• Title/Summary/Keyword: Image watermarking

Search Result 627, Processing Time 0.025 seconds

Digital Color Image Watermarking for JPEG2000 (JPEG2000을 위한 디지털 칼라 영상 워터마킹)

  • 박종태
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.792-795
    • /
    • 2004
  • Digital watermarking technology is one of method of protecting property from the illegal reproduction of digital data. This technology inserts the specific data in a certain file to identify the property, that is an author and rights, not for human to be seen and heard. In this paper, the watermarking technology which inserts a RGB rotor watermark in a JPEG2000 color image using the visual characteristics of wavelet coefficient was proposed. After applying various attack at a watermarked image according to proposed technology, the likeness between the original image, the watermark and the extracted watermark was measured and investigated. As a result, the PSNR value of image was varied depending on perceptual parameter, but we can obtain 32㏈ as a whole.

  • PDF

Robust Image Watermarking via Perceptual Structural Regularity-based JND Model

  • Wang, Chunxing;Xu, Meiling;Wan, Wenbo;Wang, Jian;Meng, Lili;Li, Jing;Sun, Jiande
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1080-1099
    • /
    • 2019
  • A better tradeoff between robustness and invisibility will be realized by using the just noticeable (JND) model into the quantization-based watermarking scheme. The JND model is usually used to describe the perception characteristics of human visual systems (HVS). According to the research of cognitive science, HVS can adaptively extract the structure features of an image. However, the existing JND models in the watermarking scheme do not consider the structure features. Therefore, a novel JND model is proposed, which includes three aspects: contrast sensitivity function, luminance adaptation, and contrast masking (CM). In this model, the CM effect is modeled by analyzing the direction features and texture complexity, which meets the human visual perception characteristics and matches well with the spread transform dither modulation (STDM) watermarking framework by employing a new method to measure edge intensity. Compared with the other existing JND models, the proposed JND model based on structural regularity is more efficient and applicable in the STDM watermarking scheme. In terms of the experimental results, the proposed scheme performs better than the other watermarking scheme based on the existing JND models.

Contents based Watermarking on Image (영상의 내용 기반 워터마킹)

  • 강호경;정용주;노용만
    • Proceedings of the IEEK Conference
    • /
    • 2000.11d
    • /
    • pp.207-210
    • /
    • 2000
  • We propose a content based watermarking technique in multimedia management system. In the proposed technique, a content description technique of MPEG-7 for the multimedia database is adopted into a watermarking technique. With multimedia features described by MPEG-7 standard, we propose a novel watermarking technique where MPEG-7 descriptors are regarded as perceptually significant portions. The watermark is embedded in cooperating with multimedia features such as MPEG-7 descriptor. To verify the feasibility and performance of proposed watermarking technique, experiments with the MPEG-7 database are performed.

  • PDF

Research on Robustness of 2D DWT-Based Watermarking in Intermediate Viewpoint by 3D Warping

  • Park, Scott;Choi, Hyun-Jun;Yang, Won-Jae;Kim, Dong-Wook;Seo, Young-Ho
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.3
    • /
    • pp.173-180
    • /
    • 2014
  • This paper investigates the robustness of watermarking techniques for stereo or multi-view images generated from texture and depth images. A three-dimensional (3D) warping technique is applied to texture and depth images to generate stereo or multi-view images for a 3D display. By using the 3D warping technique, in this paper, we developed watermarking techniques and evaluated the robustness of these techniques that can extract watermarks from texture images even when the viewpoints are moved. A depth image is used to generate a stereo image with the largest viewpoint difference to the left and right. The overlapping region in the stereo image that does not disappear after warping is then obtained, and DWT is applied to this region to embed a watermark in the LL sub-band. The proposed watermarking techniques were found to yield bit error rates of about 3%-16% when they were applied to stereo images generated from texture and depth images. Furthermore, the results showed that the copyright could be seen when the extracted watermark was visually confirmed.

A High Capacity Reversible Watermarking Using Histogram Shifting (히스토그램 이동을 이용한 고용량 리버서블 워터마킹)

  • Bae, Sung-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.76-82
    • /
    • 2010
  • Reversible watermarking hides some information in a digital image in such a way that an authorized party could decode the hidden information and also restore the image to its original state. In this paper, a high capacity reversible watermarking method using histogram shifting is proposed. In order to increase embedding capacity, the proposed method divides the image into $2{\times}2$ blocks and uses a paring(horizontal, vertical, diagonal) inside each block, then finds a maximum embedding bin which has the most frequent difference values among the parings. Also, the proposed method removes the overflow and underflow by using location map which including the maximum embedding bin and increases the embedding capacity by embedding iteratively. The experimental results show that the proposed method provides a high embedding capacity and good visual quality compared with the conventional reversible watermarking methods.

