M S RAMAIAH INSTITUTE OF TECHNOLOGY (Autonomous Institute, Affiliated to VTU) Project Report entitled

Hardware Implementation of a Digital Watermarking System for Video Authentication Submitted in partial fulfilment for the award of degree of

Bachelor of Engineering (B.E) in Electronics and Communication Engineering by PRASAN A SHEDLIGERI

( 1MS11EC082 )

SHRIDHAR SHIVAJI SHANBHAG ( 1MS11EC107 ) SOURABH BARGI

( 1MS11EC110 )

ANEBOMMAPPA

( 1MS12EC400 )

under the guidance of Mr. Shreedarshan K. Assistant Professor, Department of E & C, MSRIT

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING M S RAMAIAH INSTITUTE OF TECHNOLOGY (Autonomous Institute, Affiliated to VTU)

May 2015

2

Department of Electronics and Communication Engineering M S Ramaiah Institute of Technology Bengaluru - 54

CERTIFICATE Certified that the project titled “Hardware Implementation of a Digital Watermarking System for Video Authentication” is a bona fide work carried out by Prasan A Shedligeri (1MS11EC082), Shridhar Shivaji Shanbhag (1MS11EC107), Sourabh Bargi (1MS11EC110), Anebommappa (1MS12EC400) in partial fulfilment for the award of degree of Bachelor of Engineering in Electronics and Communication of Visvesvaraya Technological University, Belgaum, during the year 2014-15. It is certified that all the corrections/suggestions indicated for internal assessment have been incorporated in the report deposited in the department library. The project has been approved as it satisfies the academic requirements in respect of project work prescribed for Bachelor of Engineering degree.

(Guide) Mr. Shreedarshan K. Asst Prof., Dept. of ECE MSRIT

(Head of the Department) Dr. S. Sethu Selvi Professor & Head, Dept. of ECE MSRIT

(Examiner 1) Name Signature

(Examiner 2)

(Principal) Dr. S. Y. Kulkarni Principal MSRIT

Department of Electronics and Communication Engineering M S Ramaiah Institute of Technology Bengaluru - 54

DECLARATION

We hereby declare that the entire work embodied in this B.E. Project report has been carried out by us at M S Ramaiah Institute of Technology under the supervision of Mr. Shreedarshan K. This Project report has not been submitted in part or full for the award of any diploma or degree of this or any other University.

Prasan A Shedligeri ( USN- 1MS11EC082 ) Shridhar Shivaji Shanbhag ( USN- 1MS11EC107 ) Sourabh Bargi ( USN- 1MS11EC110 ) Anebommappa ( USN- 1MS12EC400 )

This work is dedicated to Parents & Teachers

Acknowledgements

We express our sincere thanks to Dr. S.Y Kulkarni, Principal, MSRIT, for providing us with the necessary technical and administrative support. We express our gratitude to Dr. S. Sethu Selvi, HOD, Department of Electronics and Communication, who mentored us and provided us with necessary advice and support for carrying out this project. We also express our sincere gratitude to Mr. Shreedarshan K. for having whole-heartedly agreed to guide our project. His timely advice and guidance inspired us to explore the avenues in detail and come out with extra-ordinary solutions. His insightful suggestions and constant support have been instrumental in the positive outcome of this project. We once again offer our sincere thanks for guiding our project successfully. We thank Mr. C G Raghavendra, Project Co-ordinator, for the support and guidance. We also thank the laboratory staff for providing us with the necessary equipments and support.

Abstract

CCTVs provide us with a way to secure the areas of our interest in the absence of any other safety. It records the happenings in a particular area where it is placed and that can be viewed later. It must be ensured that the recording is always in safe hands, else the whole credibility of CCTV is lost since it has no additional security features. If the recording were to be transmitted wireless or hosted over the internet, then it becomes impossible to ensure that it’s not tampered with. Here we propose a digital invisible watermarking technique that will embed the frame number in the corresponding frame. This watermark is semi-fragile and also is invisible. The watermark will be encrypted and secured using encryption keys from a legitimate owner before it’s embedded in the frame. The watermarking is accomplished in the transform domain which is obtained using Discrete Cosine Transform. This watermarking system is made portable using open source hardware Raspberry Pi. Raspberry Pi is programmed using Python scripts and image processing library OpenCV is made use of.

Contents Declaration

iii

Acknowledgement

v

Abstract

vi

List of figures

ix

List of tables

x

1 Introduction 1.1 Video . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 Watermark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3 The spatial and transform domain . . . . . . . . . . . . . . . . . .

1 1 2 3

2 Problem statement and Contributions

6

3 Literature Review 3.1 Spatial Domain Techniques . . . . . . . . . . . . . . . . . . . . . . 3.2 Frequency Domain techniques . . . . . . . . . . . . . . . . . . . . 3.3 Different Colour Spaces for Watermarking . . . . . . . . . . . . .

8 8 9 10

4 Proposed System 4.1 Watermark Generation . . . . . . . . . . . 4.1.1 Primitive watermark generation . . 4.1.2 Secure watermark generation . . . 4.2 Watermark Embedding . . . . . . . . . . . 4.2.1 Frequency Domain Watermarking

13 13 13 15 15 15

vi

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

CONTENTS

. . . . . .

15 17 19 19 21 22

. . . . . .

25 25 26 26 26 29 29

6 Testing and Results 6.1 GUI outputs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2 Tests and results of frequency domain technique . . . . . . . . . . 6.3 Tests and results of spatial domain technique . . . . . . . . . . . .

30 30 33 36

7 Potential Applications 7.1 Wireless security cameras . . . . . . . . . . . . . . . . . . . . . . 7.2 Journalist cameras . . . . . . . . . . . . . . . . . . . . . . . . . .

39 39 39

8 Conclusion and Future Work

41

References

43

A Bill of Materials

45

B Raspberry Pi-2 Datasheet

47

4.3

4.2.1.1 Embedding . . . . . 4.2.1.2 Extracting . . . . . . 4.2.2 Spatial Domain Watermarking 4.2.2.1 Embedding: . . . . . 4.2.2.2 Extracting . . . . . . Verification . . . . . . . . . . . . . .

