• Title/Summary/Keyword: 워터마킹기법

Search Result 427, Processing Time 0.025 seconds

Watermarking for Copyright Protection use Histogram Information and Authentication (히스토그램 정보를 이용한 저작권 보호와 인증을 위한 워터마킹)

  • 이나영;전영민;김계영;최형일
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.820-822
    • /
    • 2002
  • 본 논문에서는 저작권 보호(copyright protection)와 인증(authentication)을 동시에 할 수 있는 워더마킹 기법(watermarking method)을 제안한다. 저작권을 보호하기 위하여 원 영상을 웨이블릿 변환하여 얻어진 웨이블릿 계수 중 중요한 계수의 LSB(Least Significant Bit)와 워터마크를 XDR연산으로 워터마크를 삽입한다. 소비자측면에서는 전송 받은 디지털 컨텐츠에 대한 인위적인 조작 여부를 쉽고 간단하게 파악할 수 있다. 기존 방법의 경우 워터마크로 ID-number나 이진 영상을 사용한 반면 본 논문에서는 워터마크로 그레이 영상을 사용하므로 저작권 정보를 잘 표현할 수 있으며 워터마크 추출시에 원 영상을 필요로 하지 않는다.

  • PDF

FPGA-based One-Chip Architecture and Design of Real-time Video CODEC with Embedded Blind Watermarking (블라인드 워터마킹을 내장한 실시간 비디오 코덱의 FPGA기반 단일 칩 구조 및 설계)

  • 서영호;김대경;유지상;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8C
    • /
    • pp.1113-1124
    • /
    • 2004
  • In this paper, we proposed a hardware(H/W) structure which can compress and recontruct the input image in real time operation and implemented it into a FPGA platform using VHDL(VHSIC Hardware Description Language). All the image processing element to process both compression and reconstruction in a FPGA were considered each of them was mapped into H/W with the efficient structure for FPGA. We used the DWT(discrete wavelet transform) which transforms the data from spatial domain to the frequency domain, because use considered the motion JPEG2000 as the application. The implemented H/W is separated to both the data path part and the control part. The data path part consisted of the image processing blocks and the data processing blocks. The image processing blocks consisted of the DWT Kernel fur the filtering by DWT, Quantizer/Huffman Encoder, Inverse Adder/Buffer for adding the low frequency coefficient to the high frequency one in the inverse DWT operation, and Huffman Decoder. Also there existed the interface blocks for communicating with the external application environments and the timing blocks for buffering between the internal blocks The global operations of the designed H/W are the image compression and the reconstruction, and it is operated by the unit of a field synchronized with the A/D converter. The implemented H/W used the 69%(16980) LAB(Logic Array Block) and 9%(28352) ESB(Embedded System Block) in the APEX20KC EP20K600CB652-7 FPGA chip of ALTERA, and stably operated in the 70MHz clock frequency. So we verified the real time operation of 60 fields/sec(30 frames/sec).

A Digital Image Watermarking Method using Non-linear Property (비선형 특성을 이용한 디지털 영상 워터마킹 방법)

  • Koh, Sung-Shik;Chung, Yong-Duk;Kim, Chung-Hwa
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.3
    • /
    • pp.28-34
    • /
    • 2002
  • This paper describes embedding non-linearly watermark data in the components of pixel intensities in the spatial domain of an image. The principle of the proposed method is that when an image is segmented regularly to the blocks, the pixels of the block have the non-linear properties without any similarity. That is, for the block with strong non-linear property human can't feel the visual different to the modified pixel values, on the other hand for the block with weak non-linear property human can feel the visual different to the a little modified pixel values. Thus we could embed the watermark data according to the non-linear property of the blocks. As the result of the simulation, against some general image processing attacks our algorithm could keep robust and be responsible for the copyright certainly. 

Digital Watermarking using ART2 Algorithm (ART2 알고리즘을 이용한 디지털 워터마킹)

  • 김철기;김광백
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.81-97
    • /
    • 2003
  • In this paper, we suggest a method of robust watermarking for protection of multimedia data using the wavelet transform and artificial neural network. for the purpose of implementation, we decompose a original image using wavelet transform at level 3. After we classify transformed coefficients of other subbands using neural network except fur the lowest subband LL$_3$, we apply a calculated threshold about chosen cluster as the biggest. We used binary logo watermarks to make sure that it is true or not on behalf of the Gaussian Random Vector. Besides, we tested a method of dual watermark insertion and extraction. For the purpose of implementation, we decompose a original image using wavelet transform at level 3. After we classify transformed coefficients of other subbands using neural network except for the lowest subband LL$_3$, we apply a above mentioned watermark insert method. In the experimental results, we found that it has a good quality and robust about many attacks.

  • PDF

Digital Image Watermarking Based on Exponential Form with Base of 2 (2의 지수형식에 기초한 디지털 이미지 워터 마킹)

  • Ariunzaya, Batgerel;Kim, Han-kil;Chu, Hyung-Suk;An, Chong-Koo
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.2
    • /
    • pp.97-103
    • /
    • 2010
  • In this paper, we propose a new digital watermarking technique. The main idea of the proposed algorithm relies on the assumption that any real number can be expressed as a summation of the exponential form with base of 2 and if only consider the first few summations some numbers can be expressed in the same form. Therefore, we can be sure that some amount of changes does not affect the first few summations. The algorithm decomposes a host image in wavelet domain and intensity of the significant wavelet coefficient is expressed in exponential form with base of 2. Multiple barcode watermarks are then embedded by modifying the parity of the exponent. The proposed scheme is semi-blind and also offers either objective or subjective deteew su as well. From extracted watermarks, more accurate watermark is obtained by merging technique as a final watermark. As a simulation result, the proposed algorithm could resist most cases of salt and pepper noise, Gaussian noise and JPEG compression.

