• 제목/요약/키워드: Hybrid Watermarking

검색결과 14건 처리시간 0.015초

A New Robust Blind Crypto-Watermarking Method for Medical Images Security

  • Mohamed Boussif;Oussema Boufares;Aloui Noureddine;Adnene Cherif
    • International Journal of Computer Science & Network Security
    • /
    • 제24권3호
    • /
    • pp.93-100
    • /
    • 2024
  • In this paper, we propose a novel robust blind crypto-watermarking method for medical images security based on hiding of DICOM patient information (patient name, age...) in the medical imaging. The DICOM patient information is encrypted using the AES standard algorithm before its insertion in the medical image. The cover image is divided in blocks of 8x8, in each we insert 1-bit of the encrypted watermark in the hybrid transform domain by applying respectively the 2D-LWT (Lifting wavelet transforms), the 2D-DCT (discrete cosine transforms), and the SVD (singular value decomposition). The scheme is tested by applying various attacks such as noise, filtering and compression. Experimental results show that no visible difference between the watermarked images and the original images and the test against attack shows the good robustness of the proposed algorithm.

데이터 매트릭스와 비밀 키를 이용한 하이브리드 워터마킹 방법 (Hybrid Watermarking Scheme using a Data Matrix and Secret Key)

  • 전성구;김일환
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2006년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.144-146
    • /
    • 2006
  • The Data Matrix of two-dimensional bar codes is a new technology capable of holding relatively large amounts of data compared to the conventional one-dimensional bar code which is just a key that can access detailed information to the host computer database. A secret key is used to prevent a watermark from malicious attacks. We encoded copyright information into a Data Matrix bar code for encoding process and it was spread a pseudo random pattern using owner key. We embedded a randomized watermark into the image using watermark's embedding position, pattern generated with a secret key. The experimental results have shown that the proposed scheme has good quality and is very robust to various attacks, such as JPEG compression and noise. Also the performance of the proposed scheme is verified by comparing the copyright information with the information which is extracted from a bar code scantier.

  • PDF

DWT 부대역구조와 공간 윤곽선정보를 이용한 하이브리드 워터마킹 기술 (Hybrid Watermarking Technique using DWT Subband Structure and Spatial Edge Information)

  • 서영호;김동욱
    • 한국통신학회논문지
    • /
    • 제29권5C호
    • /
    • pp.706-715
    • /
    • 2004
  • 본 논문에서 제안되는 워터마크(Watermark) 삽입 알고리즘은 웨이블릿 변환 영역에서 구성되는 부대역간의 트리구조(Tree structure)와 공간 영역에서의 윤곽선 정보를 이용하여 워터마크를 삽입할 영역을 결정하고 삽입한다. 먼저 생성되는 고주파 성분의 부대역으로부터 저주파 부대역으로 중요 주파수 영역을 예측하게 되는데 웨이블릿 변환영역에서 구성된 트리구조에서 높은 주파수를 가지는 LHI 부대역을 4${\times}$4의 부행렬(Submatrix)로 나누고 행렬에 대한 평균과 이들에 의해 구성되는 블록 행렬(Block matrix)로부터 전체 평균 및 워터마크 삽입에 이용될 임계값을 얻는다. 또한 주파수 영역에서 구해진 에너지 특성에 대한 블록 행렬과 공간 영역에서 얻어진 영상의 윤곽선 정보에 의해 워터마크가 삽입될 위치인 키맵(Keymap)이 구해진다. 구해진 키맵에 따라서 LFSR(Linear feedback shift register)을 이용하여 발생된 무작위 순열(Random sequence)를 웨이블릿 도메인에서 이웃 웨이블릿 계수간의 관계를 이용하여 삽입한다. 최종적으로 역 웨이블릿 변환을 취함으로써 워터마크가 삽입된 영상을 생성한다. 제안된 워터마킹 알고리즘은 JPEG과 같은 압축과 Blurring, Sharpening, 그리고 가우시안(Gaussian) 잡음 등의 공격에 대해서도 기존의 방식에 비해 약 2㏈ 절도 높은 PSNR(Peak signal to noise ratio)를 보이면서 2%에서 8% 정도 높은 NR(Normalized correlation)를 가져서 좋은 특성을 나타냈다.

A Multi-Stage Encryption Technique to Enhance the Secrecy of Image

  • Mondal, Arindom;Alam, Kazi Md. Rokibul;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo;Morimoto, Yasuhiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권5호
    • /
    • pp.2698-2717
    • /
    • 2019
  • This paper proposes a multi-stage encryption technique to enhance the level of secrecy of image to facilitate its secured transmission through the public network. A great number of researches have been done on image secrecy. The existing image encryption techniques like visual cryptography (VC), steganography, watermarking etc. while are applied individually, usually they cannot provide unbreakable secrecy. In this paper, through combining several separate techniques, a hybrid multi-stage encryption technique is proposed which provides nearly unbreakable image secrecy, while the encryption/decryption time remains almost the same of the exiting techniques. The technique consecutively exploits VC, steganography and one time pad (OTP). At first it encrypts the input image using VC, i.e., splits the pixels of the input image into multiple shares to make it unpredictable. Then after the pixel to binary conversion within each share, the exploitation of steganography detects the least significant bits (LSBs) from each chunk within each share. At last, OTP encryption technique is applied on LSBs along with randomly generated OTP secret key to generate the ultimate cipher image. Besides, prior to sending the OTP key to the receiver, first it is converted from binary to integer and then an asymmetric cryptosystem is applied to encrypt it and thereby the key is delivered securely. Finally, the outcome, the time requirement of encryption and decryption, the security and statistical analyses of the proposed technique are evaluated and compared with existing techniques.