• Title/Summary/Keyword: Image watermarking

Search Result 627, Processing Time 0.023 seconds

An Iterative Digital Image Watermarking Technique using Encrypted Binary Phase Computer Generated Hologram in the DCT Domain (DCT 영역에서 암호화된 이진 위상 컴퓨터형성 홀로그램을 이용한 반복적 디지털 영상 워터마킹 기술)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.3
    • /
    • pp.15-21
    • /
    • 2009
  • In this paper, we proposed an iterative digital image watermarking technique using encrypted binary phase computer generated hologram in the discrete cosine transform(OCT) domain. For the embedding process of watermark, using simulated annealing algorithm, we would generate a binary phase computer generated hologram(BPCGH) which can reconstruct hidden image perfectly instead of hidden image and repeat the hologram and encrypt it through the XOR operation with key image that is ramdomly generated binary phase components. We multiply the encrypted watermark by the weight function and embed it into the DC coefficients in the DCT domain of host image and an inverse DCT is performed. For the extracting process of watermark, we compare the DC coefficients of watermarked image and original host image in the DCT domain and dividing it by the weight function and decrypt it using XOR operation with key image. And we recover the hidden image by inverse Fourier transforming the decrypted watermark. Finally, we compute the correlation between the original hidden image and recovered hidden image to determine if a watermark exits in the host image. The proposed watermarking technique use the hologram information of hidden image which consist of binary values and encryption technique so it is very secure and robust to the external attacks such as compression, noises and cropping. We confirmed the advantages of the proposed watermarking technique through the computer simulations.

An Algorithm for Scaling Parameter Optimization of Watermarking using Random Dot Images (랜덤한 점분포를 가진 영상을 사용한 워터마킹에서 스켈링 파라메타의 최적화 알고리즘)

  • Lee, In-Jung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.6C
    • /
    • pp.901-906
    • /
    • 2004
  • For a digital image watermarking some autostereograms are used such as random dot images. In there, the extraction efficiency is good and the distortion rate is low. In this paper, we shall select an optimized scaling parameter which derives low distortion rate and high extraction efficiency, when we use a random dot images as like as autostereograms into some images except for extremely biased gray level images.

H/W Implementation of JPEG compatible fragile watermarking algorithm (JPEG 호환 프래절 워터마킹 알고리즘의 하드웨어 구현)

  • 김진헌;김승원
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1803-1806
    • /
    • 2003
  • This paper presents a H/W module that executes a fragile watermarking algorithm. The module inputs sequentially quantized DCT values, encodes watermark and then outputs watermarked DCT coefficients. A fragile and invisible watermarking algorithm is adopted, modified and enhanced here to reduce H/W size and image degradation. The module can be directly inserted between DCT quantizer and VLC encoder in wide spread JPEG/MPEG encoder. The module is expected to be used for real-time authentication purpose in DVR(Digital Video Recorder) or digital cameras.

  • PDF

Text Watermarking using Space Coding (Space Coding을 이용한 Text watermarking)

  • 황미란;추현곤;최종욱;김회율
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.117-120
    • /
    • 2002
  • In this paper, we propose a new text watermarking method using space coding and PN sequence. A PN sequence generated from user message modifies the space between words in each line. The detection can be done without original text image using the average space with in the text. Experimental results show that proposed method has the invisible property and robustness to the attack such as the elimination of words in the text.

  • PDF

Study of robust watermarking method in medical image (의료영상에서의 강인한 워터마킹 기법에 관한 연구)

  • 남기철;박무훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.255-258
    • /
    • 2003
  • Recently, Digital Watermarking is used to authenticate data and to determine whether the data are distorted or not in medical images which is digitalized. The Fourier Mellin method using the Fourier Transform and the Log-Polar coordinate transform gets an invariant feature for RST distortion in images. But there are several problems in the real materialization. Interpolation of the image value should be considered according to the pixel position and so a watermark loss, original image distortion, numerical approximation is happened. Therefore there should be solved to realization of the Fourier Mellin method. Using the Look up table, there reduce the data loss caused by the conversion between Rectangular and Polar coordinate. After diagnose, medical images are transformed the Polar coordinate and taken the Discrete Fourier transform in the center of ROI region. Maintaining the symmetry in Fourier magnitude coefficient, the gaussian distributed random vectors and binary images are embedded in medical images.

