• Title/Summary/Keyword: 워터마크

Search Result 802, Processing Time 0.043 seconds

DCT영역에 기반한 반복적 이진위상컴퓨터형성홀로그램을 이용한 디지털 영상 워터마킹 기술

  • Kim, Cheol-Su
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2009.05a
    • /
    • pp.32-36
    • /
    • 2009
  • 본 논문에서는 DCT영역에서 반복적 이진위상컴퓨터형성홀로그램을 이용한 디지털 영상 워터마킹 기술을 제안하였다. 워터마크로 주로 사용되는 랜덤 시퀸스 또는 로고와 같은 은닉영상 대신 은닉영상을 손실없이 재생할 수 있는 이진위상컴퓨터형성홀로그램을 생성하고, 이를 반복적으로 표현해서 워터마크로 사용한다. 그리고 이 워터마크를 호스트영상의 DCT 계수에 적절한 규칙을 통해 가중치를 부여하여 삽입한 후, IDCT한다. 워터마크의 추출은 워터마킹된 영상과 호스트영상을 DCT하고, 삽입시 적용한 규칙을 통해서 수행한다. 그리고 추출된 워터마크의 역푸리에 변환과 호스트영상에 삽입하기전의 워터마크를 역푸리에 변환하여 재생한 은닉영상과의 상관을 취함으로써 워터마크의 존재여부를 검증한다. 제안한 방법은 워터마크 삽입/추출시 반복되는 홀로그램정보를 활용하고, 이진 값으로 구성되어 있으므로 기존의 어떠한 워터마킹 기술보다 외부 공격에 견실한 특징을 가지고 있으며, 컴퓨터 시뮬레이션을 통해 그 성능을 확인하였다.

  • PDF

Robust Watermarking Algorithm for 3D Mesh Models (3차원 메쉬 모델을 위한 강인한 워터마킹 기법)

  • 송한새;조남익;김종원
    • Journal of Broadcast Engineering
    • /
    • v.9 no.1
    • /
    • pp.64-73
    • /
    • 2004
  • A robust watermarking algorithm is proposed for 3D mesh models. Watermark is inserted into the 2D image which is extracted from the target 3D model. Each Pixel value of the extracted 2D image represents a distance from the predefined reference points to the face of the given 3D model. This extracted image is defined as “range image” in this paper. Watermark is embedded into the range image. Then, watermarked 3D mesh is obtained by modifying vertices using the watermarked range Image. In extraction procedure, the original model is needed. After registration between the original and the watermarked models, two range images are extracted from each 3D model. From these images. embedded watermark is extracted. Experimental results show that the proposed algorithm is robust against the attacks such as rotation, translation, uniform scaling, mesh simplification, AWGN and quantization of vertex coordinates.

Color Image Watermarking Using Human Visual System (인간시각시스템을 고려한 칼라 영상 워터마킹)

  • Lee, Joo-Shin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.6 no.2
    • /
    • pp.65-70
    • /
    • 2013
  • In this paper, we proposed color image watermarking using human visual system. A watermark is embedded by transforming a color image of RGB coordinate into a color image of HSI coordinate with considering that chromatic components are less sensitive than achromatic components. Watermark is embedded in the frequency domain of the chromatic channels by using discrete cosine transform. Watermark is extracted from watermarked image by using inverse discrete cosine transform. To verify the proposed method, a standard image and a fingerprint image are used for the original image and the watermark image, respectively. Simulation results are satisfied with invisibility and robustness from attacks as image compression.

A Watermarking System using Adaptive Thresholds (적응 임계값을 사용한 워터마킹 시스템)

  • Sang-Heun Oh;Sung-Wook Park;Bvyung-Jun Kim
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.30-37
    • /
    • 2003
  • In this paper, a discrete wavelet transform (DWT)-based watermarking system is proposed. The main feature of proposed system is that the embedding system uses adaptive thresholds to control the trade-off between the qualify of the watermarked image and the capacity of the watermark, and the trade-off between the quality and robustness of the watermarked image. Also, the extracting system rebuilds threshold according to various attacks and decides a watermark bit from the least distorted coefficient after measuring the distortion of coefficient. Finally, a new measure to detect the uniqueness of watermark is proposed. The experimental result shows that the proposed watermarking system is robust against conventional signal processing and intentional attacks.

A New Image Authentication Method through Isolation of Invalid Blocks (무효 블록의 격리를 이용한 새로운 이미지 인증 방법)

  • Kim, Hyo-Chul;Kim, Hyun-Chul;Yoo, Ki-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.17-24
    • /
    • 2002
  • In this paper, we propose a new watermarking method using isolation of invalid blocks for image authentication. We embed messages into the high frequency band in the DCT domain because of its imperceptibility and fragility. And we were able to inspect the identity of valid blocks between error corrected original images and watermarked images through experiments. As a result, we found that the watermarked image is enough to extract binary messages. Therefore, the extra information such as the original image or watermark was not necessary in our extracting process. Experiment results show that the proposed method can be used successfully for image authentication.

