Browse > Article
http://dx.doi.org/10.3745/KIPSTB.2003.10B.4.367

Robust watermarking technique in geometric distortion and authentication of digital images  

Lee, Na-Young (숭실대학교 대학원 컴퓨터학과)
Kim, Won (전주기전여자대학 실용예술학부)
Kim, Gye-Young (숭실대학교 컴퓨터학부)
Choi, Hyung-Il (숭실대학교 미디어학부)
Abstract
The existing watermarking techniques for copyright protection of a digital image are fragile in geometric distortion and it is hard to detect whether it was manipulated artificially. In this paper, we proposed the new copyright protection system that can authorize a digital mage and :an embed or extract a robust watermark in a artificial manipulation in order to solve these problems. In a watermarking part, the proposed a watermarking technique embeds a watermark in a phase component after a Complex Wavelet Transform (CWT) with an original image, and a watermark is extracted from an watermarked image by stages. A copyright about an image can be insisted on than a threshold after comparing a correlation of an original watermark with an extracted watermark if large. In an authentication part of a digital image, EZW (Embedded Zerotree Wavelet) is used, and an authentication cord of an watermarked image is generated. An authentication code of an image to have been distribute to is compared with a generated authentication cord, and artificial operation isn´t than a threshold if large. The proposed copyright protection system through performance evaluation display that it was robust in geometric distortion and a artificial operation was able to be detected.
Keywords
Copyright Protection; Digital Watermarking Technique; Complex Wavelet Transform; Geometric Distortion; Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. J. Delp and R. B. Wolfgang, 'A Watermark for Strill Image,' Int. Conf. on Image Processing, Sep., 1996
2 A. B. Watson, G. Y. Yang, J. A. Solomon, and villasenor, 'Visibility of Wavelet Quantization Noise,' IEEE Trans. on Image Processing, Vol.6, No.8, 1997   DOI   ScienceOn
3 Strang, 'Wavelets and Dilation Equations,' SIAM DEC 1989   DOI   ScienceOn
4 W. Bendor, D. Gruhl, N. Morimoto, 'Techniques for Data Hiding,' Proc. SPIE, Feb., 1995
5 A. Piva, M. Barni, F. Bartolini, V. Cappellini, 'DCT-based watermark recovering without resorting to the uncorrupted original image,' Proceedings of ICIP'97, Santa Barbara, CA, USA, Vol.I, pp.520-523, Oct., 1997   DOI
6 I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, 'Secure Spread Spectrum Watermarking for Multimedia,' IEEE Trans. on Image Processing, 6, 12, pp.1673-1687, 1997   DOI   ScienceOn
7 J. J. K. O'Ruanaidh, T. Pun, 'Rotation, Scake and Translation Invariant Digital Image Watermarking,' Proceedings of ICIP'97, Santa Barbara, CA, USA, Vol.1, pp.536-539, Oct., 1997   DOI
8 J. J. K. O'Ruanaidh, T. Pun, 'Rotation, Scake and Translation Invariant Digital Image Watermarking,' Proceedings of ICIP'97, Santa Barbara, CA, USA, Vol.I, pp.536-539, Oct., 1997   DOI
9 Nick Kingsbury, 'Image Processing With Complex Wavelets,' in Phil. Trans. R. Soc. Lond, 1997
10 D. Kundur, D. Hatzinakos, 'A Bobust Digital Image Watermarking Method using Wavelet-Based Fusion,' Proceedings of ICIP '97, Santa Barbara, CA, USA, Vol.I, pp.544-547, Oct., 1997