• Title/Summary/Keyword: 디지털 워터마크

Search Result 452, Processing Time 0.022 seconds

Robust Watermarking in Noise for Digital Image by Using FP-ICA (FP-ICA에 의한 잡음에 강건한 디지털영상 워터마킹)

  • Cho, Yong-Hyun;Hong, Seong-Jun
    • Annual Conference of KIPS
    • /
    • 2004.05a
    • /
    • pp.1031-1034
    • /
    • 2004
  • 본 논문에서는 고정점 알고리즘 독립성분분석을 이용하여 잡음에 강건한 디지털영상의 워터마킹을 제안하였다. 여기서 고정점 알고리즘은 워터마킹의 추출과정에서 빠른 추출과 잡음에 강건한 개선된 추출성능을 얻기 위함이고, 독립성분분석의 이용은 추출과정에서 워터마크의 위치나 크기, 원본과 키 영상 등에 대한 사전 지식의 요구를 없애기 위함이다. 제안된 기법을 $256{\times}256$ 픽셀의 레나 원 영상, 키 영상, 그리고 문자 워터마크에 적용한 결과, 잡음과 같은 공격에 강하면서도 워터마크의 검출 및 추출과정에 원본 영상들에 대한 사전지식이 요구되지 않았다.

  • PDF

Robust Watermarking for Digital Images in Geometric Distortions Using FP-ICA of Secant Method (할선법의 FP-ICA를 이용한 기하학적 변형에 강건한 디지털영상 워터마킹)

  • Cho Yong-Hyun
    • The KIPS Transactions:PartB
    • /
    • v.11B no.7 s.96
    • /
    • pp.813-820
    • /
    • 2004
  • This paper proposes a digital image watermarking which is robust to geometric distortions using an independent component analysis(ICA) of fixed-point(FP) algorithm based on secant method. The FP algorithm of secant method is applied for better performance in a separation time and rate, and ICA is applied to reject the prior knowledges for original image, key, and watermark such as locations and size, etc. The proposed method embeds the watermark into the spatial domain of original image The proposed watermarking technique has been applied to lena, key, and two watermarks(text and Gaussian noise) respectively. The simulation results show that the proposed method has higher speed and better rate for extracting the original images than the FP algorithm of Newton method. And the proposed method has a watermarking which is robust to geometric distortions such as resizing, rotation, and cropping. Especially, the watermark of images with Gaussian noise has better extraction performance than the watermark with text since Gaussian noise has lower correlation coefficient than the text to the original and key images. The watermarking of ICA doesn't require the prior knowledge for the original images.

Performance Analysis for Digital watermarking using Quad Tree Algorithm (쿼드트리 알고리즘을 이용한 디지털 워터마킹의 성능 분석)

  • Kang, Jung-Sun;Chu, Hyung-Suk
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.1
    • /
    • pp.19-25
    • /
    • 2010
  • In this paper, digital watermarking method using quad-tree algorithm is proposed. The proposed algorithm searches the significant coefficient of the watermark by using quad-tree algorithm and inserts the watermark by the Cox's algorithm. The simulation for performance analysis of the proposed algorithm is implemented about the effect of quad-tree algorithm in wavelet domain and that of embedding watermark in each subband coefficient (HH, LH, HL) and each DWT level, and that of embedding in the lowest frequency band (LL). As a simulation result, digital watermarking using quad-tree algorithm improves the watermarking performance in comparison with inserting watermark in the significant coefficients of fixed frequency band. The watermarking performance of simultaneously embedding in HH, LH, and HL band of DWT(6 level) is better than that of different cases. In addition, insertion the watermark to the LL band about 30~60% of all watermarks improves the correlation value while PSNR performance decreases 1~3dB.

A Secret Key Watermarking for Authentication and Integrity (인증과 무결성을 위한 비밀키 워터마킹)

  • Woo, Chan-Il;Shin, In-Chul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3576-3583
    • /
    • 2000
  • Digital watermarks have recently been proposed for the purposes of copyright ptotechtion and autheutication for multimedia contents. A watermarking technique consists of an algorithm that incorporates a watermarking structure into an image in the spatial or frequency domains. In this paper we proposed a new watermarking method for authentication and integrity of digital images and the proposed algorithm uses the MD5 hash funiction and a symmetric key encryption algorithm. To decide the position of embedding watermark and the bit pasitionin the original image, the secret key is used as an input of the MD5 hash function. The simulation results show that the proposed algorithm has the advantage of difficulty to find positions of inserted watermarks, and keep the similar watermarked image quabty with Wong's method.

  • PDF

Digital Watermarking Method using Discrete Optimization Method (이산최적화 기법을 사용한 디지털 워터마킹)

  • Lee, Chang-Soon
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.1
    • /
    • pp.44-49
    • /
    • 2014
  • In recent, watermarking technology have been paying attention to methods avoiding illegal use and reproduce of digital contents. Then, in order to protect the right of digital contents, a watermark image is inserted into original images. In different watermarking methods, several technologies using Ant Colony Algorithm have been studied. In this paper, we propose a watermarking method using a discrete optimization method in the ants colony algorithm. This proposed method resembls the process that ants follow the pheromone traps to find out food. And when a watermark image is inserted into original images, the proposed method considers the deployment of obstacles or the balance between cells in the entire digital image. Simulation results show that the proposed method is increased in robustness of watermarked image and is decreased in the perceptibility of watermarking compared to the previous methods.

