• Title/Summary/Keyword: Binary watermarking

Search Result 77, Processing Time 0.021 seconds

An Image Watermarking Scheme by Image Fusion in the Frequency Domain (주파수 영역에서 영상융합에 의한 영상 워터마킹 기법)

  • Ahn Chi-Hhyun;Shin Phil-Sun;Hwang Jae-Ho;Hong Choong-Seon;Lee Dae-Young;Kim Dong-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.10
    • /
    • pp.1411-1420
    • /
    • 2005
  • This paper presents a robust watermarking approach that the frequency coefficients of the binary logo image are inserted in the DC and each frequency area of the host image for copyright protection of image data. We use the 1 level discrete wavelet transform(DWT) coefficients of 64*64 binary logo image as watermark because the presentation of a recognizable mark is much more convincing than numerical values and allows the opportunity to exploit the human visual system's ability to recognize a pattern. The proposed method makes use of 1-level DWT of the logo image, the DWT coefficients of the logo image are inserted by human visual system(HVS) and region of interest(ROI) in the frequency domain of the host image. Thereby, the detected logo image confirms copyright. Because small size watermark is inserted by HVS and ROI, the results confirm the superiority of the Proposed method on invisibility and robustness.

  • PDF

Digital Watermarking using Bit Concealment in Wavelet Transform Domain (웨이브렛 영역에서의 비트 은닉을 이용한 디지털워터마킹)

  • Sung, Kwang-Jin;Kim, Min-Tae;Lee, Jong-Hyuck;Jee, Inn-Ho;Ahn, Hong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.1-8
    • /
    • 2008
  • The object of watermarking is to prevent from copying and distributing without the copyright or right of ownership. In case of using watermark as an image data we can detect watermark whether an original image exists or not. In this paper, we proposed that an image data is used for watermark and the watermark is detected without an original image. After the original image is transformed with DWT and the watermark is transformed with DCT, they are transformed with binary number. We calculate an optimal bit position for concealing watermark of an original binary image and insert the watermark and determine the best position for robustness against JPEG compression, filtering, and resampling attacks within inserted watermark image. In this paper, we are able to confirm the right of copyright and ownership easily while using invisible watermark and also we can detect a watermark without an original image.

  • PDF

Study of robust watermarking method in medical image (의료영상에서의 강인한 워터마킹 기법에 관한 연구)

  • 남기철;박무훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.255-258
    • /
    • 2003
  • Recently, Digital Watermarking is used to authenticate data and to determine whether the data are distorted or not in medical images which is digitalized. The Fourier Mellin method using the Fourier Transform and the Log-Polar coordinate transform gets an invariant feature for RST distortion in images. But there are several problems in the real materialization. Interpolation of the image value should be considered according to the pixel position and so a watermark loss, original image distortion, numerical approximation is happened. Therefore there should be solved to realization of the Fourier Mellin method. Using the Look up table, there reduce the data loss caused by the conversion between Rectangular and Polar coordinate. After diagnose, medical images are transformed the Polar coordinate and taken the Discrete Fourier transform in the center of ROI region. Maintaining the symmetry in Fourier magnitude coefficient, the gaussian distributed random vectors and binary images are embedded in medical images.

  • PDF

A Robust Pattern Digital Watermarking Method using Wavelet Transform (웨이브릿 기반의 강인한 패턴 디지털 워터마킹 방법)

  • 이경훈;김용훈;이태홍
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.1
    • /
    • pp.98-105
    • /
    • 2004
  • In this paper, we proposed a watermarking algorithm for embedding visually recognizable pattern into the middle-frequency part:; of image. Binary image as watermark is embedded in the LH2, HL2 and HH2 band of wavelet transformed domain for copyright protection of image data. To evaluate robustness of the proposed method, we applied some basic algorithm of image processing such as scaling, filtering, cropping, histogram equalizing and lossy compression(JPEG, gif). As a result of experiment, the proposed method has the good image quality and the high perceptibility of watermark. It was demonstrated by experiments that the proposed algorithm can provide an excellent protection under various attacks.

  • PDF

Multi-Watermarking for Image Authentication Based on DWT Coefficients (이미지 인증을 위한 DWT 계수기반 다중 워터마킹)

  • Lee Hye-Ran;Rhee Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.113-122
    • /
    • 2005
  • In this paper, we propose a multi-watermarking algorithm to satisfy two purposes: fragility against malicious attacks and robustness against non-malicious attacks. The algorithm can be used for image authentication using coefficients of Discrete Wavelet Transform(DWT). In the proposed method, watermarks are generated by combining binary image with some features extracted from the subband LL3, and then they are embedded into both the spatial and frequency domain. That is, on the spatial domain they are embedded into the Least Significant Bit(LSB) of all pixels of image blocks, and on the frequency domain the coefficients of the subband LH2 and HL2 are adjusted according to the watermarks. Thus the algorithm not only resists malicious attack but also permits non-malicious attacks such as blurring, sharpening, and JPEG compression.

