• Title/Summary/Keyword: Geometric Attacks

Search Result 39, Processing Time 0.026 seconds

A Watermarking Scheme for Shapefile-Based GIS Digital Map Using Polyline Perimeter Distribution

  • Huo, Xiao-Jiao;Lee, Suk-Hwan;Kwon, Seong-Geun;Moon, Kwan-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.5
    • /
    • pp.595-606
    • /
    • 2011
  • This paper proposes a robust watermarking scheme for GIS digital map by using the geometric properties of polyline and polygon, which are the fundamental components in vector data structure. In the proposed scheme, we calculate the lengths and the perimeters of all polylines and polygons in a map and cluster them to a number of groups. Then we embed the binary watermark by changing the mean of lengths and perimeters in an embedding group. For improving the safety and robustness, we permute the binary watermark through PRNS(pseudo-random number sequence) processing and embed it repeatedly in a model. Experimental results verified that our scheme has a good invisibility, safety and robustness to various geometric attacks and also our scheme needs not the original map in the extracting process of watermark.

A Video Watermarking System Resistant to Geometric Attacks using Frame Average (프레임 평균을 이용한 기하학공격에 강인한 비디오 워터마킹 알고리즘)

  • 이승욱;유원영;김진호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.613-615
    • /
    • 2003
  • 본 논문에서는 절삭, 크기변화, 회전, 프로젝션 등의 기하학적 공격에 매우 강인한 비디오 워터마킹 알고리즘을 소개한다. 동기정보를 파괴하는 기하학 공격은 원 비디오 데이터의 화질을 크게 손상하지 않으면서도 워터마크 정보를 극단적으로 제거할 수 있는 공격이며, 이에 대한 연구는 아직 미비하다. 한 프레임의 휘도성분의 평균값은 전역 혹은 지역적인 기하 공격에 강인하다는 것은 잘 알려진 사실이다. 그러므로 휘도성분의 평균값을 워터마크 정보에 따라 변화시키면 기하학 공격에 강인한 비디오 워터마킹 알고리즘을 만들 수 있다. 제안된 방법의 용량성과 비가시성 향상을 위해 간단하지만 매우 효율적인 시공간적 인간시각특성이 이용된다. 실험결과에 의하면 제안된 방법은 기하학공격과 압축 등의 공격이 동시에 일어나도 삽입된 워터마크 정보를 추출 할 수 있음을 보여준다.

  • PDF

Template Recovery of DWT-DFT Composite Watermarking Scheme Using Collinear Cross-Ratio

  • Sepsirisuk, Kasemsuk;Atsuta, Kiyoaki;Kondo, Shozo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.225-228
    • /
    • 2005
  • According to a popularization of the Internet and digital lifestyle, digital watermarks have been proposed for protection of copyrighted multimedia content. In blind watermark detection, which an original image is not provided, robustness against geometric distortion and compression remains challenging. In this paper, we propose a new perceptual blind discrete wavelet transform - discrete Fourier transform (DWT-DFT) composite watermarking scheme that is robust against both general linear transform and JPEG compression. This algorithm constructs an image-dependent watermark in the most significant DWT coefficients, which is determined by using a hierarchical tree structure. Strength of watermark is determined from a just-noticeable difference (JND) profile of a perceptual model. Furthermore, a desired template is inserted into DFT domain of the watermarked image. In new manner, a cross-ratio of four collinear points is used for detecting the template. Experimental results have showed that the proposed scheme is robust against general linear distortion, JPEG compression and various general kinds of attacks in the Stirmark 3.1 watermark evaluation tool.

  • PDF

Geometrical Distortion-Resilient Watermarking Based on Image Features

  • Shim, Hiuk-Jae;Byeungwoo Jeon;Kim, Rin-Chul
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1268-1271
    • /
    • 2002
  • The major threat of geometric manipulations is that they change the positions of watermarks, therefore the detection process fails to extract watermark properly. Since they cause the same effects on the host image as watermarks simultaneously, evaluating the distorted host image can be helpful to measure the nature of distortions. In this paper, we propose a geometrical distortion-resilient watermarking algorithm based on this property. Firstly we evaluate the orientation of a host image by filtering it with directional Gabor kernels, then we insert embedding pattern aligned to the estimated orientation. In its detection step, we evaluate the orientation again by Gabor filtering, then simply project and average the projected value to obtain a 1-D projection average pattern. Finally, auto-correlation function of the 1-D projection average pattern identifies periodic peaks. Analysed are experimental results against geometrical attacks including aspect ratio changes.

  • PDF

A Feature-Based Robust Watermarking Scheme Using Circular Invariant Regions

  • Doyoddorj, Munkhbaatar;Rhee, Kyung-Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.5
    • /
    • pp.591-600
    • /
    • 2013
  • This paper addresses a feature-based robust watermarking scheme for digital images using a local invariant features of SURF (Speeded-Up Robust Feature) descriptor. In general, the feature invariance is exploited to achieve robustness in watermarking schemes, but the leakage of information about hidden watermarks from publicly known locations and sizes of features are not considered carefully in security perspective. We propose embedding and detection methods where the watermark is bound with circular areas and inserted into extracted circular feature regions. These methods enhance the robustness since the circular watermark is inserted into the selected non-overlapping feature regions instead of entire image contents. The evaluation results for repeatability measures of SURF descriptor and robustness measures present the proposed scheme can tolerate various attacks, including signal processing and geometric distortions.

