• Title/Summary/Keyword: 비대칭 워터마킹

Search Result 15, Processing Time 0.029 seconds

비대칭 워터마킹 시스템에 관한 연구

  • Choi, Hyuk;Kim, Tae-Jung
    • Review of KIISC
    • /
    • v.12 no.1
    • /
    • pp.25-33
    • /
    • 2002
  • 디지털 데이터의 저작권 보호를 위해 사용되는 워터마킹은 키의 대칭성 측면으로 볼 때 대칭 방식과 비대칭 방식으로 나눌 수 있다. 기존의 연구들은 거의 모두가 대칭 워터마킹의 형태로 이루어져 왔으나 공개적인 검출이 필요한 워터마킹의 특성상 삽입키와 검출키가 같은 대팅 형태에서는 검출기에서 유출되는 정보에 의해 삽입키가 제거될 수 있는 안전성 문제를 가지고 있다. 이를 해결하기 위해 검출키와 삽입키가 다른 비대칭 워터마킹 방식이 대두되었다. 본 논문은 최근에 2세대 워터마킹 방식으로 주목을 받고 있는 비대칭 워터마킹의 개념과 기존의 연구들을 소개하고 그들의 성능을 비교, 분석하였다.

Robustness Analysis and Improvement on Transformed-key Asymmetric Watermarking System (변환키 비대칭 워터마킹 시스템의 강인성 분석 및 개선)

  • Kim, Nam-Jin;Choi, Doo-Seop;Song, Won-Seok;Choi, Hyuk;Kim, Tae-Jeong
    • Journal of Internet Computing and Services
    • /
    • v.11 no.5
    • /
    • pp.119-126
    • /
    • 2010
  • In this paper, we analyze the robustness of transformed-key asymmetric watermarking system and show its improvement by proposing a new detection method. Based on the assumption that the transformed-key asymmetric watermarking system is under the threat of subtraction attack, we first propose the criterion for the detection performance of the watermarking system and analyze the optimum condition on the system. Next, a new detection method is proposed to improve the detection performance of the system based on the criterion. The proposed improvement makes the system robust to not only subtraction attack but also Wu's attack.

Secure Transmission of Digital images using Cryptography and Watermarking Techniques (암호화와 워터마킹 기법을 이용한 디지털 이미지의 안전한 전송)

  • 변성철;안병하
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.443-445
    • /
    • 2003
  • 본 논문에서는 디지털 이미지를 대칭 및 비대칭 암호화와 워터마킹 기법을 사용하여 안전하게 전송하는 방법을 제안한다. 제안된 기법은 디지털 이미지의 안전한 전송을 위하여 필수적인 네가지 조건 즉. 비밀성, 인증, 무결성, 부인방지 기능을 제공한다. 비대칭 키 암호화 기법은 전자서명의 발행과 대칭키의 암호화를 위해 사용하고, 대칭키 암호화 기법은 워터마크가 삽입된 디지털 이미지를 암호화 하는데 사용하며, 워터마킹 기법은 전송하고자 하는 디지털 이미지에 전자서명을 삽입하기 위해 사용한다. 제안한 방법의 장정은 전자서명이 별도의 파일로 첨부되는 기존의 전송방식과는 달리 암호화된 디지털 데이터와 전자서명이 동일한 파일 내에 존재하게 되는 것이다.

  • PDF

Performance analysis on the asymmetric watermark using power spectrum domain (파워 스펙트럼 도메인 비대칭 워터마크의 성능 분석)

  • 서진수;유창동
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.3
    • /
    • pp.164-170
    • /
    • 2003
  • This paper proposes a novel method to detect Furon's asymmetric watermark by using a correlation detector that is mathematically tractable and simple. The performance of the proposed method is tested under various conditions. The experimental results matched the theoretical results well, showing that the correlation detector can indeed be used for the detection of asymmetric watermark. The proposed detector is aplied to both single and multiple bit embedded watermark. Bit error rate (BER), obtained from the experiment, was compared to the one obtained from the theory. As the embedded information increases, the BER of the Furon's asymmetric watermarking method also increases rapidly.

Asymmetric public-key watermarking based on correlation method (상관도 검출기반의 비대칭 공개 키 워터마킹)

  • Li De;Kim Jong-Weon;Choi Jong-Uk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.151-159
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks to remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched several researchers as a next generation watermarking technology. In this paper, we have expanded search space of secret key using the solution set of linear simultaneous equations. Secret key is generated by secure linear transformation method to prevent of guessing secret key from public key, and the correlation value between secret key and public key is high. At theresults, the multi bits information can be embedded and high correlation value was detected after JPEG compression.

