• Title/Summary/Keyword: 패턴워터마크

Search Result 42, Processing Time 0.024 seconds

Technique for production and encoding of New dot-type Print Watermark Pattern (새로운 도트형 프린트 워터마크 패턴의 생성 및 부호화 기법)

  • Lee, Boo-Hyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.5
    • /
    • pp.979-984
    • /
    • 2009
  • In this paper, the technique for production and encoding of new dot-type print watermark is proposed. The print watermark has characteristics similar to those of the digital watermark and function as link which change various first informations(texts, symbols, figures, etc) on the printed matter to secondary contents (sound, video, character, etc) corresponding each to informations on the printed matter. The proposed dot-type print watermark pattern is represented as $16{\times}16$ matrix in $0.4mm^2$ area and dots are printed on only 23 elements of $16{\times}16$ matrix. The size of each dot is so small(0.02mm)that it can not be seen. Because position of printed dots correspond to the position of each digit in binary notation in this paper, they are encoded easily and there are about 8,000,000 watermark patterns enough to express first information of printed matters. It was showed that the proposed print watermark patterns are recognized without difficulty by the own recognition device.

A Robust Pattern Watermarking Method by Invisibility and Similarity Improvement (비가시성과 유사도 증가를 통한 강인한 패턴 워터마킹 방법)

  • 이경훈;김용훈;이태홍
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.10
    • /
    • pp.938-943
    • /
    • 2003
  • In this paper, we Propose a method using the Tikhonov-Miller process to improve the robustness of watermarking under various attacks. A visually recognizable pattern watermark is embedded in the LH2, HL2 and HH2 subband of wavelet transformed domain using threshold and besides watermark is embeded by utilizing HVS(Human Visual System) feature. The pattern watermark was interlaced after random Permutation for a security and an extraction rate. To demonstrate the improvement of robustness and similarity of the proposed method, we applied some basic algorithm of image processing such as scaling, filtering, cropping, histogram equalizing and lossy compression(JPEG, gif). As a result of experiment, the proposed method was able to embed robust watermark invisibility and extract with an excellent normalized correlation of watermark under various attacks.

Hologram Watermarking Using Fresnel Diffraction Model (Fresnel 회절 모델을 이용한 홀로그램 워터마킹)

  • Lee, Yoon-Hyuk;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.19 no.5
    • /
    • pp.606-615
    • /
    • 2014
  • This paper is to propose an algorithm for digital hologram watermarking by using a characteristic of the Fresnel diffraction model in 2D image. When 2D image is applied Fresnel transform, the result concentrates center region. When applied to a hologram, on the other hand, the result focused diffraction pattern of 2D form. Using this characteristic, to generate diffraction model by applying 2-th Fresnel transform to the hologram. Corner of diffraction model is mark space. This mark space is embedded watermark and extracted watermark. Experimental results showed that all the extracted watermarks after several kinds of attacks (Gaussian blurring, Sharpening, JPEG compression) showed visibilities good enough to be recognized to insist the ownership of the hologram.

Digital watermarking technique using Computer-Generated Hologram and optoelectrical extraction algorithm (컴퓨터 형성 홀로그램과 광전자적 추출 알고리즘을 이용한 디지털 워터마킹 방법)

  • Cho, Kyu-Bo;Shin, Chang-Mok;Kim, Soo-Joong
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.1
    • /
    • pp.31-37
    • /
    • 2006
  • We propose a digital watermarking technique using a computer generated hologram. The proposed method uses two random patterns separated from the computer generated hologram (CGH). One of those is embedded into the original image as hidden watermark information and then the reconstructed image can be obtained by an optical decoding algorithm with the other one as a decoding key. We analyze an occlusion of the watermarked image that is the original image containing the hidden pattern. The embedding process is performed digitally and reconstruction optically Computer simulation and an optical experiment are shown in support of the proposed technique.

Halftone Image Watermarking Based on Iterative Error Minimizing Method (반복적인 에러 최소화 기법을 이용한 하프톤 영상 워터마킹)

  • 천인국
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.3
    • /
    • pp.327-339
    • /
    • 2004
  • In this paper, we propose a new watermark algorithm for halftone images using iterative error minimizing method. In the proposed method, watermark bits are hidden at pseudo-random locations within a halftone image. To remove the distortions due to the inserted watermark bits and increase the invisibility of watermark, an iterative error minimizing technique is used. We define the halftoning error is defined as the difference between the original grayscale image and HVS-filtered printed halftone image. Then we iteratively find the pixel pattern with minimum halftoning error and displace the original pixel pattern with it. In order to be robust to geometrical modification like cropping or rotation, we insert the same watermark periodically into halftone images. Experiments using printed and scanned images show that the proposed method is a robust method to the geometrical modification and to hide the large amount of data within a halftone image without noticeable distortion.

  • PDF

Multipurpose Watermarking Scheme Based on Contourlet Transform (컨투어렛 변환 기반의 다중 워터마킹 기법)

  • Kim, Ji-Hoon;Lee, Suk-Hwan;Park, Seung-Seob;Kim, Ji-Hong;Oh, Sei-Woong;Seo, Yong-Su;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.7
    • /
    • pp.929-940
    • /
    • 2009
  • This paper presents multipurpose watermarking scheme in coutourlet transform domain for copyright protection, authentication and transform detection. Since contourlet transform can detect more multi direction edge and smooth contour than wavelet transform, the proposed scheme embeds multi watermarks in contourlet domain based on 4-level Laplacian pyramid and 2-level directional filter bank. In the first stage of the robust watermarking scheme for copyright protection, we generates the sequence of circle patterns according to watermark bits and projects these patterns into the average of magnitude coefficients of high frequency directional subbands. Then the watermark bit is embedded into variance distribution of the projected magnitude coefficients. In the second stage that is the semi-fragile watermarking scheme for authentication and transform detection, we embed the binary watermark image in the low frequency subband of higher level by using adaptive quantization modulation scheme. From the evaluation experiment using Checkmark 2.1, we verified that the proposed scheme is superior to the conventional scheme in a view of the robustness and the invisibility.

