• Title/Summary/Keyword: Digital Watermarking Technique

Search Result 174, Processing Time 0.027 seconds

Digital video watermarking using fingerprint data (동영상 스트리밍 인증을 위한 지문 기반 워터마킹)

  • Jung, Soo-Yeun;Lee, Dong-Eun;Lee, Seong-Won;Paik, Joon-Ki
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.6
    • /
    • pp.43-50
    • /
    • 2007
  • In this paper we propose a method that identifies users at H.264 streaming using watermarking with fingerprints. The watermark can efficiently reduce the potential danger of forgery or alteration. Especially a biometric watermark has various advantages. Among entire biometric characteristics, the fingerprint is the most convenient and economical. In this paper we propose a novel fingerprint-based watermarking technique that can survive under very low bit-rate compression. The proposed algorithm consists of enhancement of a fingerprint image, the watermark generation using the extracted feature coordinates, watermark insertion using discrete wavelet transform, and authentication. The proposed algorithm can achieve robust watermark extraction against 0.264 compressed videos.

Image Watermarking Robust to Geometrical Attacks based on Normalization using Invariant Centroid (불변의 무게중심을 이용한 영상 정규화에 기반한 기하학적 공격에 강인한 워터마킹)

  • 김범수;최재각
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.3
    • /
    • pp.243-251
    • /
    • 2004
  • This paper proposes a digital image watermarking scheme, which is robust to geometrical attacks. The method improves image normalization-based watermarking (INW) technique that doesn't effectively deal with geometrical attacks with cropping. Image normalization is based on the moments of the image, however, in general, geometrical attacks bring the image boundary cropping and the moments are not preserved original ones. Thereafter the normalized images of before and after are not same form, i.e., the synchronization is lost. To solve the cropping problem of INW, Invariant Centroid (IC) is proposed in this paper. IC is a gravity center of a central area on a gray scale image that is invariant although an image is geometrically attacked and the only central area, which has less cropping possibility by geometrical attacks, is used for normalization. Experimental results show that the IC-based method is especially robust to geometrical attack with cropping.

Performance Enhancement through Row-Column Cross Scanning in Differential Histogram-based Reversible Watermarking (차이값 히스토그램 기반 가역 워터마킹의 행열 교차 스캐닝을 통한 성능 향상 기법)

  • Yeo, Dong-Gyu;Lee, Hae-Yeoun;Kim, Byeong-Man
    • The KIPS Transactions:PartB
    • /
    • v.18B no.1
    • /
    • pp.1-10
    • /
    • 2011
  • Reversible watermarking inserts watermark into digital media in such a way that visual transparency is preserved, which enables the restoration of the original media from the watermarked one without any loss of media quality. It has various applications, where high capacity and high visual quality are major requirements. This paper presents a new effective multi-round embedding scheme for the differential histogram-based reversible watermarking that satisfies high capacity requirements of the application. The proposed technique exploits the row-column cross scanning to fully utilize the locality of images when multi-round embedding phase to the message inserted image. Through experiments using multiple kinds of test images, we prove that the presented algorithm provides 100% reversibility, effectiveness of multi-round embedding, and higher visual quality, while maintaining the induced-distortion low.

EXTRACTION OF WATERMARKS BASED ON INDEPENDENT COMPONENT ANALYSIS

  • Thai, Hien-Duy;Zensho Nakao;Yen- Wei Chen
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.407-410
    • /
    • 2003
  • We propose a new logo watermark scheme for digital images which embed a watermark by modifying middle-frequency sub-bands of wavelet transform. Independent component analysis (ICA) is introduced to authenticate and copyright protect multimedia products by extracting the watermark. To exploit the Human visual system (HVS) and the robustness, a perceptual model is applied with a stochastic approach based on noise visibility function (NVF) for adaptive watermarking algorithm. Experimental results demonstrated that the watermark is perfectly extracted by ICA technique with excellent invisibility, robust against various image and digital processing operators, and almost all compression algorithms such as Jpeg, jpeg 2000, SPIHT, EZW, and principal components analysis (PCA) based compression.

