Gram-Schmidt 직교화를 이용한 다중 워터마킹

Multiple Watermarking Using Gram-Schmidt Orthogonal Processing

  • Oh, Yun-Hui (Net&TV) ;
  • Kang, Hyun-Ho (Dept. of Compute Engineering, Graduate School of Pukyong National University) ;
  • Park, Ji-Hwan (Dept. of Electronics Computer Information Communication Engineering, Pukyong National University)
  • 발행 : 2001.12.01

초록

본 논문에서는 영상의 저작권 보호를 위하여 하나의 컨텐츠에 복수개의 서로 다른 워터마크를 삽입하는 다중 워터마킹(multiple watermarking)에 대하여 고찰한다. 대역확산(spread spectrum)을 이용한 다중 워터마킹에서 워터마크 삽입시 사용되는 키 사이의 직교성(orthogonality)이 유지되어야 삽입된 워터마크의 정확한 추출이 가능하게 된다. 랜덤계열 사이의 직교성을 유지하기 위하여 Gram-schmidt 직교화를 이용하여 워터마크를 삽입하는 방식을 제안한다. 제안 방식은 삽입된 워터마크를 정확하게 추출할 수 있을 뿐 아니라, 가우시안 노이즈 추가, 히스토그램 평활화, 감마 보정, 샤프닝, 명도/대비조정 등의 다양한 공격에 대하여 강인함을 보인다.

In this paper, we consider a multiple watermarking for image copyright protection. Multiple watermarking can be defined that two or more watermarks are inserted into the same content. Multiple watermarking using spread spectrum technique is able to extract the correct watermarks from the watermarked content when the orthogonality among keys should be guaranteed only. To keep the orthogonal property between keys, we perform the process of Gram-Schmidt on the random sequences. The orthogonalized sequences are used as keys to embed the watermarks. The proposed method can not only extract correctly the embedded watermarks but also show the robustness against various attacks such as Gaussian noise addition, histogram equalization, gamma correlation, sharpening and brightness/contrast adjustment.

키워드

참고문헌

  1. Ross. J Anderson, F. A. P. Petitcolas, 'Information Hiding : An Annotated Bibliography,' http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/, pp.204-213, 1999
  2. F. Mintzer and G. W. Braudaway, 'If One Watermark is Good, Are More Better?,' IEEE Int'l Conf. on Acoustics, Speech and Signal Processing, pp.2067-2069, 1999 https://doi.org/10.1109/ICASSP.1999.758338
  3. X. M. Niu, Z. M. Lu and S. H. Sun, 'Digital Watermarking of Still Images with Gray-Level Digital Watermarks,' IEEE Trans. on Consumer Electronics, Vol.46, No.1, Feb. 2000 https://doi.org/10.1109/30.826391
  4. Thomas S. Shore, 'Applied Linear Algebra and Matrix Analysis,' McGraw-Hill Primis Publishing, Jan. 1999
  5. I. Pitas, 'A Method for Watermark Casting on Digital Image,' IEEE Transaction on Circuits and Systems for Video Technology, Vol.8, No.6, pp.775-780, Oct. 1998 https://doi.org/10.1109/76.728421
  6. M. Kutter, F. Jordan and F. Bossen, 'Digital Watermarking of Color Images using Amplitude Modulation,' Journal of Electronic Imaging, Vol.7, No.2, pp.326·-332, April, 1998 https://doi.org/10.1117/1.482648
  7. A. Shiozaki, 'Improvement to a Method of Embedding Robust Watermarks into Digital Color Images,' IEICE Trans. Funda, Vol.E82-A, No.5, May, 1999
  8. I. J. Cox, J. Killian, T. Leighton and T. Shamoon, 'Secure Spread Spectrum Watermarking for Multimedia,' IEEE Trans. Image Processing., pp.1673-1687, Dec. 1997 https://doi.org/10.1109/83.650120
  9. M. Kutter, 'Digital Image Watermarking: Hiding Information in Images,' Ph.D thesis, Swiss Federal Institute of Technology, Lausanne, Switzerland, 1999
  10. C. T. Hsu and J. L. Wu, 'Hidden Digital Watermarks in Images,' IEEE Transaction on Image Processing, Vol. 8, No.1, Jan. 1999 https://doi.org/10.1109/83.736686
  11. M. Ramkumar, A. N. Akansu, and A. A. Alatan, 'A Robust Data Hiding Scheme for Images Using DFT,' in Proceedings of the 6th IEEE International Conference on Image Processing ICIP'99, pp.211-215, Oct. 1999 https://doi.org/10.1109/ICIP.1999.822886
  12. S. D. Lin and C. F. Chen, 'A Robust DCT-based Watermarking for Copyright Protection,' IEEE Trans. on Consumer Electronics, Vol.46, No.3, Aug. 2000 https://doi.org/10.1109/30.883387
  13. 'STEP2001 project,' http://www.jasrac.or.jp
  14. 김장환, 김규태, 김은수, '랜덤시퀸스와 Hadamard 행렬을 이용한 디지털 정보은폐 기술에 관한 연구', 한국통신학회논문지, 제24권 제9A호, pp,1339-1345, 1999
  15. M. Kutter and F. A P. Petitcolas, 'A Fair Benchmark for Image Watermarking Systems,' Electronic Imaging '99. Security and Watermarking of Multimedia Contents, The Int'l Society for Optical Eng., Vol.3657, Jan. 1999 https://doi.org/10.1117/12.344672
  16. A. Shiozaki, J. Tanimoto, and M. Iwata, 'A Digital Image Watermarking Scheme Withstanding Malicious Attacks,' IEICE Trans. Fundamentals., Vol.E83-A, No.10, Oct. 2000
  17. S. Voloshynovskiy, S. Pereira, T. Pun, J. J. Eggers and J. K. Su, 'Attacks on Digital Watermarks: Classification, Estimation-based Attacks and Benchmarks,' Submitted to Communications Magazines, Special Issue on Watermarking, 2001 https://doi.org/10.1109/35.940053
  18. S. Voloshynovskiy, S. Pereira, V. Iquise and T. Pun, 'Attack Modelling: Towards a Second Generation Watermarking Benchmark,' Signal Processing, Special Section on Information Theoretic Aspects of Digital Watermaking, Vol.81, No.6, pp.1177-1214, June, 2001 https://doi.org/10.1016/S0165-1684(01)00039-1
  19. R. Crane, 'A Simplified Approach to Image Processing,' Prentice Hall, 1997