• Title/Summary/Keyword: Image watermarking

Search Result 627, Processing Time 0.03 seconds

Log-Polar Image Watermarking based on Invariant Centroid as Template (불변의 무게중심을 템플릿으로 이용한 대수-극 좌표계 영상 워터마킹 기법)

  • 김범수;유광훈;김우섭;곽동민;송영철;최재각;박길흠
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.341-351
    • /
    • 2003
  • Digital image watermarking is the method that can protect the copyright of the image by embedding copyright information, which is called watermark. Watermarking must have robustness to intentional or unintentional data changing, called attack. The conventional watermarking schemes are robust to waveform attacks such as image compression, filtering etc. However, they are vulnerable to geometrical attacks such as rotation, scaling, translation, and cropping. Accordingly, this paper proposes new watermarking scheme that is robust to geometrical attacks by using invariant centroid. Invariant centroid is the gravity center of a central area in a gray scale image that remains unchanged even when the image is attacked by RST including cropping and proposed scheme uses invariant centroids of original and inverted image as the template. To make geometrically invariant domain, template and angle compensated Log -Polar Map(LPM) is used. Then Discrete Cosine Transform(DCT) is performed and the watermark is embedded into the DCT coefficients. Futhermore, to prevent a watermarked image from degrading due to interpolation during coordinate system conversion, only the image of the watermark signal is extracted and added to the original image. Experimental results show that the proposed scheme is especially robust to RST attacks including cropping.

A Watermarking Technique using Block-based Wavelet Transform (블록 기반 웨이블릿 변환을 이용한 워터마킹 기법)

  • 이정수;김회율
    • Journal of Broadcast Engineering
    • /
    • v.5 no.2
    • /
    • pp.290-299
    • /
    • 2000
  • In this paper, we introduce a watermarking technique using a block-based wavelet transform. Our objective is to achieve the invisibility of the watermark embedded into an image. That is, the difference between the original image and the watermarked image is perceptually invisible. Also, we propose a scheme that is robust to common Image processing by embedding the watermark into ail frequencies. Especially, we certified that the proposed watermarking algorithm was robust to JPEG compression and noise. In addition, our detection scheme can detect the manipulated area for the purpose of authentication. From the experimental results, we conclude that the proposed watermarking system satisfied the objectives proposed in this paper.

  • PDF

Performance Comparison of Frequency-Based Watermarking Methods (주파수 기반 워터마킹 기법의 성능 비교)

  • Yim, Kyoung-Jin;Choi, Tae-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.38 no.5
    • /
    • pp.65-76
    • /
    • 2001
  • In this paper, performance of frequency-based watermarking methods is compared, which are used to protect copyright of image data. For performance comparison of each transform method, a test image is transformed into frequency domain by a full- and block-discrete cosine transforms and wavelet transform, and after general image processing, robustness of each transform is evaluated with using the same watermark signals. Simulation results show that the watermarking method based on DCTs are more robust than WT. Especially, $8{\times}8$ BDCT is most robust for JPEG lossy compression and sharpening, while $8{\times}8$ FDCT is best. for smoothing and scaling. In addition, watermarking based on BDCT shows decreasing robustness for a larger block size, compared with general image processing.

  • PDF

A Study on the Validity of Image Block in a Public Watermarking (퍼블릭 워터마킹에서 영상 블록의 유효성에 대한 연구)

  • Kim, Hyo-Cheol;Kim, Hyeon-Cheol;Yu, Gi-Yeong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.4
    • /
    • pp.344-352
    • /
    • 2001
  • In this paper, we propose a cross-correlation property and a related technique based on the validity of image block in a public watermarking and we embed messages into the high frequency band in the DCT domain because of its imperceptibility and fragility. As a result, we were able to inspect the identity of valid block between error corrected original images and watermarked images through experiments. And we confirmed the viability of this cross-correlation as an application for future public watermarking.

  • PDF

Reversible Watermarking Based On Advanced Histogram Shifting (개선된 히스토그램 쉬프팅 기법을 이용한 리버서블 워터마킹)

  • Hwang, Jin-Ha;Kim, Jong-Weon;Choi, Jong-Uk
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.39-44
    • /
    • 2007
  • In this paper, we propose a reversible watermarking method to recover an original image after the watermark has been extracted. Most watermarking algorithms cause degradation of image quality in original digital content in the process of embedding watermark. In the proposed algorithm, the original image can be obtained when the degradation is removed from the watermarked image after extracting watermark information. In the proposed method, we utilize histogram shifting concept and Location Map structure. We could solve the Filp-Flop problem by using Location Map structure and enlarge the information embedding capacity by embedding recursively. Experimental results demonstrate that the embedding information as large as 120k bits can be realized while the invisibility as high as 41dB can be maintained.

