• Title/Summary/Keyword: Digital Watermark

Search Result 454, Processing Time 0.037 seconds

Image-Adaptive Watermarking of Wavelet base for Digital Image Protection (디지털 영상 데이터의 정보 보호를 위한 웨이브릿 기반의 이미지 적응 워터마킹)

  • Kim, Kuk-Se;Lee, Jeong-Ki;Park, Chan-Mo;Bae, Il-Ho;Cho, Ai-Ri;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.59-263
    • /
    • 2003
  • 정보통신의 비약적인 발전에 힘입어 멀티미디어 데이터는 언제 어디서든 전송 받거나 공유할 수 있게 되었다. 아날로그 형태에서 디지털의 아날로그를 형태로 빠르게 대체되고 있으며, 디지털로 신호를 표현하는 방법은 기존 사용하여 표현하는 방법에 비해 많은 장점을 가지고 있다. 하지만 디지털로 된 데이터는 언제 어디서든 대단위 복제가 가능하다. 즉, 저작권 침해, 불법 복제 및 배포, 손쉽게 위조할 수 있다는 점이 그것이다. 디지털 컨텐츠의 불법 복제와 유통은 저작자의 창작 의욕과 수입원을 차단하는 매우 중요한 문제이며, 이를 방지하기 위해서 멀티미디어 데이터의 저작권을 가진 소유자가 원하는 정보를 삽입함으로써 데이터의 저작권 보호와 복사 방지 및 불법적인 유통을 막고자 하는 기술이 개발되고 있다. 디지털 영상 정보의 보호를 위해 디지털 영상의 불법적인 내용 조작을 막고, 영상의 소유권을 보장할 수 있는 방법으로 디지털 워터마크(Digital Watermark)가 있다. 디지털 워터마크는 공개키 알고리즘이나 방화벽 등으로 해독된 영상에 대하여 부가적인 보호를 제공한다. 디지털 영상에 대한 저작권 정보, 배포자 정보 그리고 사용자 정보를 영상에 삽입함으로써 훗날 법적인 문제가 발생하였을 때 해결책을 제시할 수 있다. 본 논문에서는 디지털 영상 데이터의 정보 보호를 위해 주파수 영역에서의 웨이브릿 변환(Wavelet Transform)을 이용한 이미지 적응 디지털 워터마킹(Image-Adaptive Digital Watermarking) 방법을 제안한다. 이미지 적응 웨이브릿(Image-Adaptive Wavelet)은 영상을 주파수적으로 분해하면서 각 대역들의 공간 영역에서의 정보를 함께 지니고 JND(Just noticeable difference)을 포함한다. 이미지 적응 웨이브릿의 이러한 특성을 이용하여 다해상도 분해하고, 손실 압축(toss Compression) 이나 필터링(Filtering), 잡음(Noise) 등에 크게 영향받는 저주파 성분과 인간의 시각적으로 큰 의미를 갖는 고주파 성분의 특성을 이용하여 워터마크를 삽입한다.

  • PDF

Digital Image Watermarking using Inner Product and Adaptive Quantization (내적과 적응성 양자화를 이용한 디지털 영상의 워터마킹 방법)

  • 이승욱;김진호;호요성
    • Journal of Broadcast Engineering
    • /
    • v.6 no.1
    • /
    • pp.50-57
    • /
    • 2001
  • A digital watermarking is a newly developed scheme to embed invisible or inaudible information Into the host data in order to insist the copyright of the owner or the creator. This paper describes a robust data embedding scheme that employs inner product and adaptive quantization. Compared to the previous works for digital watermarking, our proposed scheme can embed relatively large amount of Information, since a secrete key Is not directly relaxed to the watermark data. A secret key is used for the design of random direction vectors. which are taken Inner product with the DCT transformed feature set data. In odder to achieve robustness against malicious attacks. we exploit the Properties of human visual system In designing the random direction vectors which behave as embedded noises. Experimental results show that we can recover the embedded information without utilizing the original host data. We also demonstrate that the ownership assertion is possible even though The watermarked data may undergo common signal processing operations, such as JPEG compression. clopping. and filtering.

