Browse > Article

Digital Watermarking using Of-axis Hologram  

김규태 (마크애니 부설연구소)
김종원 (상명대학교 소프트웨어학)
김수길 (호서대학교 전기정보통신공학)
최종욱 (마크애니 부설연구소)
Publication Information
Abstract
We propose a now watermarking scheme that can be used to embed multiple bits and also resilient to geometrical transforms such as scaling, rotation, and cropping, based on off - axis holographic watermark that allows multiple watermark recovery without original content(cover image). The holographic watermark is that Fourier transformed digital hologram is embedded into cover image in the spatial domain. The proposed method has not only increased robustness with a stronger embedding but also imprescriptibility of the watermark in the evaluation process. To compare with the convention기 scheme, the spread spectrum, we embedded and recovered maximum 1,024 bits that consist of binary number over PSNR(peak signal-to-noise ratio) 39dB. And also, we computed robustness with BER(bit error rate) corresponding the above attack
Keywords
digital Watermarking; digital Hologram; Holographic Watermark; Geometrical Attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Y. Lin, 'Public Watermarking Surviving General Scaling and Cropping: An Application for Print and-Scan Process', ACM Multimedia 99, Orlando, FL, USA, Oct 1999
2 C. Y. Lin and Shih-Fu Chang, 'Distortion Modeling and Invariant Extraction for Digital Image Print -and-Scan Process', ISMIP 99, Taipei, Taiwan, Dec. 1999
3 R. Caldelli, M. Bami, F. Bartolini, and A. Piva, 'Geo-metric-Invariant Robust Watermarking through Constellation Matching in the Frequency domain,' Proceedings of 7th IEEE ICIP 2000, vol. II, pp.65-68, Vancouver, Canada, Sep., 2000   DOI
4 D. Gaber, 'A New Microscope Principle,' Nature, Vol.161, pp.777, 1948
5 K. T. Kim, J H. Kim, and E. S. Kim, 'Multiple Information Hiding Technique using Random Sequence and Hadamard Matrix,' Opt. Eng, vol.40, no.11, pp, 2489-2494, 2001   DOI   ScienceOn
6 F. Hartung, J. K Su, and B. Girod, 'Spread Spectrum Watermarking: Malicious Attacks and Counterattacks,' Proceedings of SPIE 3657, Security and Watermarking of Multimedia Cotents, pp. 147-158, 1999
7 C. R. Choi and J. Jeong, 'Robust Image Watermarking Scheme Resilient to De-synchronization Attacks,' SPIE 2002 Security and Watermarking of Multimedia Contents W, San Jose, USA, Jan., 2002
8 E. N. Leith and J. Upatnieks, 'Reconstructed Wavefronts and Communication Theory,' J Opt Soc. Am vol.52, pp.1377, 1962
9 I. Pitas and T. Kaskalis, 'Applying Signatures on Digital Image,' Workshop on Nonlinear Signal and Image Processing, pp.460-463, June 1995
10 I. J. Cox, J. kilian, T. Leighton, and T. Sharnoon, 'Secure spread spectrum watermarking for multi media,' NEC Res. Insti., Princeton, NJ, Tech Rep., pp.95-100, 1995
11 J. J. K. O'Rauanidh and Thierry Pun, 'Rotation, Scale and Translation Invariant Digital Image Watermarking', Signal processing journal, 1998   DOI   ScienceOn