  • PDF

Secure Asymmetric Watermarking Based on Correlation Detection (상관도 검출기반의 안전한 비대칭 워터마킹)

  • Li De;Kim JongWeon;Choi JongUk
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.379-386
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are same. Although the symmetric watermarking method is easy to detect the watermark, has method has weakness against to malicious attacks to remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched several researchers as a next generation watermarking technology. In this paper, we have expanded search space of secret key using the solution set of linear simultaneous equations. Secret key is generated by secure linear transformation method to prevent of guessing secret key from public key, and the correlation value between secret key and public key is high. At the results, the multi bits information can be embedded and high correlation value was detected after JPEG compression.

Effective Watermark Detection Using Asymmetric Thresholds (비대칭 임계치를 이용한 효과적인 워터마크 검출 방법)

  • Shin, Chang-Doon;Oh, Hae-Seok
    • The KIPS Transactions:PartB
    • /
    • v.10B no.6
    • /
    • pp.619-628
    • /
    • 2003
  • In this paper, an effective watermark detection technique in the wavelet transform domain is proposed. In this proposed method, the image is 2-level wavelet transformed, and then the watermark with a binary logo is embedded into middle band except baseband and high band to consider Invisibility and robustness. In this paper, we use an asymmetric thresholds watermarking (ATW) in which detection threshold is higher than inserting threshold in order to enhance watermark detection ratio in attacked images. In watermark detection phase, the detection value is not changed when the difference of the selected wavelet neighboring coefficient pairs Is smaller than specific value. The experimental results show that the proposed method has good quality and is robust to various attacks such as the JPEG lossy compression, noise addition, cropping, blurring, etc.

A Digital Image Watermarking Scheme using ElGamal Function (ElGarnal함수를 사용하는 디지털 이미지 워터마킹 기법)

  • Lee, Jean-Ho;Kim, Tai-Yun
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.1-8
    • /
    • 2002
  • Digital image watermarking is a technique for the purpose of protecting the ownership of the image by embedding proprietary watermarks in a digital image. It is required for the digital image watermarking scheme to pursue the robustness against water marking attacks and the perceptual Invisibility more than usual in steganography area, to guarantee not a hidden watermarking algorithm but the publicity of water-marking algorithm details and hidden use of key, which can protect the unauthorized user access from detection. In this paper we propose a new copyright watermarking scheme, which is barred on one-way hash functions using ElGamal functions and modular operations. ElGamal functions are widely used in cryptographic systems. Our watermarking scheme is robust against LSB(least significant bit) attacks and gamma correction attack, and also perceptually invisible. We demonstrate the characteristics of our proposed watermarking scheme through experiments. It is necessary to proceed as the future work the algorithm of achieving at the same time both the pseudo-randomness for the steno-key generation and the asymmetric-key generation.

Hybrid Asymmetric Watermarking using Correlation and Critical Criteria (상관도와 임계치 방식을 이용한 다중검출 비대칭 워터마킹)

  • Li De;Kim Jong-Weon;Choi Jong-Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.726-734
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are the same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched by several researchers as a next generation watermarking technology. In this paper, hybrid asymmetric watermarking algorithm is proposed. This algorithm is composed of correlation detection method and critical criteria method. Each method can be individually used to detect watermark from a watermarked content. Hybrid asymmetric detection is complement between two methods, and more feasible than when each method is used respectively, Private key and public key are generated by secure linear transformation and specific matrix. As a result, we have proved the proposed algorithm is secured than symmetric watermarking algorithms. This algorithm can expand to multi bits embedding watermark system and is robust to JPEG and JPEG2000 compression.

A Secure Asymmetric Watermarking to the Public Key Attack (공개키 공격에 안전한 비대칭 워터마킹)

  • Li, De;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.173-180
    • /
    • 2008
  • In this paper, we proposed an algorithm for an effective public key and private key generation to implement a secure asymmetric watermarking system against the public key attack. The public key and private key generation is based on the linear transformation using a special matrix and the keys are designed to be able to have high correlation value. We also proposed a counter plan of public key attack. This method uses a multiple public key generation and distribution. As the results, the correlation value between the public key and the private key is high in the watermarked image. After the public key attack. this can detect the correlation by using other public key.

  • PDF