• Title/Summary/Keyword: Digital Copyright Protection

Search Result 288, Processing Time 0.027 seconds

An Embedded Watermark into Multiple Lower Bitplanes of Digital Image (디지털 영상의 다중 하위 비트플랜에 삽입되는 워터마크)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.6 s.312
    • /
    • pp.101-109
    • /
    • 2006
  • Recently, according to the number of internet in widely use and the development of the related application program, the distribution and use of multimedia content(text, images, video, audio etc.) is very easy. Digital signal may be easily duplicated and the duplicated data can have same quality of original data so that it is difficult to warrant original owner. For the solution of this problem, the protection method of copyright which is encipher and watermarking. Digital watermarking is used to protect IP(Intellectual Property) and authenticate the owner of multimedia content. In this paper, the proposed watermarking algerian embeds watermark into multiple lower bitplanes of digital image. In the proposed algorithm, original and watermark images are decomposed to bitplanes each other and the watermarking operation is executed in the corresponded bitplane. The position of watermark image embedded in each bitplane is used to the watermarking key and executed in multiple lower bitplane which has no an influence on human visual recognition. Thus this algorithm can present watermark image to the multiple inherent patterns and needs small watermarking quantity. In the experiment, the author confirmed that it has high robustness against attacks of JPEG, MEDIAN and PSNR but it is weakness against attacks of NOISE, RNDDIST, ROT, SCALE, SS on spatial domain when a criterion PSNR of watermarked image is 40dB.

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

Status and Development of Geomatic s in China

  • Li, Li
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2002.04a
    • /
    • pp.17-24
    • /
    • 2002
  • Mechanization is the characteristic of the industrial era and computerization is the characteristic of the Information Era. Now we are facing on the transition from Industrial Era to information Era. Established the National Geo-spatial Data Infrastructures is the fundamental base for information society and is one part of the national basic economic development plan. From 1980's China started his successful transition from traditional methods to high-tech based mapping. China has laid out a high accuracy national GPS (global Positioning System) network, and completed the geographic information databases for scale of 1:1million and 1:250,000. Now it is working on the databases for scales of 1:50,000 and 1:10,000, the world highest level. The massive national programmed has been dubbed "Digital China," since it involves massive quantities of digitized geographical information. Simultaneity, GIS technology and the geo-spatial data have been used widely in electronic government affair, environmental protection, disaster control, ITS and etc. The users have realized the benefits more and more widely. Internet is an efficient way to distribute the geo-information, the State Bureau of Surveying and Mapping has give great effort to settle down the rules and standards to establish the clearing house. Some National Geo-standards have issued, and some of them are on the way. The GIS software is another important factor in the GIS industry. Chinese government working-out some good policy to supports the GIS software developer to have their own copyright. This paper is based on the above to introduce the status and development of Geomatics in China. in China.

  • PDF

Comparing of Blind Watermarking Method using DWT and CAT (DWT와 셀룰라 오토마타 변환을 이용한 블라인드 워터마킹 비교)

  • Gong, Hui;Shin, Jin-Wook;Yoon, Sook;Park, Dong-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.92-100
    • /
    • 2011
  • In this paper, we propose a novel blind digital watermarking method based on a cellular automata transform (CAT). CAT is based on dynamic systems known as cellular automata(CA) and uses transform bases which are differently defined by a rule number, the number of neighbors, the number of cells, and an initial state, etc. The proposed CAT based method is compared with a blind watermarking method based on DWT which is commonly used for a domain transform in signal processing. We analyse properties on changes of DWT coefficients and CAT coefficients under various attacks and determine optimal parameters for a watermarking method robust to attacks. The simulations show that the watermarked images with high PSNR and MSSIM look visually identical to originals and are robust against most of typical image processing attacks. Moreover, the proposed CAT based watermarking method is superior to the DWT based one in robustness to most of typical image processing attacks including JPEG compression, median and average filtering, scaling, cropping, and histogram equalization.

An Improved Watermark Detection Method Through Correlation Analysis (상관성 분석에 기반한 신뢰성있는 워터마크 검출 방법)

  • 강현수;최재각;이시웅;안치득;홍진우
    • Journal of Broadcast Engineering
    • /
    • v.6 no.2
    • /
    • pp.177-186
    • /
    • 2001
  • A digital watermark Is a perceptually unobtrusive signal embedded in some multimedia asset such as an Image for copyright protection. In many cases watermark detection amounts to thresholding a correlation vague between a watermark and a received image. Watermarking detection schemes can be classified into two types. Type 1 is based on a correlation process that is applied to the difference between an original image and an input Image to be tested. Type 2 is based on a correlation process that is directly applied to an input Image. The type 1 fails to prove the rightful ownership, while type 2 has an advantage in terms of rightful ownership compared with type 1. However, type 2 has a problem that doesnt appear in type 1. The problem is that correlation between a watermark and an original Image to be watermarked is trio significant to be ignored, when it Is normalized by watermarks energy. In this paper, based on the analysis of the correlation, we propose a novel watermarking scheme to minimize the effect and also verify the performance of the proposed scheme by experiments.

