Digital Hologram Watermarking using Quad-tree Fresnelet Transform

Quad-tree Fresnelet 변환을 이용한 디지털 홀로그램 워터마킹

  • Published : 2013.09.30

Abstract

This paper proposes a watermarking scheme to protect ownership of a digital hologram, an ultra-high value-added content. It performs pre-defined levels of quad-tree Fresnelet transforms. The relationship among the same-positional-blocks is extracted as the digital pre-watermark. For the relationship, we use properties of a digital hologram that a hologram pixel retains all the information of the object and that the same size of partial holograms reconstructs the same size of object but different in their view points. Also we mix a set of private data with the pre-watermark and the result is encrypted by a block cipher algorithm with a private key. Experimental results showed that the proposed scheme is very robust for the various malicious and non-malicious attacks. Also because it extracts the watermarking data instead of inserting, the watermarking process does not harm the original hologram data. So, it is expected to be used effectively for invisible and robust watermark for digital holograms.

Keywords

References

  1. T. Motoki, H. Isono, and I. Yuyama, "Present Status of Three-Dimensional Television Research," Proc. IEEE 83(7): 1009-1021(July 1995). https://doi.org/10.1109/5.390119
  2. J. K. Chung and M. H. Tsai, Three-Dimensional Holographic Imaging, John Wiley & Sons, Inc., 2002.
  3. Stephen A. Benton and V. Michael Bove Jr., Hologranphic imaging, John Wiley & Sons Inc., NJ, 2008.
  4. I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, T. Kalker, Digital watermarking and steganography, 2nd ed., Morgan Kaufmann Publishers, MA, 2008.
  5. Y. -H. Seo, S. -Y. Choi, S. -H. Park and D. -W. Kim, "A Digital watermarking algorithm using correlation of the tree structure of DWT coefficients," IEICE Trans. on Fundamentals, Vol. E87-A No. 6, pp. 1347-1354, Jun. 2004.
  6. Y. -H. Seo, H. -J. Choi, C. -Y. Lee and D. -W. Kim, "Low-complexity watermarking based on entropy coding in H. 264/AVC," IEICE Trans. on Fundamentals, Vol. E91-A, No. 8, pp. 2130-2137, Sep. 2008. https://doi.org/10.1093/ietfec/e91-a.8.2130
  7. Y. -H. Seo, H. -J. Choi, J. -S. Yoo and D. -W. Kim, "Adaptive watermarking scheme using biased shift of quantization index," J. of Electrical and Computer Engineering, Vol. 2010, Article ID 348321, pp. 1-6, Feb. 2010.
  8. Y-H. Lin, and J-L Wu, "A digital blind watermarking for depth-image-based rendering 3D images," IEEE Trans. on Broadcasting, Vol. 57, No. 2, pp. 602-611, June 2011. https://doi.org/10.1109/TBC.2011.2131470
  9. H-D. Kim, J-W. Lee, T-W. Oh, and H-K. Lee, "Robust DT-CWT watermarking for DIBR 3D images," IEEE Trans. on Broadcasting, Vol. 58, No. 4, pp. 533-543, Dec. 2012. https://doi.org/10.1109/TBC.2012.2206851
  10. H-J. Choi, Y-H. Seo, J-S. Yoo, D-W. Kim, "Digital watermarking technique for holography interference patterns in a transform domain," Optics and Lasers in Engineering,. Vol.. 46, Issue 4,. pp 343-348, Apl. 2008. https://doi.org/10.1016/j.optlaseng.2007.11.005
  11. http://mpeg.chiariglione.org/standards/mpeg-4/advanced-video-coding
  12. http://mpeg.chiariglione.org/standards/mpeg-h/high-efficiency-video-coding
  13. D-W. Kiim, Y-G. Choi, H-S. Kim, J-S. Yoo, H-j. Choi, and Y-H. Seo, "The problems in digital watermarking into intra-frames of H. 264/AVC," Elsevier Image and Vision Computing 28(2010) pp. 1220-1228, 2010. https://doi.org/10.1016/j.imavis.2009.12.006
  14. U. Schnar and W. Jueptner, Digital Holohtaphy, Springer, Berlin, Germany, 2005.
  15. C. S. Burrus, R. A. Gopinath, and H. Guo, Introduction to wavelet and wavelet transforms, Prentice Hall, Upper saddle River, NJ, 1998.
  16. W. Stallings, Cryptography and network security, 5th Ed., Pearson Prentice Hall Inc., 2011.
  17. http://www.mesa-imaging.ch/prodview4k.php.