• Title/Summary/Keyword: 워터마킹 이미지

Search Result 155, Processing Time 0.022 seconds

Design and implementation of Image Content Tracking System using Fingerprinting (핑거프린팅을 이용한 이미지 콘텐츠 추적시스템 설계 및 구현)

  • 서영호;김원겸;이선화;황치정
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.5
    • /
    • pp.99-109
    • /
    • 2004
  • This paper proposes a new method for tracking image contents, which are re-distributed on the Internet using a web-robot and fingerprinting scheme. The fingerprinting is an extended technique of watermarking and embeds identity of the customer into the content as a fingerprint in a way that is very difficult to erase. The fingerprint in the content can be used widely in the field of the copyright protection technique because it identifies the content itself and includes the information about the original customer. In this paper we discuss an active image tracking system using a web-robot and fingerprinting scheme. In the proposed system the information of the original customer is embedded as a fingerprint into the image content before distribution and also stored into DB. The distributed contents are collected by the web-robot and fingerprinting information is extracted from the contents. Finally the identifying of contents is done by comparing the extracted fingerprint with the selling history of the content.

Watermark Authentication Cryptography for Medical Image Security (의료영상 보안을 위한 워터마크 인증 암호화 기법)

  • Cho, Young-bok;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.759-766
    • /
    • 2017
  • In this paper, we preserve the transparency of digital contents by compressing and storing the medical image for a certain period so as to be safe and robust against various attacks of medical images. The proposed algorithm generates an encrypted image authentication code that extracts the feature value of the original image and combines it with the user's information. in order to extract hidden data, the authentication code is first decrypts the encrypted medical image and extracts the hidden data using the spatial characteristics of image. The proposed algorithm guarantees integrity when comparing extracted authentication code and newly generated authentication code for image authentication after directly inserting it into content itself through watermarking. We have proved various security of attack of image data and proved that the certification rate is improved to 98.4%.

A Data Hiding Scheme for Binary Image Authentication with Small Image Distortion (이미지 왜곡을 줄인 이진 이미지 인증을 위한 정보 은닉 기법)

  • Lee, Youn-Ho;Kim, Byoung-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.2
    • /
    • pp.73-86
    • /
    • 2009
  • This paper proposes a new data hiding scheme for binary image authentication with minimizing the distortion of host image. Based on the Hamming-Code-Based data embedding algorithm, the proposed scheme makes it possible to embed authentication information into host image with only flipping small number of pixels. To minimize visual distortion, the proposed scheme only modifies the values of the flippable pixels that are selected based on Yang et al's flippablity criteria. In addition to this, by randomly shuffling the bit-order of the authentication information to be embedded, only the designated receiver, who has the secret key that was used for data embedding, can extract the embedded data. To show the superiority of the proposed scheme, the two measurement metrics, the miss detection rate and the number of flipped pixels by data embedding, are used for the comparison analysis between the proposed scheme and the previous schemes. As a result of analysis, it has been shown that the proposed scheme flips smaller number of pixels than the previous schemes to embed the authentication information of the same bit-length. Moreover, it has been shown that the proposed scheme causes smaller visual distortion and more resilient against recent steg-analysis attacks than the previous schemes by the experimental results.

Steganography on Android Smart Devices (안드로이드 스마트기기에서의 스테가노그래피 연구)

  • Jung, Ki-Hyun;Lee, Joon-Ho;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.4
    • /
    • pp.99-105
    • /
    • 2015
  • As increasing the use of smart phones, the interest of iOS and Android operating system is growing up. In this paper, a novel steganographic method based on Android platform is proposed. Firstly, we analyze the skia based image format that is supporting 2D graphic libraries in Android operating system. Then, we propose a new data hiding method based on the Android bitmap image format. The proposed method hides the secret data on the four true color areas which include Alpha, Red, Green, Blue. In especial, we increase the embedding capacity of the secret data on the Alpha area with a less image distortion. The experimental results show that the proposed method has a higher embedding capacity and less distortion by changing the size of the secret bits on the Alpha area.

A Frequency Domain based Steganography using Image Frame and Collage (액자와 콜라주를 이용한 주파수영역 기반 스테가노그래피)

  • Yoon, Eun-Jun;Ahn, Hae-Soon;Bu, Ki-Dong;Yoo, Kee-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.86-92
    • /
    • 2010
  • This paper proposes a new steganography scheme based on frequency domain using various image frames and collages that can protect the copyright of digital contents for users and securely perform to exchange the security information in the digital communication environments. The main idea of our proposed scheme is that the security informations related its copyright embed into the frequency domain of the image frame and collages when a user decorates the original image by using various image frames and collages. The strengths of our proposed scheme are as follows: (1) It allows to freely control the quantity of embedded information by changing the number of image frames and collages. (2) It is secure to variety image distortion attacks. (3) It maintains high PSNR(Peak Signal to Noise Ratio). As a result, the proposed steganography scheme can be used practically diverse multimedia security fields such as digital copyright protect, secure message communication and digital watermarking.