  • PDF

Digital Watermarking Technique for the Copyright Protection of Motion Pictures (동영상 저작권 보호를 위한 디지털 워터마킹 기술)

  • 류대현
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.4
    • /
    • pp.438-450
    • /
    • 1999
  • In this paper, a new watermaking method embedding digital watermarks in the compressed video for the copy protection of multimedia data. The proposed method segments objects and embeds independent watermarks in each objects by spread spectrum method in the bitstream domain which is compressed by DCT and motion compensated coding method like MPEG-2. And, the proposed method not only embeds watermarks but show the robustness to the attacks like average operation or statistical analysis.

  • PDF

Fake Iris Image Detection based on Watermark

  • Kim, Man-Ki;Lee, Samuel;Kim, Gye-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.4
    • /
    • pp.33-39
    • /
    • 2018
  • In this paper, we propose a describes how to detect a false iris image by inserting watermark into a iris image. The existing method, which inserts the watermark into the entire iris image to detect a fake iris, has a problem that can evade it by segmenting iris region of an iris image. The purpose of overcoming the problem, this paper proposes a new fake iris detection technique based on digital watermark. It first searches a central point of an iris image, divide the image into blocks with respect to the point. executes Discrete Cosine Transform, inserts watermark into the blocks, and then verifies an iris image using NC(Normalized Correlation). In the experiments, we confirm the robustness for attacks - crop and JPEG.

A Study on the Watermarketing of Keyframe-Based for copyright Protection of video (동영상의 저작권 보호를 위한 키 프레임 기반의 워터마킹에 관한 연구)

  • Kim, Dan-Hwan;Oh, Moo-Song
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.102-107
    • /
    • 2005
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. the copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data which is a multimedia contents not to be, it inserts copyright information and it protects the right of ownership. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

Digital Watermarking of Medical Images (의료영상의 디지털 워터마킹)

  • Lee, Sang-Bock;Lee, Sam-Yol;Lee, Jun-Haeng
    • Journal of radiological science and technology
    • /
    • v.27 no.2
    • /
    • pp.13-19
    • /
    • 2004
  • This study proposes how to insert a strong watermark creating a big change in the areas of edge and texture. While conversion by existing Fourier transformation can acquire information for all ranges of frequency domain from the image, Wavelet transformation can manipulate edge and texture area selectively. Therefore, through wavelet transformation concerned area may be selected and watermarks in copyright formation are inserted. Our proposed algorithm was compared to Xia's watermarking technique using wavelet transformation. Its fidelity and robustness were tested with attack methods used in existing papers and it turns out that the proposed algorithm using HVS properties is more superior to Xia's techniques.

  • PDF

Design of robust Medical Image Security Algorithm using Watershed Division Method (워터쉐드 분할 기법을 이용한 견고한 의료 영상보안 알고리즘 설계)

  • Oh, Guan-Tack;Jung, Min-Six;Lee, Yun-Bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.1980-1986
    • /
    • 2008
  • A digital watermarking technique used as a protection and certifying mechanism of copyrighted creations including music, still images, and videos in terms of lading any loss in data, reproduction and pursuit. This study suggests using a selected geometric invariant point through the whole processing procedure based on the invariant point so that it will be robust in a geometric transformation attack. The introduced algorithm here is based on a watershed splitting method in order to make medical images strong against RST transformation and other processing. This algorithm also proved that is has robustness against not only RST attack, but also JPEG compression attack and filtering attack.

A Novel Copyright Protection for Digital Images Using Magnitude and Orientation of Edge (영상의 에지 크기와 각도를 이용한 정지영상 보호 기법)

  • Shin, Jin-Wook;Min, Byung-Jun;Yoon, Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3C
    • /
    • pp.262-270
    • /
    • 2008
  • We propose a technique to protect digital images using the magnitude and orientation of their edges. The proposed technique uses the content-associated copyright message generated by combining the original copyright message with the magnitude and orientation of some edges of a digital image. It enables the distribution of the original copyright message without any distortion of original digital images by avoiding embedment of the original copyright message into images. In addition to the advantage in the image quality, it also has a relatively low computational complexity by using simple operations to generate the content-associated copyright message. To verify the proposed technique, we performed experiments on its robustness to the external attacks such as histogram equalization, median filtering, rotation, and cropping. Experimental results on restoring the copyright message from images distorted by attacks show that more than 90%, on the average, can be recovered.