Browse > Article
http://dx.doi.org/10.3807/HKH.2008.19.4.262

Image Watermark Method Using Multiple Decoding Keys  

Lee, Hyung-Seok (Division of Electrical & Electronics Engineering, Korea Maritime Univerity)
Seo, Dong-Hoan (Division of Electrical & Electronics Engineering, Korea Maritime Univerity)
Cho, Kyu-Bo (School of Electrical Engineering & Computer Science, Kyungpook National University)
Publication Information
Korean Journal of Optics and Photonics / v.19, no.4, 2008 , pp. 262-269 More about this Journal
Abstract
In this paper, we propose an image watermark method using multiple decoding keys. The advantages of this method are that the multiple original images are reconstructed by using multiple decoding keys in the same watermark image, and that the quality of reconstructed images is clearly enhanced based on the idea of Walsh code without any side lobe components in the decoding process. The zero-padded original images, multiplied with random-phase pattern to each other, are Fourier transformed. Encoded images are then obtained by taking the real-valued data from these Fourier transformed images. The embedding images are obtained by the product of independent Walsh codes, and these spreaded phase-encoded images which are multiplied with new random-phase images. Also we obtain the decoding keys by multiplying these random-phase images with the same Walsh code images used in the embedding images. A watermark image is then made from the linear superposition of the weighted embedding images and a cover image, which is multiplied with a new independent Walsh code. The original image is simply reconstructed by the inverse-Fourier transform of the despreaded image of the multiplication between the watermark image and the decoding key. Computer simulations demonstrate the efficiency of the proposed watermark method with multiple decoding keys and a good robustness to the external attacks such as cropping and compression.
Keywords
Phase encoding; Optical encryption; Walsh code; Watermark;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng., vol. 35, no. 9, pp. 2464-2469, 1996   DOI   ScienceOn
2 K-B. Cho, D-H. Seo, and S-J. Kim, “Practical Image Hiding Method Using a Phase Wrapping Rule and Real-Valued Decoding Key,” Opt. rev., Vol. 14, No. 3, 2007   DOI
3 M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, pp. 29-37, 2005   DOI   ScienceOn
4 D. P, J. W, S. Y, S. W, and A. L, “CDMA based Multipleuser digital watermarking,” Proceedings of the 2006 inter national conference on intelligent information hiding and multimedia signal processing, 2006
5 C. H. Yeh, H. T. Cahng, H. C. Chien, and C. J. Kuo, “Design of cascaded phase Keys for a hierarchical security system,” Appl. Opt., vol. 41, no. 29, pp. 6128-6314, Oct. 2002   DOI
6 M. Yamazaki and J. Ohtsubo, “Optimization of encrypted holograms in optical security systems,” Opt. Eng., vol. 40, no. 1, pp. 132-137, 2001   DOI   ScienceOn
7 K-T Kim, J-H Kim, and E-S Kim, “Multiple information hiding technique using random sequence and Hadamard matrix,” Opt. Eng., vol. 40, no. 11, pp. 2489-2494, 2001   DOI   ScienceOn
8 D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and deciphered by a modified joint-transform correlator,” Appl Opt., vol. 44, no. 15, pp. 3019-3023, 2005   DOI
9 G. Situ, J. Zhang, “Image hiding with computer-generated phase codes for optical authentication,” Opt. Commun. 245 pp. 55-65, 2005   DOI   ScienceOn
10 Hsuan T. Chang and Chung L. Tsan, “Image watermarking by use of digital holography embedded in the discretecosine-transform domain,” Appl. Opt., vol. 44, no. 29, pp. 6211-6219, 2005   DOI
11 S. Huang and J. K. Wu, “Optical Watermarking for Printed Document Authentication,” IEEE Trans. on Information Forensics and Security, vol. 2, no. 2, pp. 164-173, 2007   DOI   ScienceOn
12 P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett., vol. 20, no. 7, pp. 767-769, 1995   DOI   ScienceOn
13 B. Schneier, Applied cryptography-protocol, algorithms, and source code in C, 2nd ed., John Wiley & Sons, New York, 1995
14 A. Shamir, “How to share secret,” Communications of ACM, vol. 22, pp. 612-613, 1979   DOI   ScienceOn
15 B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng., vol. 33, no. 6, pp. 1752-1756, 1994   DOI   ScienceOn
16 B. Javidi and E. Ahouzi, “Optical security system with Fourier plane encoding,” Appl. Opt., vol. 37, no. 26, pp. 6247-6255, 1998   DOI
17 T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng., vol. 39, no. 8, pp. 2031-2035, 2000   DOI   ScienceOn
18 B. Javidi, A. Sergent, G. Zhang, and L. Guibert, “Fault tolerance properties of a double phase encoding encryption technique,” Opt. Eng., vol. 36, no. 4, pp. 992-998, 1997   DOI   ScienceOn
19 B. Wang, C. C. Sun, W. C. Su, and A. E. T. Chiou, “Shifttolerance property of an optical double-random phase-encoding encryption system,” Appl. Opt., vol. 39, no. 26, pp. 4788-4793, 2000   DOI
20 N-J Kim, D-H Seo, and S-G Lee, C-M Shin, K-B Cho, and S-J Kim, “Hierarchical Image Encryption System Using Orthogonal Method,” Journal of OSK, vol. 17, no. 3, 2006   과학기술학회마을   DOI   ScienceOn