5 Hardware Implementation 5.1 Hardware specifications: . . . . . 5.2 Power supply requirements: . . . 5.3 Raspberry Pi 2 Initial set up: . . 5.4 Remote Access of Raspberry Pi 2: 5.5 OpenCV installation: . . . . . . . 5.6 Camera Interfacing: . . . . . . . .

vii

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

List of Figures 1.1 1.2 1.3 1.4

Variation of intensity levels . . . . . . . . . Intensity levels for various values of pixels RGB components in a color image . . . . . The DCT basis functions . . . . . . . . . .

. . . .

3 4 5 5

2.1 2.2 2.3

Problem Identified . . . . . . . . . . . . . . . . . . . . . . . . . . Solution for the Problem . . . . . . . . . . . . . . . . . . . . . . . Adapted solution for the Problem . . . . . . . . . . . . . . . . . .

6 7 7

3.1 3.2 3.3 3.4

An image in RGB colour model . . . . . . . . . . Y component of the RGB image . . . . . . . . . . Chroma Blue (Cb) component of the RGB image Chroma Red (Cr) component of the RGB image .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

11 11 12 12

4.1 4.2 4.3 4.4 4.5 4.6 4.7 4.8 4.9 4.10

Watermark generation . . . . . . . Adapted watermark generation . . Adapted watermark encryption . . Frame pre-processing . . . . . . . . Embedding in transform domain . . Converting back to spatial domain Frame pre-processing . . . . . . . . Embedding in spatial domain . . . Frame post-processing . . . . . . . Verification method . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

14 14 15 17 18 19 22 23 23 24

5.1 5.2

General Interfacing . . . . . . . . . . . . . . . . . . . . . . . . . . Customized Interfacing for the project . . . . . . . . . . . . . . .

27 28

viii

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . .

. . . . . . . . . .

. . . .

. . . . . . . . . .

. . . .

. . . . . . . . . .

. . . .

. . . . . . . . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

LIST OF FIGURES

5.3

Graphical User Interface of the project demo . . . . . . . . . . . .

29

6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8

Key input . . . . . Verification . . . . Replacing a frame . Altering a frame . . Captured frame . . Watermarked frame Captured frame . . Watermarked frame

. . . . . . . .

31 31 32 32 35 35 38 38

7.1 7.2

wireless security camera . . . . . . . . . . . . . . . . . . . . . . . Journalist with a camera . . . . . . . . . . . . . . . . . . . . . . .

40 40

. . . . . . . . . . . . . . . . . . . . (using . . . . (using

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Frequency domain technique) . . . . . . . . . . . . . . . . . Spatial domain technique) . .

ix

. . . . . . . .

. . . . . . . .

. . . . . . . .

. . . . . . . .

List of Tables 4.1

Quantization matrix . . . . . . . . . . . . . . . . . . . . . . . . .

18

A.1 Bill of materials . . . . . . . . . . . . . . . . . . . . . . . . . . . .

46

x

Chapter 1 Introduction Wireless technologies has been seeing a new boom. With the advancement in wireless technologies, data transfer has become very much simpler and with lesser wires, a hassle-free life. Wireless technologies can be used for security purposes. A remote camera can be used to record videos and transfer the data to the storage device using wireless networks. The wireless transfer of data makes it attractive to both consumers and attackers. Any consumer would feel safe when the video which has been captured cannot be hacked and tampered at all. There’s every chance that attackers will hack into the wireless system and tamper the video. In such cases it’s extremely necessary to make the wireless systems hack-proof, which is very difficult due to ever increasing number and sophistication of attackers. In the least case the consumer must be able to check if the his video has been attacked or not. Our project is a first step towards that direction.

1.1

Video

A series of frames when played continuously at the standard rate of 30 frames/s constitutes a video. This continuous play gives our eyes an illusion of motion although each of the frames have still images. The illusion of motion occurs due to the persistence of vision. Persistence of vision is the theory where an afterimage is thought to persist for approximately one sixteenth of a second on the retina.

1

1.2 Watermark

Since every video can be broken down into a series of still images, it becomes easier to process videos as a series of frames than to process it as a whole. A video has 2 tracks: a video track and an audio track. The audio track is optional. In the digital watermarking algorithm adopted here, the audio track is ignored and is not considered for watermarking.

1.2

Watermark

By definition watermark is a faint design made in some paper during manufacture that is visible when held against the light and typically identifies the maker. But, in a digital sense watermark can be classified as follows: • Based on perceptibility: 1. Visible watermark: These watermarks are present on an image or a video, which is just faintly visible and is translucent. 2. Invisible watermark: These watermarks are invisible to the viewer and can be viewed only after some signal processing. • Robustness: 1. Robust watermark: A digital watermark is called robust if it resists a designated class of transformations. Robust watermarks may be used in copy protection applications to carry copy and no access control information. 2. Semi-fragile watermark: A digital watermark is called semi-fragile if it resists benign transformations, but fails detection after malignant transformations. Semi-fragile watermarks commonly are used to detect malignant transformations. 3. Fragile watermarks: A digital watermark is called “fragile” if it fails to be detectable after the slightest modification. Fragile watermarks are commonly used for tamper detection (integrity proof). Modifications to an original work that clearly are noticeable, commonly are not referred to as watermarks, but as generalized barcodes.

