• Title/Summary/Keyword: 워터마크

Search Result 806, Processing Time 0.028 seconds

Digital Video Watermarking Based on SPHIT for I-frame Using Motion Vector Analysis (움직임 벡터 분석을 이용한 I 프레임에서의 SPIHT 기반 디지털 비디오 워터마킹)

  • 황의창;강경원;김희정;문광석;권기룡
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.167-170
    • /
    • 2004
  • 본 논문에서는 다양한 디지털 컨텐츠들 중에 디지털 비디오에 대한 워터마킹 방법을 제안하였다. 현재 비디오 압축 부호화의 기본 알고리즘으로 사용되는 DCT(discrete cosine transform)는 고압축을 수행할 경우 블록킹 현상이 심하게 나타나는 단점이 있다. 제안한 방법은 이러한 단점을 극복하고 점진적 전송 특성을 갖는 비디오를 위해 웨이브릿 변환 영역에서 SPIHT(set partitioning in hierarchical trees)를 이용한 비디오 부호화 과정에 워터마크를 삽입하였다. SPIHT 부호화 과정에서 비디오 신호의 시간 중복성을 이용한 I 프레임에 대한 이전 프레임의 움직임 벡터를 이용하여 I 프레임에 워터마크를 삽입한다. 워터마크 삽입 시 HVS(human visual system)를 이용하여 움직임 벡터 분석에 의해 선택된 영역에서 지각적 중요 계수 (PSC :perceptual significant coefficient)를 선택하여 워터마크를 삽입한다. 실험 결과 시간 중복성과 HVS를 이용하여 I 프레임에 워터마크를 삽입하였기 때문에 비가시성과 강인성이 우수함을 확인하였다.

  • PDF

Robust Digital Watermark Segmentation-based Embedding Techniques against Distortion Attacks (왜곡 공격에 강인한 디지털 워터마크 분할 삽입 기법)

  • Chae-Won Song;So-Hyun Park;Il-Gu Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.331-332
    • /
    • 2024
  • 최근 디지털 워터마킹 기술은 디지털 콘텐츠의 저작권 보호 및 추적을 위해 활용되고 있다. 그러나 종래의 워터마킹 기술은 이미지에 워터마크 이미지 전체를 삽입하기 때문에 왜곡 공격에 취약하다. 이러한 문제를 해결하기 위해 본 연구에서는 워터마크 분할 삽입 기법을 제안하였다. 워터마크 분할 삽입 기법을 사용하면 종래 방법 대비 20%p의 손실률이 증가하더라도 원본 워터마크를 복구할 수 있어 1.5배 향상된 성능을 보인다.

Tamper Detection of Digital Images using Hash Functions (해쉬 함수를 이용한 디지털 영상의 위변조 검출)

  • Woo, Chan-Il;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.7
    • /
    • pp.4516-4521
    • /
    • 2014
  • Digital watermarking for digital image authentication and integrity schemes are based on fragile watermarking and can detect any modifications in a watermark embedded image by comparing the embedded watermark with the regenerated watermark. Therefore, the digital watermark for image authentication and integrity should be erased easily when the image is changed by digital image processing, such as scaling or filtering etc. This paper proposes an effective tamper detection scheme for digital images. In the proposed scheme, the original image was divided into many non-overlapping $2{\times}2$ blocks. The digital watermark was divided into two LSB of each block and the image distortion was imperceptible to the human eye. The watermark extraction process can be used to determine if the watermarked image has been tampered. The experimental results successfully revealed the effectiveness of the proposed scheme.

Copyright Protection for the Video image with Coded Watermarking (암호화 워터마킹을 사용한 비디오 영상의 저작권 보호)

  • Park, Young;Kim, Hang-Rae;Rhu, Ho-Joon;Kim, Jae-Won
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.120-123
    • /
    • 2003
  • In this paper, a digital watermarking scheme whichis effective in protecting a copyright of video image under an image transformation and impulse noise is proposed. The proposing scheme is to use a coded watermark that insert the personal ID of copyrighter. The recovery ability is improved by the coded watermark. Also the coded watermark is abel to trace the illegal distributors. Binary image is used as watermark image, the value of PSNR and recovered rates of watermark are obtained in order to confirm the required invisibility and robustness in watermark system. The experimental results show that image quality is less degraded as the PSNR of 98.21 ㏈. It is also observed that excellent watermark recovery is achieved under the image transformation and impulse noise.