  • PDF

Fragile Watermarking for Image Authentication and Detecting Image Modification (영상 인증과 변형 검출을 위한 Fragile 워터마킹)

  • Woo, Chan-Il;Jeon, Se-Gil
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.459-465
    • /
    • 2009
  • Digital watermarking is a technique to insert a visually imperceptible information into an image so that the information can be extracted for the purposes of ownership verification or authentication. And watermarking techniques can be classified as either fragile or robust. Robust watermarks are useful for copyright and ownership assertion purposes. They cannot be easily removed and should resist common image manipulation procedures such as rotation, scaling, cropping, etc. On the other hand, fragile watermarks are easily corrupted by any image processing procedure, it can detect any change to an image as well as localizing the areas that have been changed. In this paper, we propose a fragile watermarking algorithm using a special hierarchical structure for integrity verification of image and detection of manipulated location. In the proposed method, the image to be watermarked is divided into blocks in a multi-level hierarchy and calculating block digital signatures in this hierarchy. The proposed method thwarts the cut-and-paste attack and the experimental results to demonstrate the effectiveness of the proposed method.

  • PDF

ASCII data hiding method based on blind video watermarking using minimum modification of motion vectors (움직임벡터의 변경 최소화 기법을 이용한 블라인드 비디오 워터마킹 기반의 문자 정보 은닉 기법)

  • Kang, Kyung-Won;Ryu, Tae-Kyung;Jeong, Tae-Il;Park, Tae-Hee;Kim, Jong-Nam;Moon, Kwang-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1C
    • /
    • pp.78-85
    • /
    • 2007
  • With the advancement of the digital broadcasting and popularity of the Internet, recently, many studies are making on the digital watermarking for the copyright protection of digital data. This paper proposes the minimum modification method of motion vector to minimize the degradation of video quality, hiding subtitles of many language and information of OST(original sound track), character profiles, etc. as well as the copyright protection. Our proposed algorithm extracts feature vector by comparing motion vector data with watermark data, and minimize the modification of motion vectors by deciding the inversion of bit. Thus the degradation of video quality is minimized comparing to conventional algorithms. This algorithm also can check data integrity, and retrieve embedded hidden data simply and blindly. And our proposed scheme can be useful for conventional MPEG-1, -2 standards without any increment of bit rate in the compressed video domain. The experimental result shows that the proposed scheme obtains better video quality than other previous algorithms by about $0.5{\sim}1.5dB$.

Metadata production system based on MPEG-21 IPMP for protection and management of The Digital contents (디지털 콘텐츠 보호 관리를 위한 MPEG-21 IPMP 기반의 메타데이터 저작 시스템)

  • Ryu Kwang-Hee;Hong Hyen-Woo;Kim Kwang-Yong;Kim Jae-Gon;Jung Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.577-580
    • /
    • 2006
  • The rapidly growth of Internet is main factor that activates the Digital Contents market. However imprudent Digital Contents market could be shrunk by imprudent illegal copy and delivery. MPEG(Moving Picture Experts Group) proposed MPEG-21 Multimedia frameworks in order to solve these problem. IPMP is parts of MPEG-21 Multimedia Frameworks, when Digital Contents goes through production delivery consumption, which defines standard to keep the Digital Contents in safety. Currently IPMP defined by FCD(Final Committee Draft) level. Therefore development of system which applied to latest standard to protect and manage the Digital Contents is required. and the system consists of fourth organizations which means Metadata Production server, Tool server, License server, Consumption server. In this Paper, we made production server to parse REL(Rights Expression Language) document that has right information for content from license server, and create metadata based on MPEG-21 IPMP about the content that applied to watermark. then, after it do remuxing, transmit the protected data to consumption server.

  • PDF

Study of robust watermarking method in medical image (의료영상에서의 강인한 워터마킹 기법에 관한 연구)

  • 남기철;박무훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.255-258
    • /
    • 2003
  • Recently, Digital Watermarking is used to authenticate data and to determine whether the data are distorted or not in medical images which is digitalized. The Fourier Mellin method using the Fourier Transform and the Log-Polar coordinate transform gets an invariant feature for RST distortion in images. But there are several problems in the real materialization. Interpolation of the image value should be considered according to the pixel position and so a watermark loss, original image distortion, numerical approximation is happened. Therefore there should be solved to realization of the Fourier Mellin method. Using the Look up table, there reduce the data loss caused by the conversion between Rectangular and Polar coordinate. After diagnose, medical images are transformed the Polar coordinate and taken the Discrete Fourier transform in the center of ROI region. Maintaining the symmetry in Fourier magnitude coefficient, the gaussian distributed random vectors and binary images are embedded in medical images.

