Top Banner
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 2, FEBRUARY 2013 289 Hardware Implementation of a Digital Watermarking System for Video Authentication Sonjoy Deb Roy, Xin Li, Yonatan Shoshan, Alexander Fish, Member, IEEE, and Orly Yadid-Pecht, Fellow, IEEE Abstract —This paper presents a hardware implementation of a digital watermarking system that can insert invisible, semifragile watermark information into compressed video streams in real time. The watermark embedding is processed in the discrete cosine transform domain. To achieve high performance, the proposed system architecture employs pipeline structure and uses parallelism. Hardware implementation using field programmable gate array has been done, and an experiment was carried out using a custom versatile breadboard for overall performance eval- uation. Experimental results show that a hardware-based video authentication system using this watermarking technique features minimum video quality degradation and can withstand certain potential attacks, i.e., cover-up attacks, cropping, and segment re- moval on video sequences. Furthermore, the proposed hardware- based watermarking system features low power consumption, low cost implementation, high processing speed, and reliability. Index Terms—Digital video watermarking, hardware imple- mentation, real-time data hiding, very large scale integration (VLSI), video authentication. I. Introduction R ECENTLY, the advances in electronic and information technology, together with the rapid growth of techniques for powerful digital signal and multimedia processing, have made the distribution of video data much easier and faster [1]–[3]. However, concerns regarding authentication of the digital video are mounting, since digital video sequences are very susceptible to manipulations and alterations using widely available editing tools. This issue turns to be more significant when the video sequence is to be used as evidence. In such cases, the video data should be credible. Consequently, authentication techniques are needed in order to maintain authenticity, integrity, and security of digital video content. As a result, digital watermarking (WM), a data hiding technique has been considered as one of the key authentication methods [4], [5]. Digital watermarking is the process of embedding an Manuscript received February 15, 2011; revised November 7, 2011; accepted April 13, 2012. Date of publication June 8, 2012; date of current version February 1, 2013. This paper was recommended by Associate Editor M. Berekovic. S. D. Roy, X. Li, and O. Yadid-Pecht are with the Integrated Sensors Intelligent System Laboratory, Department of Electrical and Computer Engineering, University of Calgary, Calgary, AB T2N 1N4, Canada (e-mail: [email protected]). Y. Shoshan is with Texas Instruments, Inc., Raanana 43662, Israel (e-mail: [email protected]). A. Fish is with the VLSI Systems Center, Ben-Gurion University, Beer- Sheva 84105, Israel (e-mail: afi[email protected]). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TCSVT.2012.2203738 additional, identifying information within a host multimedia object, such as text, audio, image, or video. By adding a transparent watermark to the multimedia content, it is possible to detect hostile alterations, as well as to verify the integrity and the ownership of the digital media. Today, digital video WM techniques are widely used in var- ious video applications [2]–[7]. For video authentication, WM can ensure that the original content has not been altered. WM is used in fingerprinting to track back a malicious user and also in a copy control system with WM capability to prevent unau- thorized copying [2], [5]. Because of its commercial potential applications, current digital WM techniques have focused on multimedia data and in particular on video contents. Over the past few years, researchers have investigated the embedding process of visible or invisible digital watermarks into raw digital video [7], uncompressed digital video both on software [7]–[11], and hardware platforms [12]–[16]. Contrary to still image WM techniques, new problems and new challenges have emerged in video WM applications. Shoshan et al. [4] and Li et al. [5] presented an overview of the various existing video WM techniques and showed their features and specific requirements, possible applications, benefits, and drawbacks. The main objective of this paper is to describe an efficient hardware-based concept of a digital video WM system, which features low power consumption, efficient and low cost im- plementation, high processing speed, reliability and invisible, and semifragile watermarking in compressed video streams. It works in the discrete cosine transform (DCT) domain in real time. The proposed WM system can be integrated with video compressor unit, and it achieves performance that matches complex software algorithms [17] within a simple efficient hardware implementation. The system also features minimum video quality degradation and can withstand certain potential attacks, i.e., cover-up attacks, cropping, segment removal on video sequences. The above-mentioned design objectives were achieved via combined parallel hardware architecture with a simplified design approach of each of the components. This can enhance the suitability of this design approach to fit easily in devices that require high tampering resistance, such as surveillance cameras and video protection apparatus. The proposed WM system is implemented using the Verilog hardware description language (HDL) synthesized into a field programming gate array (FPGA) and then experimented using a custom versatile breadboard for performance evaluation. The remainder of this paper is organized as follows. Section II provides a survey on the previous related work 1051-8215/$31.00 c 2012 IEEE
13

Hardware Implementation of a Digital Watermarking System for Video Authentication

Jan 23, 2016

Download

Documents

detailed about video authentication
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Hardware Implementation of a Digital Watermarking System for Video Authentication

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 2, FEBRUARY 2013 289

Hardware Implementation of a DigitalWatermarking System for Video Authentication

Sonjoy Deb Roy, Xin Li, Yonatan Shoshan, Alexander Fish, Member, IEEE, and Orly Yadid-Pecht, Fellow, IEEE

Abstract—This paper presents a hardware implementation of adigital watermarking system that can insert invisible, semifragilewatermark information into compressed video streams in realtime. The watermark embedding is processed in the discretecosine transform domain. To achieve high performance, theproposed system architecture employs pipeline structure and usesparallelism. Hardware implementation using field programmablegate array has been done, and an experiment was carried outusing a custom versatile breadboard for overall performance eval-uation. Experimental results show that a hardware-based videoauthentication system using this watermarking technique featuresminimum video quality degradation and can withstand certainpotential attacks, i.e., cover-up attacks, cropping, and segment re-moval on video sequences. Furthermore, the proposed hardware-based watermarking system features low power consumption, lowcost implementation, high processing speed, and reliability.

Index Terms—Digital video watermarking, hardware imple-mentation, real-time data hiding, very large scale integration(VLSI), video authentication.

I. Introduction

R ECENTLY, the advances in electronic and informationtechnology, together with the rapid growth of techniques

for powerful digital signal and multimedia processing, havemade the distribution of video data much easier and faster[1]–[3]. However, concerns regarding authentication of thedigital video are mounting, since digital video sequencesare very susceptible to manipulations and alterations usingwidely available editing tools. This issue turns to be moresignificant when the video sequence is to be used as evidence.In such cases, the video data should be credible. Consequently,authentication techniques are needed in order to maintainauthenticity, integrity, and security of digital video content. Asa result, digital watermarking (WM), a data hiding techniquehas been considered as one of the key authentication methods[4], [5]. Digital watermarking is the process of embedding an

Manuscript received February 15, 2011; revised November 7, 2011;accepted April 13, 2012. Date of publication June 8, 2012; date of currentversion February 1, 2013. This paper was recommended by Associate EditorM. Berekovic.

S. D. Roy, X. Li, and O. Yadid-Pecht are with the Integrated SensorsIntelligent System Laboratory, Department of Electrical and ComputerEngineering, University of Calgary, Calgary, AB T2N 1N4, Canada (e-mail:[email protected]).

Y. Shoshan is with Texas Instruments, Inc., Raanana 43662, Israel (e-mail:[email protected]).

A. Fish is with the VLSI Systems Center, Ben-Gurion University, Beer-Sheva 84105, Israel (e-mail: [email protected]).

Color versions of one or more of the figures in this paper are availableonline at http://ieeexplore.ieee.org.

