• Title/Summary/Keyword: Image watermarking

Search Result 627, Processing Time 0.026 seconds

UCC-Resilient HD Content Watermarking Scheme on DCT Compressed Domain (UCC 편집에 강인한 DCT 압축영역 기반 고화질 영상 워터마킹 기법)

  • Kim, Jung-Youn;Nam, Je-Ho
    • Journal of Broadcast Engineering
    • /
    • v.13 no.4
    • /
    • pp.489-500
    • /
    • 2008
  • We propose a novel high-definition content watermarking algorithm that is highly feasible in UCC (User Created Contents) environment. We begin by addressing an association between broadcasting content and UCC in a view of copyrights, then present watermark requirements by analyzing various UCC editing-effect. Also, we provide a brief review of previous watermarking techniques that are supposed to satisfy the requirements. Our proposed scheme inserts a invisible watermark into both DC and AC components on $8{\times}8$ block DCT domain and extracts them after synchronization using DC image. Experimental results show that our technique satisfies the requirements of invisibility and robustness to a variety of attacks such as rotation, scaling, cropping, and JPEG compression, etc. Note that the proposed scheme is highly resilient to UCC edit attacks that are combined by many different types of watermark attacks.

A Study on Effective Digital Watermark Generation Method to Overcome Capacity Limit (저장 한계를 극복한 효율적인 디지털 워터마크 생성 방법 연구)

  • Kim Hee-Sun;Cho Dae-Jea
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.343-350
    • /
    • 2005
  • During the design of a successful digital watermarking systems, Pseudo-Noise(PN) sequences are widely used to modulate information bits into watermark signals. In this method, the number of bits that can be hidden within a small image by means of frequency domain watermarking is limited. In this paper, we show the possibility of introducing chaotic sequences into digital watermarking systems as potential substitutes to commonly used PN-sequences. And we propose a method that transforms the text to chaotic sequence. In our current implementation, we show how the sample text is expressed by an implied unit data(watermark) and the implied unit data is regenerated into the original left. Because we use this implied data as watermark for information hiding, we can insert much more watermark compared with previous method.

  • PDF

Robust Blind Watermarking in Medical Images Using by Polar Transformation (의료영상에서 Polar 변환을 적용한 강인한 블라인드 워터마킹 기법)

  • 김태호;남기철;박무훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.241-246
    • /
    • 2004
  • Medical images are being managed more by PACS in general medical institutions. It is important to protect patients from being invaded their privacy related to the images. It is also necessary to confirm the ownership, the right of properity of the medical images and notice whether the data are modified. In this paper, we propose a robust watermarking against RST attacks in medical images on the PACS. The proposed scheme modifies and improves Log-Polar Mapping and Fourier Mellin Transform in order to realize and recover serious image degradation and watermark data loss caused by the conversion between cartesian coordinate and log-polar coordinate. We used the radius and theta Look Up Table to solve the realization of the Fourier Mellin Transform, and inserted a watermark into 2D-DFT magnitudes using Spread Spectrum. Experimental results shows that this method are robust to several attack.

  • PDF

(Content-Based Video Copy Detection using Motion Directional Histogram) (모션의 방향성 히스토그램을 이용한 내용 기반 비디오 복사 검출)

  • 현기호;이재철
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.5_6
    • /
    • pp.497-502
    • /
    • 2003
  • Content-based video copy detection is a complementary approach to watermarking. As opposed to watermarking, which relies on inserting a distinct pattern into the video stream, video copy detection techniques match content-based signatures to detect copies of video. Existing typical content-based copy detection schemes have relied on image matching which is based on key frame detection. This paper proposes a motion directional histogram, which is quantized and accumulated the direction of motion, for video copy detection. The video clip is represented by a motion directional histogram as a 1-dimensional graph. This method is suitable for real time indexing and counting the TV CF verification that is high motion video clips.

A Robust Watermarking Method Using Binary Images (이진 영상을 사용하는 강인한 워터마킹 기법)

  • Shin, Chang-Doon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.630-633
    • /
    • 2007
  • In this paper, a blind watermarking method using binary images as watermarks is proposed. In order to enhance the detection capability against various attacks that transform watermarked image, the method uses asymmetric thresholds for inserting and detecting. Also, in order to reduce errors in the detected value of watermarks according to small changes in the coefficient values when detecting watermarks, it set the range for movement variation of the coefficients and lowered the sensitivity of variation by ignoring the variations that fall into this range. The experimental results show that the proposed method has good quality and is robust to various attacks such as the JPEG lossy compression, noise addition, cropping, blurring etc.

