• Title/Summary/Keyword: Image watermarking

Search Result 627, Processing Time 0.028 seconds

A Color Image Watermarking Method for Embedding Audio Signal

  • Kim Sang Jin;Kim Chung Hwa
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.631-635
    • /
    • 2004
  • The rapid development of digital media and communication network urgently brings about the need of data certification technology to protect IPR (Intellectual property right). This paper proposed a new watermarking method for embedding contents owner's audio signal in order to protect color image IPR. Since this method evolves the existing static model and embeds audio signal of big data, it has the advantage of restoring signal transformed due to attacks. Three basic stages of watermarking include: 1) Encode analogue ID owner's audio signal using PCM and create new 3D audio watermark; 2) Interleave 3D audio watermark by linear bit expansion and 3) Transform Y signal of color image into wavelet and embed interleaved audio watermark in the low frequency band on the transform domain. The results demonstrated that the audio signal embedding in color image proposed in this paper enhanced robustness against lossy JPEG compression, standard image compression and image cropping and rotation which remove a part of image.

  • PDF

DCT Domain Zero-Watermarking based on CRT (CRT 기반의 DCT 영역 제로-워터마킹)

  • Kim, Hyoung-Do;Sohn, Kyu-Seek
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.1
    • /
    • pp.9-15
    • /
    • 2011
  • Zero-watermarking is a digital watermarking technique that can escape from data distortion and quality degradation by no watermark insertion into digital images to be watermarked. This paper proposes DCT0CRT, a CRT-based zero-watermarking technique in the domain of DCT. One of the DC and low-frequency AC coefficients of each DCT block chosen in chaotic way from an image is selected by testing whether it satisfies the CRT-based condition matching with the watermark bit to be embedded. Such selection information forms a key to extract the watermark from the watermarked image. Experimental results show that the image quality watermarked by DCT0CRT is better than that watermarked by any other CRT-based watermarking techniques and the inserted watermark is robust against some common attacks such as sharpening, blurring, and JPEG lossy compression.

A Study on Image Electronic Money based on Watermarking Technique (워터 마킹 기술을 활용한 이미지 전자화폐에 관한 연구)

  • Lee, Jung-Soo;Kim, Whoi-Yul
    • The KIPS Transactions:PartD
    • /
    • v.11D no.6
    • /
    • pp.1335-1340
    • /
    • 2004
  • This study introduces a technology utilizing digital images as electronic money by inserting watermark into the images. Watermarking technology assign contents ID to images and inserts the contents ID into the images in an unnoticeable way. The server that manages the issue and the usage of mage electronic money (called ‘WaterCash’ hereafter) stores issued contents ID to database and manage them as electronic money. WaterCash guarantees anonymity and prevents the forgery and modification of WaterCash based on semi-fragile watermarking technique. In addition, WaterCash is transferable and the illegal use of WaterCash can be prevented based on the watermarking technology. The watermarking .technology used in this paper was designed to be robust to image compression but vulnerable to intentional or non-intentional Image processing.

A ROBUST WATERMARKING METHOD BASED ON HVS (HVS 기반 워터마킹에서 외부 공격에 강인한 방법에 관한 연구)

  • 심상흔;정용주;강호경;노용만
    • Proceedings of the IEEK Conference
    • /
    • 2001.06d
    • /
    • pp.73-76
    • /
    • 2001
  • In this paper, we utilize a HVS(Human Visual System) watermarking method where watermarks are embedded in a DFT domain. The HVS watermarking method is robust for attacks like JPEC, filtering, noise, etc. But, when images are attacked by basic geometric attacks as cropping, scaling, rotation, a watermarks may not be detected. In this paper, we introduce the HVS watermarking method that inserts references In a domain of LSB(Least Significant Bit) of image. Experimental results show that the proposed method based on HVS watermarking method gives more robustness to the basic geometric attacks compared with original HVS watermarking methods.

  • PDF

LBP and DWT Based Fragile Watermarking for Image Authentication

  • Wang, Chengyou;Zhang, Heng;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.14 no.3
    • /
    • pp.666-679
    • /
    • 2018
  • The discrete wavelet transform (DWT) has good multi-resolution decomposition characteristic and its low frequency component contains the basic information of an image. Based on this, a fragile watermarking using the local binary pattern (LBP) and DWT is proposed for image authentication. In this method, the LBP pattern of low frequency wavelet coefficients is adopted as a feature watermark, and it is inserted into the least significant bit (LSB) of the maximum pixel value in each block of host image. To guarantee the safety of the proposed algorithm, the logistic map is applied to encrypt the watermark. In addition, the locations of the maximum pixel values are stored in advance, which will be used to extract watermark on the receiving side. Due to the use of DWT, the watermarked image generated by the proposed scheme has high visual quality. Compared with other state-of-the-art watermarking methods, experimental results manifest that the proposed algorithm not only has lower watermark payloads, but also achieves good performance in tamper identification and localization for various attacks.