Digital Object Identifier 10.1109/TCSVT.2012.2203738

additional, identifying information within a host multimediaobject, such as text, audio, image, or video. By adding atransparent watermark to the multimedia content, it is possibleto detect hostile alterations, as well as to verify the integrityand the ownership of the digital media.

Today, digital video WM techniques are widely used in var-ious video applications [2]–[7]. For video authentication, WMcan ensure that the original content has not been altered. WMis used in fingerprinting to track back a malicious user and alsoin a copy control system with WM capability to prevent unau-thorized copying [2], [5]. Because of its commercial potentialapplications, current digital WM techniques have focused onmultimedia data and in particular on video contents. Over thepast few years, researchers have investigated the embeddingprocess of visible or invisible digital watermarks into rawdigital video [7], uncompressed digital video both on software[7]–[11], and hardware platforms [12]–[16]. Contrary to stillimage WM techniques, new problems and new challenges haveemerged in video WM applications. Shoshan et al. [4] andLi et al. [5] presented an overview of the various existingvideo WM techniques and showed their features and specificrequirements, possible applications, benefits, and drawbacks.

The main objective of this paper is to describe an efficienthardware-based concept of a digital video WM system, whichfeatures low power consumption, efficient and low cost im-plementation, high processing speed, reliability and invisible,and semifragile watermarking in compressed video streams. Itworks in the discrete cosine transform (DCT) domain in realtime. The proposed WM system can be integrated with videocompressor unit, and it achieves performance that matchescomplex software algorithms [17] within a simple efficienthardware implementation. The system also features minimumvideo quality degradation and can withstand certain potentialattacks, i.e., cover-up attacks, cropping, segment removal onvideo sequences. The above-mentioned design objectives wereachieved via combined parallel hardware architecture witha simplified design approach of each of the components.This can enhance the suitability of this design approach tofit easily in devices that require high tampering resistance,such as surveillance cameras and video protection apparatus.The proposed WM system is implemented using the Veriloghardware description language (HDL) synthesized into a fieldprogramming gate array (FPGA) and then experimented usinga custom versatile breadboard for performance evaluation.

The remainder of this paper is organized as follows.Section II provides a survey on the previous related work

1051-8215/$31.00 c© 2012 IEEE

Page 2: Hardware Implementation of a Digital Watermarking System for Video Authentication

290 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 2, FEBRUARY 2013

on video WM technologies. The details of the proposednovel video WM system solution are described in Section III.Section IV presents the hardware architecture of the proposedvideo WM system, followed by a description of the FPGA-based prototyping of the hardware architecture. Section Vdiscusses the experimental setup and verification methodologyused to analyze the FPGA experimental results, which is fol-lowed by comparisons with existing approaches. Conclusionsare presented in Section VI.

II. Related Work on Video Watermarking Systems

A. Robustness Level of WM for Video Authentication

The level of robustness of the WM can be categorizedinto three main divisions: fragile, semifragile, and robust. Awatermark is called fragile if it fails to be detectable afterthe slightest modification. A watermark is called robust ifit resists a designated class of transformations. A semifragilewatermark is the one that is able to withstand certain legitimatemodifications, but cannot resist malicious transformations [36],[42]. There is no absolute robustness scale and the definition isvery much dependent on the requirements of the applicationsat hand, as well as the set of possible attacks. Differentapplications will have different requirements.

In copyright protected applications, the attacker wishes toremove the WM without causing severe damage to the image.This can be done in various ways, including digital-to-analogand analog-to-digital conversions, cropping, scaling, segmentremoval, and others [32], [33]. Robust WM is used in theseapplications so that it remains detectable even after theseattacks are applied, provided that the host image is not severelydamaged. For image integrity applications, fragile watermarksare commonly used so that it can detect even the slightestchange in the image. Most of the fragile WM methods performthe embedding of added information in the spatial domain.

Unlike the fragile WM techniques, a semifragile invisiblewatermark, such as that proposed in this paper, is designedto withstand certain legitimate manipulations, i.e., lossy com-pression, mild geometric changes of images, but is capable ofrejecting malicious changes, i.e., cropping, segment removal,and so on. Furthermore, the semifragile approaches are gen-erally processed in the frequency domain.

Frequency-domain WM methods are more robust than thespatial-domain techniques [6]. In practical video storage anddistribution systems, video sequences are stored and transmit-ted in a compressed format, and during compression the imageis transformed from spatial domain to frequency domain.Thus, a watermark that is embedded and detected directly inthe compressed video stream can minimize computationallydemanding operations. Therefore, working on compressedrather than uncompressed video is beneficial for practical WMapplications.

B. Watermark Implementations-Hardware Versus Software

A WM system can be implemented on either softwareor hardware platforms, or some combinations of the two.In software implementation, the WM scheme can simply be

implemented in a PC environment. The WM algorithm’s oper-ations can be performed as machine code software running onan embedded processor. By programming the code and makinguse of available software tools, it can be easy to design andimplement any WM algorithm at various levels of complexity.Over the last decade, numerous software implementations ofWM algorithms for relatively low data rate signals (such asaudio and image data) have been invented [7]–[11]. Whilethe software approach has the advantage of flexibility, com-putational limitations may arise when attempting to utilizethese WM methods for video signals or in portable devices.Therefore, there is a strong incentive to apply hardware-basedimplementation for real-time WM of video streams [12]. Thehardware-level design offers several distinct advantages overthe software implementation in terms of low power consump-tion, reduced area, and reliability. It enables the addition ofa tiny, fast and potentially cheap watermark embedder as apart of portable consumer electronic devices. Such devicescan be a digital camera, camcorder, or other multimediadevices, where the multimedia data are watermarked at theorigin. On the other hand, hardware implementations of WMtechniques require flexibility in the implementation of bothcomputational and design complexity. The algorithm must becarefully designed to minimize any susceptibility, as well asmaintaining a sufficient level of security.

C. Past Research on Video Watermarking

In the past few years, research effort has been focusedon efficient WM systems implementation using hardwareplatforms. For example, Strycker et al. [12] proposed a well-known video WM scheme, called just another watermarkingsystem (JAWS), for TV broadcast monitoring and imple-mented the system on a Philips’s Trimedia TM-1000 very longinstruction word (VLIW) processor. The experimental resultsproved the feasibility of WM in a professional TV broadcastmonitoring system. Mathai et al. [13], [14] presented anapplication-specific integrated circuits (ASIC) implementationof the JAWS WM algorithm using 1.8 V, 0.18-μm comple-mentary metal oxide semiconductor technology for real-timevideo stream embedding. With a core area of 3.53 mm2 andan operating frequency of 75 MHz, that chip implementedwatermarking of raw digital video streams at a peak pixelrate of over 3 Mpixels/s while consuming only 60 mW power.A new real-time WM very large scale integration (VLSI)architecture for spatial and transform domain was presented byTsai and Wu [15]. Maes et al. [16] presented the millenniumwatermarking system for copyright protection of DVD videoand some specific issues, such as watermark detector locationand copy generation control, were also addressed in their work.An FPGA prototype was presented for HAAR-wavelet-basedreal-time video watermarking by Jeong et al. [38]. A real-timevideo watermarking system using DSP and VLIW processorswas presented in [39], which embeds the watermark usingfractal approximation by Petitjean et al. Mohanty et al. [40]presented a concept of secure digital camera with a built-ininvisible-robust watermarking and encryption facility. Also,another watermarking algorithm and corresponding VLSI ar-chitecture that inserts a broadcasters logo (a visible watermark)

Page 3: Hardware Implementation of a Digital Watermarking System for Video Authentication

ROY et al.: HARDWARE IMPLEMENTATION OF A DIGITAL WATERMARKING SYSTEM 291

Fig. 1. Overview of the proposed video WM system.

into video streams in real time was presented [41] by the samegroup.