  • PDF

A Study on the Selection of the Optimal Region for Digital Watermarking in the Frequency Domain (주파수 영역에서의 최적의 워터마크 삽입영역 선정에 대한 연구)

  • Oh, Jae-Ho;Kim, Sun-Hyung;Lim, Hae-Jin
    • The KIPS Transactions:PartB
    • /
    • v.9B no.4
    • /
    • pp.459-464
    • /
    • 2002
  • In this paper, we propose a private digital watermarking method based on a wavelet transform to protect digital contents copyrights. We find out the optimal watermark insertion region and the optimal amount of watermark in order to satisfy robustness and imperceptibility against various attacks such as noise, compression, collusion, clipping, scaling to transfer the contents safely. Through this experiment, we could find out the adequate location of watermark insertion and proper amount of watermark, and transfer the watermarked image safely.

Performance Evaluation of New Signatures for Video Copy Detection (비디오 복사방지를 위한 새로운 특징들의 성능평가)

  • 현기호
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.1
    • /
    • pp.96-102
    • /
    • 2003
  • Video copy detection is a complementary approach to watermarking. As opposed to watermarking, which relies on inserting a distinct pattern into the video stream, video copy detection techniques match content-based signatures to detect copies of video. Existing typical content-based copy detection schemes have relied on image matching. This paper proposes two new sequence matching techniques for copy detection and compares the performance with color techniques that is the existing techniques. Motion, intensity and color-based signatures are compared in the context of copy detection. Comparison of experimental results are reported on detecting copies of movie clips.

Effective Watermark Detection Using Asymmetric Thresholds (비대칭 임계치를 이용한 효과적인 워터마크 검출 방법)

  • Shin, Chang-Doon;Oh, Hae-Seok
    • The KIPS Transactions:PartB
    • /
    • v.10B no.6
    • /
    • pp.619-628
    • /
    • 2003
  • In this paper, an effective watermark detection technique in the wavelet transform domain is proposed. In this proposed method, the image is 2-level wavelet transformed, and then the watermark with a binary logo is embedded into middle band except baseband and high band to consider Invisibility and robustness. In this paper, we use an asymmetric thresholds watermarking (ATW) in which detection threshold is higher than inserting threshold in order to enhance watermark detection ratio in attacked images. In watermark detection phase, the detection value is not changed when the difference of the selected wavelet neighboring coefficient pairs Is smaller than specific value. The experimental results show that the proposed method has good quality and is robust to various attacks such as the JPEG lossy compression, noise addition, cropping, blurring, etc.

A Secure Asymmetric Watermarking to the Public Key Attack (공개키 공격에 안전한 비대칭 워터마킹)

  • Li, De;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.173-180
    • /
    • 2008
  • In this paper, we proposed an algorithm for an effective public key and private key generation to implement a secure asymmetric watermarking system against the public key attack. The public key and private key generation is based on the linear transformation using a special matrix and the keys are designed to be able to have high correlation value. We also proposed a counter plan of public key attack. This method uses a multiple public key generation and distribution. As the results, the correlation value between the public key and the private key is high in the watermarked image. After the public key attack. this can detect the correlation by using other public key.

  • PDF

Digital Watermarking of Medical Images (의료영상의 디지털 워터마킹)

  • Lee, Sang-Bock;Lee, Sam-Yol;Lee, Jun-Haeng
    • Journal of radiological science and technology
    • /
    • v.27 no.2
    • /
    • pp.13-19
    • /
    • 2004
  • This study proposes how to insert a strong watermark creating a big change in the areas of edge and texture. While conversion by existing Fourier transformation can acquire information for all ranges of frequency domain from the image, Wavelet transformation can manipulate edge and texture area selectively. Therefore, through wavelet transformation concerned area may be selected and watermarks in copyright formation are inserted. Our proposed algorithm was compared to Xia's watermarking technique using wavelet transformation. Its fidelity and robustness were tested with attack methods used in existing papers and it turns out that the proposed algorithm using HVS properties is more superior to Xia's techniques.

  • PDF