• Title/Summary/Keyword: 워터마크

Search Result 802, Processing Time 0.024 seconds

A Watermark Embedding Technique for Still Images Using Cross-Reference Points (교차 참조 점을 이용한 정지영상의 워터마크 삽입기법)

  • Lee, Hang-Chan
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.4
    • /
    • pp.165-172
    • /
    • 2006
  • In this paper we present a technique for detecting cross-reference points that allows improving watermark detect-ability. In general, Harris detector is commonly used for finding salient points. Harris detector is a kind of combined corner and edge detector which is based on neighboring image data distribution, therefore it has some limitation to find accurate salient points after watermark embedding or any kinds of digital attacks. The new method proposed in this paper used not data distribution but geometrical structure of a normalized image in order to avoid pointing error caused by the distortion of image data. After normalization, we constructed pre-specified number of virtual lines from top to bottom and left to right, and several of cross points were selected by a random key. These selected points specify almost same positions with the accuracy more than that of Harris detector after digital attacks. These points were arranged by a random key, and blocks centered in these points were formed. A reference watermark is formed by a block and embedded in the next block. Because same alteration is applied to the watermark generated and embedded blocks. the detect-ability of watermark is improved even after digital attacks.

Contents-based digital still-image protection using OCL (OCL을 이용한 콘텐츠 기반의 정지영상 보호 기법 연구)

  • Yoo, Hyouck-Min;Shin, Jin-Wook;Park, Dong-Sun;Yoon, Sook
    • Korean Journal of Cognitive Science
    • /
    • v.21 no.1
    • /
    • pp.145-156
    • /
    • 2010
  • This paper presents a new contents-based digital still image protection method which includes a copyright message. Since the existing method using gradient values used a pixel based $3{\times}3$ Sobel operator, it was sensitive to attacks and could not extract exact copyright message. Therefore, in this paper, we present a algorithm which uses block based OCL(Orientation Certainty Level) instead of pixel. The experimental results show that the proposed scheme not only has good image quality, but also is robust to JPEG lossy compression, filtering, sharpening, blurring and noise. Moreover, the proposed algorithm has good performance more than 10% in rotation attacks than the existing method.

  • PDF

A Technique of Watermark Generation and Similarity Embedding for Still Images Based on Cross Reference Points (교차참조점에 기반한 정지영상의 워터마크 생성 및 유사성 삽입 기법)

  • Lee, Hang-Chan
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.8
    • /
    • pp.1484-1490
    • /
    • 2007
  • The Cross Reference Point(CRP) is a robust method for finding salient points in watermarking systems because it is based on the geometrical structure of a normalized image in order to avoid pointing error caused by digital attacks. After normalization of an image, the 100 CRPs are calculated. Next, the 100 blocks centered by CRPS are formed. These 100 blocks are arranged using a secrete key. Each boundary of 50 out of 100 blocks is surrounded by 8 blocks which are selected by the ordered number of a preceding block. This number is a seed of random number generator for selecting 8 out of 50 blocks. The search area of a center block is formed by a secrete key. The pixels of a center block are quantized to 10 levels by predefined thresholds. The watermarks are generated by the 50 quantized center blocks. These watermarks are embedded directly in the remaining 50 blocks. In other words, 50 out of 100 blocks are utilized to generate watermarks and the remaining 50 blocks are used to watermark embedding. Because the watermarks are generated in the given images, we can successfully detect watermarks after several digital attacks. The reason is that the blocks for the generation and detection of watermarks are equally affected by digital attacks except for the case of local distortion such as cropping.

