algorithms running in polynomial.

• NP-Hard class of problems: A problem is in NP-Hard class if an already


proved NP-Hard problem reduces to it.

• NP-Complete class of problems: A problem is NP-Complete if it is NP-Hard


and it is NP (i.e. there exists a non-deterministic algorithm running in polyno-
mial time which solves it).

Therefore, our system is NP-Complete. Hence it Is Feasible.

Figure A.1: NP Problem


“VIDEO COPYRIGHT SYSTEM USING DIGITAL WATERMARKING”

• What is NP? ”NP” means ”we can solve it in polynomial time if we can break
the normal rules of step-by-step computing”.

• What is NP-Complete? Since this amazing ”N” computer can also do anything
a normal computer can, we know that ”P” problems are also in ”NP”. So, the
easy problems are in ”P” (and ”NP”), but the really hard ones are *only* in
”NP”, and they are called ”NP-complete”. It is like saying there are things
that People can do (”P”), there are things that Super People can do (”SP”), and
there are things *only* Super People can do (”SP-complete”).

• NP-Complete: We have use Bloom filtering for detection of packet drop attack
whether it is drop by itself or by hacker. Hence the P is NP-Complete in this
case.

Figure A.2: NP Problem Complete

Department of Computer Engineering 2020-21 50

You might also like