A Wavelet-Based Watermarking Scheme of Digital Image Using ROI Method (ROI를 이용한 웨이브렛 기반 디지털 영상의 워터마킹 기법)

  • Kim, Tae-Jung;Hong, Choong-Seon;Sung, Ji-Hyun;Hwang, Jae-Ho;Lee, Dae-Young
    • The KIPS Transactions:PartB
    • /
    • v.11B no.3
    • /
    • pp.289-296
    • /
    • 2004
  • General watermarking techniques tend not to consider intrinsic characteristics of image, so that watermarks are embeded to entire images. In this paper, we present a watermarking algorithm based on wavelet domain, and the watermark is embedded into large coefficients in region of interest(ROI) being based on principle of multi-threshold watermark coding(MTWC) for robust watermark insertion. We try to accomplish both image duality and robustness using human visual system(HVS). The watermarks are embedded in middle frequency bands because the distortion degree of watermarked images appears to be less than lower frequency bands, and the embedded watermarks in the middle bands showed high extraction ratios after some distortion. The watermarks are consisted of pseudo random sequences and detected using Cox's similarity mesurement.

Perceptual Data Hiding Model with Adaptive Watermark Strength (적응적 워터마크 삽입강도를 갖는 지각적 데이터 은닉 모델)

  • 조영웅;장봉주;김응수;문광석;권기룡
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.11b
    • /
    • pp.287-290
    • /
    • 2002
  • 본 논문에서는 디지털 컨텐츠 저작권 보호를 위해 강인성과 비가시성의 유지를 위한 보다 효과적인 방법으로 웨이브릿 변환에서 적응적 워터마크 삽입강도를 갖는 지각적 데이터 은닉 모델을 제안한다. 먼저 영상을 9/7 쌍직교 웨이브릿 필터를 사용해 4레벨로 다해상도 분해한다. 다음으로 연속부대역 양자화(successive subband quantization)를 통한 시각적 중요계수(perceptually significant coefficient: PSC)들을 선정하여 선택된 계수들에 대해서만 워터마크 정보를 삽입한다. 지각 모델은 정상상태의 일반화 가우시안 모델(generalized gaussian model)로 추정된 NVF(noise visibility function)로 에지와 텍스쳐영역 그리고 평탄영역에 따라 각각 적응적으로 삽입되게 한다. 이는 각 서브밴드 내의 분산과 형상계수(shape parameter)에 의해 결정된다. 적응적 워터마크의 삽입강도를 갖기 위해 에지와 텍스쳐영역의 삽입강도는 각 서브밴드의 주파수 감도(frequency sensitivity)로 결정되고, 평탄영역의 삽입강도는 영상의 국부적 특성에 근거한 통계적 가중치를 사용한다. 삽입되는 워터마크는 랜덤시퀀스로 N(0,1)이다. 여러 가지 공격에 대한 실험으로 제안한 방법의 비가시성과 강인성을 확인한다.

  • PDF

Digital Watermark for the Protection of Multimedia Content (멀티미디어 컨텐트 보호를 위한 디지털 워터마크)

  • Lee, J.S.;Kim, H.Y.;Lee, E.T.
    • Electronics and Telecommunications Trends
    • /
    • v.13 no.3 s.51
    • /
    • pp.42-52
    • /
    • 1998
  • 멀티미디어 산업의 확장과 인터넷과 같은 네트워크의 보편화로 인해 멀티미디어 컨텐트의 사용이 급증하고 있다. 또한, 이러한 네트워크 망을 통한 상업적 거래가 확대됨에 따라 멀디미디어 컨텐트(정지영상, 동영상, 오디오, 문서 등)의 지적소유권, 저작권을 보호하려는 노력이 있었다. 워터마크는 멀티미디어 컨텐트에 사용자 정보를 감춤으로써 효과적으로 저작권 및 소유권을 보호할 수 있는 도구이다. 따라서 본 논문에서는 워터마크가 갖추어야 할 요건 및 멀티미디어 컨텐트에 워터마크를 내장하는 여러 가지 방법을 소개하고, 상업적으로 이용되고 있는 워터마크 시스템을 살펴보았다.

The Robustness Wavelet Watermarking with Adaptive Weight MASK (적응 가중치 마스크 처리 기반 강인한 웨이브릿 워터마킹)

  • 정성록;김태효
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.4 no.2
    • /
    • pp.46-52
    • /
    • 2003
  • In this paper, the wavelet watermarking algorithm based on adaptive weight MASK processing as a watermark embedded-method for Copyright Protection of Digital contents is Proposed. Because watermark induce as a noise of original image, the watermark size should be limited for preventing quality losses and embedding watermark into images. Therefore, it should be preserve the best condition of the factors, robustness, capacity and visual quality. Tn order to solve this problem, we propose watermarking embedded method by applying adaptive weight MASK to the algorithm and optimize its efficiency. In that result, the watermarked images are improved about external attack. Specifically, correlation coefficient has over 0.8 on both modifications of brightness and contrast. Also, correlation coefficient of wavelet compression of embedded watermark last by over 0.65.

  • PDF

Hologram Watermarking Using Fresnel Diffraction Model (Fresnel 회절 모델을 이용한 홀로그램 워터마킹)

  • Lee, Yoon-Hyuk;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.19 no.5
    • /
    • pp.606-615
    • /
    • 2014
  • This paper is to propose an algorithm for digital hologram watermarking by using a characteristic of the Fresnel diffraction model in 2D image. When 2D image is applied Fresnel transform, the result concentrates center region. When applied to a hologram, on the other hand, the result focused diffraction pattern of 2D form. Using this characteristic, to generate diffraction model by applying 2-th Fresnel transform to the hologram. Corner of diffraction model is mark space. This mark space is embedded watermark and extracted watermark. Experimental results showed that all the extracted watermarks after several kinds of attacks (Gaussian blurring, Sharpening, JPEG compression) showed visibilities good enough to be recognized to insist the ownership of the hologram.