Multiresolution Watermarking Scheme on DC Image in DCT Compressed Domain (DCT 압축영역에서의 DC 영상 기반 다해상도 워터마킹 기법)

  • Kim, Jung-Youn;Nam, Je-Ho
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.4
    • /
    • pp.1-9
    • /
    • 2008
  • This paper presents a rapid watermarking algorithm based on DC image, which provides a resilience to geometric distortion. Our proposed scheme is based on $8{\times}8$ block DCT that is widely used in image/video compression techniques (e.g., JPEG and MPEG). In particular, a DC image is analyzed by DWT to embed a watermark. To overcome a quality degradation caused by a watermark insertion into DC components, we discern carefully the intensity and amount of watermark along the different subbands of DWT. Note that the proposed technique supports a high throughput for a real-time watermark insertion and extraction by relying on a partial decoding (i.e., DC components) on $8{\times}8$ block DCT domain. Experimental result shows that the proposed watermarking scheme significantly reduces computation time of 82% compared with existing DC component based algorithm and yet provides invariant properties against various attacks such as geometric distortion and JPEG compression, etc.

Deep Learning Framework for Watermark-Adaptive and Resolution-Adaptive Image Watermarking (워터마크 및 해상도 적응적인 영상 워터마킹을 위한 딥 러닝 프레임워크)

  • Lee, Jae-Eun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.25 no.2
    • /
    • pp.166-175
    • /
    • 2020
  • Recently, application fields for processing and using digital image contents in various forms and types are rapidly increasing. Since image content is high value-added content, the intellectual property rights of this content must be protected in order to activate the production and use of the digital image content. In this paper, we propose a deep learning based watermark embedding and extraction network. The proposed method is to maximize the robustness of the watermark against malicious/non-malicious attacks while preserving the invisibility of the host image. This network consists of a preprocessing network that changes the watermark to have the same resolution as the host image, a watermark embedding network that embeds watermark data while maintaining the resolution of the host image by three-dimensionally concatenating the changed host image and the watermark information, and a watermark extraction network that reduces the resolution and extracts watermarks. This network verifies the invisibility and robustness of the proposed method by experimenting with various pixel value change attacks and geometric attacks against various watermark data and host images with various resolutions, and shows that this method is universal and practical.

Empirical Initial Scantling Equations on Optimal Structural Design of Submarine Pressure Hull

  • Oh, Dohan;Koo, Bonguk
    • Journal of Advanced Research in Ocean Engineering
    • /
    • v.4 no.1
    • /
    • pp.7-15
    • /
    • 2018
  • The submarine is an underwater weapon system which covertly attacks the enemy. Pressure hull of a submarine is a main system which has to have a capacity which can improve the survivability (e.g., protection of crews) from the high pressure and air pollution by a leakage of water, a fire caused by outside shock, explosion, and/or operational errors. In addition, pressure hull should keep the functional performance under the harsh environment. In this study, optimal design of submarine pressure hull is dealt with 7 case studies done by analytic method and then each result's adequacy is verified by numerical method such as Finite Element Analysis (FEA). For the structural analysis by FEM, material non-linearity and geometric non-linearity are considered. After FEA, the results by analytic method and numerical method are compared. Weight optimized pressure hull initial scantling methods are suggested such as a ratio with shell thickness, flange width, web height and/or relations with radius, yield strength and design pressure (DP). The suggested initial scantling formulae can reduce the pressure hull weight from 6% and 19%.

3D Printing Watermarking Method Based on Radius Curvature of 3D Triangle

  • Pham, Ngoc-Giao;Song, Ha-Joo;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1951-1959
    • /
    • 2017
  • Due to the fact that 3D printing is applied to many areas of life, 3D printing models are often used illegally without any permission from the original providers. This paper presents a novel watermarking algorithm for the copyright protection and ownership identification for 3D printing based on the radius curvature of 3D triangle. 3D triangles are extracted and classified into groups based on radius curvature by the clustering algorithm, and then the mean radius curvature of each group will be computed for watermark embedding. The watermark data is embedded to the groups of 3D triangle by changing the mean radius curvature of each group. In each group, we select a 3D triangle which has the nearest radius curvature with the changed mean radius curvature. Finally, we change the vertices of the selected facet according to the changed radius curvature has been embedded watermark. In experiments, the distance error between the original 3D printing model and the watermarked 3D printing model is approximate zero, and the Bit Error Rate is also very low. From experimental results, we verify that the proposed algorithm is invisible and robustness with geometric attacks rotation, scaling and translation.

Satellite Image Watermarking Perspective Distance Decision using Information Tagging of GPS (GPS 정보태깅을 이용한 원근거리 판별 기반의 위성영상 워터마킹)

  • Ahn, Young-Ho;Kim, Jun-Hee;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.7
    • /
    • pp.837-846
    • /
    • 2012
  • This paper presents a watermarking scheme based on the perspective distance for the secure mash-up service. The proposed scheme embeds the watermark of the location information of satellite image and the user information using edge color histogram, which is dissimilar to general digital image. Therefore, this scheme can trace the illegal distributor and can protect private information of user through the watermarking scheme that is adaptive to satellite image. Experimental results verified that our scheme has the invisibility and also the robustness against geometric attacks of rotation and translation.