• Title/Summary/Keyword: 워터마크 정보 검출

Search Result 132, Processing Time 0.024 seconds

Watermarking Technique for the Digital Contents Protection (영상 콘텐츠 지적재산권 보호 워터마킹 기술)

  • 송학현;김윤호;류광렬
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.144-148
    • /
    • 2004
  • Beyond the digital world from the analog age, the contents are very easily copied under the illegal conditions and these are rapidly distributed by the information super highway. The increase of illegal usage and conflict in digital content market would diminish motivation of creators for their work, furthermore break down digital content market on cyberspace. Watermarking technology support to the legal users by the protection technique based on the digital content copyright protection method(DRM). Most of previous digital watermarking have embeded to the content. In this paper, we researched the standardization of digital rights management and developed more efficient watermark embedding method.

  • PDF

Watermarking Technique for the Digital Contents Protection (디지털콘덴츠 보호를 위한 워터마킹 기술)

  • Song Hag-hyun;Kim Yoon-ho
    • Journal of Digital Contents Society
    • /
    • v.5 no.1
    • /
    • pp.66-72
    • /
    • 2004
  • Beyond the digital world from the analog age, the contents are very easily copied under the illegal conditions and these are rapidly distributed by the information super highway. The increase of ilegal usage and conflict in digital content market would diminish motivation of creators for their work, furthermore break down digital content market on cyberspace. Watermarking technology support to the legal users by the protection technique based chi the digital content copyright protection method(DRM). Most of previous digital watermarking have embeded to the content. In this paper, we have researched the standardization of digital rights management and developed more efficient watermark embedding method.

  • PDF

Digital Watermarking of Medical Image Based on Public Key Encryption Algorithm Considering ROI (ROI를 고려한 공개키 암호화 알고리즘 기반 의료영상 디지털 워터마킹)

  • Lee Hyung-Kyo;Kim Hee-Jung;Seong Tack-Young;Kwon Ki-Ryong;Lee Jong-Keuk
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1462-1471
    • /
    • 2005
  • Recently, the medical image has been digitized by the development of computer science and digitization of the medical devices. There are needs for database service of the medical image and long term storage because of the construction of PACS(picture archiving and communication system) following DICOM(digital imaging communications in medicine) standards, telemedicine, and et al. However, it also caused some kinds of problems, such as illegal reproduction of medical image, proprietary rights and data authentication. In this paper, we propose the new digital watermarking technique for medical image based on public key encryption algorithm for integrity verification. It prevents illegal forgery that can be caused after transmitting medical image data remotely. The watermark is the value of bit-plane in wavelet transform of the original image for certification method of integrity verification. We proposed the embedding regions are randomly chosen considering ROI, and a digital signature is made using hash function of MD5 which input is a secret key. The experimental results show that the watermark embedded by the proposed algorithm can survive successfully in image processing operations and that the watermark's invisibility is good.

  • PDF

Watermarking-based cryptographic synchronization signal transmission and detection (워터마킹 기반의 암호동기신호 전송 및 검출)

  • Son, Young-ho;Bae, Keun-sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1589-1596
    • /
    • 2017
  • In synchronous secure communications, a synchronization signal is transmitted over the same channel where ciphertext is transmitted for cryptographic synchronization between an encryptor and a decryptor, so, it causes data rate lowering and transmission delay for plain communication. Especially, in poor environments such as wireless channels and so on, since secure communications require a periodic resynchronization protocol, synchronization signal transmission method can dominate its quality. In this paper, we proposed a new synchronization signal transmission method without additional bandwidth as well as resynchronization protocol based on it. We embeded a synchronization signal as a watermark in a transmission image and restored it from a detected watermark in the decryptor. Experimental results of image have demonstrated that the proposed synchronization signal transmission method using watermarking is efficient in transmission rate and can support reliable synchronization detection.

Digital Audio Watermarking System for Copyright Protection of Web Contents (웹 콘텐츠의 저작권 보호를 위한 디지털 오디오 워터마킹 시스템)

  • Cho, Jung-Won
    • Proceedings of the KAIS Fall Conference
    • /
    • 2006.05a
    • /
    • pp.558-560
    • /
    • 2006
  • 웹 콘텐츠의 특성상 분배, 복제 및 조작이 용이하기 때문에 원 정보의 저작권 침해로 인한 재산권 침해 피해가 나날이 증가하고 있어, 막대한 비용이 투자된 웹 콘텐츠의 무단도용을 방지하고 분쟁 발생시 소유권에 대한 분쟁을 해결하기 위한 노력이 계속되고 있다. 본 논문에서는 웹 콘텐츠의 소유권 및 저작권 보호를 위한 오디오 콘텐츠에 대한 워터마크 생성, 삽입 및 검출, 검증 시스템을 설계 및 구현한다. 본 시스템은 저작권 보호에 대한 전문지식이 없는 일반관리자도 용이하게 이용할 수 있는 사용자 인터페이스를 갖추고 있으며, 이러한 디지털 오디오 워터마킹의 적용을 통한 소유권 및 저작권 보호는 궁극적으로 콘텐츠 제작 의뢰자로 하여금 제작 의지를 강화하여 제작 의뢰 건수를 증가시킬 수 있을 것으로 기대되어 문화콘텐츠 등의 디지털 콘텐츠 제작업체의 매출 신장에 도움을 주게될 것이다.