  • PDF

A Blind Watermarking for 3-D Mesh Sequence Using Temporal Wavelet Transform of Vertex Norms (꼭지점 좌표 벡터 크기값의 시간축 웨이블릿 변환을 이용한 3차원 메쉬 시퀀스의 블라인드 워터마킹)

  • Kim, Min-Su;Cho, Jae-Won;Prost, Remy;Jung, Ho-Youl
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3C
    • /
    • pp.256-268
    • /
    • 2007
  • In this paper, we present a watermarking method for 3-D mesh sequences. The main idea is to transform vertex norm with the identical connectivity index along temporal axis using wavelet transform and modify the distribution of wavelet coefficients in temporally high (or middle) frequency frames according to watermark bit to be embedded. All vertices are divided into groups, namely bin, using the distribution of coefficients in low frequency frames. As the vertices with the identical connectivity index over whole frames belong to one bin, their wavelet coefficients are also assigned into the same bin. Then, the watermark is embedded into the wavelet coefficients of vertex norm. Due to the use of the distribution, our method can retrieve the hidden watermark without any information about original mesh sequences in the process of watermark detection. Through simulations, we show that the proposed is flirty robust against various attacks that are probably concerned in copyright protection of 3-D mesh sequences.

Secret Sharing Scheme using Gray Code based on Steganography (스테가노그라피 기반에서 그레이코드를 사용한 비밀공유 기법)

  • Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik;Kim, Hyoung-Joong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.96-102
    • /
    • 2009
  • Due to the rapid growth of the Internet, it is possible to distribute the digital content efficiently. However, the need for image data protection and secret communication technique is also on the rise because of an infringement of the copyright by malicious attackers. Shamir and Lin-Tsai proposed simple secret image encryption algorithms based on the principle of secret sharing, respectively. However, their secret sharing schemes have a serious problem which can be declined the image quality and it is possible for third party to know embed information. In this paper, we propose a new secret sharing scheme using gray code that can be increased the image quality and security. As a result of our experiment, the proposed scheme is not only shown of good image quality and but also provide enhanced security compare with Shamir and Lin-Tasi's schemes.

Application and Evaluation of Vector Map Watermarking Algorithm for Robustness Enhancement (강인성 향상을 위한 벡터 맵 워터마킹 알고리즘의 적용과 평가)

  • Won, Sung Min;Park, Soo Hong
    • Spatial Information Research
    • /
    • v.21 no.3
    • /
    • pp.31-43
    • /
    • 2013
  • Although the vector map data possesses much higher values than other types of multimedia, the data copyright and the protection against illegal duplication are still far away from the attention. This paper proposes a novel watermarking technique which is both robust to diverse attacks and optimized to a vector map structure. Six approaches are proposed for the design of the watermarking algorithm: point-based approach, building a minimum perimeter triangle, watermark embedding in the length ratio, referencing to the pixel position of the watermark image, grouping, and using the one-way function. Our method preserves the characteristics of watermarking such as embedding effectiveness, fidelity, and false positive rate, while maintaining robustness to all types of attack except a noise attack. Furthermore, our method is a blind scheme in which robustness is independent of the map data. Finally, our method provides a solution to the challenging issue of degraded robustness under severe simplification attacks.

Digital Image Watermarking using Subband Correlation Wavelet Domain (웨이블릿 영역의 부대역 상관도를 이용한 디지털 영상 워터마킹)

  • 서영호;박진영;김동욱
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.6
    • /
    • pp.51-60
    • /
    • 2003
  • The watermarking is the technique that embeds or extracts the certain data without the change of the original data for the copyright protection of the multimedia contents. Watermark-embedded contents must not be distinguished by human's eye and must be robust to the various image processing and the intentional distortions. In this paper, we propose a new watermarking technique applied in the wavelet domain which has both the spatial and frequency information of a image. For both the robustness and the invisibility, the positions for embedding the watermark is selected with the multi-threshold. We search the similarity between highly correlated coefficients in the each subband and decide the mark space after verifying the significance in the specified subband. The similarity is represented by the coefficient difference between the subbands and its distribution is used in the watermark embedding and extracting. The embedded watermark can be extracted without the original image using the relationship of the subbands. By these properties the proposed watermarking algorithm has the invisibility and the robustness to the attacks such as JPEG compression and the general image processing.

A Hybrid Watermarking Scheme for Color Images (컬러 영상을 위한 하이브리드 워터마킹)

  • Lee Hyun-Suk;Oktavia Vivi;Kim Mi-Ae;Lee Won-Hyung
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.73-86
    • /
    • 2004
  • This paper presents a hybrid digital watermarking scheme for color images, We insert two watermarks in the DWT domain using spread-spectrum correlation-based watermarking in luminance component of the color image and in spatial domain using pixel-value substitution of blue channel of color image. The objectives of this paper are to have the watermark robust to common signal processing and to detect any changes on the watermarked image for tamper detection at the same time. This watermark scheme will have the robustness characteristic as typical in frequency domain watermark, and also ability to detect any changes on the image (tamper detection).

  • PDF