Browse > Article

Wavelet based data Watermarking  

김동현 (순천청암대학)
Abstract
The use of digital imaging technique and digital contents based on internet has grown rapidly for last several years, and the needs of digital image protection become more important. For the purpose of copyright protection on digital image, the verification of authentication techniques like content authentication, ownership authentication, illegal copy and etc are needs. Digital watermarking, the invisible encryption technique to insert digital watermarking into image, the sophisticated perceptual information should be used for providing transparency and robustness of images on watermarking process. In this paper, we implement the algorithm for preventing forged attack. ownership protection and authentication by transforming the wavelet algorithms in frequency domain in terms of human visual system.
Keywords
디지털 워터마크;웨이브렛 변환;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. Voyatzis, N. Nikolaidis and I. Pitas, 'Digital Watermarking : An Overview,' Proc, of EUSIPCO'98, Sep., 8-11, Rhodes, Greece, 1998
2 S. Craver, N. Memon, N. Yeo, and M. Yeung, 'Can Invisible Watermarks Resolve Rightful Ownership?,' IBM Research Report, RC20509, July 25, 1996
3 R. B. Wolfgang, E. J. Delp, 'A watermarking technique for digital imagery : further studies,' Video and Imaging Processing Laboratory, Proceeding of the International Conf. on Imaging Science, pp.279-287, 1997
4 I. J. Cox, M. L. Miller, 'A Review of Watermarking and the Importance of Perceptual Modeling,' Proc. SPIE Conf. on Human Vision Electronic Imaging II, Vol. 3-16, pp. 92-99, Feb., 1997
5 A. Piva, M. Barni, F. Bartolini, V. Cappellini, 'DCT-based watermark recovering without resorting to the uncorrupted original image,' Proceedings of ICIP'97, Santa Barbara, CA, SA, Oct., 26-29, Vol. I, pp. 520-523, 1997   DOI
6 I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, 'Secure Spread Spectrum Watermarking for Multimedia,' IEEE Trans. on Image Processing, 6, 12, pp. 1673-1687, 1997   DOI   ScienceOn
7 J. J. K. O' Ruanaidh, W. J. Dowling, F. M. Boland, 'Phase watermarking of digital images,' Proc. 1996 IEEE Int. Conference on Image Processing(ICIP'96), Vol. III, pp. 239-242, 1996   DOI
8 W. Bender, D. Gruhl, N. Morimoto, and A. Lu, 'Techniques for data hiding', IBM Systems Journal, Vol. 35, No. 3 and 4, pp.313-336, 1996   DOI
9 I. Pitas and T. H. Kaskalis, 'Applying signatures on digital images,' in Porc. IEEE Nonlinear Signal and Image Processing, June 1995, pp. 460-463
10 G. Caronni, 'Assuring Ownership Rights for Digital Images,'in Reliable IT Systems VIS '95, H. H. Brueggemann and W. Gerhardt-Haeckl, eds.,Vieweg Publishing Company, Germany, 1995