• Title/Summary/Keyword: Blind Watermark

Search Result 91, Processing Time 0.033 seconds

Digital Image Watermarking based on Wavelet Transform and Spatial (웨이브렛 변환 및 공간지각특성을 이용한 디지털영상 워터마킹)

  • Bae, Mi-Young;Lee, Jeong-Hwan;Kim, Yun-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.1165-1168
    • /
    • 2005
  • This paper proposes an digital image watermarking method based on discrete wavelet transform(DWT) and spatial perceptual properties of human visula system. first, an digital image is transformed by DWT and inserted gaussian watermark into the frequency domain. To increase the robustness and perceptual invisibility of watermark, the proposed algorithm is combined with the characteristics of digital image and human visual system. The proposed method is invisible and blind watermarking which the original image is not required to detect watermarks. Simulation results show that the proposed method is robust to the general attack such as JPEG compression, enhancement, noise, cropping, and filtering etc.

  • PDF

Robust Blind Watermarking using DCT Texture Block Coefficient (DCT 질감 블록 계수를 이용한 강인한 블라인드 워터마킹)

  • Shin, Yong-Dal;Park, Kyung-Nam
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.4
    • /
    • pp.108-114
    • /
    • 2008
  • In this paper, we proposed robust blind watermarking algorithm using texture block coefficient based on discrete cosine transform(DCT). The proposed method embedded all of watermark signals into DC component of $8\times8$ block DCT in order to robust various external attack The texture block coefficient was composed absolute value of DCT coefficients. Experiment showed that the proposed method better than conventional methods in the invisibility and various attack such as dithering, cropping, and scaling.

  • PDF

Blind Watermarking Using DCT and Variance (DCT 및 분산을 이용한 블라인드 워터마킹)

  • Shin, Yong-Dal
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.10
    • /
    • pp.1276-1281
    • /
    • 2006
  • In this paper, We proposed a robust blind digital watermarking algorithm using variance and DCT domain. The proposed method embedded watermark signals into DC components of $8{\times}8$ block DCT using valiance, texture regions and smooth regions. In the digital watermarking algorithms using DCT domain, more robustness can be achieved if watermarks are embedded in DC components since DC components have much larger perceptual capacity than AC components. Experiment showed that robustness of the proposed method better than that of the conventional methods in JPEG quality and scaling attack.

  • PDF

Audio Watermarking Using Quantization Index Modulation on Significant Peaks in Frequency Domain (주파수 영역에서 주요 피크에 QIM을 적용한 오디오 워터마킹)

  • Kang, Jung-Sun;Cho, Sang-Jin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.30 no.6
    • /
    • pp.303-307
    • /
    • 2011
  • This paper describes an audio watermarking using Quantization Index Modulation (QIM) on significant peaks in frequency domain. The audio signal is broken up into L samples length frames with non-overlapping and rectangular window. The zero-crossing rate of each frame is calculated for decision whether it is proper to be watermarked or not. If the frame is legitimate, frequency magnitude response is computed by discrete Fourier transform. For the QIM, we set the quantization step size based on maximum value of frequency magnitude response and select n significant peaks with w samples around them in frequency domain, totally $n{\times}(w+1)$ samples. Finally, watermark embedding is performed. Decoder extract watermarks based on Euclidean distance, that is a blind detection. The proposed method is robust against many attacks of watermark benchmark.

Blind Watermarking Using by Multi-wavelet Transform and Binary Image (다중 웨이블릿 변환과 이진영상을 이용한 Blind 워터마킹)

  • Kim, Tae-Ho;Park, Mu-Hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.413-416
    • /
    • 2005
  • Developement of computer and digitalizing of medical implement are being caused digitalizing of medical image. Medical Images are being managed more by PACS. In this situation comes out many problem about ownership, the right of properity of the medical images and notice wheather the data are modified. Digital watermarking can solve this problem. The proposed schemes have a two weak point that Non-blind method need a original image and Blind method use gaussian watermarking. In this paper, we propose a blind watermarking using binary image in order to easily recognize result of watermark This proposed scheme using wavelet transform and Circular Input method that input in medium-band of frequency domain.

  • PDF

Watermarking for Digital Hologram by a Deep Neural Network and its Training Considering the Hologram Data Characteristics (딥 뉴럴 네트워크에 의한 디지털 홀로그램의 워터마킹 및 홀로그램 데이터 특성을 고려한 학습)

  • Lee, Juwon;Lee, Jae-Eun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.26 no.3
    • /
    • pp.296-307
    • /
    • 2021
  • A digital hologram (DH) is an ultra-high value-added video content that includes 3D information in 2D data. Therefore, its intellectual property rights must be protected for its distribution. For this, this paper proposes a watermarking method of DH using a deep neural network. This method is a watermark (WM) invisibility, attack robustness, and blind watermarking method that does not use host information in WM extraction. The proposed network consists of four sub-networks: pre-processing for each of the host and WM, WM embedding watermark, and WM extracting watermark. This network expand the WM data to the host instead of shrinking host data to WM and concatenate it to the host to insert the WM by considering the characteristics of a DH having a strong high frequency component. In addition, in the training of this network, the difference in performance according to the data distribution property of DH is identified, and a method of selecting a training data set with the best performance in all types of DH is presented. The proposed method is tested for various types and strengths of attacks to show its performance. It also shows that this method has high practicality as it operates independently of the resolution of the host DH and WM data.

