REPORT
REPORT
CHAPTER 1
INTRODUCTION
The mode of secret transmission has been a key issue throughout the recorded
human history. Numerous methods have been used for secret transmission. The early
approach to secure data transmission includes wax covered tablets, tattooing on the head
and then growing hair. Later during World War II, invisible inks were used for secret
data transmission. With the introduction of many encryption algorithms by skillful
mathematicians, cryptography became a well established field. Most of the
cryptographic algorithms are key based. Cryptography mainly concentrates on
designing methods to map an original data to some random-looking data which may
attract the hackers. Mainly Cryptographic techniques "scramble" messages so if
intercepted, the messages cannot be understood whereas Steganography, in an essence,
"camouflages" a message to hide its existence and make it seem "invisible" thus
concealing the fact that a message is being sent altogether. An encrypted message may
draw suspicion while an invisible message will not. Also with the development in
digital multimedia the need for security also arises. The introduction of watermarking
techniques was a major breakthrough which was used to provide copyright protection to
software as well as for digital media. As the need for protection of digital media goes
on, researchers start pouring their efforts in this field of steganography, giving many
fruitful results. This work is focused towards secure image transmission. Both the
carrier and the secret are color images.
Digital multimedia data provides a robust and easy way of editing and
modifying data. The data can be delivered over computer networks with little to no
errors and often without interference. Unfortunately, digital media distribution raises a
concern for digital content owners. Digital data can be copied without any loss in
quality and content. This poses a big problem for the protection of intellectual property
2
rights of copyright owners. To prevent these, some additional data are incorporated for
identity purpose.
The security for multimedia data is of much concern because of its use in every
field. Numerous techniques are used in practice. But the following four are of much
importance:
Fingerprinting Watermarking
Cryptography Steganography
1.2.1 Fingerprinting
1.2.2 Cryptography
1.2.3 Watermarking
1.2.4 Steganography
Fingerprinting uses some kind of hash functions to create fingerprint and the
original file remains intact.
Cryptography is about protecting the meaning of the document.
Watermarking embeds usually imperceptible or invisible marking or labels in
digital data in the form of bits.
Steganography is the art of concealing the existence of information
4
CHAPTER 2
LITERATURE SURVEY
Watermarking is the technique used to embed the some additional data into the
original data.
Mohanty (1999) present a survey about the different types of information hiding
techniques and their comparisons. Introduction to the digital watermarking and a brief
note about their types. Image watermarking, audio watermarking, video watermarking
and text watermarking.
sadiq & salih(2001) This paper presents a no-reference video quality metric that
blindly estimates the quality of a video. They proposed system which is based on video
watermarking using 8x8 blocks DCT coefficients of YCBCR domain, and for the
generation of watermark, the Geffe generator has been used to generate binary stream
sequence watermark in embedding and extracting processor. Data hiding is achieved by
simple “even-odd” signaling of the DCT coefficients. The comparison process between
the extracted watermark and the generated watermark from Geffe generator was
calculated to conclude the video quality assessment by measuring the watermark
degradation. With these mechanisms, the proposed method is robust against the attacks
of frame dropping, averaging, swapping, and statistical analysis. The results indicate
that the proposed video quality metric outperforms standard Peak Signal to Noise Ratio
(PSNR) and structural similarity and Image Quality (SSIM) metric in estimating the
perceived quality of a video.
6
Alan Brunton & Jiying Zhao(2010) In this paper, they proposed a real-time
video watermarking system on programmable graphics hardware. Real-time video
watermarking is important to the use of digital video in legal proceedings, security
surveillance, new reportage and commercial video transactions. The watermarking
scheme implemented here is based on Wong’s scheme for image watermarking, and is
designed to detect and localize any change in the pixels of any frame of the incoming
video stream. We implement this scheme for real-time operation on programmable
graphics hardware. The Graphics Processing Units (GPUs) found on many modern
commodity-level graphics cards have the ability to execute application-defined
sequences of instructions on not only geometric primitives, defined by vertices, but also
on image or texture fragments mapped to rasterized geometric primitives. These
fragment programs, also known as fragment or pixel shaders, execute in hardware and
in parallel on the GPU for each fragment, or pixel, that is rendered, making the GPU
well suited for image and video processing.
