• Title/Summary/Keyword: Digital Watermark

Search Result 453, Processing Time 0.032 seconds

Digital Watermarking Algorithm of Still Image Using Human Visual System Characteristics (인간시각체계 특성을 이용한 정지영상 디지털 워터마킹 알고리즘)

  • 지남현;전병민
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.2
    • /
    • pp.31-38
    • /
    • 2003
  • This paper proposes method to insert soong Watermark considering dull HVS properties to big change of Edge and Texture area. While conversion of existent Fourier form can acquire information for whole frequency ingredient of image, but Wavelet transform can look for Edge and Texture area locally. Therefore, use Wavelet transform to use HVS properites, and compare with Xia's Watermarking techniques to use Wavelet transform simply arid experimented these proposal algorithm. Experimented about fidelity and robusthness by attack method that is used in existing paper, and as a result, confirmed that proposal algorithm that use HVS properties is more superior than Xia's techniques.

  • PDF

Secured Different Disciplinaries in Electronic Medical Record based on Watermarking and Consortium Blockchain Technology

  • Mohananthini, N.;Ananth, C.;Parvees, M.Y. Mohamed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.947-971
    • /
    • 2022
  • The Electronic Medical Record (EMR) is a valuable source of medical data intelligence in e-health systems. The watermarking techniques have been used to authenticate the owner and protect the EMR from illegal copying. The existing distributive strategies, successfully operated to secure the EMR, are found to be inadequate. Blockchain technology, mainly, is employed by a sharing database that allows the digital crypto-currency. It rapidly leads to the magnified expectations acme. In this excitement, the use of consortium adopting the technology based on Blockchain, in the EMR structure, is found improving. This type of consortium adds an immutable share with a translucent record of the entire business and it is accomplished with responsibility, along with faith and transparency. The combination of watermarking and Blockchain technology provides a singular chance to promote a secured, trustworthy electronic documents administration to share with the e-records system. The authors, in this article, present their views on consortium Blockchain technology which is incorporated in the EMR system. The ledger, used for the distribution of the block structure, has team healthcare models based on dissimilar multiple image watermarking techniques.

Digital Watermarking Technique in Wavelet Domain for Protecting Copyright of Contents (컨텐츠의 저작권 보호를 위한 DWT영역에서의 디지털 워터마킹 기법)

  • Seo, Young-Ho;Choi, Hyun-Jun;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1409-1415
    • /
    • 2010
  • In this paper we proposed the watermarking technique using the markspace which is selected by tree-structure between the subbands in the wavelet domain and feature information in the spatial domain. The watermarking candidate region in the wavelet domain is obtained by the markspace selection algorithm divides the highest frequency subband to several segments and calculates theirs energy and the averages value of the total energy of the subband. Also the markspace of the spatial domain is obtained by the boundary information of a image. The final markspace is selected by the markspaces of the wavelet and spatial domain. The watermark is embedded into the selected markspace using the random addresses by LFSR. Finally the watermarking image is generated using the inverse wavelet transform. The proposed watermarking algorithm shows the robustness against the attacks such as JPEG, blurring, sharpening, and gaussian noise.

A Study on Digital Watermarking of MPEG Coded Video Using Wavelet Transform (웨이블릿 변환를 이용한 MPEG 디지털동영상 워터마킹에 관한 연구)

  • Lee, Hak-Chan;Jo, Cheol-Hun;Song, Jung-Won
    • The KIPS Transactions:PartB
    • /
    • v.8B no.5
    • /
    • pp.579-586
    • /
    • 2001
  • Digital watermarking is to embed imperceptible mark into image, video, audio, and text data to prevent the illegal copy of multimedia data. arbitrary modification, and also illegal sales of the copies without agreement of copyright ownership. In this paper, we study for the embedding and extraction of watermark key using wavelet in the luminance signal in order to implement the system to protect the copyright for image MPEG. First, the original image is analyzed into frequency domain by discrete wavelet transform. The RSA(Rivest, Shamir, Aldeman) public key of the coded target is RUN parameter of VLD(variable length coding). Because the high relationship among the adjacent RUN parameters effect the whole image, it prevents non-authorizer not to possess private key from behaving illegally. The Results show that the proposed method provides better moving picture and the distortion more key of insert than direct coded method on low-frequency domain based DCT.