2

1.3 The spatial and transform domain

Figure 1.1: Variation of intensity levels

1.3

The spatial and transform domain

For still images two domains are chiefly considered: The spatial domain and the transform domain. The spatial domain representation of a still image makes sense to the viewer. The viewer is able to recognize different parts of the image through his previous experiences. In the spatial domain, a digital image is represented as a series of quantized states in both the x and y directions. These quantized states are known as picture elements (or pixels). These pixels have values between 0-255 as shown in Fig.1.1., when each of the pixels are represented using 8 bits. 0 represents a complete dark pixel and 255 represents a completely bright pixels. Intensity levels for some of the values are shown in Fig.1.2. A color image is represented using the overlapping of the 3 primary colors Red, Green and Blue as shown in Fig.1.3. In a color image each of the primary colors are varied just like the intensity levels in a grayscale image. When all the 3 primary colors are overlapped and viewed, it gives the complete color image. In transform domain representation of an image, the frequency components in an image are displayed against the amplitude of those frequency components. Since JPEG, DCT (Discrete Cosine Transform) has been the most popular transform to be applied on an image. A DCT expresses a finite sequence of data points in terms of a sum of cosine

3

1.3 The spatial and transform domain

Figure 1.2: Intensity levels for various values of pixels functions oscillating at different frequencies. Each of the 8x8 blocks in an image is represented as a linear combinations of the DCT basis functions which are shown in Fig.1.4. The DCT basis functions are obtained by using the Forward 2-D dct formula which are shown below. Forward 2-D DCT formula:     N −1 N −1 X X 2 1 π(2x + 1)u π(2y + 1)v F (u, v)=( ) 2 C(u)C(v) f (x, y) cos cos N 2N 2N x=0 y=0 for u=0. . . N-1 , v=0. . . N-1, where N=8 and √1 , for k = 0 2 C(k)= 1, otherwise Inverse 2-D DCT formula:     N −1 N −1 X X 2 1 π(2y + 1)v π(2x + 1)u f (x, y)=( ) 2 C(u)C(v) F (u, v) cos cos N 2N 2N x=0 y=0  for u=0 . . . N-1 , v=0. . . N-1, where N=8 C(k)=

4

√1 , for 2

k=0 1, otherwise

1.3 The spatial and transform domain

Figure 1.3: RGB components in a color image

Figure 1.4: The DCT basis functions

5

Chapter 2 Problem statement and Contributions This is a digital age and everything has become simple with technology. The digital age has transformed the face of entertainment and security. Videos are the main source of entertainment and also have been excessively used for security purposes. The digital age has also simplified the way to tamper the videos Fig.2.1. In the entertainment industry, copyrights and other intellectual property rights are at stake on a video. In case of security services tampering will lead to the threat going undetected. Hence, it makes sense to provide a mechanism that can, at the minimum,

Figure 2.1: Problem Identified

6

Figure 2.2: Solution for the Problem

Figure 2.3: Adapted solution for the Problem detect that a video has been tampered. In this project an algorithm [1] is used which creates a digital invisible watermark suitable for tamper detection and embeds it into each of the frames of the video Fig.2.2. Since Implementation on an ASIC is out of the scope, it has been implemented on a GPP (Fig.2.3). The watermark which is embedded in transform domain reduces the degradation in the quality of the video. The watermark is retrieved in the transform domain itself.

7

Chapter 3 Literature Review The various watermarking techniques are:

3.1

Spatial Domain Techniques

Spatial domain watermarking slightly modifies the pixels of one or two randomly selected subsets of an image. Modifications might include flipping the low-order bit of each pixel. However, this technique is not reliable when subjected to normal media operations such as filtering or lossy compression. Various spatial domain techniques are as follows: • Least Significant Bit Coding (LSB) LSB coding is one of the earliest methods. It can be applied to any form of watermarking. In this method the LSB of the carrier signal is substituted with the watermark. The bits are embedded in a sequence which acts as the key. In order to retrieve it back this sequence should be known. The watermark encoder first selects a subset of pixel values on which the watermark has to be embedded. It then embeds the information on the LSBs of the pixels from this subset. LSB coding is a very simple technique but the robustness of the watermark will be too low. With LSB coding almost always the watermark cannot be retrieved without a noise component [2]. • Predictive Coding Schemes

8

3.2 Frequency Domain techniques

In this method the correlation between adjacent pixels are exploited. A set of pixels where the watermark has to be embedded is chosen and alternate pixels are replaced by the difference between the adjacent pixels. This can be further improved by adding a constant to all the differences. A cipher key is created which enables the retrieval of the embedded watermark at the receiver. This is much more robust as compared to LSB coding [3]. • Correlation-Based Techniques In this method a pseudo random noise (PN) with a pattern W(x, y) is added to an image. At the decoder the correlation between the random noise and the image is found out and if the value exceeds a certain threshold value the watermark is detected else it is not [4].

3.2

Frequency Domain techniques

• Discrete cosine transform (DCT) based technique Discrete cosine transform (DCT): It is a process which converts a sequence of data points in the spatial domain to a sum of sine and cosine waveforms with different amplitudes in the frequency domain. The DCT is a linear transform, which maps an n-dimensional vector to a set of n coefficients. It is very robust to JPEG compression, since JPEG compression itself uses DCT. However, DCT methods lack resistance to strong geometric distortions [5],[6],[7]. • Discrete Fourier Transformation (DFT) based technique It is translation invariant and rotation resistant, which translates to strong robustness to geometric attacks.DFT uses complex numbers, while DCT uses just real numbers [8]. • Discrete wavelet transform (DWT) based technique DWT-based methods enable good spatial localization and have multi resolution characteristics, which are similar to the human visual system. Also

9

3.3 Different Colour Spaces for Watermarking

this approach shows robustness to low-pass and median filtering. However, it is not robust to geometric transformations [9].

3.3

Different Colour Spaces for Watermarking

The most widely used colour representations are RGB, YUV, YCbCr, HSV and CIElab. The YUV representation is used in watermarking of colour information in television systems, where as the YCbCr is used in digital watermarking of colour information in video and still-image. One of the important issue in colour image watermarking is to find the appropriated colour space for embedding the watermark. The RGB colour space representation has the most correlated components, while the YCbCr colour components are the least correlated components. The forward and backward transforms between RGB and YCbCr colour spaces are linear as shown in the equations below. 