Watermarking Algorithm that is Adaptive on Geometric Distortion in consequence of Restoration Pattern Matching (복구패턴 정합을 통한 기하학적 왜곡에 적응적인 워터마킹)

  • Jun Young-Min;Ko Il-Ju;Kim Dongho
    • The KIPS Transactions:PartB
    • /
    • v.12B no.3 s.99
    • /
    • pp.283-290
    • /
    • 2005
  • The mismatched allocation of watermarking position due to parallel translation, rotation, and scaling distortion is a problem that requires an answer in watermarking. In this paper, we propose a watermarking method robust enough to hold against geometrical distorting using restoration pattern matching. The proposed method defines restoration pattern, then inserts the pattern to a watermark embedded image for distribution. Geometrical distortion is verified by comparing restoration pattern extracted from distributed image and the original restoration pattern inserted to the image. If geometrical distortion is found, inverse transformation is equally performed to synchronize the watermark insertion and extraction position. To evaluate the performance of the proposed method, experiments in translation, rotation, and scaling attack are performed.

An Watermarking Algorithm for Multimodal Biometric Systems (다중 생체인식 시스템에 적합한 워터마킹 알고리즘)

  • Moon, Dae-Sung;Jung, Seung-Hwan;Kim, Tae-Hae;Chung, Yong-Wha;Moon, Ki-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.93-100
    • /
    • 2005
  • In this paper, we describe biometric watermarking techniques for secure user verification on the remote, multimodal biometric system employing both fingerprint and face information, and compare their effects on verification accuracy quantitatively. To hide biometric data with watermarking techniques, we first consider possible two scenarios. In the scenario 1, we use a fingerprint image as a cover work and hide facial features into it. On the contrary, we hide fingerprint features into a facial image in the Scenario 2. Based on the experimental results, we confirm that the Scenario 2 is superior to the Scenario 1 in terms of the verification accuracy of the watermarking image.

An Embedded Watermark into Multiple Lower Bitplanes of Digital Image (디지털 영상의 다중 하위 비트플랜에 삽입되는 워터마크)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.6 s.312
    • /
    • pp.101-109
    • /
    • 2006
  • Recently, according to the number of internet in widely use and the development of the related application program, the distribution and use of multimedia content(text, images, video, audio etc.) is very easy. Digital signal may be easily duplicated and the duplicated data can have same quality of original data so that it is difficult to warrant original owner. For the solution of this problem, the protection method of copyright which is encipher and watermarking. Digital watermarking is used to protect IP(Intellectual Property) and authenticate the owner of multimedia content. In this paper, the proposed watermarking algerian embeds watermark into multiple lower bitplanes of digital image. In the proposed algorithm, original and watermark images are decomposed to bitplanes each other and the watermarking operation is executed in the corresponded bitplane. The position of watermark image embedded in each bitplane is used to the watermarking key and executed in multiple lower bitplane which has no an influence on human visual recognition. Thus this algorithm can present watermark image to the multiple inherent patterns and needs small watermarking quantity. In the experiment, the author confirmed that it has high robustness against attacks of JPEG, MEDIAN and PSNR but it is weakness against attacks of NOISE, RNDDIST, ROT, SCALE, SS on spatial domain when a criterion PSNR of watermarked image is 40dB.

A Study on Semi-fragile Watermarking for Robust Authentication on Image Compression (영상압축에 강인한 변질검증 워터마킹에 관한 연구)

  • Ahn, Sung-Cheol;Lee, Kyoung-Hak;Park, Hwa-Bum;Ko, Hyung-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12C
    • /
    • pp.1165-1172
    • /
    • 2006
  • The rapid progress of the software has enabled individuals to copy and remark digital contents, which was only done by professionals. As a solution for the problems, contents producer needs to have certification and inspection of its contents and hold the proprietary right. A fragile watermarking method is able to detect the distortion and damage of watermarked image, but the watermark is also fragile on standardized image compression. That is the problem of fragile watermarking technique. We propose semi-fragile watermarking technique that is robust in the image processing such as JPEG compression used on computer, but it is fragile on the addition of noise and other attacks. In the proposed method, we can generate the watermarks of an image from the relationship between two block coefficients, also the generated watermark is inserted into insensible part of HVS(Human Visual System) after processing DCT(Discrete Cosine Transform) and using quantization. As a result, on the spatial domain, high detection of distortion has been possible even in slight changes, and could detect the corrupted blocks on image. Therefore, it is simple to judge the pixels at which some location has been changed in the space.

Color Image Watermarking Using Human Visual System (인간시각시스템을 고려한 칼라 영상 워터마킹)

  • Lee, Joo-Shin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.6 no.2
    • /
    • pp.65-70
    • /
    • 2013
  • In this paper, we proposed color image watermarking using human visual system. A watermark is embedded by transforming a color image of RGB coordinate into a color image of HSI coordinate with considering that chromatic components are less sensitive than achromatic components. Watermark is embedded in the frequency domain of the chromatic channels by using discrete cosine transform. Watermark is extracted from watermarked image by using inverse discrete cosine transform. To verify the proposed method, a standard image and a fingerprint image are used for the original image and the watermark image, respectively. Simulation results are satisfied with invisibility and robustness from attacks as image compression.