In general, digital WM techniques proposed so far for mediaauthentication are usually designed to be visible or invisible-robust or invisible-fragile watermarks according to the levelof required robustness [4], [5]. Each of the schemes is equallyimportant due to its unique applications. In this paper, how-ever, we present the hardware implementation of the invisiblesemifragile watermarking system for video authentication. Themotivation here is to integrate the video watermarking systemwith a surveillance video camera for real-time watermarking inthe source end. Our work is the first semifragile watermarkingscheme for video streams with hardware architecture.

III. Procedure for the Digital Video

Watermarking System

In this section, a detailed description of the hardwarearchitecture of the proposed digital video WM system isprovided. Fig. 1 illustrates the general block diagram of theproposed system that is comprised of four main modules: avideo camera, video compression unit, watermark generation,and watermark embedding units.

The watermark embedding approach is designed to beperformed in the DCT domain. This holds several advantages.DCT is used in the most popular stills and video compressionformats, including JPEG, MPEG, H.26x. This allows the in-tegration of both watermarking and compression into a singlesystem. Compression is divided into three elementary phases:DCT transformation, quantization, and Huffman encoding.Embedding the watermark after quantization makes the water-mark robust to the DCT compression with a quantization ofequal or lower degree used during the watermarking process.Another advantage of this approach is that in image or videocompression the image or frames are first divided into 8 × 8blocks. By embedding the WM specifically to each 8×8 block,tamper localization and better detection ratios are achieved[25].

Each of the video frames undergoes 8 × 8 block DCTand quantization. Then, they are passed to the watermarkembedding module. The watermark generation unit produces aspecific watermark data for each video frame, based on initial

predefined secret keys. The watermark embedding moduleinserts the watermark data into the quantized DCT coefficientsfor each video frame according to the algorithm detailedbelow. Finally, watermarked DCT coefficients of each videoframe are encoded by the video compression unit whichoutputs the compressed frame with embedded authenticationwatermark data.

A. Video Compression

Currently, all popular standards for video compression,namely MPEG-x (ISO standard) and H.26x formats (ITU-Tstandard), use the same basic hybrid coding schemes that applythe principle of motion-compensated prediction and block-based transform coding using DCT [18]. MPEG-2 video com-pression standard has been described below as a representativecase for utilizing the WM algorithm for more advanced DCT-based compression methods.

Generally, a video sequence is divided into multiple groupof pictures (GOP), representing sets of video frames which areneighboring in display order. An encoded MPEG-2 video se-quence is made up of two frame-encoded pictures: intraframes(I-frame) and interframes (P-frame or B-frame). P-framesare forward prediction frames and B-frames are bidirectionalprediction frames. Within a typical sequence of an encodedGOP, P-frames may be 10% of the size of I-frames and B-frames are about 2% of the I-frames.

There can be two types of redundancies in video frames:temporal redundancy and spatial redundancy. MPEG-2 videocompression technique reduces these redundancies to com-press the images.

Within a GOP, the temporal redundancy among the videoframes is reduced by applying temporal differential pulse codemodulation (DPCM). The major video coding standards, suchas H.261, H.263, MPEG-1, MPEG-2, MPEG-4, and H.264, areall based on the hybrid DPCM/DCT CODEC, which incorpo-rates motion estimation and motion compensation function,a transform stage and an entropy encoder [19], [20]. It hasbeen illustrated in Fig. 2 that an input video frame Fn iscompared with a reference frame (previously encoded) F ′

n−1and a motion estimation function finds a region in F ′

n−1 thatmatches the current macro-block in Fn. The offset between thecurrent macro-block position and the chosen reference regionis a motion vector, dk. Based on this dk, a motion compensatedprediction F ′′

n is generated, and it is then subtracted from thecurrent macro-block to produce a residual or prediction error,e [20]. For proper decoding this motion vector, dk, has to betransmitted as well.

The spatial redundancy in the prediction error, e (also calledthe displaced frame difference) of the predicted frames, andthe I-frame is reduced by the following operations: each frameis split into blocks of 8 × 8 pixels that are compressed usingthe DCT followed by quantization (Q) and entropy coding(run-level-coding and Huffman coding) (Fig. 2).

Hardware implementation of MPEG-2 standard is not thatsimple. For simplifying the implementation of the video com-pressor module, the motion JPEG (MJPEG) video encodingtechnique rather than the MPEG-2 can also be considered, andit was chosen in our experiment. The MJPEG standard was

Page 4: Hardware Implementation of a Digital Watermarking System for Video Authentication

292 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 2, FEBRUARY 2013

Fig. 2. Block diagram of hybrid DPCM/DCT coding scheme [20].

developed by Xinph.org Foundation for Theora encoders(based on VP3 made by On2 Technologies) [26], [37] tocompete with MPEG encoders efficiently. The encoding pro-cess, performed on the raw data, is similar in both MPEG-2and MJPEG. The only difference is the motion compensatedprediction that is used in MPEG to encode the interframes(P, B frames).

B. Watermark Generation

Since simple watermark data can be easily cracked, it is es-sential that the primitive watermark sequence will be encodedby an encipher. This insures that the primitive watermark dataare secured before being embedded into each video frame.Currently, there are different approaches to convert a primitivewatermark into a secured pattern [14], [15]. Contradictoryto existing solution approaches, a novel video watermarkgenerator is proposed. The WM generator generates a securewatermark sequence for each video frame using a meaningfulprimitive watermark sequence and secret input keys.

According to the recommendation by Dittman et al. in [22]for the feature of a video watermark, a primitive watermarkpattern can be defined as a meaningful identifying sequence foreach video frame. As shown in Fig. 3, the unique meaningfulwatermark data for each video frame contain the time, date,camera ID, and frame serial number (that is related to itscreation). This will establish a unique relationship of thevideo stream frames with the time instant, the specific videocamera, and the frame number. Any manipulation, such asframe exchange, cut, and substitution, will be detected by thespecific watermark. The corresponding N-bit (64-bit) binaryvalued pattern, ai,, will be used as a primitive watermarksequence. This would generate a different watermark for everyframe (time-varying) because of the instantaneously changingserial number and time.

The block diagram of the proposed novel watermark gen-erator is depicted in Fig. 4. A secure watermark pattern isgenerated by performing expanding, scrambling, and modula-tion on a primitive watermark sequence. There are two digitalsecret keys: Key 1 is used for scrambling and Key 2 is used forthe random number generator (RNG) module that generates apseudorandom sequence.

Initially, the primitive binary watermark sequence, ai (of64 bit), is expanded (ai

′) and stored in a memory buffer. It

Fig. 3. Structure of the primitive watermark.

Fig. 4. Block diagram of the proposed watermark generator.

is expanded by a factor cr. For example, if we use a 64-bit primitive watermark sequence then for a 256 × 256-pixelsvideo frame, cr will be (256 × 256/(8 × 8)) or 1024. This isdone to meet the appropriate length for the video frame.

Scrambling is actually a sequence of XOR operations amongthe contents (bytes) of the expanded primitive WM in thebuffer. Key 1 initiates the scrambling process by specifyingtwo different addresses (Add1 and Add2) of the buffer forhaving the XOR operation in between them. The basic purposeof scrambling is to add complexity and encryption in theprimitive watermark structure. After that, the expanded andscrambled sequence ci is obtained. The bit size of ci isthe same as the size of the video of frame. Finally, theexpanded and scrambled watermark sequence, ci, is modulatedby a binary pseudorandom sequence to generate the securedwatermark sequence wi. Due to the random nature of thepseudorandom sequence pi, modulation makes the watermarksequence ci a pseudorandom sequence and thus difficult todetect, locate, and manipulate.

