Browse > Article
http://dx.doi.org/10.5370/JEET.2012.7.4.646

New Watermarking Technique Using Data Matrix and Encryption Keys  

Kim, Il-Hwan (Dept. of Electrical and Electronic Engineering, Kangwon National University)
Kwon, Chang-Hee (Dept. of Information Technology, Hansei University)
Lee, Wang-Heon (Dept. of Information Technology, Hansei University)
Publication Information
Journal of Electrical Engineering and Technology / v.7, no.4, 2012 , pp. 646-651 More about this Journal
Abstract
Meaningful logos or random sequences have been used in the current digital watermarking techniques of 2D bar code. The meaningful logos can not only be created by copyright holders based on their unique information, but are also very effective when representing their copyrights. The random sequences enhance the security of the watermark for verifying one's copyrights against intentional or unintentional attacks. In this paper, we propose a new watermarking technique taking advantage of Data Matrix as well as encryption keys. The Data Matrix not only recovers the original data by an error checking and correction algorithm, even when its high-density data storage and barcode are damaged, but also encrypts the copyright verification information by randomization of the barcode, including ownership keys. Furthermore, the encryption keys and the patterns are used to localize the watermark, and make the watermark robust against attacks, respectively. Through the comparison experiments of the copyright information extracted from the watermark, we can verify that the proposed method has good quality and is robust to various attacks, such as JPEG compression, filtering and resizing.
Keywords
Data matrix; Encryption keys; Copyright information; Watermarking;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
Times Cited By Web Of Science : 0  (Related Records In Web of Science)
연도 인용수 순위
1 J. O. Ruanaidh, H. Petersen, A. Herrigel, S. Pereira, and T. Pun, "Cryptographic copyright protection for digital images based on watermarking techniques," Theoretical Computer Science,vol.226, pp.117-142, 1999.   DOI   ScienceOn
2 Tomokazu Onuki, Takeharu Adachi, Madoka Hasegawa, and Shigeo Kato, "A study on a digital watermarking method for still images," International Technical Conference on Circuits/Systems, Computers and Communications , pp.19-22, 2000.
3 Yong C. Kim, Byeong C. Choi, "Two-Step Detection Algorithm in a HVS-Based Blind Watermarking of Still Images," Lecture Notes on Computer Science, vol. 2613, pp. 235-248, 2002.
4 Jong-Eun Ha, "A New Method for Detecting Data Matrix under Similarity Transform for Machine Vision Application," IJCAS, vol. 9, no. 4, pp.737-741, 2011.
5 Kyung-Hun Lee, "Wavelet-Based Digital Watermarking Method," Journal of The Korea Computer Industry Education Society, vol.3, no.7, pp. 871-880, 2002.   과학기술학회마을
6 I. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for images, audio and video," Proceeding of Int. Conf. Image Processing, pp.243-246, 1996.
7 W. Zeng and B. Liu, "A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images," IEEE Transactions on Image Processing, pp.1534- 1548, 1999.
8 N. Nikolaidis and I. Pitas, "Copyright protection of images using robust digital signatures," Proceeding of Int. Conf. Acoustics Speech and Signal Processing, pp.2168-2171, 1996.
9 J. J. Chae and B. S. Manjunath, "A Robust Embedded Data from Wavelet Coefficients," Proceedings of the SPIE : Storage and Retrieval for Image and Video Databases VI 3312, pp.308-317, 1998 .
10 Ji-Hong Chang and Long-Wen Chang, "A new image copyright protection using digital signature of trading message and bar codewatermark," Proceeding of Image and Vision computing , pp.205-209, 2003.
11 M. Barni, F. Bartolini, A. De Rasa and A. Piva, "Capacity of full frame DCT image watermarks," IEEE Transactions on Image Processing, vol.9, pp.1450-1455, 2000.   DOI   ScienceOn