  • PDF

Adaptive reversible image watermarking algorithm based on DE

  • Zhang, Zhengwei;Wu, Lifa;Yan, Yunyang;Xiao, Shaozhang;Gao, Shangbing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1761-1784
    • /
    • 2017
  • In order to improve the embedding rate of reversible watermarking algorithm for digital image and enhance the imperceptibility of the watermarked image, an adaptive reversible image watermarking algorithm based on DE is proposed. By analyzing the traditional DE algorithm and the generalized DE algorithm, an improved difference expansion algorithm is proposed. Through the analysis of image texture features, the improved algorithm is used for embedding and extracting the watermark. At the same time, in order to improve the embedding capacity and visual quality, the improved algorithm is optimized in this paper. Simulation results show that the proposed algorithm can not only achieve the blind extraction, but also significantly heighten the embedded capacity and non-perception. Moreover, compared with similar algorithms, it is easy to implement, and the quality of the watermarked images is high.

Satellite Image Watermarking Perspective Distance Decision using Information Tagging of GPS (GPS 정보태깅을 이용한 원근거리 판별 기반의 위성영상 워터마킹)

  • Ahn, Young-Ho;Kim, Jun-Hee;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.7
    • /
    • pp.837-846
    • /
    • 2012
  • This paper presents a watermarking scheme based on the perspective distance for the secure mash-up service. The proposed scheme embeds the watermark of the location information of satellite image and the user information using edge color histogram, which is dissimilar to general digital image. Therefore, this scheme can trace the illegal distributor and can protect private information of user through the watermarking scheme that is adaptive to satellite image. Experimental results verified that our scheme has the invisibility and also the robustness against geometric attacks of rotation and translation.

Robust video watermarking algorithm for H.264/AVC based on JND model

  • Zhang, Weiwei;Li, Xin;Zhang, Yuzhao;Zhang, Ru;Zheng, Lixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2741-2761
    • /
    • 2017
  • With the purpose of copyright protection for digital video, a novel H.264/AVC watermarking algorithm based on JND model is proposed. Firstly, according to the characteristics of human visual system, a new and more accurate JND model is proposed to determine watermark embedding strength by considering the luminance masking, contrast masking and spatial frequency sensitivity function. Secondly, a new embedding strategy for H.264/AVC watermarking is proposed based on an analysis on the drift error of energy distribution. We argue that more robustness can be achieved if watermarks are embedded in middle and high components of $4{\times}4$ integer DCT since these components are more stable than dc and low components when drift error occurs. Finally, according to different characteristics of middle and high components, the watermarks are embedded using different algorithms, respectively. Experimental results demonstrate that the proposed watermarking algorithm not only meets the imperceptibility and robustness requirements, but also has a high embedding capacity.

Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization

  • Tang, Zhenjun;Wang, Shuozhong;Zhang, Xinpeng;Wei, Weimin;Su, Shengjun
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.2 no.1
    • /
    • pp.18-26
    • /
    • 2008
  • The invariance relation existing in the non-negative matrix factorization (NMF) is used for constructing robust image hashes in this work. The image is first re-scaled to a fixed size. Low-pass filtering is performed on the luminance component of the re-sized image to produce a normalized matrix. Entries in the normalized matrix are pseudo-randomly re-arranged under the control of a secret key to generate a secondary image. Non-negative matrix factorization is then performed on the secondary image. As the relation between most pairs of adjacent entries in the NMF's coefficient matrix is basically invariant to ordinary image processing, a coarse quantization scheme is devised to compress the extracted features contained in the coefficient matrix. The obtained binary elements are used to form the image hash after being scrambled based on another key. Similarity between hashes is measured by the Hamming distance. Experimental results show that the proposed scheme is robust against perceptually acceptable modifications to the image such as Gaussian filtering, moderate noise contamination, JPEG compression, re-scaling, and watermark embedding. Hashes of different images have very low collision probability. Tampering to local image areas can be detected by comparing the Hamming distance with a predetermined threshold, indicating the usefulness of the technique in digital forensics.

  • PDF