Sequence generation and measuring threshold of audio watermarking using sinusoidal function pattern (Sinusoidal Function Pattern을 이용한 오디오 워터마킹의 시퀀스 생성 및 Threshold 설정 방안)

  • 김태훈;김형중
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.87-90
    • /
    • 2003
  • 본 논문에서는 정현파를 이용한 spread-spectrum watermarking 에서 비가청성을 높이기 위한 방법과 효율적인 threshold 설정 방법을 제안한다. 제안하는 방법에서는 spread-spectrum 기법을 사용할 때 계산량이 많이 요구되는 심리음향모델 계산을 피하면서도 가청잡음을 줄이기 위한 방법을 제시한다. 또한 outlier 를 이용하여 워터마크 검출에서 적절한 threshold 설정방법을 제안한다.

  • PDF

Performance Analysis of CDMA/QPSK System for Watermarked Image Transmission (CDMA/QPSK 시스템에서의 워터마킹된 영상전송에 대한 성능 평가)

  • 조송백;강희조;이말례
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.86-89
    • /
    • 2003
  • 본 논문에서는 CDMA/QPSK 시스템을 이용하여 워터마크가 삽입된 영상 정보 데이터를 다중경로 채널환경에서 전송했을 때 미치는 데이터 손실을 분석하고 에러정정부호 중의 하나인 컨볼루션 기법을 이용하여 성능 개선 정도를 평가하였다. 무선 채널 환경으로써 ITU-R M.1225에서 제시한 시스템 모델링 파라미터중 하나인 보행자 이동 환경의 파라미터를 이용하여 압축된 영상 정보가 전송되었을 때 복원된 영상을 분석하였다.

  • PDF

A robust watermarking suppressing the visibility of the outstanding edges (에지의 인지성을 보완한 강력한 워터마크)

  • 박배효;성영경;최태선
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.315-318
    • /
    • 2002
  • 본 논문은 워터마크의 일반 요건 중에서 가장 기술적으로 요구되는 강인성과 비인지성을 함께 발전시키기 위해서 구성되었다. 먼저, 주파수 영역을 이용한 워터마킹 기법 중에서 현재 압축 표준에서 사용되고, 지역적 인간 시각 시스템을 이용할 수 있기 때문에, 널리 사용되는 블록 단위의 DCT를 사용한다. 삽입 위치를 결정하기 위하여, 기존에 발표된 논문들의 강인성을 비교하여, 보다 나은 위치를 선정한다. 그리고, 인간 시각 시스템 중에서, 강한 에지의 인지성을 줄이기 위하여, 에지의 오리엔테이션을 보존하고 수평과 수직 성분보다는 45 도에 가까운 DCT 대각 성분에 워터마크의 강도를 높여준다 이는 워터마크 이후의 강한 에지 성분의 오리엔테이션 오차를 줄여주며, 에지의 비인지성을 향상시키는 결과를 가져온다.

  • PDF

Hologram Watermarking Using Fresnel Diffraction Model (Fresnel 회절 모델을 이용한 홀로그램 워터마킹)

  • Lee, Yoon-Hyuk;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.19 no.5
    • /
    • pp.606-615
    • /
    • 2014
  • This paper is to propose an algorithm for digital hologram watermarking by using a characteristic of the Fresnel diffraction model in 2D image. When 2D image is applied Fresnel transform, the result concentrates center region. When applied to a hologram, on the other hand, the result focused diffraction pattern of 2D form. Using this characteristic, to generate diffraction model by applying 2-th Fresnel transform to the hologram. Corner of diffraction model is mark space. This mark space is embedded watermark and extracted watermark. Experimental results showed that all the extracted watermarks after several kinds of attacks (Gaussian blurring, Sharpening, JPEG compression) showed visibilities good enough to be recognized to insist the ownership of the hologram.

Adaptive Watermarking Using Successive Subband Quantization and Perceptual Model Based on Multiwavelet Transform Domain (멀티웨이브릿 변환 영역 기반의 연속 부대역 양자화 및 지각 모델을 이용한 적응 워터마킹)

  • 권기룡;이준재
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.7
    • /
    • pp.1149-1158
    • /
    • 2003
  • Content adaptive watermark embedding algorithm using a stochastic image model in the multiwavelet transform is proposed in this paper. A watermark is embedded into the perceptually significant coefficients (PSCs) of each subband using multiwavelet transform. The PSCs in high frequency subband are selected by SSQ, that is, by setting the thresholds as the one half of the largest coefficient in each subband. The perceptual model is applied with a stochastic approach based on noise visibility function (NVF) that has local image properties for watermark embedding. This model uses stationary Generalized Gaussian model characteristic because watermark has noise properties. The watermark estimation use shape parameter and variance of subband region. it is derive content adaptive criteria according to edge and texture, and flat region. The experiment results of the proposed watermark embedding method based on multiwavelet transform techniques were found to be excellent invisibility and robustness.

  • PDF