Dictionary Based Software Watermarking Technique (사전 소프트웨어 워터마크 기술 기반)

  • Pervez, Zeeshan;Lee, Sungyoung;Lee, Young-Koo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.241-242
    • /
    • 2009
  • As software is becoming increasing important to the human society, so does the effort to produce them is also increasing.. All of these efforts can be at risk when source code of the application is reverse engineered by the software pirate. Many attempts have been made to protect Intellectual Property Rights (IPR); one of the newest attempts to protect IPR is software watermarking. It is used to prove ownership right when IPR are violated, and also prevents the bandit from altering the code for his own use. In this paper we are presenting a new technique for software watermarking know as Dictionary Based Software Watermarking (DBSW). DBSW works by embedding dummy instructions in source code with the help of predefined mapping already available in the dictionary. These instructions are identical to the normal instructions of the program and are hard to identify or to extract from the watermarked program. With the help of DBSW we not only can stop source code alteration but can also identify the buyer how has distributed the pirated copy.

Audio Forensic Marking System for Copyright Protection of Streaming Music Service (스트리밍 음악 서비스의 저작권 보호를 위한 오디오 포렌식마킹 시스템)

  • Seo, Yongseok;Park, Jihyun;Yoo, Wonyoung
    • Journal of Digital Contents Society
    • /
    • v.15 no.3
    • /
    • pp.357-363
    • /
    • 2014
  • In this paper, we propose a new audio forensic marking system for protecting the copyright of the Internet-based music streaming services. In the proposed method, in order to guarantee the QoS of the streaming service, high speed, and generates a forensic mark inserted MP3 file. We make pre-marking process and generate a new forensic marked MP3 file, a combination of the pre-marked MP3 frame, the inserted user information. Experimental results show that the proposed method satisfactory results robustness and imperceptibility, and real-time properties. In addition, we were confirmed that the real-time embedding and detection from the streaming-based audio forensic marking system that has been implemented on the server/client is possible.

A Watermarking Scheme Based on k-means++ for Design Drawings (k-means++ 기반의 설계도면 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.57-70
    • /
    • 2009
  • A CAD design drawing based on vector data that is very important art work in industrial fields has been considered to content that the copyright protection is urgently needed. This paper presents a watermarking scheme based on k-means++ for CAD design drawing. One CAD design drawing consists of several layers and each layer consists of various geometric objects such as LINE, POLYLINE, CIRCLE, ARC, 3DFACE and POLYGON. POLYLINE with LINE, 3DFACE and ARC that are fundamental objects make up the majority in CAD design drawing. Therefore, the proposed scheme selects the target object with high distribution among POLYLINE, 3DFACE and ARC objects in CAD design drawing and then selects layers that include the most target object. Then we cluster the target objects in the selected layers by using k-means++ and embed the watermark into the geometric distribution of each group. The geometric distribution is the normalized length distribution in POLYLINE object, the normalized area distribution in 3DFACE object and the angle distribution in ARC object. Experimental results verified that the proposed scheme has the robustness against file format converting, layer attack as well as various geometric editing provided in CAD editing tools.

사례를 통해 본 독점금지법 vs 지적재산권

  • Son, Seung-U
    • Digital Contents
    • /
    • no.7 s.146
    • /
    • pp.110-113
    • /
    • 2005
  • MP3, DVD, P2P 등 디지털 매체기술의 발달은 디지털콘텐츠의 창작과 유통을 급속도로 증가시켰고 일반 공중은 다양한 창작물에 쉽게 접근할 수 있게 됐다. 반면 이러한 기술의 발전은 원본과 거의 차이가 없는 복제물을 쉽고 빠르게 비용을 들이지 않고 재생성하게 하였고, 또한 디지털콘텐츠는 한 번 전송되고 나면 그 침해를 막기가 거의 불가능하기 때문에 저작권자의 이익을 저해하는 사례가 점차로 증가되고 있다. 이에 저작권자들은 자신들이 창작한 저작물을 무단복제로부터 보호하기 위해 암호화기법, 디지털워터마크 등 기술적 조치(technological measures)를 개발해 저작물에 대한 접근을 제한하기 시작했다. 이러한 움직임과 더불어 접근제한시스템에 대한 법적 보호의 필요성이 제기됐고, 저작권자의 허락없이 기술적 보호조치를 무력화하거나 침해하는 행위를 금지하는 입법이 이뤄졌다. 그러나 기술적 보호조치를 보호하게 되면 전통적으로 인정해 온 저작물에 대한 일반인의 접근을 차단하게 되므로 저작권법의 근본적인 입법취지인 과학기술의 발전과 문화증진을 저해하게 될 것이라는 비판도 강력히 맞서고 있다. 이하에서는 기술적보호조치에 관한 사례들을 소개하고 기술적 보호조치의 개념, 관련 법률조항 및 주요 법적 쟁점 등을 중점적으로 살펴보도록 하겠다.