    Y 16 0.257 0.504  Cb  =  128  +  −0.148 − 0.291 Cr 128 0.439 − 0.368 

  R 1.164  G  =  1.164 B 1.164

   0.098 R 0.439  •  G  − 0.071 B

   0.000 1.596 (Y −16) − 0.392 −0.813  •  (Cb−128)  2.017 0.000 (Cr−128)

The correlated RGB components are not suitable to embed the watermark. In RGB colour space the perceived colour quality of an image is dependent on all components. Thus, embedding watermark bits into one component independently of the other RGB components is not the best choice. On the other hand the YCbCr permits to extract uncorrelated components and it favour the separation of the achromatic part from the chromatic parts of the colour image. To achieve high robustness and large embedding capacity, the proposed scheme uses the least correlated YCbCr components of the colour image. An image in RGB colour model is show in Fig. 3.1 and the Y, Cb, Cr components of the RGB image are shown in Fig. 3.2, 3.3 and 3.4 respectively

10

3.3 Different Colour Spaces for Watermarking

Figure 3.1: An image in RGB colour model

Figure 3.2: Y component of the RGB image

11

3.3 Different Colour Spaces for Watermarking

Figure 3.3: Chroma Blue (Cb) component of the RGB image

Figure 3.4: Chroma Red (Cr) component of the RGB image

12

Chapter 4 Proposed System 4.1 4.1.1

Watermark Generation Primitive watermark generation

A 64 bit watermark is generated for every captured frame. Watermark generation needs camera ID, frame number (serial number), time stamp and date stamp. For a total of 64 bits, 16 bits are assigned for camera ID, 11 bits for serial number, 17 bits for time stamp and 20 bits for date stamp. Watermark generation function in the Fig 4.1. combines all the data in binary formats. But this method of generating watermark doesn’t efficiently support verification. Since a single bit change in the extracted watermark doesn’t mean that entire image has been altered. We encounter many such bit errors due to transmission and compression. To compensate for these errors we’ve introduced a new method for watermark generation. CCTV footages have time and date stamp over the video itself which is visible. So redundant information is removed. The newly generated watermark has 64 bits, where only camera ID and serial numbers are used. 9 bits are assigned for camera ID and 11 bits for serial number data. The serial number is repeated 5 times in the watermark as shown in Fig 4.2. This gives rigidity over few pixel alterations and is easier to verify.

13

4.1 Watermark Generation

Figure 4.1: Watermark generation

Figure 4.2: Adapted watermark generation

14

4.2 Watermark Embedding

Figure 4.3: Adapted watermark encryption

4.1.2

Secure watermark generation

Watermark generated using the above procedure is a primitive watermark. It needs protection from threats, so a key from the owner is used and is cryptographically encrypted. This key can be of any random positive integer. Using this key a random sequence of 1s and 0s, of length 64, is generated which is then Ex-ored with primitive watermark. This process yields a secure watermark as shown in Fig 4.3.

4.2

Watermark Embedding

4.2.1

Frequency Domain Watermarking

4.2.1.1

Embedding

• Obtain the captured frame in RGB color domain. • Convert the frame from RGB format to YCbCr format, where Y represents the light intensity format of the captured frame. The following formula can

15

4.2 Watermark Embedding

be used to convert RGB to YCbCr. 

    Y 16 0.257  Cb  =  128  +  −0.148 Cr 128 0.439

0.504 − 0.291 − 0.368

   0.098 R 0.439  •  G  − 0.071 B

• Apply Contrast Limited Adaptive Histogram Equalization to the Y component of the captured frame. • Divide the whole Y frame into 8x8 blocks. • The binary watermark is embedded in those 8x8 blocks which are specified by the master-key. The masterkey is used to generate 64 random numbers each denoting one 8x8 block in the whole Y frame. • Get the ith random number generated using the master-key. Navigate to that 8x8 block in the frame. The 8x8 blocks are numbered serially left to right and top to bottom • Take the 2-D DCT of that block and quantize the DCT coefficients using the Quantization matrix as shown in Table 4.1. Let bloc denote the quantized DCT coefficient matrix. • If W[i] denotes the ith watermark bit, then W[i] is hidden inside the bloc as shown in Fig 4.5. and is given by:

bloc[3][4] = bloc[4][4]-W[i] • Now de-quantize the DCT coefficients in the matrix bloc and take Inverse 2-D DCT. The obtained matrix is overwritten in the Y frame as shown in Fig 4.6. • Repeat the above steps till all the watermark bits are embedded. • After all the watermark bits are embedded inside the Y frame, convert the YCbCr frame back to RGB format and write the watermark embedded

16

4.2 Watermark Embedding

Figure 4.4: Frame pre-processing frame to the video. To convert YCbCr to RGB the following formula can be used. 

  R 1.164  G  =  1.164 B 1.164

4.2.1.2

   0.000 1.596 (Y −16) − 0.392 −0.813  •  (Cb−128)  2.017 0.000 (Cr−128)

Extracting

• Read the nth frame from the watermark embedded video. • Convert the frame from RGB format to YCbCr format, where Y represents the light intensity format of the captured frame. • Divide the whole Y frame into 8x8 blocks. • Get the ith random number generated using the master-key. Navigate to that 8x8 block in the frame. The 8x8 blocks are numbered serially left to right and top to bottom

17

4.2 Watermark Embedding

Table 4.1: Quantization matrix 17

18

24

47

99

99

99

99

18

21

26

66

99

99

99

99

24

26

56

99

99

99

99

99

47

66

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

99

Figure 4.5: Embedding in transform domain

18

4.2 Watermark Embedding

Figure 4.6: Converting back to spatial domain • Take the 2-D DCT of that block and quantize the DCT coefficients using the Quantization matrix shown below. Let bloc denote the quantized DCT coefficient matrix. • If W[i] denotes the ith watermark bit, then W[i] is extracted from the bloc as follows: W[i] = bloc[4][4]- bloc[3][4] • Repeat the above steps till all the watermark bits are extracted.

4.2.2

Spatial Domain Watermarking

4.2.2.1

Embedding:

• Obtain the captured frame in RGB color domain. • Convert the frame from RGB format to YCbCr format, where Y represents the light intensity format of the captured frame.