7
Kitsos , Sklavos , Provelengios &. Skodras (2012) paper reviewed about the
hardware implementations of six representative stream ciphers are compared in terms of
performance, consumed area and the throughput-to-area ratio. The stream ciphers used
for the comparison are ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0. ZUC,
Snow3g and E0 have been used for the security part of well known standards, especially
wireless communication protocols. In addition, Grain V1, Mickey V2 and Trivium are
currently selected as the final portfolio of stream ciphers for Profile 2 (Hardware) by the
eStream project. The designs were implemented by using VHDL language and for the
hardware implementations a FPGA device was used. The highest throughput has been
achieved by Snow3g with 3330 Mbps at 104 MHz and the lowest throughput has been
achieved by E0 with 187 Mbps at 187 MHz. Also, the most efficient cipher for
hardware implementation in terms of throughput-to-area ratio is Mickey V2 cipher
while the worst cipher for hardware implementation is Grain V1.
Pia Singh(2013) This paper is about encryption and decryption of images using
a secret key block cipher called 64-bits Blowfish designed to increase security and to
improve performance. This algorithm will be used as a variable key size up to 448 bits.
It employs Feistel network which iterates simple function 16 times. The blowfish
algorithm is safe against unauthorized attack and runs faster than the popular existing
algorithms. The proposed algorithm is designed and realized using MATLAB.
8
Sonjoy Deb Roy& Xin Li(2013) This paper presents a hardware implementation of a
digital watermarking system that can insert invisible, semi-fragile watermark
information into compressed video streams in real time. The watermark embedding is
processed in the discrete cosine transform domain. To achieve high performance, the
proposed system architecture employs pipeline structure and uses parallelism. Hardware
implementation using field programmable gate array has been done, and an experiment
was carried out using a custom versatile breadboard for overall performance evaluation.
Experimental results show that a hardware-based video authentication system using this
watermarking technique features minimum video quality degradation and can withstand
certain potential attacks, i.e., cover-up attacks, cropping, and segment removal on video
sequences. Furthermore, the proposed hardware based watermarking system features
low power consumption, low cost implementation, high processing speed, and
reliability.
9
CHAPTER 3
WATERMARKING
3.1 INTRODUCTION
The needed properties of a digital watermark depend on the use case in which it
is applied. For marking media files with copyright information, a digital watermark has
to be rather robust against modifications that can be applied to the carrier signal.
Instead, if integrity has to be ensured, a fragile watermark would be applied.
• 1779 – Counterfeiting
D(J,I)=S'
b)decoder
out that the frequency domain methods are more robust than the spatial domain
techniques. Different types of watermarks are shown in the figure 3.2.
According to the human perception, the digital watermarks can be divide into
three different types as follows.
Visible watermark
Invisible-Robust watermark
Invisible-Fragile watermark
Dual watermark
14
for watermark detection, whereas the public watermarks do not. The class of invisible
robust watermarking schemes that can be attacked by creating a counterfeit original is
called invertible watermarking scheme.
3.5.1 Encryption
Windows offers this feature, which allows users to hide files. Using this feature
is as easy as changing the properties of a directory to "hidden", and hoping that no one
displays all types of files in their explorer. Hiding directories (Unix) in existing
directories that have a lot of files, such as in the / dev directory on a Unix
implementation, or making a directory that starts with three dots (...) versus the normal
single or double dot.
16
The act of hiding the message in the cover necessitates some noise modulation
or distortion of the cover image. It is important that the embedding occur without
significant degradation or loss of perceptual quality of the cover. In a secret
communications application, if an attacker notices some distortion that arouses
suspicion of the presence of hidden data in a stego image, the steganographic encoding
has failed even if the attacker is unable to extract the message. For applications where
the perceptual transparency of embedded data is not critical, allowing more distortion in
the stego-image can increase hiding capacity, robustness, or both.
