An Effective Authentication Scheme for Videos using Invisible Watermark
Jayati Bhadra1, M.Vinayaka Murthy2, M.K. Banga3
1Ms. Jayati Bhadra, Earned, St. Joseph’s College Autonomous Bangalore India.
2Dr. M. Vinayaka Murthy, REVA University, India.
3Dr. M. K Banga, Dayanand Sagar University, India.
Manuscript received on 05 June 2019 | Revised Manuscript received on 14 June 2019 | Manuscript Published on 29 June 2019 | PP: 170-175 | Volume-8 Issue-5S, May 2019 | Retrieval Number: E10360585S19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In this paper, a novel reversible keyless invisible authentication method for video piracy protection which uses randomized pixel for embedding real identity information is proposed. Randomization at two different levels is not considered in any of the existing methods. Videos, with this proposed embedding of authentication information, ensure minimum distortions and maximum resistance to the removal of authentication information. Keyless invisible embedding process increases the security and reduces the cost. This proposed approach enhances the randomization of the specific pixels where authentication information will be stored in a frame and the location of such modified pixels is stored in an immediate next frame. Each pair is identified with an embedded random number. Modified Least Significant Bit (LSB) based invisible watermark mechanism is used to embed the bits which are cost effective due to simplicity and which can withstand statistical attacks. During extraction, frame with pixel locations is used. The extracted information will be compared to assure the authenticity of video. The Euclidean distance, PSNR, MSE, SSIM proved that the proposed method can withstand visual attacks. StirMark test proved that the proposed algorithm is highly robust.
Keywords: Modified Least Significant Bit, Invisible Watermark, Video Authentication.
Scope of the Article: Authentication, Authorization, Accounting