19

4.2 Watermark Embedding

• Apply Contrast Limited Adaptive Histogram Equalization to the Y component of the captured frame. • Divide the whole Y frame into 8x8 blocks as shown in Fig 4.7. • The binary watermark is embedded in those 8x8 blocks which are specified by the master-key. The masterkey is used to generate 64 random numbers each denoting one 8x8 block in the whole Y frame. • Get the ith random number generated using the master-key. Navigate to that 8x8 block in the frame. The 8x8 blocks are numbered serially left to right and top to bottom. • Let bloc represent the current 8x8 block in which the watermark must be embedded. • Obtain the average of the bloc, avg, which represents the average intensity level inside the bloc. • Obtain the highest intensity level imax of the bloc. • Define a level step as follows:

Step= (imax-avg)/4 • If the ith watermark bit is zero, vary the intensity levels of each of the cloumns of the bloc as shown in Fig 4.8. and is given as follows:

Column1 = avg - 4*step =bloc[ : , 0] Column2 = avg - 3*step =bloc[ : , 1] Column3 = avg - 2*step =bloc[ : , 2] Column4 = avg - 1*step =bloc[ : , 3] Column5 = avg + 1*step =bloc[ : , 4] Column6 = avg + 2*step =bloc[ : , 5] Column7 = avg + 3*step =bloc[ : , 6] Column8 = avg + 4*step =bloc[ : , 7]

20

4.2 Watermark Embedding

• If the ith watermark bit is 1 the vary the intensity levels of each of the columns of the bloc as shown in Fig 4.8. and is given as follows:

Column1 = avg + 4*step =bloc[ : , 0] Column2 = avg + 3*step =bloc[ : , 1] Column3 = avg + 2*step =bloc[ : , 2] Column4 = avg + 1*step =bloc[ : , 3] Column5 = avg - 1*step =bloc[ : , 4] Column6 = avg - 2*step =bloc[ : , 5] Column7 = avg - 3*step =bloc[ : , 6] Column8 = avg - 4*step =bloc[ : , 7] • The obtained 8x8 block is overwritten in Y frame as shown in Fig 4.9. 4.2.2.2

Extracting

• Read the nth frame from the watermark embedded video. • Convert the frame from RGB format to YCbCr format, where Y represents the light intensity format of the captured frame. • Divide the whole Y frame into 8x8 blocks. • Get the ith random number generated using the master-key. Navigate to that 8x8 block in the frame. The 8x8 blocks are numbered serially left to right and top to bottom • Divide the bloc into two halves- left half and the right half named as left bloc and right bloc. • Obtain the averages of the 2 halves, left bloc and right bloc, as left avg and right avg respectively. • The ith watermark bit W[i] is extracted as follows:

21

4.3 Verification

Figure 4.7: Frame pre-processing if ( left avg >right avg ) then W[i]=1 if ( left avg
4.3

Verification

The following algorithm has been introduced to verify the frames. Successful recognition, Repeat of frames (replace), Wrong key and Modified are the four possible states of output, assuming that 1st frame isn’t altered. • The embedded watermark is of length 64 bits with first 9 bits as camera id and other 55 bits as frame number, of length 11 bits, repeated over 5 times. • The extracted watermark can be segregated as camera id and frame number. Let each repetition of frame number in the extracted watermark be represented as Si , where i varies for 1 to 5.

22

4.3 Verification

Figure 4.8: Embedding in spatial domain

Figure 4.9: Frame post-processing

23

4.3 Verification

Figure 4.10: Verification method • The information on frame number is to be extracted by comparing these Si s with each other. The frame number is considered valid when 2 or more of Si match with each other with respect to every bit. The least condition to be satisfied to consider the frame number as valid is: Si ==Sj , where i 6 j and i,j=1,2,3,4,5 = • After we obtain a valid frame number , we need to verify if the frame number lies consecutive to the previous frame number, i.e. nc == np +1, where nc= frame number of current frame and np= frame number of previous frame. • If the above condition is satisfied, then the frame is valid else the valid frame has been replaced with the frame numbered nc. • If the condition Si ==Sj is violated and the frame under consideration is not the first frame in the video, then we declare that the frame is altered. • If the condition Si ==Sj is violated and the frame under consideration is the first frame captured in the video, then we declare the the keys entered are wrong assuming that the first frame is not altered. The verification algorithm has been shown in the Fig 4.10.

24

Chapter 5 Hardware Implementation 5.1

Hardware specifications:

• System:Raspberry Pi 2 • OS: Raspbian Linux (additional operating systems available, to include Windows 10) • Processor: 900MHz Broadcom BCM2836, four ARMv7 cores • Graphics: Dual-Core VideoCore IV • Memory: 1024MB DDR2 • Storage: None on-board, requires optional micro-SD card to boot • Connectivity: SMSC LAN9514 USB hub and 10/100 Ethernet controller • Ports: 1x HDMI, 4x USB 2.0 with partial compatibility, 1x DSI, 1x CSI, 1x analogue AV (stereo audio and composite video), 40x GPIO, 1x Ethernet • Power Draw: 1.5W idle, 3.5W under load (measured from the wall) • Size: 82.5mm x 57.5mm x 19.8mm • Weight: 41g

25

5.2 Power supply requirements:

5.2

Power supply requirements:

• AC/DC Adapter with output of 5V and 2A • USB cable with filter

5.3

Raspberry Pi 2 Initial set up:

• Raspbian Linux has to be Downloaded from official site. • One MicroSD card (4GB or above) must be used for OS installation. • To install OS Win32DiskImager software can been used. • Bootable MicroSD card can been loaded onto Raspberry Pi MicroSD slot.

5.4

Remote Access of Raspberry Pi 2:

• Raspberry can be connected to Router or Any DHCP enabled PC through LAN. • IP address will be allocated for it. • This IP address can be used to access Raspberry Pi remotely or through SSH. • Raspberry Pi can be accessed using either Secure Shell or Remote Desktop connection. • For Secure Shell, Putty can be used. • For remote desktop connections XRDP has to be installed on Raspberry Pi using Putty.

26

5.4 Remote Access of Raspberry Pi 2:

Figure 5.1: General Interfacing

27

5.4 Remote Access of Raspberry Pi 2:

Figure 5.2: Customized Interfacing for the project

28

5.5 OpenCV installation:

Figure 5.3: Graphical User Interface of the project demo

5.5

OpenCV installation:

• Python 2.7.3 is an inbuilt application in Raspbian • Numpy and OpenCV have to be installed. • OpenCV and Numpy paths must be added to Python Library

5.6

Camera Interfacing:

• Compatible USB camera can be used. Algorithms explained in the previous sections are implemented on the Raspberry Pi module. The Fig 5.3. shown is the GUI for recording, verifying and other test cases.