  • PDF

Medical Image Security Algorithm Implement using Wavelet (웨이블릿을 이용한 의료영상보안 알고리즘 구현)

  • Oh, Keun-Tak;Yoon, H.S.;Lee, S.T.
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.601-605
    • /
    • 2006
  • 의료영상은 디지털이라는 속성으로 인해서 일상생활에 적용되는 저작권법으로 저작권을 보호한다는 것이 어렵다. 특히 의료 영상은 복사를 하면 또 하나의 원본이 생성되므로, 의료 영상 이미지를 생산해 내는 사람의 입장에서는 똑같은 원본을 자신도 모르는 사이에 다른 사람에게 전달하게 된다. 그렇게 되면 과연 누가 이 디지털 작품을 만들었는지에 대한 의료 분쟁이 생길 수밖에 없다. 디지털시대의 의료 환경에서 필수 불가결하게 제기될 수 있는 의료영상보안은 특히 우리나라처럼 의료보험의 부당 청구가 사회적인 큰 물의를 일으키고 있는 시점에서 많은 관심과 연구가 필요하다. 따라서 이 분야의 핵심적인 문제점을 도출하고, 문제점 개선을 위해서 워터 마크를 통해 영상 보안 기법을 제안하였다. 그러나 의료영상의 대표적인 특징인 무결성을 보장 받지 못해 법적인 인증에는 한계가 있음을 알 수 있었다.

  • PDF

A Study on Video Copy Detection Methods Using Representative Color Sequence for Protecting Copyrights (저작권 보호를 위한 대표 색상 시퀀스를 이용한 동영상 복사 검출 방법)

  • Choi, Min-Seok;Choi, Sung-Wook
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.185-191
    • /
    • 2012
  • This study deals with the technical approach related to the protection of digital video contents copyright, which has currently become a major issue in the digital contents market. With the production and distribution of digital video contents rapidly increasing, various policies and technical approaches are being made in relation to the protection of intellectual property rights. The technical approach from a DRM (Digital Rights Management) perspective was made from various angles, but its limitations have also been exposed in terms of convenience and quality. In this study, rather than the existing encoding certification and watermark technologies, it introduces technical approaches from a content-based copy detection method, while suggesting a copy detection method using the representative color sequence. In particular, this study takes into consideration the distribution environment of the domestic video market and deals with the technical approach in a direction that can control the illegal distribution of high quality videos.

Loadbalancing for WDM Network using Dynamic Watermarks (WDM 네트워크에서 동적 워터마크 결정을 이용한 로드벨런싱)

  • Nahm, Jung-Joo;Kim, Sung-Chun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.2
    • /
    • pp.1-5
    • /
    • 2007
  • Wavelength-division multiplexed (WDM) networks are emerging to be the right choice for the future transport networks. In WDM networks, the optical layer provides circuit-switched lightpath services to the client layer such as IP, SONET and ATM. The set of lightpaths in the optical layer defines the virtual topology. Since the optical switches are reconfigurable, the virtual topology can be reconfigured in accordance with the changing traffic demand pattern at theclient layer in order to optimize the network performance. We present a new approach to the virtual topology reconfiguration and loadbalancing problem for wavelength-routed, optical wide-area networks under dynamic traffic demand. By utilizing the measured Internet backbone traffic characteristics, our approach follows the changes in traffic without assuming that the future traffic pattern is known. For the simulation traffic modeling, we collected the data from real backbone traffic. Experiments show that the standard deviation compared to previous technique is reduced.