A secure pseudorandom sequence pi used for the modu-lation can be generated by an RNG structure using the Key2. RNG is based on a Gollmann cascade of filtered feedbackwith carry shift register (F-FCSR) cores, presented by Li etal. [23], [30].

C. Watermark Embedding

Watermark embedding is done only in the I (intra) frames.It is understandable since B and P frames are predicted from I

Page 5: Hardware Implementation of a Digital Watermarking System for Video Authentication

ROY et al.: HARDWARE IMPLEMENTATION OF A DIGITAL WATERMARKING SYSTEM 293

Fig. 5. Dataflow of the proposed WM algorithm.

frames. If all I, B, P frames are watermarked, the watermarkeddata of the previous frame and the one of the current framemay accumulate, resulting in visual artifacts (called “drift”or “error accumulation”) during decoding procedures [8]. Toavoid such a major issue, within each GOP of MPEG-2 videostream, only the I-frame is identified to be watermarked.

The watermarking algorithm should be hardware friendlyin a way that it can be implemented in hardware with highthroughput. For this purpose, one concern for the algorithmdevelopment should be that it must support pipelining archi-tecture so that two or more macroblocks inside a single videoframe or more than one frame can be watermarked simultane-ously. This feature will aid in increasing the processing speedof watermarking.

The watermark embedding approach used in this paperwas originally developed by Nelson et al. [24] and Shoshanet al. [25]. This WM algorithm, capable of inserting asemifragile invisible watermark in a compressed image in theDCT frequency domain, was modified and then applied inwatermarking of a video stream. In general, for each DCTblock of a video frame, N cells need to be identified as“watermarkable” and modulated by the watermark sequence.The chosen cells contain nonzero DCT coefficient values andare found in the mid-frequency range. This algorithm wasdetailed by Shoshan et al. [25]. The proposed WM algorithmalong with MPEG-2 video encoding standard is presented asa flow chart in Fig. 5. This can be described as follows.

1) Split I frame and watermark data into 8 × 8 blocks.2) For each 8×8 block (both watermark data and I frame),

perform DCT, quantization, and zig–zag scan to generatequantized DCT coefficients.

3) Identify N watermarkable cells for each block andcalculate the modification value for each selected cell.

4) Modify the identified watermarkable DCT coefficientsaccording to the modification values.

5) Perform inverse DCT and inverse quantization for each8 × 8 block watermarked coefficient to reconstruct theoriginal I pixel values.

6) Buffer the reconstructed watermarked I frame.

Fig. 6. Block diagram of the hardware system architecture.

7) Perform motion estimation for B/P frames to obtain themotion vector.

8) Using the motion vector and reconstructed watermarkedI frame motion compensation is done.

9) Difference between the motion-compensated predictionframe and the watermarked reference frame I is theprediction error.

10) Perform DCT, quantization, and zig–zag scan on theprediction error.

11) Perform entropy coding for the blocks of the differentframes.

12) Generate compressed and watermark embedded videosteam.

13) To avoid heavy computationally demanding operationsand to simplify the hardware implementation, water-marking can be done with MJPEG standard video com-pressing unit. Since watermark is only embedded on Iframes, the steps stated above will be the same for theMJPEG video standard except for the motion estimationand motion compensation.

IV. Hardware Architecture Design

There exists a wide range of available techniques to im-plement the peripheral blocks of the proposed video WM

Page 6: Hardware Implementation of a Digital Watermarking System for Video Authentication

294 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 2, FEBRUARY 2013

Fig. 7. Hardware architecture of MJPEG video compressor module with Watermarking unit (Fori is the original frame, Fref is the reference frame).

system. Here, the focus is on simplifying the process asmuch as possible, thus making it fit easily within existingvideo processing circuitry. At the same time, the security leveland video frame quality are kept high. An overall view ofthe hardware implementation for the video WM system isdepicted in Fig. 6. The proposed system architecture includessix modules: video camera, video compressor, watermarkgenerator, watermark embedder, control unit, and memory. Theparts implemented by the FPGA are shown in shaded blocks.

The hardware implementation for the complete design isdeveloped using Verilog HDL. As previously mentioned, allthe processing in the implementation is assumed to be doneon a block basis (such as 8 × 8 pixels). First, the capturedvideo frame is temporarily stored in a memory buffer, andthen each block of the frame data is continuously processedby the video compressor unit using DCT and quantizationcores. The watermark embedder block inserts an identifyingmessage, generated using the watermark generator unit, in theselected block data within the video frame and sends it tomemory for storage. The control unit is responsible for drivingthe operations of the modules and the data flow in the wholesystem.

A. Video Compressor

For hardware implementation of the video compressormodule, the MJPEG video encoding technique rather thanthe MPEG-2 standard was chosen as because MJPEG offersseveral significant advantages over the MPEG-2 technique forhardware implementation [27]. Even though MJPEG providesless compression than MPEG-2, it is easy to implement theMJPEG format in hardware with relatively low computa-tional complexity and low power dissipation. Moreover, it is

available for free usage and modification, and it is nowsupported by many video data players, such as VLC mediaplayer [28], MPlayer [29], and so on [30], [37].

Furthermore, using the MJPEG video encoding techniquehas no effect on the watermark embedding procedure, since theintraframes (chosen as watermarkable) in both compressionstandards have the same formats. This is due to the sameencoding process that is performed on the raw data. Thedifference is motion-compensated prediction, which is usedto encode the interframes. However, as described, only the in-traframes are identified to be watermarked, thus the proceduredoes not affect the watermark embedding process. Therefore,for our evaluation purposes, the MJPEG compression standardwas found to be a better alternative for hardware imple-mentation of the video compressor module than the MPEG-2 standard. Fig. 7 depicts the hardware architecture of theMJPEG video compressor.

Depending on the types of the frames, raw video dataare encoded either directly (intraframe) or after the referenceframe is subtracted (interframe). The encoded interframes (P)are passed to the decoder directly and intraframes (I) are fedto watermark embedder and after WM embedding they arealso passed to the decoder.

The output of the decoder is combined with the referenceframe data delayed by the bypass buffer so that it arrives at thesame time as the processed one and is fed to the multiplexer.The multiplexer selects the inverse DCT output (decoded in-traframes) or the sum of the inverse DCT output and previousreference frame (decoded interframes). The multiplexer outputis stored in the SRAM as reconstructed frames. Furthermore,the decoded interframes are stored in a memory buffer to beutilized as reference frame for the next frames which are yet

Page 7: Hardware Implementation of a Digital Watermarking System for Video Authentication

ROY et al.: HARDWARE IMPLEMENTATION OF A DIGITAL WATERMARKING SYSTEM 295

Fig. 8. Hardware architecture of the watermark generator module.

to be encoded. The second branch of the video data from theencoder block is fed to the watermark embedder module.

B. Watermark Generator

Fig. 8 describes the hardware architecture of the novel wa-termark generator. The expanding procedure is accomplishedby providing consecutive clock signal so that an expandedwatermark sequence can be generated by reading out theprimitive watermark sequence (ai) for cr times. Expandedsequence (ai

′) is stored in memory buffer.Scrambling is done by using the secret digital key Key1,

which has two parts. The two different parts initiate twodifferent counters. At each state of the counters two readings(addressed by Add1 and Add2) from the buffer occur forhaving the XOR operation between them. Thus, the scrambledwatermark sequence, ci, is generated. Furthermore, differentdigital keys can make the counters start running with differentstates and generate different corresponding addresses so thatwe can get different patterns of ci.