29

Chapter 6 Testing and Results Various tests conducted on Windows 7 laptop with core i5 and RAM 4GB, and on Raspberry Pi having specification as described in chapter 5. In the following section, outputs of different test cases have been shown.

6.1

GUI outputs

The algorithms are designed to accept numeric keys of any length. Two keys have to be provided for both recording and verifying the video as explained in the proposed method. The corresponding image is shown in Fig 6.1. Once the keys are entered “Record” button can be pressed. A small video of specified number of frames will be captured and watermark will be embedded. “Verify” button will verify whether the video has been altered or whether the frames have been replaced. If it produces all the frame numbers in a serial order, without any discrepancy then that means none of the frames have been altered as shown in Fig 6.2. A python code has been written to replace one frame from another frame from same video. This program will be triggered when “Replace” button is pressed, then verify function shows that the frames have been replaced as shown in the Fig 6.3. A code has been written to alter one image frame from different image or any image alterations like cropping, geometrical transformation. This program will be triggered when “Alter” button is pressed, then verify function yields that the video has been altered as shown in Fig 6.4.

30

6.1 GUI outputs

Figure 6.1: Key input

Figure 6.2: Verification

31

6.1 GUI outputs

Figure 6.3: Replacing a frame

Figure 6.4: Altering a frame

32

6.2 Tests and results of frequency domain technique

6.2

Tests and results of frequency domain technique

In computer: • Average time required to embed 20 frames = 5.8 seconds in Windows platform • Average time required to extract and verify 20 frames = 3.25 seconds in Windows platform • Average SNR of captured frame under optimal light condition = 15.81 dB • Average SNR of embedded frame under optimal light condition = 15.8 dB • The watermark is imperceptible. Testing in different illumination conditions: • Under low light conditions: The algorithm was tested for 20 frames. The watermark was embedded for 20 frames and then verified for integrity. The verification of the video yielded wrong frame numbers for 5 frames (on an average) for every 20 frames. • Under very bright lights: The algorithm was tested for 20 frames. The watermark was embedded for 20 frames and then verified for integrity. The verification of the video under very bright light conditions yielded wrong frame numbers for 6 frames (on an average) for every 20 frames. • Under optimal light conditions: The algorithm was tested for 20 frames. The watermark was embedded for 20 frames and then verified for integrity. The verification of the video under optimal light conditions did not yield any wrong frame numbers for the 20 frames embedded.

33

6.2 Tests and results of frequency domain technique

In Raspberry Pi 2: • Average time required to embed 9 frames = 15 seconds in Windows platform • Average time required to extract and verify 9 frames = 5.7 seconds in Windows platform • Average SNR of captured frame under optimal light condition = 14.5 dB • Average SNR of embedded frame under optimal light condition = 13.6 dB • The watermark is imperceptible. Testing in different illumination conditions: • Under low light conditions: The algorithm was tested for 9 frames. The watermark was embedded for 9 frames and then verified for integrity. The verification of the video yielded wrong frame numbers for 5 frames (on an average) for every 9 frames. • Under very bright lights: The algorithm was tested for 9 frames. The watermark was embedded for 9 frames and then verified for integrity. The verification of the video under very bright light conditions yielded wrong frame numbers for 6 frames (on an average) for every 9 frames. • Under optimal light conditions: The algorithm was tested for 9 frames. The watermark was embedded for 9 frames and then verified for integrity. The verification of the video under optimal light conditions did not yield any wrong frame numbers for the 9 frames embedded. The captured frame is shown in Fig.6.5 and the watermarked frame is shown in Fig.6.6

34

6.2 Tests and results of frequency domain technique

Figure 6.5: Captured frame

Figure 6.6: Watermarked frame (using Frequency domain technique)

35

6.3 Tests and results of spatial domain technique

6.3

Tests and results of spatial domain technique

In computer: • Average time required to embed 20 frames = 3.1 seconds in Windows platform • Average time required to extract and verify 20 frames = 1 second in Windows platform • Average SNR of captured frame under optimal light condition = 15.8 dB • Average SNR of embedded frame under optimal light condition = 15.76 dB • The watermark becomes perceptible only under very careful observation. Testing in different illumination conditions: • Under low light conditions: The algorithm was tested for 20 frames. The watermark was embedded for 20 frames and then verified for integrity. The verification of the video yielded wrong frame numbers for 2 frames (on an average) for every 20 frames. • Under very bright lights: The algorithm was tested for 20 frames. The watermark was embedded for 20 frames and then verified for integrity. The verification of the video under very bright light conditions yielded wrong frame numbers for 3 frames (on an average) for every 20 frames. • Under optimal light conditions: The algorithm was tested for 20 frames. The watermark was embedded for 20 frames and then verified for integrity. The verification of the video under optimal light conditions did not yield any wrong frame numbers for the 20 frames embedded.

36

6.3 Tests and results of spatial domain technique

In Raspberry Pi 2: • Average time required to embed 9 frames = 6.4 seconds in Windows platform • Average time required to extract and verify 9 frames = 0.8 seconds in Windows platform • Average SNR of captured frame under optimal light condition = 14.3 dB • Average SNR of embedded frame under optimal light condition = 14 dB • The watermark becomes perceptible only under very careful observation. Testing in different illumination conditions: • Under low light conditions: The algorithm was tested for 9 frames. The watermark was embedded for 9 frames and then verified for integrity. The verification of the video yielded wrong frame numbers for 5 frames (on an average) for every 9 frames. • Under very bright lights: The algorithm was tested for 9 frames. The watermark was embedded for 9 frames and then verified for integrity. The verification of the video under very bright light conditions yielded wrong frame numbers for 6 frames (on an average) for every 9 frames. • Under optimal light conditions: The algorithm was tested for 9 frames. The watermark was embedded for 9 frames and then verified for integrity. The verification of the video under optimal light conditions did not yield any wrong frame numbers for the 9 frames embedded. The captured frame is shown in Fig. 6.7 and the watermarked frame is shown in Fig. 6.8

37

6.3 Tests and results of spatial domain technique

Figure 6.7: Captured frame

Figure 6.8: Watermarked frame (using Spatial domain technique)

38

Chapter 7 Potential Applications 7.1

Wireless security cameras

The project concentrates on securing the video from hackers and hence, can be used in wireless security cameras. Wireless security camera is shown in Fig 7.1.

