• Title/Summary/Keyword: Image watermarking

Search Result 627, Processing Time 0.027 seconds

A Multi-Stage Encryption Technique to Enhance the Secrecy of Image

  • Mondal, Arindom;Alam, Kazi Md. Rokibul;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo;Morimoto, Yasuhiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2698-2717
    • /
    • 2019
  • This paper proposes a multi-stage encryption technique to enhance the level of secrecy of image to facilitate its secured transmission through the public network. A great number of researches have been done on image secrecy. The existing image encryption techniques like visual cryptography (VC), steganography, watermarking etc. while are applied individually, usually they cannot provide unbreakable secrecy. In this paper, through combining several separate techniques, a hybrid multi-stage encryption technique is proposed which provides nearly unbreakable image secrecy, while the encryption/decryption time remains almost the same of the exiting techniques. The technique consecutively exploits VC, steganography and one time pad (OTP). At first it encrypts the input image using VC, i.e., splits the pixels of the input image into multiple shares to make it unpredictable. Then after the pixel to binary conversion within each share, the exploitation of steganography detects the least significant bits (LSBs) from each chunk within each share. At last, OTP encryption technique is applied on LSBs along with randomly generated OTP secret key to generate the ultimate cipher image. Besides, prior to sending the OTP key to the receiver, first it is converted from binary to integer and then an asymmetric cryptosystem is applied to encrypt it and thereby the key is delivered securely. Finally, the outcome, the time requirement of encryption and decryption, the security and statistical analyses of the proposed technique are evaluated and compared with existing techniques.

A Digital Watermarking Algorithm Using Successive Subband Quantization and Human Visual System (연속적 부대역 양자화와 인간 시각 시스템을 이용한 디지털 워터마킹 알고리듬)

  • Gwon, Seong-Geun;Gwon, Gi-Gu;Ban, Seong-Won;Park, Gyeong-Nam;Ha, In-Seong;Gwon, Gi-Ryong;Lee, Geon-Il
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.39 no.2
    • /
    • pp.45-53
    • /
    • 2002
  • A wavelet-based digital watermarking algorithm is proposed that uses the successive subband quantization and human visual system (HVS). After an original image is decomposed into 4-level by the discrete wavelet transform, perceptually significant coefficients (PSC) of each subband excluding the lowest level subband are utilized to embed the watermark. PSC of the baseband ate chosen according to their amplitude and they are slightly modified to embed the watermark by a conventional embedding method. By the successive subband quantization, PSC of the high frequency subband are chosen and slightly modified according to the HVS. We tested the performance of the proposed algorithm compared with the conventional watermarking algorithm by computer simulation. Experimental results show that the proposed watermarking algorithm produces a better invisibility and robustness than the conventional algorithm.

The High-Reliable Image Authentication Technique using Histogram Compensation (히스토그램 보정을 이용한 고신뢰성 영상 인증 기법)

  • Kim, Hyo-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.7
    • /
    • pp.1088-1094
    • /
    • 2010
  • Image authentication algorithms have to discriminate forged contents in the various critical fields of military, medical services, digital documents. They must ensure perceptual invisibility and fragility against malicious attacks. It is desirable that watermarking algorithms support sufficient insertion capacity and blind feature. And, high reliable algorithms that can eliminate false-positive and false-negative errors are needed in the watermark extraction process. In this paper, we control coefficients of high frequency band in a DCT domain and compensate brightness histogram for high reliability. As a result, we found that the proposed algorithm guarantee various requirements such as perceptual invisibility with high PSNR values, fragility, high reliability and blind feature. In addition, experiment results show that the proposed algorithm can be used steganographic applications by sufficient capacity of watermark.

A RST Resistant Logo Embedding Technique Using Block DCT and Image Normalization (블록 DCT와 영상 정규화를 이용한 회전, 크기, 이동 변환에 견디는 강인한 로고 삽입방법)

  • Choi Yoon-Hee;Choi Tae-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.93-103
    • /
    • 2005
  • In this paper, we propose a RST resistant robust logo embedding technique for multimedia copyright protection Geometric manipulations are challenging attacks in that they do not introduce the quality degradation very much but make the detection process very complex and difficult. Watermark embedding in the normalized image directly suffers from smoothing effect due to the interpolation during the image normalization. This can be avoided by estimating the transform parameters using an image normalization technique, instead of embedding in the normalized image. Conventional RST resistant schemes that use full frame transform suffer from the absence of effective perceptual masking methods. Thus, we adopt $8\times8$ block DCT and calculate masking using a spatio-frequency localization of the $8\times8$ block DCT coefficients. Simulation results show that the proposed algorithm is robust against various signal processing techniques, compression and geometrical manipulations.

Secret Sharing Scheme using Gray Code based on Steganography (스테가노그라피 기반에서 그레이코드를 사용한 비밀공유 기법)

  • Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik;Kim, Hyoung-Joong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.96-102
    • /
    • 2009
  • Due to the rapid growth of the Internet, it is possible to distribute the digital content efficiently. However, the need for image data protection and secret communication technique is also on the rise because of an infringement of the copyright by malicious attackers. Shamir and Lin-Tsai proposed simple secret image encryption algorithms based on the principle of secret sharing, respectively. However, their secret sharing schemes have a serious problem which can be declined the image quality and it is possible for third party to know embed information. In this paper, we propose a new secret sharing scheme using gray code that can be increased the image quality and security. As a result of our experiment, the proposed scheme is not only shown of good image quality and but also provide enhanced security compare with Shamir and Lin-Tasi's schemes.