3.6.3 Robustness
Robustness refers to the ability of embedded data to remain intact if the stego-
image undergoes transformations, such as linear and non-linear filtering, addition of
random noise, sharpening or blurring, scaling and rotations, cropping or decimation,
lossy compression, and conversion from digital to analog form and then reconversion
back to digital form (such as in the case when a hard copy of a stego-image is printed
and then a digital image is formed by subsequently scanning the hardcopy.) Robustness
is critical in copyright protection watermarks because pirates will attempt to filter and
destroy any watermarks embedded in images. Anti-watermarking software is already
available on the Internet and has been shown effective in removing some watermarks.
These techniques can also be used to destroy the message in a stego-image.
17
when and where content is broadcast, who is broadcasting and for how long. Digital
Watermarking works by making very subtle modifications to the original asset by
adding some bit data disseminated throughout the content. The modifications are
indiscernible to human senses, but can easily be detected and decoded using dedicated
hardware or software. Being part of the content itself, any attempt to destroy or remove
it will also ruin the quality of the material in which it is embedded. Digital watermarks
can be linked to a database with more complete metadata associated with the content,
depending on the solution requirements. The metadata can be anything related to the
content such as title, type of content, author, etc. In a broadcast monitoring
environment, specialized equipment is used to monitor and track television channels or
radio stations. Upon detection of a watermark, data are analyzed and broadcast details
rapidly confirmed and precisely reported.
20
CHAPTER 4
SYMMETRIC CIPHERS
4.1 INTRODUCTION
In the cryptographic algorithms that exist in a little bit more in detail, the
symmetric ciphers can be divided into stream ciphers and block ciphers
A block cipher by itself allows encryption only of a single data block of the cipher's
block length. For a variable-length message, the data must first be partitioned into
21
separate cipher blocks. In the simplest case, known as the electronic codebook (ECB)
mode, a message is first split into separate blocks of the cipher's block size (possibly
extending the last block with padding bits), and then each block is encrypted and
decrypted independently. However, such a naive method is generally insecure because
equal plaintext blocks will always generate equal ciphertext blocks (for the same key),
so patterns in the plaintext message become evident in the ciphertext output.
A stream cipher is a symmetric key cipher where plaintext digits are combined
with a pseudorandom cipher digit stream (keystream). In a stream cipher each plaintext
digit is encrypted one at a time with the corresponding digit of the keystream, to give a
digit of the ciphertext stream. An alternative name is a state cipher, as the encryption of
each digit is dependent on the current state. In practice, a digit is typically a bit and the
22
The hardware module of Grain was implemented with a 16-bit AMBA APB
interface in a 0.35 μm CMOS process technology. This interface fits to the 16- bit
datapath architecture. The reason for implementing a 16-bit word size was the low-
power design approach as presented in Section 2. The details of the datapath are shown
in Figure 4.2b. It can be seen that the feedback shift registers NFSR and LFSR shift 16
bits per clock cycle. Only a single register is clocked at the same point in time via clock
gating which eases the input of the key and the initial value because the same 16 input
wires are connected to all registers. Additionally, it reduces the mean power
consumption significantly. This comes at the expense of having a temporary register
which stores intermediate results.
gates are used to enable and disable the appropriate inputs. Producing a 16-bit
encryption result after initialization requires 13 clock cycles.
Figure4.3a)schematic of Trivium
The implementation of the Trivium module has the same 16-bit AMBA APB
interface as the one for Grain. Implementing a radix-16 datapath is also motivated by
the low-power design technique. Figure 4.3b shows the details of the architecture. The
boxes denoted with comb are the combinational logic elements of the algorithm that are
26
used for updating the state according to the algorithm specification. The 288 flip-flops
for the state are separated in 16-bit registers. Additionally, two temporary registers are
necessary which store intermediate results. The output register is again used for directly
applying the XOR operation of the key stream with the input value. Again, clock gating
is used to only clock one register per clock cycle. During initialization, the key, the IV,
and the constants are loaded into the registers. Then the combinational circuit is used to
update the registers in a kind of pipeline where the temporary registers are used to
prevent overwriting of needed values. The generation of a 16-bit key stream after the
initialization phase requires 22 clock cycles.