7.2

Journalist cameras

The proposed method also authenticates the video. The cameraman using this type of cameras won’t be able to modify or delete the videos until he/she gets the approval from higher authority, which reduces the blackmailing activity from spoiled journalists. The Fig 7.2 shows a Journalist using a camera.

39

7.2 Journalist cameras

Figure 7.1: wireless security camera

Figure 7.2: Journalist with a camera

40

Chapter 8 Conclusion and Future Work In this project two different watermarking algorithms are implemented. The embedded watermark exhibits different characteristics when embedded using each of the algorithms. The watermark embedded using the frequency domain technique does not degrade the embedded video but is very fragile. The watermark cannot even resist the compression of frames into a video. The watermark is embedded in frequency domain and hence more secured and invisible. This technique is more suited to watermark an image rather than a video. The watermark embedded in spatial domain is semi-fragile. It’s reseistant to the compression of frames into video but slightly degrades the quality of the video thus generated. The watermark embedded becomes perceptible only under very keen observation and hence can be considered invisible. This technique is very much preferable since it does not involve getting the DCT coefficients to embed the watermark and hence faster. However one has to make a tradeoff between speed and quality of the video to be generated. This work can be extended to take into account motion compensation used in video compression. In that way we can use this watermarking technique for compressed videos. The watermark can be made more secure by using other transform domain approaches. Also the watermark can be further encrypted using stronger algorithms.

41

This project has been tested to be successfully working in a general purpose processor, hence it can be put into use in an image sensor as a hardware.

42

Bibliography [1] Sonjoy Deb Roy, Xin Li, Yonatan Shoshan, Alexander Fish, Orly YadidPecht, Hardware Implementation of a Digital Watermarking System for Video Authentication, IEEE Transactions on circuits and systems for video technology, (2013), Vol.23, No.2. 7 [2] Puneet Kr Sharma, Rajni, Analysis of image watermarking using least significant bit algorithm, International Journal of Information Sciences and Techniques, (2012), Vol.2, No.4. 8 [3] Piyu Tsaia, Yu-Chen Hub, Hsiu-Lien Yeha, Reversible image hiding scheme using predictive coding and histogram shifting, Signal Processing, (2009), Vol.89,No.6. 9 [4] Rohit M. Thanki, Rahul K. Kher, Divyang D. Vyas, Robustness of Correlation Based Watermarking Techniques Using WGN against Different Order Statistics Filters, International Journal of Computer Science and Telecommunications, (2011), Vol.2, No.4. 9 [5] M. A. Suhail, M. S. Obaidat, Digital Watermarking-Based DCT and JPEG Model, IEEE Trans. Instrumentation and Measurement, (2003), vol. 52, No. 5, pp. 1640-1647. 9 [6] G. Dayalin Leena and S. Selva Dhayanithy, Robust Image Watermarking in Frequency Domain, International Journal of Innovation and Applied Studies ISSN, (2013),Vol.2, No.4, 582-587. 9

43

BIBLIOGRAPHY

[7] Sasmita Mishra, Amitav Mahapatra, Pranati Mishra, A Survey on Digital Watermarking Techniques, International Journal of Computer Science and Information Technologies, (2013), Vol.4,No.3, 451-456. 9 [8] Ante Poljicak, Lidija Mandic, Darko Agic, Discrete Fourier transformbased watermarking method with an optimal implementation radius, Journal of Electronic Imaging, (2011), Vol.20,No.3. 9 [9] Pratibha Sharma, Shanti Swami, Digital image watermarking using 3 level discrete wavelet transform, Conference on Advances in Communication and Control Systems, (2013). 10 [10] www.mathworks.com [11] http://www.pyimagesearch.com/2015/02/23/ install-opencv-and-python-on-your-raspberry-pi-2-and-b/ [12] http://opencv.org/ [13] www.quora.com [14] http://tex.stackexchange.com/ [15] http://stackoverflow.com/ [16] http://askubuntu.com/ [17] http://www.raspberrypi.org/products/raspberry-pi-2-model-b/ [18] http://www.raspberrypi.org/documentation/installation/ installing-images/windows.md [19] http://www.raspberrypiblog.com/2012/10/ how-to-setup-remote-desktop-from.html

44

Appendix A Bill of Materials

45

Table A.1: Bill of materials Sl No

Item

Amount Quantity (INR)

Total amount (INR)

1

Raspberry Pi 2 MOD B

3300

1

3300

2

Logitech Webcam C100

800

1

800

3

5V 2A adapter

300

1

300

4

8 GB MicroSD card

500

1

500

5

TP-LINK Wireless Router 850

1

850

6

3m LAN cable

1

60

Total

5810

60

46

Appendix B Raspberry Pi-2 Datasheet

47

Raspberry Pi 2, Model B Product Name

Raspberry Pi 2, Model B

Product Description

The Raspberry Pi 2 delivers 6 times the processing capacity of previous models. This second generation Raspberry Pi has an upgraded Broadcom BCM2836 processor, which is a powerful ARM Cortex-A7 based quad-core processor that runs at 900MHz. The board also features an increase in memory capacity to 1Gbyte.