Deep Learning Framework for Watermark-Adaptive and Resolution-Adaptive Image Watermarking (워터마크 및 해상도 적응적인 영상 워터마킹을 위한 딥 러닝 프레임워크)

  • Lee, Jae-Eun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.25 no.2
    • /
    • pp.166-175
    • /
    • 2020
  • Recently, application fields for processing and using digital image contents in various forms and types are rapidly increasing. Since image content is high value-added content, the intellectual property rights of this content must be protected in order to activate the production and use of the digital image content. In this paper, we propose a deep learning based watermark embedding and extraction network. The proposed method is to maximize the robustness of the watermark against malicious/non-malicious attacks while preserving the invisibility of the host image. This network consists of a preprocessing network that changes the watermark to have the same resolution as the host image, a watermark embedding network that embeds watermark data while maintaining the resolution of the host image by three-dimensionally concatenating the changed host image and the watermark information, and a watermark extraction network that reduces the resolution and extracts watermarks. This network verifies the invisibility and robustness of the proposed method by experimenting with various pixel value change attacks and geometric attacks against various watermark data and host images with various resolutions, and shows that this method is universal and practical.

A Mesh Watermarking Using Patch CEGI (패치 CEGI를 이용한 메쉬 워터마킹)

  • Lee Suk-Hwan;Kwon Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.1
    • /
    • pp.67-78
    • /
    • 2005
  • We proposed a blind watermarking for 3D mesh model using the patch CEGIs. The CEGI is the 3D orientation histogram with complex weight whose magnitude is the mesh area and phase is the normal distance of the mesh from the designated origin. In the proposed algorithm we divide the 3D mesh model into the number of patch that determined adaptively to the shape of model and calculate the patch CEGIs. Some cells for embedding the watermark are selected according to the rank of their magnitudes in each of patches after calculating the respective magnitude distributions of CEGI for each patches of a mesh model. Each of the watermark bit is embedded into cells with the same rank in these patch CEGI. Based on the patch center point and the rank table as watermark key, watermark extraction and realignment process are performed without the original mesh. In the rotated model, we perform the realignment process using Euler angle before the watermark extracting. The results of experiment verify that the proposed algorithm is imperceptible and robust against geometrical attacks of cropping, affine transformation and vertex randomization as well as topological attacks of remeshing and mesh simplification.

An Energy-Based Watermarking Algorithm for Digital Images (디지털 영상을 위한 에너지 기반 워터마킹 알고리즘)

  • Choi Dong-Jin;Hwang Dong-Guk;Lee Sang-Ju;Lee Woo-Ram;Jun Byoung-Min
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.2
    • /
    • pp.87-94
    • /
    • 2005
  • In this paper, we present a new watermarking algorithm in which a watermark is created based on the energy of the original image and embedded into the image by replacement. The watermark is adjusted to have a certain proportional amount of energy based on one of the original image and embedded into the DFT magnitude component replacing original coefficients. This scheme reduces degree of quality degradation in a watermarked image by maintaining energy and strengthen robustness against attacks by embedding a strong watermark. From the result of experiment, we confirmed that the proposed algorithm had high invisibility of 47.6dB of PSNR and could reconstruct 98.9% of message on average.

  • PDF

A Watermarking Technique for User Authentication Based on a Combination of Face Image and Device Identity in a Mobile Ecosystem

  • Al-Jarba, Fatimah;Al-Khathami, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.303-316
    • /
    • 2021
  • Digital content protection has recently become an important requirement in biometrics-based authentication systems due to the challenges involved in designing a feasible and effective user authentication method. Biometric approaches are more effective than traditional methods, and simultaneously, they cannot be considered entirely reliable. This study develops a reliable and trustworthy method for verifying that the owner of the biometric traits is the actual user and not an impostor. Watermarking-based approaches are developed using a combination of a color face image of the user and a mobile equipment identifier (MEID). Employing watermark techniques that cannot be easily removed or destroyed, a blind image watermarking scheme based on fast discrete curvelet transform (FDCuT) and discrete cosine transform (DCT) is proposed. FDCuT is applied to the color face image to obtain various frequency coefficients of the image curvelet decomposition, and for high frequency curvelet coefficients DCT is applied to obtain various frequency coefficients. Furthermore, mid-band frequency coefficients are modified using two uncorrelated noise sequences with the MEID watermark bits to obtain a watermarked image. An analysis is carried out to verify the performance of the proposed schema using conventional performance metrics. Compared with an existing approach, the proposed approach is better able to protect multimedia data from unauthorized access and will effectively prevent anyone other than the actual user from using the identity or images.