Digital Image Watermarking Schemes Based on GCST and SVD (GCST-SVD 기반 디지털 영상 워터마킹 방법)

  • Lee, Juck-Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.14 no.3
    • /
    • pp.154-161
    • /
    • 2013
  • In this paper, Gabor cosine and sine transform considered as human visual filter is applied to watermarking methods for digital images. Four algorithms by using singular values or principal components of SVD in the frequency domain are proposed for watermark embedding and extraction. Two dimensional image is used as an embedded watermark. To measure the similarity between the embedded watermark image and the extracted one, a normalized correlation value is computed for the comparison of the four proposed methods with various attacks. Extracted watermark images are also provided for visual inspection. The proposed GCST-SVD method which embeds a watermark image into the lowest vertical or horizontal ac frequency band can provide useful watermarking algorithm with high correlation values and visual watermark features from experimental results for various attacks.

Zero-Watermarking Algorithm in Transform Domain Based on RGB Channel and Voting Strategy

  • Zheng, Qiumei;Liu, Nan;Cao, Baoqin;Wang, Fenghua;Yang, Yanan
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1391-1406
    • /
    • 2020
  • A zero-watermarking algorithm in transform domain based on RGB channel and voting strategy is proposed. The registration and identification of ownership have achieved copyright protection for color images. In the ownership registration, discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) are used comprehensively because they have the characteristics of multi-resolution, energy concentration and stability, which is conducive to improving the robustness of the proposed algorithm. In order to take full advantage of the characteristics of the image, we use three channels of R, G, and B of a color image to construct three master shares, instead of using data from only one channel. Then, in order to improve security, the master share is superimposed with the copyright watermark encrypted by the owner's key to generate an ownership share. When the ownership is authenticated, copyright watermarks are extracted from the three channels of the disputed image. Then using voting decisions, the final copyright information is determined by comparing the extracted three watermarks bit by bit. Experimental results show that the proposed zero watermarking scheme is robust to conventional attacks such as JPEG compression, noise addition, filtering and tampering, and has higher stability in various common color images.

Image Watermarking Robust to Geometrical Attacks based on Normalization using Invariant Centroid (불변의 무게중심을 이용한 영상 정규화에 기반한 기하학적 공격에 강인한 워터마킹)

  • 김범수;최재각
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.3
    • /
    • pp.243-251
    • /
    • 2004
  • This paper proposes a digital image watermarking scheme, which is robust to geometrical attacks. The method improves image normalization-based watermarking (INW) technique that doesn't effectively deal with geometrical attacks with cropping. Image normalization is based on the moments of the image, however, in general, geometrical attacks bring the image boundary cropping and the moments are not preserved original ones. Thereafter the normalized images of before and after are not same form, i.e., the synchronization is lost. To solve the cropping problem of INW, Invariant Centroid (IC) is proposed in this paper. IC is a gravity center of a central area on a gray scale image that is invariant although an image is geometrically attacked and the only central area, which has less cropping possibility by geometrical attacks, is used for normalization. Experimental results show that the IC-based method is especially robust to geometrical attack with cropping.

Digital watermarking using binary phase hologram and optical interferometer (이진 위상 홀로그램과 광학적 간섭계를 이용한 디지털 워터마킹)

  • 김병열;서동환;조규보;신창목;김수중;김철수
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.4
    • /
    • pp.377-382
    • /
    • 2003
  • We propose a new optical watermarking method, which can protect the copyright of digital data, using a binary phase hologram and a Mach-Zehnder interferometer. Using a simulated annealing algorithm, the binary phase hologram of the mark image to be hidden is designed. We obtained a watermarked image by linearly superposing the hologram, which is the watermark, in the original image. The extraction processing of the mark image from the watermarked image is achieved by placing the phase-modulated watermarked image on a LCD in one path and the phase-modulated original image on another LCD in the other path in the Mach-Zehnder interferometer. The mark image was obtained by inverse Fourier transforming the phase modulated interference intensity. We confirmed that the proposed method is robust for the cropped images through computer simulation, and we implemented it optically using LCDs which are phase modulation devices.

Embedding Binary Watermark Image using DWT Coefficients (이산 웨이블릿 변환계수를 이용한 이진 워터마크 영상)

  • Park, Kwang-Chae;Bae, Ceol-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6317-6321
    • /
    • 2014
  • Multimedia documents can be transferred quickly and easily across the Internet, and has attracted considerable interest in multimedia security and multimedia copyright protection. This paper proposes an animage watermarking scheme embedding a binary watermark image using Discrete Wavelet Transform (DWT) coefficients. The original image is transformed to the wavelet domain and decomposed in subbands. The binary watermark image, as a sequence of bits, is embedded into the middle frequency subbands. The original image is not needed to detect the watermark image. The proposed method detected fewer watermark bits but produced an approximately 10dB higher PSNR than the max/min method.