In each step of the key stream generation, 15 specific state bits are used to update 3 bits
of the state and to compute 1 bit of key stream zi. The output of Trivium is given by
zi = ai + ai+27 + bi + bi+15 + ci + ci+45 , i = 0,1... (4.1)
The updating functions of three NFSRs are given as follows.
ai+93 = ai+24 + ci + ci+45 + ci+1ci+2 (4.2)
bi+84 = bi+6 + ai + ai+27 + ai+1ai+2 (4.3)
ci+111 = ci+24 + bi + bi+15 + bi+1bi+2 (4.4)
As we compared the power consumption of the both ciphers, comparatively Trivium is
less consumed compared with grain stream cipher.
27
CHAPTER 5
ENCRYPTION TECHNIQUES
5.1 ENCRYPTION
To make the data secure from various attacks and for the integrity of data we
must encrypt the data before it is transmitted or stored. Government, military, financial
institution, hospitals and private business deals with confidential images about their
patient (in Hospitals), geographical areas (in research ), enemy positions (in defense),
product, financial status. Most of this information is now collected and stored on
electronic computers and transmitted across network to other computer. If these
confidential images about enemy positions, patient and geographical areas fall into the
wrong hands, than such a breach of security could lead to declination of war, wrong
treatment etc. Protecting confidential images is an ethical and legal requirement.
The triple DES (3DES) algorithm was needed as a replacement for DES due to
advances in key searching. TDES uses three round message This provides TDES as a
strongest encryption algorithm since it is extremely hard to break 2^168 possible
combinations. Another option is to use two different keys for the encryption algorithm.
This reduces the memory requirement of keys in TDES. The disadvantage of this
algorithm is that it is too time consuming.
AES was developed by two scientists Joan and Vincent Rijmen in 2000. AES
uses the Rijndael block cipher. Rijndael key and block length can be 128, 192 or 256-
bits. If both the key-length and block length are 128-bit, Rijndael will perform 9
processing rounds. If the block or key is 192-bit, it performs 11 processing rounds. If
either is 256-bit, Rijndael performs 13 processing rounds.
5.2.4 BLOWFISH
5.2.4.1ENCRYPTION PROCESS
Data image as a plaintext and the encryption key are two inputs of encryption
process. In this case, original image data bit stream is divided into the blocks length of
29
Blowfish algorithm. Image header is excluded to encrypt and the start of the bitmap
pixel or array begins right after the header of the file. The byte elements of the array are
stored in row order from left to right with each row representing one scan line of the
image and the rows of the image are encrypted from top to bottom.
The encrypted image is divided into the same block length of Blowfish
algorithm from top to bottom.
The first block is entered to the decryption function and the same encryption key
is used to decrypt the image but the application of sub keys is reversed. The process of
decryption is continued with other blocks of the image from top to bottom.
30
CHAPTER 6
PROPOSED METHODOLOGY
6.1 INTRODUCTION
The proposed work is abstracted from methods proposed by ( Sonjoy Deb Roy,
Xin Li, Yonatan Shoshan, Alexander Fish , 2013) and (Paris Kitsos , Nicolas
Sklavos , George Provelengios , Athanassios N. Skodras 2013). The algorithm by
(Burhanuddin , Aamna Patel, Rozina Choudhary 2012) are combined and made
worthy to improve the watermarking .
The entire method works together to made digital data in secured form. For key
generation Trivium stream cipher technique was used. Blowfish algorithm used for the
encryption/decryption process. Video files to be separated to frames, processed that
frames .DCT was used to find the high pixel value. Watermark was generated by using
Trivium key.
31
The input video files are separated as shown in Figure 6.2. These frames are first
divided into 8 × 8 blocks. By embedding the WM specifically to each 8×8 block, tamper
localization and better detection ratios are achieved. Each of the video frames undergoes
8 × 8 block DCT and quantization.