  • PDF

Comparing of Blind Watermarking Method using DWT and CAT (DWT와 셀룰라 오토마타 변환을 이용한 블라인드 워터마킹 비교)

  • Gong, Hui;Shin, Jin-Wook;Yoon, Sook;Park, Dong-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.92-100
    • /
    • 2011
  • In this paper, we propose a novel blind digital watermarking method based on a cellular automata transform (CAT). CAT is based on dynamic systems known as cellular automata(CA) and uses transform bases which are differently defined by a rule number, the number of neighbors, the number of cells, and an initial state, etc. The proposed CAT based method is compared with a blind watermarking method based on DWT which is commonly used for a domain transform in signal processing. We analyse properties on changes of DWT coefficients and CAT coefficients under various attacks and determine optimal parameters for a watermarking method robust to attacks. The simulations show that the watermarked images with high PSNR and MSSIM look visually identical to originals and are robust against most of typical image processing attacks. Moreover, the proposed CAT based watermarking method is superior to the DWT based one in robustness to most of typical image processing attacks including JPEG compression, median and average filtering, scaling, cropping, and histogram equalization.

An Embedded Watermark into Multiple Lower Bitplanes of Digital Image (디지털 영상의 다중 하위 비트플랜에 삽입되는 워터마크)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.6 s.312
    • /
    • pp.101-109
    • /
    • 2006
  • Recently, according to the number of internet in widely use and the development of the related application program, the distribution and use of multimedia content(text, images, video, audio etc.) is very easy. Digital signal may be easily duplicated and the duplicated data can have same quality of original data so that it is difficult to warrant original owner. For the solution of this problem, the protection method of copyright which is encipher and watermarking. Digital watermarking is used to protect IP(Intellectual Property) and authenticate the owner of multimedia content. In this paper, the proposed watermarking algerian embeds watermark into multiple lower bitplanes of digital image. In the proposed algorithm, original and watermark images are decomposed to bitplanes each other and the watermarking operation is executed in the corresponded bitplane. The position of watermark image embedded in each bitplane is used to the watermarking key and executed in multiple lower bitplane which has no an influence on human visual recognition. Thus this algorithm can present watermark image to the multiple inherent patterns and needs small watermarking quantity. In the experiment, the author confirmed that it has high robustness against attacks of JPEG, MEDIAN and PSNR but it is weakness against attacks of NOISE, RNDDIST, ROT, SCALE, SS on spatial domain when a criterion PSNR of watermarked image is 40dB.

Digital watermarking algorithm for authentication and detection of manipulated positions in MPEG-2 bit-stream (MPEG-2비트열에서의 인증 및 조작위치 검출을 위한 디지털 워터마킹 기법)

  • 박재연;임재혁;원치선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.378-387
    • /
    • 2003
  • Digital watermarking is the technique that embeds invisible signalsincluding owner identification information, specific code, or pattern into multimedia data such as image, video and audio. Watermarking techniques can be classified into two groups; robust watermarking and fragile(semi-fragile) watermarking. The main purpose of the robust watermarking is the protection of copyright, whereas fragile(semi-fragile) watermarking prevents image or video data from illegal modifications. To achieve this goal watermark should survive from unintentional modifications such as random noise or compression, but it should be fragile for malicious manipulations. In this paper, an invertible semi-fragile watermarkingalgorithm for authentication and detection of manipulated location in MPEG-2 bit-stream is proposed. The proposed algorithm embeds two kinds of watermarks, which are embedded into quantized DCT coefficients. So it can be applied directly to the compressed bit-stream. The first watermark is used for authentication of video data. The second one is used for detection of malicious manipulations. It can distinguish transcodingin bit-stream domain from malicious manipulation and detect the block-wise locations of manipulations in video data. Also, since the proposed algorithm has an invertible property, recovering original video data is possible if the watermarked video is authentic.

Double Encryption of Digital Hologram Based on Phase-Shifting Digital Holography and Digital Watermarking (위상 천이 디지털 홀로그래피 및 디지털 워터마킹 기반 디지털 홀로그램의 이중 암호화)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2017
  • In this Paper, Double Encryption Technology Based on Phase-Shifting Digital Holography and Digital Watermarking is Proposed. For the Purpose, we First Set a Logo Image to be used for Digital Watermark and Design a Binary Phase Computer Generated Hologram for this Logo Image using an Iterative Algorithm. And Random Generated Binary Phase Mask to be set as a Watermark and Key Image is Obtained through XOR Operation between Binary Phase CGH and Random Binary Phase Mask. Object Image is Phase Modulated to be a Constant Amplitude and Multiplied with Binary Phase Mask to Generate Object Wave. This Object Wave can be said to be a First Encrypted Image Having a Pattern Similar to the Noise Including the Watermark Information. Finally, we Interfere the First Encrypted Image with Reference Wave using 2-step PSDH and get a Good Visible Interference Pattern to be Called Second Encrypted Image. The Decryption Process is Proceeded with Fresnel Transform and Inverse Process of First Encryption Process After Appropriate Arithmetic Operation with Two Encrypted Images. The Proposed Encryption and Decryption Process is Confirmed through the Computer Simulations.