A secure pseudorandom sequence pi, generated by theproposed Gollman cascade filtered feedback with carry shiftregister RNG [23], seeded with secret key Key2, is used tomodulate the expanded and scrambled watermark sequence ci.Finally, the generated secure watermark data wi is embeddedinto the video stream by the watermark embedder.

C. Watermark Embedder

A schematic view of the hardware architecture for thewatermark embedder unit is presented in Fig. 9. As describedby Shoshan et al. [25], the watermark embedder works intwo phases (calculation and embedding). When consideringa cycle of embedding the watermark in one 8 × 8 blockof pixels, each phase takes one block cycle. Two blocksare processed simultaneously in a pipelined manner so thatthe embedding process only requires one block cycle. Asthe number of cells to be watermarked (N) in an 8 × 8block increases, the security robustness of the algorithm alsoincreases. But such an increase reduces the video frame qualitybecause of the reduction in the originality of the video frame.Simulation results show that even for N as low as 2, theperformance like detection ratio or peak signal-to-noise ratio(PSNR) is satisfactory. A block that produces less than Ncells is considered to be unmarked and disregarded. Only

Fig. 9. Hardware architecture of the watermark embedder module designedby Shoshan et al. [25].

blocks that are distinctively homogeneous and have low valuesfor high-frequency coefficients are problematic. The detailsof the architecture for the watermark embedder module werepresented by Shoshan et al. [25].

D. Control Unit

The control unit generates control signals to synchronizethe overall process in the whole system. As shown in Fig. 10,it is implemented as a finite state machine (FSM) with fourmain states.

1) S0: In this initial state, all the modules stay idle tillthe signal Start is set to high. Depending on the Selectsignal, different processing steps are applied to the videoframes. When Select is 1, the control state will move tostate S1 for intraframes or directly jump to the state S2for interframes if Select is 0.

2) S1: In this state, watermark embedding is performed.The intraframe blocks read from memory and the gen-erated watermark sequence are added together by ac-tivating the watermark embedder module in this state.Once the watermarking is completed for the block, Blksignal will be “1” and the FSM moves to state S2.

3) S2: In the state S2, the watermarked intraframe datafrom the watermark embedder module or the unmodifiedinterframe sequences from the memory are encoded. Thesignal Blk remains “0” until the encoding of the currentblock is completed. When finished, the encoded andwatermarked blocks are fed to the next state S3.

4) S3: In this stage, the watermarked and compressed videoframe blocks are written back to the memory. When allthe blocks of a frame are encoded the control signal Imgchanges to “1” and the FSM goes back to the state S0for considering the next frame. If encoding of all theblocks of the current frame is not finished, the systemgoes back to the state S1 or S2 depending on the typeof the current frame (interframe or intraframe).

E. FPGA-Based Prototyping

Each module in the proposed digital video WM system,including the MJPEG compressor, watermark generator andwatermark embedder has been implemented and tested indi-vidually, and then integrated together to obtain the final systemarchitecture. The proposed architecture was first modeled in

Page 8: Hardware Implementation of a Digital Watermarking System for Video Authentication

296 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 2, FEBRUARY 2013

Fig. 10. State diagram of the controller for WM system.

TABLE I

FPGA Synthesis Report

Components Logic Memory Initial PowerCells Bits Latency Consumption

(cycles)MJPEG videocompressor

8822 13 540 188260 mW

Watermarkgenerator

309 512 64

10 mWWatermarkembedder

132 744 64

Overall archi-tecture

9263 14 796 320 270 mW

Verilog HDL and the functional simulation of the HDL designwas performed using the Mentor’s ModelSim tool. Finally,the system design was synthesized to Altera Cyclone EP1C20FPGA device using Altera Quartus II design software. Theblock diagram of the FPGA implementation of the wholesystem is shown in Fig. 11. The synthesis results provide thehardware resources usage of the units, as shown in Table I.

V. Experimental Results

A. Methodology for Verification

In order to evaluate the performance of the hardware-basedvideo WM system properly, the algorithm was tested withtwo representative grey-scale video clips: a “dynamic” scene,which has significant high-frequency patterns and a “static”scene, which has several homogenous (low spatial frequency)areas. The video streams at a rate of 25 frames/s (f/s) and256 × 256 pixels/frame were captured by a surveillance videocamera.

For each video stream, a comparison was performed be-tween two sets of experimental results: original video streamversus MJPEG video stream and original video data versuswatermarked video stream. The comparisons were quantifiedusing the standard video quality metric: PSNR, which is awell-known quantitative measure in multimedia processingused to determine the fidelity of a video frame and the amountof distortion found in it, as suggested by Piva et al. [3] andStrycker et al. [12]. The PSNR, measured in decibels (dB), iscomputed using

PSNR = 10 log10

(255

MSE

)(1)

MSE =1

MN

M−1∑m=0

N−1∑n=0

[f (m, n) − k (m, n)

]2(2)

where 255 is the maximum pixel value in the grey-scale imageand MSE is the average mean-squared error, as defined in (2).Here, f and k are the two compared images, the size of eachbeing M × N pixels (256 × 256 pixels in our experiment).

B. Analysis of Experimental Results

The results of the experiment done with the implementedsystem are presented in Fig. 12, which contains the originalsample frames, the compressed frames, and the watermarkedframes. Here, the presented results are achieved for the casethat only two DCT coefficients in each block are changed.In terms of PSNR, the quality of the watermarked framesis maintained above ∼35 dB, measured consistently with novisually perceptible artifacts. Moreover, the quality of thevideo with watermark is comparable to the one generated bya software-based algorithm.

Three sets of video GOPs consisting of three frames (oneI and two P frames) were tested (for both static and dynamicscenes). As described above, the interframes are encodedbased on the intraframes, and thus the PSNR values ofthe intraframes are expected to be higher than those of theinterframes, as demonstrated in Fig. 13(a) and (b). That is whywe get the “hill” behavior at the first, fourth, and seventh famethat are the I-frames. On the other hand, watermark embeddingdid not degrade the quality of the video streams compared tothe compressed video without watermark embedded (Fig. 13).Therefore, the proposed hardware implementation of videowatermarking system features minimum degradation of videoquality.

C. Performance Analysis

The performance of the overall FPGA implementation wasevaluated in terms of hardware cost, power consumption,processing speed, and security issues.

1) Hardware Cost and Power Consumption: The hardwareresources used by the different modules are given in Table I.The results clearly indicate that the addition of the water-mark generator and embedder modules caused only 4.99%increase in logic cells usage and 9.28% increase in memoryresources consumed with relation to the hardware of the videocompressor.

Page 9: Hardware Implementation of a Digital Watermarking System for Video Authentication

ROY et al.: HARDWARE IMPLEMENTATION OF A DIGITAL WATERMARKING SYSTEM 297

Fig. 11. FPGA-based implementation of the proposed video WM system.

Fig. 12. Examples of watermarked video streams. (a) Original video frame. (b) MJPEG video frame. (c) Watermarked video frame.

The combined system would easily fit in the original FPGAdevice. In general, any device that is large enough for theimplementation of the MJPEG video compressor would beable to accommodate the additional hardware required for thewatermark generator and embedder blocks.