Invisible Watermarking Algorithm based on Zerotree Structure (제로트리 구조를 이용한 비가시적인 워티마킹 알고리즘)

  • 박병선;유지상
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.97-100
    • /
    • 2002
  • In this paper, we propose a watermarking technique that embeds a digital watermark into digital images for the proof of owner or copyright protection. Proposed algorithm is based on discrete wavelet transform. Zerotree structure defined by Shapiro's embedded zerotree wavelet(EZW) algorithm is used. In the proposed algorithm, a digital watermark is embedded on only significant wavelet coefficients chosen by QSWT for the robustness of the algorithm. In other words, only the values of significant wavelet coefficients are modified in accordance with the given watermark pattern. We use the relationship among neighboring coefficients when modifying chosen coefficients to keep good image quality. Visual recognizable patterns such as binary images are used as a watermark. The experimental results show that the proposed algorithm has robustness under a variety of attacks such as JPEG compression, sharpening and blurring and also show that it has a better performance in PSNR comparing with other algorithms.

  • PDF

Watermarking for Digital Images Using Differences and Means of the Neighboring Wavelet Coefficients

  • Kim, Hyun-Soon;Bae, Sung-Ho;Yoon, Ock-Kyung;Park, Kil-Houm
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.466-469
    • /
    • 2000
  • In this paper, a watermarking technique for digital images is proposed. In our method, an image is 1-1eve1 wavelet transformed, and then the watermark of a binary stamp is embedded into the baseband. The watermark is embedded by inverting the polarities of the selected coefficient pairs. In the inverting process, we can increase perceptual image quality by finding means and differences of the selected neighboring coefficient pairs, and then adding values, which are inversely proportional to the differences, to the means. The experimental results show that the proposed method has good quality and is robust to JPEG lossy compression and various image processing operations.

  • PDF

Digital Watermarking of EZW Coded Image using ZTR symbol (EZW 비트열의 ZTR 심벌을 이용한 디지털 워터마킹)

  • Kim Hyun-Woo;Lee Ho-Keun;Lee Myong-Young;Ha Yeong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.1
    • /
    • pp.43-50
    • /
    • 2005
  • We proposed a method for embedding coded binary data into EZW bitstreams and extracting embedded data from EZW bitstreams using the traditional EZW decoder. EZW coder have two passes. The first pass, the dominant pass have four symbols, P, N, IZ, ZTR. The second pass is sub-ordinary pass which specifies the value of symbol. In the proposed methods, we use ZTR symbol in the dominant pass. We embed watermark into ZTR symbol in the highest frequency band which original image is transferred by wavelet transform. The proposed digital watermarking method shows good properties for robustness in the low bit rate. Accordingly, based on the proposed digital watermarking, video and 3D image watermarking will become a new area for research in the near future.

Multipurpose Watermarking Scheme Based on Contourlet Transform (컨투어렛 변환 기반의 다중 워터마킹 기법)

  • Kim, Ji-Hoon;Lee, Suk-Hwan;Park, Seung-Seob;Kim, Ji-Hong;Oh, Sei-Woong;Seo, Yong-Su;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.7
    • /
    • pp.929-940
    • /
    • 2009
  • This paper presents multipurpose watermarking scheme in coutourlet transform domain for copyright protection, authentication and transform detection. Since contourlet transform can detect more multi direction edge and smooth contour than wavelet transform, the proposed scheme embeds multi watermarks in contourlet domain based on 4-level Laplacian pyramid and 2-level directional filter bank. In the first stage of the robust watermarking scheme for copyright protection, we generates the sequence of circle patterns according to watermark bits and projects these patterns into the average of magnitude coefficients of high frequency directional subbands. Then the watermark bit is embedded into variance distribution of the projected magnitude coefficients. In the second stage that is the semi-fragile watermarking scheme for authentication and transform detection, we embed the binary watermark image in the low frequency subband of higher level by using adaptive quantization modulation scheme. From the evaluation experiment using Checkmark 2.1, we verified that the proposed scheme is superior to the conventional scheme in a view of the robustness and the invisibility.

  • PDF

Robust Watermarking against Lossy Compression in Hadamard Domain (하다마드 도메인에서의 손실압축에 강인한 워터마킹)

  • Cui, Xue-Nan;Kim, Jong-Weon;Li, De;Choi, Jong-Uk
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.33-43
    • /
    • 2007
  • In this proper, we proposes a robust watermarking against the lossy compression in the Hadamard domain. The Hadamard matrix consists of only 1 or -1 and can be computed veru fast. The Hadamrd transform has the inverse transform therefore it is able to be applied into the watermarking technology. In embedding process, we select 10 coefficients from intermediate frequency domain and create two watermark patterns. In extraction process, we use the watermark patterns and compare them to detect the watermark information. When we use the standard image ($512{\times}512$) and binary watermark image ($64{\times}64$), the results of these examines are PSNR for $38{\sim}42dB$ and BER for $3.9{\sim}12.5%$. The JPEG QF between 30 and100, naked human eyes can detect to watermark image easily. The experimental results show that performance of Hadamard domain is better than those of DCT, FFT, and DWT.

  • PDF