  • PDF

Metadata production system based on MPEG-21 IPMP for protection of broadcasting contents (방송 콘텐츠 보호를 위한 MPEG-21 IPMP 기반의 메타데이터 저작 시스템)

  • Ryu, Kwang-Hee;Kim, Kwang-Yong;Kim, Jae-Gon;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.619-622
    • /
    • 2005
  • When Digital Contents goes through production${\cdot}$delivery${\cdot}$consumption, MPEG(Moving Picture Expers Group)-21 IPMP(Intellectual Property Management and Protection) defines standard which have defined by FCD(Final Committee Draft) level to keep the Digital Contents in safety. And development of system which applied to latest standard to protect and manage the broadcasting contents is required. Currently, the system to protect and manage the broadcast contents consists of fourth organizations which means production server, tool server, license server, consumption server. In this paper, we made production server to parse REL(Right Expression Language) document that has right information for content from license server, and create metadata based on MPEG-21 IPMP about the content that applied to watermark. then, after it do remuxing, transmit the protected data to consumption server.

  • PDF

Image Watermarking for Copyright Protection of Images on Shopping Mall (쇼핑몰 이미지 저작권보호를 위한 영상 워터마킹)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.147-157
    • /
    • 2013
  • With the advent of the digital environment that can be accessed anytime, anywhere with the introduction of high-speed network, the free distribution and use of digital content were made possible. Ironically this environment is raising a variety of copyright infringement, and product images used in the online shopping mall are pirated frequently. There are many controversial issues whether shopping mall images are creative works or not. According to Supreme Court's decision in 2001, to ad pictures taken with ham products is simply a clone of the appearance of objects to deliver nothing but the decision was not only creative expression. But for the photographer's losses recognized in the advertising photo shoot takes the typical cost was estimated damages. According to Seoul District Court precedents in 2003, if there are the photographer's personality and creativity in the selection of the subject, the composition of the set, the direction and amount of light control, set the angle of the camera, shutter speed, shutter chance, other shooting methods for capturing, developing and printing process, the works should be protected by copyright law by the Court's sentence. In order to receive copyright protection of the shopping mall images by the law, it is simply not to convey the status of the product, the photographer's personality and creativity can be recognized that it requires effort. Accordingly, the cost of making the mall image increases, and the necessity for copyright protection becomes higher. The product images of the online shopping mall have a very unique configuration unlike the general pictures such as portraits and landscape photos and, therefore, the general image watermarking technique can not satisfy the requirements of the image watermarking. Because background of product images commonly used in shopping malls is white or black, or gray scale (gradient) color, it is difficult to utilize the space to embed a watermark and the area is very sensitive even a slight change. In this paper, the characteristics of images used in shopping malls are analyzed and a watermarking technology which is suitable to the shopping mall images is proposed. The proposed image watermarking technology divide a product image into smaller blocks, and the corresponding blocks are transformed by DCT (Discrete Cosine Transform), and then the watermark information was inserted into images using quantization of DCT coefficients. Because uniform treatment of the DCT coefficients for quantization cause visual blocking artifacts, the proposed algorithm used weighted mask which quantizes finely the coefficients located block boundaries and coarsely the coefficients located center area of the block. This mask improves subjective visual quality as well as the objective quality of the images. In addition, in order to improve the safety of the algorithm, the blocks which is embedded the watermark are randomly selected and the turbo code is used to reduce the BER when extracting the watermark. The PSNR(Peak Signal to Noise Ratio) of the shopping mall image watermarked by the proposed algorithm is 40.7~48.5[dB] and BER(Bit Error Rate) after JPEG with QF = 70 is 0. This means the watermarked image is high quality and the algorithm is robust to JPEG compression that is used generally at the online shopping malls. Also, for 40% change in size and 40 degrees of rotation, the BER is 0. In general, the shopping malls are used compressed images with QF which is higher than 90. Because the pirated image is used to replicate from original image, the proposed algorithm can identify the copyright infringement in the most cases. As shown the experimental results, the proposed algorithm is suitable to the shopping mall images with simple background. However, the future study should be carried out to enhance the robustness of the proposed algorithm because the robustness loss is occurred after mask process.