Specifications Chip

Broadcom BCM2836 SoC

Core architecture

Quad-core ARM Cortex-A7

CPU

900 MHz

GPU

Dual Core VideoCore IV® Multimedia Co-Processor Provides Open GL ES 2.0, hardware-accelerated OpenVG, and 1080p30 H.264 high-profile decode Capable of 1Gpixel/s, 1.5Gtexel/s or 24GFLOPs with texture filtering and

Memory

DMA infrastructure 1GB LPDDR2

Operating System

Boots from Micro SD card, running a version of the Linux operating system

Dimensions

85 x 56 x 17mm

Power

Micro USB socket 5V, 2A

Connectors: Ethernet

10/100 BaseT Ethernet socket

Video Output

HDMI (rev 1.3 & 1.4)

Audio Output

3.5mm jack, HDMI

USB

4 x USB 2.0 Connector

GPIO Connector

40-pin 2.54 mm (100 mil) expansion header: 2x20 strip Providing 27 GPIO pins as well as +3.3 V, +5 V and GND supply lines

Camera Connector

15-pin MIPI Camera Serial Interface (CSI-2)

JTAG

Not populated

Display Connector

Display Serial Interface (DSI) 15 way flat flex cable connector with two data lanes and a clock lane

Memory Card Slot

Micro SDIO

MS RAMAIAH INSTITUTE OF TECHNOLOGY Hardware ... - GitHub

6.2 Tests and results of frequency domain technique . . . . . . . . . . 33. 6.3 Tests and results of spatial domain .... represented as a linear combinations of the DCT basis functions which are shown in Fig.1.4. The DCT basis functions are obtained by .... Quantization matrix as shown in Table 4.1. Let bloc denote the quantized.

8MB Sizes 38 Downloads 315 Views

Recommend Documents

Dr. MS Ramaiah Memorial Parliamentary Debate -
at Malaysia national novice, and best adjudicator at MCC 2013, Bangalore. He was an invited male adjudicator at IWDC 2015. 4. Mr. Viraj Parikh An NLS ...

Florida Institute of Technology
Florida Tech Senior Design Project. Railroad Signaling Block Design Tool ... The software application shall include formulas on the following specific parameters ...

Hardware and Representation - GitHub
E.g. CPU can access rows in one module, hard disk / another CPU access row in ... (b) Data Bus: bidirectional, sends a word from CPU to main memory or.

national institute of technology - DoCuRi
Introduction: Basics of data mining, related concepts, Data mining techniques Data Mining Algorithms: Classification, Clustering ... (WBS), Estimation, Network Fundamentals, PERT & CPM Techniques, Gantt Charts, Partitioning. Project, WBS .... Davies

INDIAN INSTITUTE OF TECHNOLOGY GANDHINAGAR.pdf ...
Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more ...

Institute of Technology
Venus International College of Technology. Electrical Engineering Department. B. E. Semester-VI [Electrical] , January 2014. 4: Synchronous Motor-II (Power ...

Indian Institute of Technology Guwahati
o Reproduction rate of JG is very fast as compare to EF and EG. o Survival temperature ranges from 4 to 45oC. . They are resistive to light rays.

ProctorU - Oregon Institute of Technology
Have Questions? activates the LiveChat. » Test Your Equipment takes the test-taker to the equipment check page. » Schedule New Exam takes the test-taker through the appointment reservation pages. • After clicking Schedule New Exam, the test-taker

KUKA youBot Hardware Interfaces - GitHub
youBot hardware. omni-directional mobile platform.. 5-degree-of-freedom manipulator.. 2-finger gripper. all joints with relative encoders. real-time ...

Software and hardware list.docx.docx - GitHub
Download links to the software. Hardware specifications. OS required. 1. 32-bit / 64-bit guest OS. Free. None. Windows/Mac. OS/Debian/RedHa t/CentOS/SUSE/U buntu. 2. R. 3.X.X/RStudio. Desktop V0.9X. Free. R http://www.r-project.org/. RStudio https://

advanced institute advanced institute of technology ... -
Head Department of Computer Science and Engg. ... Courses at Advances Educational Institutions ... infrastructure, sophisticated labs and all other facilities.

List of Holidays - BIT Institute of Technology
Jul 29, 2014 - GENERAL ADMINISTRATION (POLL. ... (BY ORDER AND IN THE NAME OF THE GOVERNOR OF ANDHRA PRADESH). DR. P.K. MOHANTY.

DEPARTMENT OF PHYSICS INDIAN INSTITUTE OF TECHNOLOGY ...
INDIAN INSTITUTE OF TECHNOLOGY MADRAS. PH102 Physics II. Problem Set 8. To be discussed on April 2 2007. 1. The skin effect: Recall the relations D ...

advanced institute advanced institute of technology ... -
Advanced College of Technology & Management (ACTM) ... Advanced Institute of Technology & Management .... Introduction to Wireless technology- Wireless.

Newsletter - National Institute of Standards and Technology
Committees for Forensic Science (OSAC) program, and the ... activities from all interested parties. Recent OSAC ... during the course of standards and guidelines ...

Central Institute Of Plastics Engineering & Technology Recruitment ...
Central Institute Of Plastics Engineering & Technology ... d Various Post Application Form 2016 Qualification1.pdf. Central Institute Of Plastics Engineering ...

Central Institute of Plastics Engineering & Technology Recruitment ...
Central Institute of Plastics Engineering & Technology Recruitment For Scientist Qualification & Experience.pdf. Central Institute of Plastics Engineering ...

California Institute of Technology
California Institute of Technology. Hyoung Jun Ahn and Babak ... How long does it take to converge to the stationary distribution? ⇒ We study the mixing time of ...

MAEER's Maharashtra Institute of Technology Pune ... - PDFKUL.COM
Link: http://goo.gl/forms/RSm5jEbvC4. [Last date for registration: 3rd Jan 2016]. Registration is on first come first serve basis. Maximum entries: 30 ... Peace has been established at the “World Peace. Centre” of MIT Pune, which is first of its

International Institute of Information Technology ...
International Institute of Information Technology: Bhubaneswar. Transport Requisition Slip for Tata Magic. Requisition Slip No.(for office use):. Name: Date:.

Institute of Engineering & Technology
14T4036 PALAK JAIN. 9. Absent. 25. 28. 38. 74%. 34. 14T4037 PRATEEK VED. 16. 8. 25. 11. 38. 29% ... 14T4045 SAJAL KUMAR JAIN. 7. 9. 25. 29. 38. 76%. 42. 14T4046 SATYENDRA SINGH DHARVARIYA. 6 ... 14T4058 VIVEK SAGAR PANDEY. Absent. 7.5. 25. 21. 38. 55

CodeUnCode - Jagruti Institute of Engineering and Technology
the information security domain through the Code Uncode competition. III. National Footprint: ... Students can register online directly through the website ...