• Title/Summary/Keyword: Geometric Attacks

Search Result 39, Processing Time 0.021 seconds

Sound Watermarking Technique based on Blackfin Processor (블랙핀 프로세서 기반의 사운드 워터마킹 기법)

  • Kim, Ye-il;Seo, Jung-hee;Park, Hung-bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.757-758
    • /
    • 2015
  • The digital watermark is one of important techniques to solve copyright authentication problems of digital media. Researches on the digital watermark are rapidly increasing in various media. The watermark system can resist some attacks such as signal attack, geometric attack and protocol attach. However, so far the robustness of the watermark needs to be improved. This paper suggests a watermarking technique with which a watermark is embedded on a coefficient of wavelet-based frequency band and extracted from it for protection of property rights and authentication of Blackfin processor-based digital sound. By carrying out hardware implementation of the suggested sound watermarking, the commercialization of protection of property rights and robustness of watermarks resulted from development of high-level programs can be confirmed.

  • PDF

Genetic Algorithm-Based Watermarking in Discrete Wavelet Transform Domain (유전자 알고리듬을 사용한 웨이블릿 기반 워터마킹)

  • Lee Dong-Eun;Kim Tae-Kyung;Lee Seong-Won;Paik Joon-Ki
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.4 s.310
    • /
    • pp.108-115
    • /
    • 2006
  • This paper presents a watermarking algorithm in the discrete wavelet transform domain using evolutionary algorithm. The proposed algorithm consists of wavelet-domain watermark insertion and genetic algorithm-based watermark extraction. More specifically watermark is inserted to the low-frequency region of wavelet transform domain, and watermark extraction is efficiently performed by using the evolutionary algorithm. The proposed watermarking algorithm is robust against various attacks such as JPEG and JPEG2000 image compression and geometric transformations.

Stability of suspension bridge catwalks under a wind load

  • Zheng, Shixiong;Liao, Haili;Li, Yongle
    • Wind and Structures
    • /
    • v.10 no.4
    • /
    • pp.367-382
    • /
    • 2007
  • A nonlinear numerical method was developed to assess the stability of suspension bridge catwalks under a wind load. A section model wind tunnel test was used to obtain a catwalk's aerostatic coefficients, from which the displacement-dependent wind loads were subsequently derived. The stability of a suspension bridge catwalk was analyzed on the basis of the geometric nonlinear behavior of the structure. In addition, a full model test was conducted on the catwalk, which spanned 960 m. A comparison of the displacement values between the test and the numerical simulation shows that a numerical method based on a section model test can be used to effectively and accurately evaluate the stability of a catwalk. A case study features the stability of the catwalk of the Runyang Yangtze suspension bridge, the main span of which is 1490 m. Wind can generally attack the structure from any direction. Whenever the wind comes at a yaw angle, there are six wind load components that act on the catwalk. If the yaw angle is equal to zero, the wind is normal to the catwalk (called normal wind) and the six load components are reduced to three components. Three aerostatic coefficients of the catwalk can be obtained through a section model test with traditional test equipment. However, six aerostatic coefficients of the catwalk must be acquired with the aid of special section model test equipment. A nonlinear numerical method was used study the stability of a catwalk under a yaw wind, while taking into account the six components of the displacement-dependent wind load and the geometric nonlinearity of the catwalk. The results show that when wind attacks with a slight yaw angle, the critical velocity that induces static instability of the catwalk may be lower than the critical velocity of normal wind. However, as the yaw angle of the wind becomes larger, the critical velocity increases. In the atmospheric boundary layer, the wind is turbulent and the velocity history is a random time history. The effects of turbulent wind on the stability of a catwalk are also assessed. The wind velocity fields are regarded as stationary Gaussian stochastic processes, which can be simulated by a spectral representation method. A nonlinear finite-element model set forepart and the Newmark integration method was used to calculate the wind-induced buffeting responses. The results confirm that the turbulent character of wind has little influence on the stability of the catwalk.

An Improved Method of Digital Watermarking Applied to Binary Printed Images (이진 프린트 영상에 적용하는 디지털 워터마킹의 성능 개선)

  • 김현주;곽내정;권혁봉;안재형
    • Journal of Korea Multimedia Society
    • /
    • v.4 no.3
    • /
    • pp.247-256
    • /
    • 2001
  • Digital watermarking is a copyright protection technique for digital images which embed a code into the digital data so the data is marked. Watermarking techniques previously deal with on-line digital data and have been developed to withstand digital attacks such image processing, compression and geometric transformation. In this paper we propose a novel method of embedding watermarks in printed images. In the proposed algorithm, watermark is embedded in a dithered binary image by comparing the $2\times{2}$ blocks of the counting array is the number of 1 (WHITE) in the $16\times{16}$ blocks of the dithered binary image with predefined reference block pattern, which is generated by watermark values. The proposed algorithm is able to provide more information at a watermark because the proposed algorithm use both '1'and '0' as watermark values. The watermark information is detected by comparing the watermark which is reconstructed from the image which is embedded watermark with the original watermark which is embedded in a binary image. The performance of the proposed algorithm is compared with that of the conventional watermark embedding algorithm for printed images by detecting watermark for scan images.