  • PDF

Robust Audio Copyright Protection Technology to the Time Axis Attack (시간축 공격에 강인한 오디오 저작권보호 기술)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.4
    • /
    • pp.201-212
    • /
    • 2009
  • Even though the spread spectrum method is known as most robust algorithm to general attacks, it has a drawback to the time axis attack. In this paper, I proposed a robust audio copyright protection algorithm which is robust to the time axis attack and has advantages of the spread spectrum method. Time axis attack includes the audio length variation attack with same pitch and the audio frequency variation attack. In order to detect the embedded watermark by the spread spectrum method, the detection algorithm should know the exact rate of the time axis attack. Even if there is a method to know the rate, it needs heavy computational resource and it is not possible to implement. In this paper, solving this problem, the audio signal is transformed into time-invariant domain, and the spread spectrum watermark is embedded into the audio in the domain. Therefore the proposed algorithm has the advantages of the spread spectrum method and it is also robust to the time axis attack. The time-invariant domain process is that the audio is arranged by log scale time axis, and then, the Fourier transform is taken to the audio in the log scale time axis. As a result, the algorithm can get the time-invariant watermark signal.

  • PDF

Application and Evaluation of Vector Map Watermarking Algorithm for Robustness Enhancement (강인성 향상을 위한 벡터 맵 워터마킹 알고리즘의 적용과 평가)

  • Won, Sung Min;Park, Soo Hong
    • Spatial Information Research
    • /
    • v.21 no.3
    • /
    • pp.31-43
    • /
    • 2013
  • Although the vector map data possesses much higher values than other types of multimedia, the data copyright and the protection against illegal duplication are still far away from the attention. This paper proposes a novel watermarking technique which is both robust to diverse attacks and optimized to a vector map structure. Six approaches are proposed for the design of the watermarking algorithm: point-based approach, building a minimum perimeter triangle, watermark embedding in the length ratio, referencing to the pixel position of the watermark image, grouping, and using the one-way function. Our method preserves the characteristics of watermarking such as embedding effectiveness, fidelity, and false positive rate, while maintaining robustness to all types of attack except a noise attack. Furthermore, our method is a blind scheme in which robustness is independent of the map data. Finally, our method provides a solution to the challenging issue of degraded robustness under severe simplification attacks.

A New Watermarking Method for Video (동영상을 위한 새로운 워터마킹 방법)

  • Kim, Dug-Ryung;Park, Sung-Han
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.12
    • /
    • pp.97-106
    • /
    • 1999
  • We propose a new watermarking method to embed a label in a video which is robust against the change of the group of picture. The proposed method embeds labels in the pixel domain, but detects the label in the DCT frequency domain. For embedding a label, the size of watermark based on the human visual system is calculated to keep a quality of videos. A lookup table haying the pixel patterns and the sequences of a sign of DCT coefficients is used for detecting a label in the DCT frequency domain. In this paper, we analyze bit error rates for labels of videos compressed by MPEG2 using the central limit theorem and compare the simulation results with previous methods.

  • PDF

Error Detection and Concealment of Transmission Error Using Watermark (워터마크를 이용한 전송 채널 에러의 검출 및 은닉)

  • 박운기;전병우
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2C
    • /
    • pp.262-271
    • /
    • 2004
  • There are channel errors when video data are transmitted between encoder and decoder. These channel errors would make decoded image incorrect, so it is very important to detect and recover channel errors. This paper proposes a method of error detection and recovery by hiding specific information into video bitstream using fragile watermark and checking it later. The proposed method requires no additional bits into compressed bitstream since it embeds a user-specific data pattern in the least significant bits of LEVELs in VLC codewords. The decoder can extract the information to check whether the received bitstream has an error or not. We also propose to use this method to embed essential data such as motion vectors that can be used for error recovery. The proposed method can detect corrupted MBs that usually escape the conventional syntax-based error detection scheme. This proposed method is quite simple and of low complexity. So the method can be applied to multimedia communication system in low bitrate wireless channel.

A Secure Digital Watermarking Scheme based on RSA Function (RSA 함수에 기반한 안전한 워터마킹 기법)

  • Lee, Jean-Ho;Kim, Tai-Yun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.3
    • /
    • pp.220-228
    • /
    • 2001
  • Digital watermarking is a technique for the purpose of protecting the ownership of the image by embedding invisible watermarks in a digital imnge. To guarantee the security of the digital watermarking scheme for copyright protection, it is required to satisfy some requirements robustness and perceptual invisibility which provided by the location of embedded bits, the public watermarking algorithm, and the hidden use of the key, which can protect unauthorized accesses from illegal users. For this, in this paper we propose a new copyright watermarking scheme, which is based on one-way hash functions using RSA functions and modular operations. RSA functions are widely used in cryptographic systems. Our watermarking scheme is robust against LSB(Jeast significant bit) attacks and gamma corresction attack, and is also perceptually invisible. We demonstrate the characteristics of our proposed watermarking scheme through experiments.

  • PDF