A Wavelet-Based Watermarking Scheme of Digital Image Using ROI Method (ROI를 이용한 웨이브렛 기반 디지털 영상의 워터마킹 기법)

  • Kim, Tae-Jung;Hong, Choong-Seon;Sung, Ji-Hyun;Hwang, Jae-Ho;Lee, Dae-Young
    • The KIPS Transactions:PartB
    • /
    • v.11B no.3
    • /
    • pp.289-296
    • /
    • 2004
  • General watermarking techniques tend not to consider intrinsic characteristics of image, so that watermarks are embeded to entire images. In this paper, we present a watermarking algorithm based on wavelet domain, and the watermark is embedded into large coefficients in region of interest(ROI) being based on principle of multi-threshold watermark coding(MTWC) for robust watermark insertion. We try to accomplish both image duality and robustness using human visual system(HVS). The watermarks are embedded in middle frequency bands because the distortion degree of watermarked images appears to be less than lower frequency bands, and the embedded watermarks in the middle bands showed high extraction ratios after some distortion. The watermarks are consisted of pseudo random sequences and detected using Cox's similarity mesurement.

Invisible Watermarking for Improved Security of Digital Video Application (디지털 동영상 어플리케이션의 향상된 보안성을 위한 비시각적인 워터마킹)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.175-183
    • /
    • 2011
  • Performance of digital video watermarking is an assessment that hides a lot of information in digital videos. Therefore, it is required to find a way that enables to store lots of bits of data into a high quality video of the frequency area of digital contents. Hence, this paper designs a watermarking system improving security with an enhancing watermarking based on invisible watermarking and embedding an watermarking on LH and HL subband and its subband by transforming wavelet after the extraction of luminance component from the frames of video by compromising robustness and invisible of watermarking elements. The performance analysis of security of watermarking is carried out with a statistic method, and makes an assessment of robustness against variety of attacks to invisible watermarking. We can verify the security of watermarking against variety of attacks by testing robustness and invisible through carrying out general signal processing like noise addition, lossy compression, and Low-Pass filtering.

Implementation of DCT-based Watermarking for Digital Image Protection (디지털 이미지 보호를 위한 DCT 기반의 워터마킹 구현)

  • Kim Bong-Hyun;Cho Dong-Uk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.685-688
    • /
    • 2006
  • 본 논문에서는 기존의 DCT(Discrete Cosine Transform)를 이용한 디지털 워터마킹 방법을 개선하여 비가시성을 향상시키는 DCT 기반의 디지털 워터마킹 방법을 제안하고자 한다. 이에 원 영상을 DCT 변환한 영역에 워터마크로 사용할 이미지를 이진화하여 얻은 픽셀 값을 기준으로 워터마크를 삽입하고자 한다. 삽입 할 워터마크는 식별하기 어려운 의사난수를 사용하지 않고 가시적으로 인지할 수 있는 문자(서명) 혹은 도장으로 구성된 이진 영상을 사용한다. 이 방법의 강인성 평가를 위해 워터마크가 삽입된 영상을 대상으로 영상처리를 수행하지 않은 경우, JPEG 영상압축, cropping, 필터링, 밝기 조절 및 대비 확장 등 기본적인 영상처리 알고리즘을 적용한 후 워터마크를 검출하였다. 실험 결과 제안된 방법의 워터마킹 영상은 기존 방법에 비하여 워터마크가 삽입된 영상의 화질이 비교적 우수하였으며 검출된 워터마크의 시각적인 인지도가 높아 가시적 효율성이 뛰어남을 검증하였다. 최종적으로, 실험에 의해 제안한 방법의 유용성을 입증하고자 한다.

  • PDF

Adaptive Watermark Detection using Stochastical Decision Rule Based on Image characteristics (영상특성에 기반한 통계적 판정법을 이용한 적응 워터마크 검출 알고리즘)

  • 황의창;김희정;김현천;김종진;권기룡
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11a
    • /
    • pp.104-107
    • /
    • 2003
  • 본 논문에서는 웨이브릿 영역에서 HVS 및 NVF 함수를 사용하여 영상특성에 기반한 통계적 판정법을 이용한 적응 워터마크 검출 알고리즘을 판정법을 제안한다. 워터마크는 4레벨로 분해된 웨이브릿 영역에서 JND(just noticeable difference) 특성과 NVF(noise visibility function)를 이용한 통계적 특성을 기반으로 정상상태 가우시안 모델에 따라 지각적 동조 특성을 이용하여 적응적으로 삽입하고, Bayes 이론 및 Neyman-Pearson 정리를 이용한 통계적 판정법을 이용하여 워터마크를 추출함으로써 기존의 통계적 판정법 보다 정확하게 워터마크 존재 유무를 판정 할 수 있음을 확인하였다.

  • PDF

Digital Image Watermarking Scheme in the Singular Vector Domain (특이 벡터 영역에서 디지털 영상 워터마킹 방법)

  • Lee, Juck Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.16 no.4
    • /
    • pp.122-128
    • /
    • 2015
  • As multimedia information is spread over cyber networks, problems such as protection of legal rights and original proof of an information owner raise recently. Various image transformations of DCT, DFT and DWT have been used to embed a watermark as a token of ownership. Recently, SVD being used in the field of numerical analysis is additionally applied to the watermarking methods. A watermarking method is proposed in this paper using Gabor cosine and sine transform as well as SVD for embedding and extraction of watermarks for digital images. After delivering attacks such as noise addition, space transformation, filtering and compression on watermarked images, watermark extraction algorithm is performed using the proposed GCST-SVD method. Normalized correlation values are calculated to measure the similarity between embedded watermark and extracted one as the index of watermark performance. Also visual inspection for the extracted watermark images has been done. Watermark images are inserted into the lowest vertical ac frequency band. From the experimental results, the proposed watermarking method using the singular vectors of SVD shows large correlation values of 0.9 or more and visual features of an embedded watermark for various attacks.