Power consumption is an important concern in hardwareimplementation of a VLSI system. As this is a constrainton the system it needs to be kept low as much as possi-ble. Using the built-in power analyzer of Altera Quartus IIthe power consumption of our WM system was measuredand it was found that the MJPEG video compressor withthe watermarking unit consumes 270 mW power, whereas

the MJPEG video compressor itself consumes 260 mWpower.

So with an addition of 10 mW power the video water-marking unit (watermark generator and watermark embed-der) can be integrated into the MJPEG video compressorunit.

2) Processing Speed: The data of each frame are processedmacroblock (8×8) wise. Each macro-block first passes throughthe DCT module, and then through the WM embedder andinverse DCT module, respectively. From the timing diagramof Fig. 14, the processing time of a single I frame can bedetermined.

Page 10: Hardware Implementation of a Digital Watermarking System for Video Authentication

298 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 2, FEBRUARY 2013

Fig. 13. PSNR comparisons. (a) Static scene. (b) Dynamic scene.

Fig. 14. Timing diagram of a 256 × 256 frame processing (I frame). MBstands for macroblock of 8 × 8 pixels.

For the first 8×8 macro-block of a frame it takes 320 clockcycles. Then for all the later 8 × 8 blocks it takes 64 cycleseach (throughput). The WM generator takes 64 clock cycles togenerate the WM data that are completed at the first 64 clockcycles of the frame processing period, and then WM data arestored in a WM buffer. Hence, the WM generator does notcontribute to the initial latency of the frame processing period.The pipelining architecture and parallelism of the designedsystem helped in achieving this high throughput after the initiallatency state. Processing of P frame will require less time asthey are not watermarked. If we consider a video frame ofN × M pixel resolution, the time it would take to watermarkone frame of the video is defined by

T =

[Latency +

(MN

8 × 8− 1

)Throughput

]1

clockfrequency

.

(3)For the present case, in which real-time video streams of

size 256 × 256 pixels/frame are used, the number of cyclesit would take to watermark one frame would be 65 792 clockcycles. Thus, the processing time it takes to watermark eachframe is 1.6 ms (607 f/s) at a clock frequency of 40 MHz. Forvideo streams of 640 × 480 pixels/frame, the processing timewould be 7 ms/frame (130 f/s). This means that if this water-marking system is employed in practical applications (such asa surveillance video system) with an input video of 30 frame/s,then the implemented watermark system can watermark the

video stream in real time. The reason of this high frame rate isthe pipelining architecture of the watermarking system alongwith the video encoder. Another reason is that the encodedvideo is of MJPEG standard which requires less processingtime than MPEG standard. If the proposed system is integratedwith an MPEG encoder then the processing time will be higheronly because of the MPEG encoding process, as the watermarkembedding process will remain the same.

3) Robustness Analysis: As stated before, the WMsystem, designed in this paper, is for invisible semifrag-ile watermark that is allowed to withstand certain legiti-mate manipulations, i.e., lossy compression, mild geometricchanges of images, but is capable of rejecting maliciouschanges, i.e., cover-up attack, cropping segment removal, andso on.

To prove the robustness of the watermark, two sample videosequences were embedded with watermark according to theproposed algorithm. The cover-up attack is applied to thewatermarked sample video. The tampered video is analyzedby the watermark detector, which outputs a detection map. Thedetection map is used to indicate which blocks of the imageare suspected as inauthentic.

The results of the tamper detection of the video sequencesare presented in Figs. 15 and 16. Only one frame of videosamples is shown here as an example. Following tamperingwas done in the video sequence-1.

1) The book in the hand of the person was removed bycopying the contents of adjacent blocks onto the blockswhere the book was in the original frame. To an innocentobserver the original existence of the book in the videoframes is visually undetectable.

2) The segment containing the electrical outlet on thewall under the white board was also removed. Hencethe electrical outlet was also undetectable in the videoframes.

In video sequence-2, the portion of the white horse wascovered up by a black horse, so for an innocent observerit seems that there was no white horse in the frame. The

Page 11: Hardware Implementation of a Digital Watermarking System for Video Authentication

ROY et al.: HARDWARE IMPLEMENTATION OF A DIGITAL WATERMARKING SYSTEM 299

Fig. 15. Tamper detection of video sample-1. (a) Original video. (b) Watermarked video. (c) Tampered video. (d) Detected video.

Fig. 16. Tamper detection of video sample-2. (a) Original video. (b) Watermarked video. (c) Tampered video. (d) Detected video.

TABLE II

Comparisons With Other Video WM Chips

Research Design Type Type of WM Video Processing Chip StatisticsWorks Standard Domain/Method

Logic Cells Clock Frequency and PSNR(kilogates) Processing Speed

Strycker et al. [12] DSP board Invisible-Robust – Spatial N/A 100 MHz N/A

Mathai et al. [14] Custom IC-0.18 μm Invisible-Robust – Wavelet N/A 75 MHz at 30 f/s(320 × 320)

40 dB

Tsai and Wu [15] Custom IC Robust RawVideo Spatial N/A N/A N/AMaes et al. [16] FPGA Custom IC Robust MPEG Spatial 17, 14 N/A N/APetitjean et al. [39] FPGA Board DSP Board Invisible-Robust MPEG Fractal N/A 50 MHz takes 6 μs

250 MHz takes 118 μsN/A

Mohanty et al. [41] FPGA Visible MPEG-4 DCT 28.3 100 MHz at 43 f/s(320 × 240)

Around 30 dB

This Paper FPGA Semifragile MJPEG DCT 9.263 40 MHz at 607 f/s (256 × 256)40 MHz at 130 f/s (640 × 480)

44 dB

detection map successfully illustrated the blocks of the tam-pered video frame, which are suspected as inauthentic.

It is important to understand that the proposed WM systemembeds the watermark into MJPEG video frames and enablesthe detection of tampered video frames. The detection isdone in software by using the same algorithm utilized for thewatermark embedding process. Both modifications are easilynoticed using the detection map created by the watermarkdetector and presented in Figs. 15(d) and 16(d).

4) Security Issues: The encryption of the watermark ismainly dependent on the statistical property of the pseudo-random sequence generated by the random number generator(RNG) module, since the primitive watermark is modulatedby the pseudorandom sequence.

Hence, it is necessary that the pseudorandom sequenceshould have the statistical property as close as possible to atrue random sequence [23]. A true random binary sequencehas equal distribution of 1s and 0s. Another indication of therandomness of the sequence is the autocorrelation values ofthe sequence. This feature is crucial for the resistance of thesequence to correlation attacks [23].

In order to evaluate the statistical quality of the pseudoran-dom number sequence generated by the Gollmann cascade F-FCSR RNG module, designed in [23], two tests were carriedout. First, a comparison between the autocorrelation valuesof the proposed Gollman Cascade F-FCSR RNG and F-FCSRRNG (which is well studied and known to have good statisticalproperty [34]) with a similar size, was done. The second

Page 12: Hardware Implementation of a Digital Watermarking System for Video Authentication

300 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 2, FEBRUARY 2013

evaluation was done using the statistical test suite availablethrough the National Institute of Standards and Technology(NIST) [35]. NIST provides a comprehensive tool to verifythe statistical quality of a pseudorandom sequence throughvarious tests. These tests check the properties of the sequenceand compare the results with the expected values of a truerandom sequence [35]. The tests were all successful andproved that the proposed RNG meets the standards comparedto other published RNGs, while providing a simple designmethodology [23].