  • PDF

Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol (익명 Buyer-Seller 워터마킹 프로토콜 기반 모바일 3D 콘텐츠의 기하학적 다중 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.2
    • /
    • pp.244-256
    • /
    • 2009
  • This paper presents multiple watermarking method for the copyright protection and the prevention of illegal copying of mobile 3D contents. The proposed method embeds an unique watermark and a WCA watermark into the spatial and encryption domains of mobile 3D content based on anonymous Buyer-Seller watermarking protocol. The seller generates an unique watermark and embeds it into the distribution of vertex data of 3D content object. After receiving the encrypted watermark from WCA, the seller embeds it into the encrypted vertex data by using operator that satisfies the privacy homo morphic property. The proposed method was implemented using a mobile content tool, Power VR MBX and experimental results verified that the proposed method was capable of copyright protection and preventing illegal copying, as the watermarks were also accurately extracted in the case of geometrical attacks, such as noise addition, data accuracy variation, and data up/down scaling.

  • PDF

A Real-time Video Watermarking Technique Using Spatial and Frequency Domain Feedback (공간 영역과 주파수 영역을 이용한 실시간 비디오 워터마킹 기술)

  • 이한호;채종진;최종욱
    • Journal of Broadcast Engineering
    • /
    • v.6 no.2
    • /
    • pp.169-176
    • /
    • 2001
  • Most of the previous video watermarking algorithms cannot be supported by real-time video processing. The maul reason is that in order to develop a robust algorithm the watermarking technique requires a very high computational cost when embedding and extracting the watermark in various frequency domains. Previous embedding methods simultaneously try to compress a video by MPEG and embed a watermark supporting real-time processing. However, In this paper, our proposed algorithm can support real-time processing in both spatial and frequency domains. First. the watermark is created on the courier transform domain, and next is inverse-Fourier-transformed ; then, we directly embed it into the video frame In the spatial domain. This procedure does not require a lot of the computational cost during embedding because of the spatial domain processing. Also, it is possible to support a video stream service and a very robust algorithm from MPEG compression and various geometric attacks.

  • PDF

Suggestion on the Prototype of the Korean Barriers through the Investigation and Modeling of RC Protective Installments in Contact Areas (접적지역 RC형 방호시설 조사와 모델링을 통한 한국형 방호벽 설계안의 제시)

  • Park, Young Jun;Lee, Min Su;Lee, Hui Man
    • Journal of the Korea Institute of Building Construction
    • /
    • v.16 no.4
    • /
    • pp.341-348
    • /
    • 2016
  • The aim of this study is to suggest design requirements on the military barriers which are installed to reduce critical damage on protective facilities against sudden pin-point attacks caused by North Korean artilleries. For this purpose, site investigation and review of design drawings associated with barriers built in the contact areas are conducted. With identified data concerning barriers, the geometric modeling, which is used in the structural analysis, is performed. And then, the possible threat of North Korea is determined based on intelligence preparation of battlefields. Once the structural modeling and threat analysis are completed, structural damage on barriers and protective facilities are assessed in terms of impact, penetration, scabbing, and blast pressure effects. According to the analysis results, the thickness of barriers should be 450mm at least and current established barriers need to be structurally reinforced via sectional enlargement.

A RST Resistant Logo Embedding Technique Using Block DCT and Image Normalization (블록 DCT와 영상 정규화를 이용한 회전, 크기, 이동 변환에 견디는 강인한 로고 삽입방법)

  • Choi Yoon-Hee;Choi Tae-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.93-103
    • /
    • 2005
  • In this paper, we propose a RST resistant robust logo embedding technique for multimedia copyright protection Geometric manipulations are challenging attacks in that they do not introduce the quality degradation very much but make the detection process very complex and difficult. Watermark embedding in the normalized image directly suffers from smoothing effect due to the interpolation during the image normalization. This can be avoided by estimating the transform parameters using an image normalization technique, instead of embedding in the normalized image. Conventional RST resistant schemes that use full frame transform suffer from the absence of effective perceptual masking methods. Thus, we adopt $8\times8$ block DCT and calculate masking using a spatio-frequency localization of the $8\times8$ block DCT coefficients. Simulation results show that the proposed algorithm is robust against various signal processing techniques, compression and geometrical manipulations.

An adaptive watermarking for remote sensing images based on maximum entropy and discrete wavelet transformation

  • Yang Hua;Xu Xi;Chengyi Qu;Jinglong Du;Maofeng Weng;Bao Ye
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.192-210
    • /
    • 2024
  • Most frequency-domain remote sensing image watermarking algorithms embed watermarks at random locations, which have negative impact on the watermark invisibility. In this study, we propose an adaptive watermarking scheme for remote sensing images that considers the information complexity to select where to embed watermarks to improve watermark invisibility without affecting algorithm robustness. The scheme converts remote sensing images from RGB to YCbCr color space, performs two-level DWT on luminance Y, and selects the high frequency coefficient of the low frequency component (HHY2) as the watermark embedding domain. To achieve adaptive embedding, HHY2 is divided into several 8*8 blocks, the entropy of each sub-block is calculated, and the block with the maximum entropy is chosen as the watermark embedding location. During embedding phase, the watermark image is also decomposed by two-level DWT, and the resulting high frequency coefficient (HHW2) is then embedded into the block with maximum entropy using α- blending. The experimental results show that the watermarked remote sensing images have high fidelity, indicating good invisibility. Under varying degrees of geometric, cropping, filtering, and noise attacks, the proposed watermarking can always extract high identifiable watermark images. Moreover, it is extremely stable and impervious to attack intensity interference.