• Title/Summary/Keyword: Image watermarking

Search Result 627, Processing Time 0.024 seconds

H.265/HEVC Video Watermarking Method with High Image Quality (HEVC기반의 비디오를 위한 워터마킹 알고리즘)

  • Seo, Young-Ho;Lee, Yong-Seok;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.24 no.1
    • /
    • pp.97-104
    • /
    • 2019
  • In the field of video watermarking, which adds a time axis to the watermarking of the existing still image, it is important to embed a watermark at a level that can claim copyright while minimizing the overall video quality. In this paper, we focus on the fact that B slices refer to blocks of I and P slices in the Random Access compression method of HEVC. Therefore, We propose that watermark is embedded only in I and P slices and extracted in I, P, and B slices. This can minimize the decreases of the overall image quality of the image and protect the copyright of the B slice without directly embedding the watermark.

Multi-Watermarking for Image Authentication Based on DWT Coefficients (이미지 인증을 위한 DWT 계수기반 다중 워터마킹)

  • Lee Hye-Ran;Rhee Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.113-122
    • /
    • 2005
  • In this paper, we propose a multi-watermarking algorithm to satisfy two purposes: fragility against malicious attacks and robustness against non-malicious attacks. The algorithm can be used for image authentication using coefficients of Discrete Wavelet Transform(DWT). In the proposed method, watermarks are generated by combining binary image with some features extracted from the subband LL3, and then they are embedded into both the spatial and frequency domain. That is, on the spatial domain they are embedded into the Least Significant Bit(LSB) of all pixels of image blocks, and on the frequency domain the coefficients of the subband LH2 and HL2 are adjusted according to the watermarks. Thus the algorithm not only resists malicious attack but also permits non-malicious attacks such as blurring, sharpening, and JPEG compression.

A Digital Watermarking Technique for MPEG Image/Video Compression (MPEG 영상/비디오 압축을 위한 디지털 워터마킹 기법)

  • Yoo Byoung-Seok;Choi Hyun-Jun;Seo Young-Ho;Kim Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5C
    • /
    • pp.406-414
    • /
    • 2005
  • The necessity for a technique to protect intellectual property of a digital content has been increasing, especially for the image/video contents which are the most favorite because of their high information-intensive property. According to this demand, this paper proposed a digital watermarking algorithm, which is recognized as the most promising technique. This algorithm targets MPEG compression system and the watermarking process is to be performed during the compression process. It inserts watermark only in Y components of I-frames. Experimental results showed that the proposed method satisfied both imperceptibility and robustness against various attacks. The PSNR difference between the compressed images(the average compression ratio was about 27:1 with Y:Cb:Cr=4:2:0 color format for TM5-based compression) with and without watermarking was only 1.8dB ($4.2\%$). In each case that the resulting image after an attack was reusable the normalized correlation between the extracted watermark and the original one was above 0.8.

A Study on Integrity Verification and Tamper Detection of Digital Image (디지털 영상의 무결성 검증과 변형 검출에 관한 연구)

  • Woo, Chan-Il;Goo, Eun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.10
    • /
    • pp.203-208
    • /
    • 2019
  • Digital watermarking was developed to protect copyright by discouraging the illegal copying of digital content. On the other hand, recently, watermarking has also been used to verify the integrity of digital content, such as medical images, and detect illegal manipulation or distortion locations. Watermarking should be tenacious so as to protect copyright from illegal copying and should remain firm to the content through a range of attacks, such as distortion or filtering. At the same time, however, it should be removed easily even in a slight transformation of the material to verify the integrity. Therefore, this paper proposes a watermarking technique that easily checks and verifies the deformation or manipulation of digital images. In the proposed method, the entire image was examined in $16{\times}16$ blocks to check for deformation of the image. When deformation was detected, further inspection proceeded in $4{\times}4$ blocks and the location where deformation occurred was identified.

Reversible Watermarking in JPEG Compression Domain (JPEG 압축 영역에서의 리버서블 워터마킹)

  • Cui, Xue-Nan;Choi, Jong-Uk;Kim, Hak-Il;Kim, Jong-Weon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.121-130
    • /
    • 2007
  • In this paper, we propose a reversible watermarking scheme in the JPEG compression domain. The reversible watermarking is useful to authenticate the content without the quality loss because it preserves the original content when embed the watermark information. In the internet, for the purpose to save the storage space and improve the efficiency of communication, digital image is usually compressed by JPEG or GIF. Therefore, it is necessary to develop a reversible watermarking in the JPEG compression domain. When the watermark is embedded, the lossless compression was used and the original image is recovered during the watermark extracting process. The test results show that PSNRs are distributed from 38dB to 42dB and the payload is from 2.5Kbits to 3.4Kbits where the QF is 75. Where the QF of the Lena image is varied from 10 to 99, the PSNR is directly proportional to the QF and the payload is around $1.6{\sim}2.8Kbits$.