5) Comparison With Existing Research: The proposedhardware-based video WM authentication features minimumvideo frame quality degradation with no visually perceptibleartifacts and high PSNR values. Moreover, the results arecomparable to that generated by software-based algorithms.However, the complexity of the proposed algorithm is lowersince only the intraframes are modified and the results shownare achieved with only two DCT coefficients in each 8 × 8block being changed. Furthermore, the watermark embeddingthat is designed to be performed directly in the compressedvideo streams minimizes computationally demanding opera-tions.

Table II presents a comparative perspective with otherpublished hardware-based video WM systems. The proposedWM system is the first that employs an invisible semifragilewatermark approach in the frequency domain (DCT) for videostreams with fewer logic gates and higher processing speedcompared to other works, such as in [12]–[16], [39], and [41].

VI. Conclusion

A. Summary and Conclusion

Design of the hardware architecture of a novel digital videowatermarking system to authenticate video stream in real timewas presented in this paper. FPGA-based prototyping for thehardware architecture was developed. The proposed systemwas suitable for implementation using an FPGA and can beused as a part of an ASIC. In the current implementation,FPGA was the simple and available way of the proof-of-concept. The implementation made integration to peripheralvideo (such as surveillance cameras) to achieve real-timeimage data protection. The aim of this paper was to achievethree objectives.

First, to propose a new HW architecture of a digital wa-termarking system for video authentication and making itsuitable for VLSI implementation. Second, to ensure that thewatermarking algorithm achieves a certain level of securityto withstand certain potential threats. Third, to make thewatermarking system suitable for a real time video, whichcan be easily adapted with commonly used digital videocompression standards with minor video frame degradation.

Contradictory to existing solutions, where robust WM algo-rithms were mainly used, a semifragile WM system for videoauthentication was developed in this paper. The proposedwatermark system was capable of watermarking video streamsin the DCT domain in real time. It was also demonstrated thatthe designed system was capable of achieving the requiredsecurity level with minor video frame quality degradation.

B. Future Research

Future research should concentrate on applying the wa-termarking algorithm to other modern video compressionstandards, such as MPEG-4/H.264, so that it can be utilizedin various commercial applications as well. Embedding thewatermark information within high resolution video streamsin real time is another challenge.

Acknowledgment

The authors would like to thank Dr. E. Pecht, Technologiesand Beyond, University of Calgary, Calgary, AB, Canada, forhis constructive suggestions and helpful advice.

References

[1] V. M. Potdar, S. Han, and E. Chang, “A survey of digital imagewatermarking techniques,” in Proc. IEEE Int. Conf. Ind. Informatics,Aug. 2005, pp. 709–716.

[2] A. D. Gwenael and J. L. Dugelay, “A guide tour of video watermarking,”Signal Process. Image Commun., vol. 18, no. 4, pp. 263–282, Apr. 2003.

[3] A. Piva, F. Bartolini, and M. Barni, “Managing copyright in opennetworks,” IEEE Trans. Internet Comput., vol. 6, no. 3, pp. 18–26, May–Jun. 2002.

[4] Y. Shoshan, A. Fish, X. Li, G. A. Jullien, and O. Yadid-Pecht, “VLSIwatermark implementations and applications,” Int. J. Information Tech-nol. Knowl., vol. 2, no. 4 pp. 379–386, Jun. 2008.

[5] X. Li, Y. Shoshan, A. Fish, G. A. Jullien, and O. Yadid-Pecht, “Hardwareimplementations of video watermarking,” in International Book Serieson Information Science and Computing, no. 5. Sofia, Bulgaria: Inst. In-form. Theories Applicat. FOI ITHEA, Jun. 2008, pp. 9–16 (supplementto the Int. J. Inform. Technol. Knowledge, vol. 2, 2008).

[6] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spreadspectrum watermarking for multimedia,” IEEE Trans. Image Process.,vol. 6, no. 12, pp. 1673–1687, Dec. 1997.

[7] S. P. Mohanty. (1999). Digital Watermarking: A TutorialReview [Online]. Available: http://www.linkpdf.com/download/dl/digital-watermarking-a-tutorial-review-.pdf

[8] F. Hartung and B. Girod, “Watermarking of uncompressed and com-pressed video,” IEEE Trans. Signal Process., vol. 66, no. 3, pp. 283–302,May 1998.

[9] T. L. Wu and S. F. Wu, “Selective encryption and watermarking ofMPEG video,” in Proc. Int. Conf. Image Sci. Syst. Technol. (CISST),Jun. 1997, pp. 0–9.

[10] A. Shan and E. Salari, “Real-time digital video watermarking,” in Proc.Dig. Tech. Papers: Int. Conf. Consumer Electron., Jun. 2002, pp. 12–13.

[11] L. Qiao and K. Nahrstedt, “Watermarking methods for MPEG encodedvideo: Toward resolving rightful ownership,” in Proc. IEEE Int. Conf.Multimedia Comput. Syst., Jun. 1998, pp. 276–285.

[12] L. D. Strycker, P. Termont, J. Vandewege, J. Haitsma, A. Kalker,M. Maes, and G. Depovere, “Implementation of a real-time digitalwatermarking process for broadcast monitoring on Trimedia VLIWprocessor,” Proc. Inst. Elect. Eng. Vision, Image Signal Process., vol.147, no. 4, pp. 371–376, Aug. 2000.

[13] N. J. Mathai, A. Sheikholesami, and D. Kundur, “Hardware implementa-tion perspectives of digital video watermarking algorithms,” IEEE Trans.Signal Process., vol. 51, no. 4, pp. 925–938, Apr. 2003.

[14] N. J. Mathai, A. Sheikholesami, and D. Kundur, “VLSI implementationof a real-time video watermark embedder and detector,” in Proc. Int.Symp. Circuits Syst., vol. 2. May 2003, pp. 772–775.

[15] T. H. Tsai and C. Y. Wu, “An implementation of configurable digitalwatermarking systems in MPEG video encoder,” in Proc. Int. Conf.Consumer Electron., Jun. 2003, pp. 216–217.

[16] M. Maes, T. Kalker, J. P. Linnartz, J. Talstra, G. Depoyere, and J.Haitsma, “Digital watermarking for DVD video copy protection,” IEEESignal Process. Mag., vol. 17, no. 5, pp. 47–57, Sep. 2000.

[17] X. Wu, J. Hu, Z. Gu, and J. Huang, “A secure semifragile watermark-ing for image authentication based on integer wavelet transform withparameters,” in Proc. Australian Workshop Grid Comput. E-Research,vol. 44. 2005, pp. 75–80.

[18] Information Technology: Generic Coding of Moving Pictures and As-sociated Audio Information, ISO/IEC 13818-2:1996(E), Video Interna-tional Standard, 1996.

Page 13: Hardware Implementation of a Digital Watermarking System for Video Authentication

ROY et al.: HARDWARE IMPLEMENTATION OF A DIGITAL WATERMARKING SYSTEM 301

[19] K. Jack, Video Demystified: A Handbook for the Digital Engineer, 2nded. Eagle Rock, VA: LLH Technology Publishing, 2001.

[20] I. E. G. Richardson, H.264 and MPEG-4 Video Compression. Chichester,U.K.: Wiley, 2003.

[21] F. Bartolini, M. Barni, A. Tefas, and I. Pitas, “Image authenticationtechniques for surveillance applications,” Proc. IEEE, vol. 89, no. 10,pp. 1403–1418, Oct. 2001.

[22] J. Dittmann, T. Fiebig, R. Steinmetz, S. Fischer, and I. Rimac, “Com-bined video and audio watermarking: Embedding content informationin multimedia data,” in Proc. SPIE Security Watermarking MultimediaContents II, vol. 3971. Jan. 2000, pp. 455–464.