  • PDF

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images

  • Zhang, Heng;Wang, Chengyou;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.13 no.2
    • /
    • pp.385-399
    • /
    • 2017
  • Nowadays, with the development of signal processing technique, the protection to the integrity and authenticity of images has become a topic of great concern. A blind image authentication technology with high tamper detection accuracy for different common attacks is urgently needed. In this paper, an improved fragile watermarking method based on local binary pattern (LBP) is presented for blind tamper location in images. In this method, a binary watermark is generated by LBP operator which is often utilized in face identification and texture analysis. In order to guarantee the safety of the proposed algorithm, Arnold transform and logistic map are used to scramble the authentication watermark. Then, the least significant bits (LSBs) of original pixels are substituted by the encrypted watermark. Since the authentication data is constructed from the image itself, no original image is needed in tamper detection. The LBP map of watermarked image is compared to the extracted authentication data to determine whether it is tampered or not. In comparison with other state-of-the-art schemes, various experiments prove that the proposed algorithm achieves better performance in forgery detection and location for baleful attacks.

Digital watermarking technique using Computer-Generated Hologram and optoelectrical extraction algorithm (컴퓨터 형성 홀로그램과 광전자적 추출 알고리즘을 이용한 디지털 워터마킹 방법)

  • Cho, Kyu-Bo;Shin, Chang-Mok;Kim, Soo-Joong
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.1
    • /
    • pp.31-37
    • /
    • 2006
  • We propose a digital watermarking technique using a computer generated hologram. The proposed method uses two random patterns separated from the computer generated hologram (CGH). One of those is embedded into the original image as hidden watermark information and then the reconstructed image can be obtained by an optical decoding algorithm with the other one as a decoding key. We analyze an occlusion of the watermarked image that is the original image containing the hidden pattern. The embedding process is performed digitally and reconstruction optically Computer simulation and an optical experiment are shown in support of the proposed technique.

The Effective Protection Mechanism for Digital Images using Transform of the Wavelet in Frequency Domain (주파수 영역에서 웨이브릿 변환을 이용한 디지털 이미지의 효과적인 보호)

  • 최우진;오무송
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.6
    • /
    • pp.937-942
    • /
    • 2002
  • The use of digital imaging technique and digital contents based on internet has grown rapidly for last several years, and the needs of digital image protection become more important. For the purpose of copyright protection on digital image, the verification of authentication techniques like content authentication, ownership authentication, illegal copy and etc are needed. Digital watermarking, the invisible encryption technique to insert digital watermark into image the sophisticated perceptual information should be used for providing transparency and robustness of images on watermarking process. In this paper, we implement the algorithm for preventing forged attack, ownership protection and authentication by transforming the wavelet algorithms in frequency domain in terms of human visual system.

An Energy-Based Watermarking Algorithm for Digital Images (디지털 영상을 위한 에너지 기반 워터마킹 알고리즘)

  • Choi Dong-Jin;Hwang Dong-Guk;Lee Sang-Ju;Lee Woo-Ram;Jun Byoung-Min
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.2
    • /
    • pp.87-94
    • /
    • 2005
  • In this paper, we present a new watermarking algorithm in which a watermark is created based on the energy of the original image and embedded into the image by replacement. The watermark is adjusted to have a certain proportional amount of energy based on one of the original image and embedded into the DFT magnitude component replacing original coefficients. This scheme reduces degree of quality degradation in a watermarked image by maintaining energy and strengthen robustness against attacks by embedding a strong watermark. From the result of experiment, we confirmed that the proposed algorithm had high invisibility of 47.6dB of PSNR and could reconstruct 98.9% of message on average.

  • PDF

A Fragile Watermarking Scheme Using a Arithmetic Coding (산술부호화를 이용한 연성 워터마킹 기법)

  • Piao, Cheng-Ri;Paek, Seung-Eun;Han, Seung-Soo
    • The Journal of Information Technology
    • /
    • v.9 no.4
    • /
    • pp.49-55
    • /
    • 2006
  • In this paper, a new fragile watermarking algorithm for digital image is presented, which makes resolving the security and forgery problem of the digital image to be possible. The most suitable watermarking method that verifies the authentication and integrity of the digital image is the Wong's method, which invokes the hash function (MD5). The algorithm is safe because this method uses the hash function of the cryptology. The operations such as modulus, complement, shift, bitwise exclusive-or, bitwise inclusive-or are necessary for calculating the value of hash function. But, in this paper, an Arithmetic encoding method that only includes the multiplication operation is adopted. This technique prints out accumulative probability interval, which is obtained by multiplying the input symbol probability interval. In this paper, the initial probability interval is determined according to the value of the key, and the input sequence of the symbols is adjusted according to the key value so that the accumulative probability interval will depend on the key value. The integrity of the algorithm has been verified by experiment. The PSNR is above the 51.13db and the verifying time is $1/3{\sim}1/4$ of the verifying time of using the hash function (MD5), so, it can be used in the real-time system.

  • PDF