  • PDF

Robust Watermarking against Lossy Compression in Hadamard Domain (하다마드 도메인에서의 손실압축에 강인한 워터마킹)

  • Cui, Xue-Nan;Kim, Jong-Weon;Li, De;Choi, Jong-Uk
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.33-43
    • /
    • 2007
  • In this proper, we proposes a robust watermarking against the lossy compression in the Hadamard domain. The Hadamard matrix consists of only 1 or -1 and can be computed veru fast. The Hadamrd transform has the inverse transform therefore it is able to be applied into the watermarking technology. In embedding process, we select 10 coefficients from intermediate frequency domain and create two watermark patterns. In extraction process, we use the watermark patterns and compare them to detect the watermark information. When we use the standard image ($512{\times}512$) and binary watermark image ($64{\times}64$), the results of these examines are PSNR for $38{\sim}42dB$ and BER for $3.9{\sim}12.5%$. The JPEG QF between 30 and100, naked human eyes can detect to watermark image easily. The experimental results show that performance of Hadamard domain is better than those of DCT, FFT, and DWT.

  • PDF

Scalable Digital Watermarking Techniques for Optimal Distributed Contents (최적의 분산 컨텐츠를 위한 다중 계층 디지털 워터마킹 기법)

  • Seo Jung-Hee;Park Hung-Bog
    • The KIPS Transactions:PartB
    • /
    • v.12B no.3 s.99
    • /
    • pp.291-300
    • /
    • 2005
  • We are required to adequately adjust the distributed contents to each device and users' demands on the network and to obtain authentication of ownership for our information to prevent the illegal usage of our digital information by non-owners. In this paper, we propose scalable digital watermarking of contents within a compression domain based on Orthogonal Forward Wavelet Transforms, and the proposed method focuses on robust watermark algorithms that are not visually recognizable to embedded ownership information. Therefore, it proposes a watermark insertion methods based on spread spectrum techniques and Provides a watermark key. As a result, it not only extracted the contained watermark from the intentionally altered images, but also secured the watermark information extraction from partial images and ensure the decrease of BER (Bit Error Rate) in the images containing watermarks even when more watermark inserted images are transmitted.

A adaptively robust method of DCT-based watermarking (DCT 기반 워터마킹의 적응적 강인화 방법)

  • Jun, Young-Min;Kim, Gye-Young;Choi, Hyung-Il
    • The KIPS Transactions:PartB
    • /
    • v.10B no.6
    • /
    • pp.629-638
    • /
    • 2003
  • In this paper, we propose an improved method of watermarking to increase the invisibility of a watermark and robustness against attacks for the purpose of removing the embedded watermark. The proposed method adaptively selects DCT blocks and determines position and intensity for watermarking based on the characteristics of human visual system. The used features are texture, luminance and contrast. We show the experimental results against image processing attacks such as cropping, image enhancement, low pass filtering, and JPEG compression, and then discuss the performance of the proposed method.

Digital Image Watermarking Schemes Based on GCST and SVD (GCST-SVD 기반 디지털 영상 워터마킹 방법)

  • Lee, Juck-Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.14 no.3
    • /
    • pp.154-161
    • /
    • 2013
  • In this paper, Gabor cosine and sine transform considered as human visual filter is applied to watermarking methods for digital images. Four algorithms by using singular values or principal components of SVD in the frequency domain are proposed for watermark embedding and extraction. Two dimensional image is used as an embedded watermark. To measure the similarity between the embedded watermark image and the extracted one, a normalized correlation value is computed for the comparison of the four proposed methods with various attacks. Extracted watermark images are also provided for visual inspection. The proposed GCST-SVD method which embeds a watermark image into the lowest vertical or horizontal ac frequency band can provide useful watermarking algorithm with high correlation values and visual watermark features from experimental results for various attacks.

Multiple Watermarking Using Gram-Schmidt Orthogonal Processing (Gram-Schmidt 직교화를 이용한 다중 워터마킹)

  • Oh, Yun-Hui;Kang, Hyun-Ho;Park, Ji-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.703-710
    • /
    • 2001
  • In this paper, we consider a multiple watermarking for image copyright protection. Multiple watermarking can be defined that two or more watermarks are inserted into the same content. Multiple watermarking using spread spectrum technique is able to extract the correct watermarks from the watermarked content when the orthogonality among keys should be guaranteed only. To keep the orthogonal property between keys, we perform the process of Gram-Schmidt on the random sequences. The orthogonalized sequences are used as keys to embed the watermarks. The proposed method can not only extract correctly the embedded watermarks but also show the robustness against various attacks such as Gaussian noise addition, histogram equalization, gamma correlation, sharpening and brightness/contrast adjustment.

  • PDF

Design on Protection and Authentication System of IPTV Contents using HSI Watermark (HSI 워터마크를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.55-62
    • /
    • 2010
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents illicit copying and distribution of copyright meterials tends to draw more attentions. So we need a right service system that can protect contents and copyright using watermark inserting. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But this system can not protect the contents when acquiring them from TV output using A/D convertor. So we apply watermark method using HSI color space against contents illicit copying. And for distribution of copyright materials. we compound unique settop ID and copyrighter's ID to make new ID that is watermark. When inserting watermark, we use the watermark for copyright protection and authentication. So we can protect copyright and identify last settop's user in illicit distribution. we design download based IPTV contents protection and authentication system using HSI watermark method.