[23] X. Li, Y. Shoshan, A. Fish, and G. A. Jullien, “A simplified approachfor designing secure random number generators in HW,” in Proc. IEEEInt. Conf. Electron. Circuits Syst., Aug. 2008, pp. 372–375.

[24] G. R. Nelson, G. A. Jullien, and O. Yadid-Pecht, “CMOS image sensorwith watermarking capabilities,” in Proc. IEEE Int. Symp. Circuits Syst.vol. 5. May 2005, pp. 5326–5329.

[25] Y. Shoshan, A. Fish, G. A. Jullien, and O. Yadid-Pecht, “Hardwareimplementation of a DCT watermark for CMOS image sensors,” in Proc.IEEE Int. Conf. Electron. Circuits Syst., Aug. 2008, pp. 368–371.

[26] Theora.org. (2012, Mar. 8) [Online]. Available: http://www.theora.org/[27] A. Filippov, “Encoding high-resolution Ogg/Theora video with recon-

figurable FPGAs,” Xcell J. (Plugging into High-Volume ConsumerProducts), no. 53, pp. 19–21, 2005 [Online]. Available: http://www.xilinx.com/publications/archives/xcell/Xcell53.pdf

[28] (2012, Mar. 8) [Online]. Available: http://www.videolan.org/vlc/features.php?cat=video

[29] (2011, Apr. 25) [Online]. Available: http://www.mplayerhq.hu/design7/info.html

[30] (2012, Jan. 13) [Online]. Available: http://wiki.xiph.org/index.php/TheoraSoftwarePlayers

[31] B. Schneier, Applied Cryptography, 2nd ed. New York: Wiley, 1996.[32] V. M. Potdar, S. Han, and E. Chang, “A survey of digital image

watermarking techniques,” in Proc. 3rd IEEE Int. Conf. Ind. Informatics,2005, pp. 709–716.

[33] F. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding: Asurvey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, 1999.

[34] F. Arnault, T. Berger, and A. Necer, “A new class of stream cipherscombining LFSR and FCSR architectures,” in Proc. Adv. CryptologyINDOCRYPT, LNCS 2551. 2002, pp. 22–33.

[35] NIST. (2012, Jun. 19). A Statistical Test Suite for the Validation ofRandom Number Generators and Pseudo Random Number Generatorsfor Cryptographic Applications [Online]. Available: http://csrc.nist.gov/groups/ST/toolkit/rng/documentation−software.html

[36] (2012, Jul. 28) [Online]. Available: http://en.wikipedia.org/wiki/Digital−watermarking

[37] (2012, Apr. 16) [Online]. Available: http://en.wikipedia.org/wiki/Motion−JPEG

[38] Y.-J. Jeong, K.-S. Moon, and J.-N. Kim, “Implementation of real timevideo watermark embedder based on Haar wavelet transform usingFPGA,” in Proc. 2nd Int. Conf. Future Generation Commun. NetworkingSymp., 2008, pp. 63–66.

[39] G. Petitjean, J. L. Dugelay, S. Gabriele, C. Rey, and J. Nicolai, “Towardsrealtime video watermarking for systems-on-chip,” in Proc. IEEE Int.Conf. Multimedia Expo, vol. 1. 2002, pp. 597–600.

[40] S. P. Mohanty, “A secure digital camera architecture for integrated real-time digital rights management,” J. Syst. Architecture, vol. 55, nos. 10–12, pp. 468–480, Oct.–Dec. 2009.

[41] S. P. Mohanty and E. Kougianos, “Real-time perceptual watermarkingarchitectures for video broadcasting,” J. Syst. Softw., vol. 84, no. 5, pp.724–738, May 2011.

[42] S. Saha, D. Bhattacharyya, and S. K. Bandyopadhyay, “Security onfragile and semifragile watermarks authentication,” Int. J. Comput.Applicat., vol. 3, no. 4, pp. 23–27, Jun. 2010.

Sonjoy Deb Roy received the B.Sc. degreein electrical and electronic engineering from theBangladesh University of Engineering and Tech-nology, Dhaka, Bangladesh, in 2009. Currently, heis pursuing the M.Sc. degree with the IntegratedSensors Intelligent System Laboratory, Departmentof Electrical and Computer Engineering, Universityof Calgary, Calgary, AB, Canada.

His current research interests include hardwareimplementation of secured digital watermarking sys-tems for image and video authentication.

Xin Li received the B.Eng. degree in electrical engineering from NantongUniversity, Nantong, China, and the M.Sc. degree from the Integrated SensorsIntelligent System Laboratory, University of Calgary, Calgary, AB, Canada,in 2010.

His current research interests include digital watermarking system designfor image and video.

Yonatan Shoshan received the B.Sc. degree in electrical engineering fromBen-Gurion University, Beer-Sheva, Israel, in 2007, and the M.Sc. degreefrom the ATIPS Laboratory, University of Calgary, Calgary, AB, Canada, in2009.

He is currently with Texas Instruments, Inc., Raanana, Israel. His currentresearch interests include smart CMOS image sensors and watermarking.

Alexander Fish (M’06) received the B.Sc. degreein electrical engineering from the Technion-IsraelInstitute of Technology, Haifa, Israel, in 1999, andthe M.Sc. and Ph.D. (summa cum laude) degreesfrom Ben-Gurion University, Beer-Sheva, Israel, in2002 and 2006, respectively.

He was a Post-Doctoral Fellow with the ATIPSLaboratory, University of Calgary, Calgary, AB,Canada, from 2006 to 2008. In 2008, he joined Ben-Gurion University as a Faculty member with theElectrical and Computer Engineering Department.

He has authored over 60 scientific papers and patent applications. He hasalso published two book chapters. His current research interests include low-voltage digital design, energy-efficient SRAM, Flash memory arrays, and low-power CMOS image sensors.

Dr. Fish serves as the Editor-in-Chief for the MDPI Journal of LowPower Electronics and Applications and as an Associate Editor for the IEEESensors Journal.

Orly Yadid-Pecht (S’90–M’95–SM’01–F’07) re-ceived the B.Sc. degree from the Electrical En-gineering Department, Technion-Israel Institute ofTechnology, Haifa, Israel, and the M.Sc. and D.Sc.degrees from the Technion-Israel Institute of Tech-nology in 1990 and 1995, respectively.

She was a National Research Council ResearchFellow from 1995 to 1997 in the areas of advancedimage sensors with the Jet Propulsion Laboratoryand the California Institute of Technology, Pasadena.She joined Ben-Gurion University, Beer-Sheva, Is-

rael, as a member with the Electrical and Electro-Optical Engineering De-partment in 1997. There she founded the VLSI Systems Center, specializingin CMOS image sensors. She was affiliated with the ATIPS Laboratory,University of Calgary, Calgary, AB, Canada, from 2003 to 2005, promotingthe area of integrated sensors. She has been an iCORE Professor with theIntegrated Sensors Intelligent System Laboratory, University of Calgary, since2009. She has published over 100 papers and patents and has led over a dozenresearch projects supported by government and industry. She has co-authoredand co-edited the first book on CMOS image sensors, CMOS Imaging:From Photo-Transduction to Image Processing, 2004. She also serves as theDirector of the boards of two companies. Her current research interests includeintegrated CMOS sensors, smart sensors, image processing hardware, andmicro and biomedical system implementations.

Dr. Yadid-Pecht has served on different IEEE Transactions editorialboards, has been the General Chair of the IEEE International Conference onElectronic Circuits and Systems, and is a member of the Steering Committeeof this conference.