Efficient Optical Watermark Using Multiple Phase Wrapping and Real-Valued Functions (다중위상래핑과 실수값 함수를 이용한 효율적인 광 워터마킹)

  • Cho, Kyu-Bo;Seo, Dong-Hoan;Lee, Seung-Hee;Hong, Jae-Keun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.3
    • /
    • pp.10-19
    • /
    • 2009
  • In this paper, an efficient optical watermark method using multiple phase wrapping and real-valued decoding key is proposed. In the embedding process, two zero-padded original images placed in two quadrants on input plane are multiplied with two statistically independent random phase patterns and are Fourier transformed, respectively. Two encoded images are obtained by taking the real-valued data from these Fourier transformed images. And then two phase-encoded patterns, used as a hidden image and a decoding key, are generated by the use of multiple phase wrapping from each of the encoded images. A transmitted image is made from the linear superposition of the weighted hidden images and a cover image. In reconstruction process, the mirror reconstructed images can be obtained at all quadrants by the inverse-Fourier transform of the product of the transmitted image and the decoding key. Computer simulation and optical experiment are demonstrated in order to confirm the proposed method.

Multi-Level Digital Watermarking for Color Image of Multimedia Contents (멀티미디어 컨텐츠의 컬러 영상에 대한 다중 레벨 디지털 워터마킹)

  • Park, Hung-Bog;Seo, Jung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.1946-1953
    • /
    • 2006
  • Because the embedded watermark of luminance component guarantees the extraction of ownership information when the color image is converted to gray scale image, the information of ownership right as to the luminance component is embedded in the luminance-chrominance color space such as YCbCr. Therefore, this paper proposes watermark embedding, extraction and authentication algorithm of color image. which considers the device and performance of multimedia contents service by focusing on the robustness and invisibility of watermark. The color image is converted from RGB color space to YCbCr color space, and then the properties of each component of Y(Luminance), Cb(Color Differences) and Cr(Color Differences) are considered in order to embed, extract and certify multi-level watermark in the frequency domain based on the wavelet. As a result, it can guaranteed the robustness for the JPEG compression and invisibility of watermark for multi-level.

A Rotation Resistant Logo Embedding Watermark on Frequency Domain (회전 변환에 강인한 주파수 영역 로고 삽입 워터마크 방법)

  • Lee, In-Jung;Lee, Hyoung;Min, Joon-Young
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2006.06a
    • /
    • pp.730-736
    • /
    • 2006
  • In this paper, we propose a rotation resistant robust logo embedding watermarking technique. Geometric manipulations make the detection process very complex and difficult. Watermark embedding ill the normalized image directly suffers from smoothing effect due to the interpolation during the image normalization. This can be avoided by estimating the transform parameters using image normalization technique, instead of embedding in the normalized image. Conventional rotation resistant schemes that use full frame transform. In this paper, we adopt $8{\times}8$ block DCT and calculate masking using a spatio-frequency localization of the $8{\times}8$ block DCT coefficients. Experimental results show that the proposed algorithm is robust against rotation process.

  • PDF

Adaptive Digital Watermarking with Perceptually Tuned Characteristic Based on Wavelet Transform (웨이브릿 변환영역에서 지각적 동조특성을 갖는 적응적 디지털 워터마킹)

  • 김현천;장봉주;서용수;김종진
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.6
    • /
    • pp.1008-1014
    • /
    • 2003
  • In this paper, we propose the image retrieval method based on object regions using bidirectional round filter in the wavelet transform domain. A conventional method that includes unnecessary background information reduce retrieval efficiency, because of the extraction of feature vectors from the whole region of subband. On proposed method, it extracts accurate feature vectors and keep certainly retrieval efficiency in case of reduced feature vectors, because of the extraction of feature vectors from the only extracted object region. Furthermore, it improve retrieval efficiency by removing unnecessary background information. Consequently, the retrieval efficiency is improved with 2.5%∼5.5% values, which have a little chances to vary according to characteristics of image.

  • PDF

A New Wavelet Watermarking Based on Linear Bit Expansion (선형계수확장 기반의 새로운 웨이블릿 워터마킹)

  • Piao Yong-Ri;Kim Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.167-170
    • /
    • 2006
  • This study proposes a new wavelet watermark technique based on the Linear Bit Expansion. To ensure the security of the watermark, it is Amold Transformed before embedding. Then the wavelet transformation of watermark and original images is processed. Since the size of the watermark image is a quarter of the original site, it uses linear bit-expansion to enlarge the watermark image. Lastly, watermark is inserted in a given intensity to the corresponding low frequency subbands of the wavelet-transformed images proposed in this paper. When detecting the presence of watermark, the similarity between extracted watermark and the original watermark is compared applying the F norm function.

  • PDF