32
Trivium is also a bit-oriented stream cipher that has two 80-bit inputs, the Key,
the Initial Vector (IV) and the Input bit. The main functionality of Trivium is quite
simple and consists of two phases, the Initialization and the Keystream generation. The
bits are managed as a group of 288-bit which is called ‘‘Internal state’’ and is denoted
by Si. The pseudo code for the Initialization phase, is given below. The initial value of
the Internal State is also defined:
Initialization
For i = 1 to 4 x 288 do
1. x1 <= S66 _ S93
2. x2 <= S162 _ S177
3. x3 <= S243 _ S288
4. t1 <= x1 _ (S91 AND S92) _ S171
5. t2 <= x2 _ (S175 AND S176) _ S264
6. t3 <= x3 _ (S286 AND S287) _S69
33
This Trivium cipher generates the key with respect to four iteration ,each iteration took
288 times and its updated to 1152 times .Figure 6.3 shows the iteration 1 results
Trivium cipher which update is state value for each cycle and present bit is depends on
previous one. Figure 6.4 shows histogram plot for comparison of keys at different times.
34
6.3.1The F function
An algorithm with the Feistel structure for encryption, with 16 rounds of
confusion and diffusion. Mathematically the functions can be expressed as below: Take
a block of 64 bits and divide it into two equal halves: L and R.
Then define the iterated block cipher when the outputs Li and Ri of the i'th round are
determined from the outputs Li-1 and Ri-1 of the previous round:
Li = Li-1
Ri = Li-1 F (Ri-1, Ki)
where Ki is the sub-key used in the ith round and F is specific to the particular
algorithm.
The F Function, regarded as the primary source of algorithm security, combines two
simple functions: addition modulo two (XOR) and addition modulo 232.
35
XL = XL Pi
XR = F (XL) XR
Swap XL and XR
End for
Swap XL and XR (Undo the last swap.)
XR = XR P17
XL = XL P18
Recombine XL and XR
Output X (64-bit data block: cipher text)
a) b)
Figure6.5 a)Input image b)encrypt image
CHAPTER 7
36
REFERENCES
10. A. Shan and E. Salari, “Real-time digital video watermarking,” in Proc. Dig. Tech.
Papers: Int. Conf. Consumer Electron., Jun. 2002, pp. 12–13.
11. L. Qiao and K. Nahrstedt, “Watermarking methods for MPEG encoded video:
Toward resolving rightful ownership,” in Proc. IEEE Int. Conf. Multimedia Comput.
Syst., Jun. 1998, pp. 276–285.
monitoring on Trimedia VLIW processor,” Proc. Inst. Elect. Eng. Vision, Image Signal
Process., vol.147, no. 4, pp. 371–376, Aug. 2000.
17. X. Wu, J. Hu, Z. Gu, and J. Huang, “A secure semi fragile watermarking for image
authentication based on integer wavelet transform with parameters,” in Proc. Australian
Workshop Grid Comput E-Research, vol. 44. 2005, pp. 75–80.
18. K. Jack, Video Demystified: A Handbook for the Digital Engineer, 2nd ed. Eagle
Rock, VA: LLH Technology Publishing, 2001.
20. F. Bartolini, M. Barni, A. Tefas, and I. Pitas, “Image authentication techniques for
surveillance applications,” Proc. IEEE, vol. 89, no. 10, pp. 1403–1418, Oct. 2001.
39
21. J. Dittmann, T. Fiebig, R. Steinmetz, S. Fischer, and I. Rimac, “Combined video and
audio watermarking: Embedding content information in multimedia data,” in Proc.
SPIE Security Watermarking Multimedia Contents II, vol. 3971. Jan. 2000, pp. 455–
464.
25. F. Arnault , T. Berger, and A. Necer, “A new class of stream ciphers combining
LFSR and FCSR architectures,” in Proc. Adv. Cryptology INDOCRYPT, LNCS 2551.
2002, pp. 22–33.