Image Watermarking Based on Feature Points of Scale-Space Representation (스케일 스페이스 특징점을 이용한 영상 워터마킹)

  • Seo, Jin-S.;Yoo, Chang-D.
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.367-370
    • /
    • 2005
  • This paper proposes a novel method for content-based watermarking based on feature points of an image. At each feature point, watermark is embedded after affine normalization according to the local characteristic scale and orientation. The characteristic scale is the scale at which the normalized scale-space representation of an image attains a maximum value, and the characteristic orientation is the angle of the principal axis of an image. By binding watermarking with the local characteristics of an image, resilience against affine transformations can be obtained. Experimental results show that the proposed method is robust against various image processing steps including affine transformations, cropping, filtering, and JPEG compression.

  • PDF

Image Watermarking Scheme Based on Scale-Invariant Feature Transform

  • Lyu, Wan-Li;Chang, Chin-Chen;Nguyen, Thai-Son;Lin, Chia-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3591-3606
    • /
    • 2014
  • In this paper, a robust watermarking scheme is proposed that uses the scale-invariant feature transform (SIFT) algorithm in the discrete wavelet transform (DWT) domain. First, the SIFT feature areas are extracted from the original image. Then, one level DWT is applied on the selected SIFT feature areas. The watermark is embedded by modifying the fractional portion of the horizontal or vertical, high-frequency DWT coefficients. In the watermark extracting phase, the embedded watermark can be directly extracted from the watermarked image without requiring the original cover image. The experimental results showed that the proposed scheme obtains the robustness to both signal processing and geometric attacks. Also, the proposed scheme is superior to some previous schemes in terms of watermark robustness and the visual quality of the watermarked image.

RST Invariant Digital Watermarking Based on Image Representation by Wedges and Rings

  • Kim, Ki-Jung
    • International Journal of Contents
    • /
    • v.5 no.2
    • /
    • pp.26-31
    • /
    • 2009
  • This paper describes a new image watermarking scheme invariant to rotation, scaling and translation (RST) attacks. For obtaining the invariance properties we propose to present an image of watermark by wedges and rings to convert its rotation to shift and then utilize the shift invariance property of the Direct Fourier Transform (DFT). But in contrast to conversional schemes based on the Fourier-Mellin transform (FMT), we do not use a log-polar mapping (LPM). As a result, our scheme preserves high quality of original image since it is not underwent to LPM For withstanding against JPEG compression, noise addition and low-pass (LP) filtering attacks a low frequency watermark is embedded into middle frequencies of the original image. Experiments with various attacks show the robustness of the proposed scheme.

Wavelet-Based Digital Watermarking Method (웨이브릿 기반 디지털 워터마킹 방법)

  • 이경훈
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.871-880
    • /
    • 2002
  • In this paper, I proposed the adaptive watermarking based on the discrete wavelet transform for the very robust watermarking against intentional distortion which attacks on image. A watermark is an binary image such as document(sign), and such watermark image is embedded in the LH and HL band of wavelet transformed domain for copyright protection of image data. To evaluate robustness of the proposed method, we applied some basic algorithm of image processing such as brightening, darkening, sharpening, blurring, cropping, histogram equalizing and lossy compression(JPEG, gif). As a result of experiment, the proposed method has the good image quality and the high perceptibility of watermark. It was demonstrated by experiments that the proposed algorithm can provide an excellent protection under various attacks.

  • PDF

A Wavelet-based Image Watermarking Scheme (웨이블릿 기반 이미지 워터마킹)

  • Park Ho-sik;Bae Cheol-soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1469-1474
    • /
    • 2004
  • A wavelet-based image watermarking scheme is proposed, based on the insertion of pseudo-random codes in the frequency domain. The original image is required for the watermark detection. The 'strength' of the signature to be embedded depends on the image to be marked, thus fitting signal capacity. The experimental results prove that the method is more tamper resistant and less perceptible for any type of images than other well-known private methods in the frequency domains.