An Implementation on the Digital Audio Watermarking for High Quality Audio

  • Park, Jong-Tae;Kang Hyeon RHEE
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.454-457
    • /
    • 2002
  • In this paper, we proposed digital audio watermarking algorithm for high quality audio. Nowadays, digital watermark used to confirm to digital copyright protection, not only digital image but also digital audio is active in the digital watermarking study. In this paper, we proposed digital audio watermarking algorithm using psychoacoustics model and MDCT/IMDCT (Modified Discrete Cosine Transform/Inverse Modified Discrete Cosine Transform) for the high quality audio watermark. In the proposed scheme, we used to 441KHz, 128kbps and stereo audio data for audio watermarking algorithm. Audio data is passed by MDCT; watermark can be inserted into the frequency domain with 256,1024 and 2048 interval.

  • PDF

Robust Image Watermarking using Quantization on the Lowest Wavelet Subband (웨이브렛 최저주파수 대역에서의 양자화를 이용한 강인한 영상 워터마킹)

  • 서용석;주상현;유원영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9C
    • /
    • pp.898-907
    • /
    • 2003
  • In this paper, we propose a new blind watermarking method that embeds a watermark on the lowest wavelet subband coefficients, while most watermarking techniques embed watermarks in the middle frequency range for robustness and fidelity. A new embedding algorithm for watermarking is proposed that embeds a bi-level watermark sequence into randomly selected wavelet coefficients on the lowest subband(LL) using a quantization in order to be robust. Experimental results prove our novel embedding strategy is invisible and good rate-distortion-robustness performance.

Digital Watermarking using Color Space Conversion

  • Kim, Hee-Soo;Jin-woo park;Eui-Yoon chung;Ha, Yeong-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.470-473
    • /
    • 2000
  • Digital watermarking is a technical solution to the copyright problem and is a necessary technique to protect copyright of multimedia content. Recently, there are many digital watermarking methods that deal in grey scale still images. However, only a few researchers are interested in digital watermarking fro video and color images. In this paper, we focus on digital watermarking for color images. At first, in order to embed the watermark signal in color image, we converted RGB color space to YCbCr color space which is a world-wide digital component video standard. In addition, we adopted the acceptable degree of color difference in order to keep the invisibility.

  • PDF

Secure and Novel Watermarking System Based on Complemented MLCA and 2D CAT

  • Li, Xiao-Wei;Yun, Jae-Sik;Cho, Sung-Jin;Kim, Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.393-396
    • /
    • 2010
  • A secure and novel watermarking system based on complemented Maximum Length Cellular Automata (MLCA) and Two-Dimension Cellular Automata Transform (2D CAT) is proposed. In this watermarking scheme, the original watermark which is first encrypted by complemented MLCA with the private keys, and the encrypted watermark is embedded into the CAT domain of the cover image. Experiment results show that this new method is more secure and provides robust performance against watermarking attacks.

  • PDF

Digital Image Watermarking Technique using Scrambled Binary Phase Computer Generated Hologram in Discrete Cosine Transform Domain (DCT영역에서 스크램블된 이진 위상 컴퓨터형성홀로그램을 이용한 디지털 영상 워터마킹 기술)

  • Kim, Cheol-Su
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.3
    • /
    • pp.403-413
    • /
    • 2011
  • In this paper, we proposed a digital image watermarking technique using scrambled binary phase computer generated hologram in the discrete cosine transform(DCT) domain. For the embedding process of watermark. Using simulated annealing algorithm, we would generate a binary phase computer generated hologram(BPCGH) which can reconstruct hidden image perfectly instead of hidden image and encrypt it through the scramble operation. We multiply the encrypted watermark by the weight function and embed it into the DC coefficients in the DCT domain of host image and an inverse DCT is performed. For the extracting process of watermark, we compare the DC coefficients of watermarked image and original host image in the DCT domain and dividing it by the weight function and decrypt it using descramble operation. And we recover the hidden image by inverse Fourier transforming the decrypted watermark. Finally, we compute the correlation between the original hidden image and recovered hidden image to determine if a watermark exits in the host image. The proposed watermarking technique use the hologram information of hidden image which consist of binary values and scramble encryption technique so it is very secure and robust to the various external attacks such as compression, noises and cropping. We confirmed the advantages of the proposed watermarking technique through the computer simulations.