A Study of RF Watermark Backward Compatibility under Various Channel Environments (다양한 채널환경 하에서의 RF 워터마크 역호환성 연구)

  • Kim, Jeong-Chang;Park, Sung-Ik;Choi, Dae-Won;Lim, Hyoung-Soo;Kim, Heung-Mook
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.8
    • /
    • pp.99-107
    • /
    • 2010
  • In a single frequency network (SFN) for Advanced Television Systems Committee (ATSC) terrestrial digital television (DTV) system, the interferences induced by the multiple transmitters and/or repeaters using the same frequency are inevitable. Since the presence of interferences results in performance degradation of the SFN, it is crucial to manipulate the interferences by adjusting the transmit power and timing of each transmitter and repeater. In the ATSC terrestrial DTV system, in order to facilitate the interference manipulation process, a transmitter identification (TxID) signal which is uniquely embedded in the signal to be transmitted from each transmitter and repeater is recommended. Even though the injection level of the TxID signal is much lower than the DTV signal, the TxID signal injection infects the DTV signal. Hence, the effect of the TxID signal on the DTV signal must be investigated before deployment. In this paper, the effect of the TxID signal on the performance of legacy DTV receivers under additive white Gaussian noise and multipath channel environments is investigated not only with computer simulation but also with laboratory and field tests. The test results show that the average threshold of visibility degradation of the legacy DTV receivers due to the TxID signal injection is less than 0.2 dB at the TxID injection level of -30 dB.

Video Copyright Protection through Watermarking of Wavelet Transform based on the Frequency (주파수기반 웨이브릿 변환의 워터마킹을 통한 동영상 저작권 보호에 관한 연구)

  • Han, Mi-Ja;Kim, Dan-Hwan;Jung, Chang-Ryul;Jeong, Byeong-Yeol;Lee, Sung-Keun;Koh, Jin-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.535-539
    • /
    • 2008
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. The copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data. As inserts copyright information and it protects the copyright. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

  • PDF

Reversible Image Watermarking with Differential Histogram Shifting and Error Prediction Compensation (차이값 히스토그램 쉬프팅과 오류 예측 보정을 이용한 가역 영상 워터마킹)

  • Yeo, Dong-Gyu;Lee, Hae-Yeoun;Kim, Byeong-Man;Kim, Kyung-Su
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.6
    • /
    • pp.417-429
    • /
    • 2010
  • Reversible watermarking inserts watermark into digital media in such a way that visual transparency is preserved and then enables to restore the original media from the marked one without any loss of media quality. This watermarking can be applied to quality-sensitive imaging such as medical imaging, military imaging, remote-sensing imaging, and precious artwork, where the original media should be preserved during image processing and analysis. In this paper, a reversible image watermarking technique that embeds message bits by modifying the differential histogram of adjacent pixels is presented. In order to satisfy both high embedding capacity and visual quality, the proposed technique exploits the fact that adjacent pixels in the image have highly spatial correlation. Also, we prevent overflow/underflow problem and salt-and-pepper artifacts by employing a predicted error compensation scheme. Through experiments using various test images, we prove that the presented technique provides perfect reversibility and high embedding capacity, while maintaining the induced-distortion low.

Block-based Image Authentication Algorithm using Differential Histogram-based Reversible Watermarking (차이값 히스토그램 기반 가역 워터마킹을 이용한 블록 단위 영상 인증 알고리즘)

  • Yeo, Dong-Gyu;Lee, Hae-Yeoun
    • The KIPS Transactions:PartB
    • /
    • v.18B no.6
    • /
    • pp.355-364
    • /
    • 2011
  • In most applications requiring high-confidential images, reversible watermarking is an effective way to ensure the integrity of images. Many watermarking researches which have been adapted to authenticate contents cannot recover the original image after authentication. However, reversible watermarking inserts the watermark signal into digital contents in such a way that the original contents can be restored without any quality loss while preserving visual quality. To detect malicious tampering, this paper presents a new block-based image authentication algorithm using differential histogram-based reversible watermarking. To generate an authentication code, the DCT-based authentication feature from each image block is extracted and combined with user-specific code. Then, the authentication code is embedded into image itself with reversible watermarking. The image can be authenticated by comparing the extracted code and the newly generated code and restored into the original image. Through experiments using multiple images, we prove that the presented algorithm has achieved over 97% authentication rate with high visual quality and complete reversibility.