• Title/Summary/Keyword: Multiple Insertion Watermark

Search Result 4, Processing Time 0.021 seconds

Coefficient Adaptive Multiple Insertion Method With Blind Watermarking (계수 적응적 다중삽입 블라인드 워터마킹 기법)

  • Shin, Chang-Doon;Kim, Bong-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.489-497
    • /
    • 2009
  • Most of existent blind watermarking methods in frequency domain use coefficient relationship to detect the watermark without original image. But the change in coefficient values occurred when the original image was attacked by lossy JPEG compression or noise addition. So robustness of watermark detection was weaken. In order to solve these problems, this paper presents a robust watermarking method, which enables multiple watermark insertion. Also, in order to reduce errors in the detected value of watermarks according to small changes in the coefficient relationship when detecting watermarks, it set the change guard value for variation of the coefficients. The experimental results show that the proposed method has good image quality and is robust to various attacks such as the JPEG lossy compression, noise addition, etc.

Watermaking for still images in the DCT domain (DCT 영역에서의 정지 영상 Watermarking)

  • 권오형;김영식;박래홍
    • Journal of Broadcast Engineering
    • /
    • v.4 no.1
    • /
    • pp.68-75
    • /
    • 1999
  • In this paper. we propose a digital watermarking method for still images in the discrete cosine transform (DCT) domain. The adaptive watermark insertion method in the high frequency region within a given image is employed to increase the invisibility of the inserted watermark in images, in which variable block-size method is used for selection of the high frequency region. Experimental results show that the proposed watermarking method is robust to several common image processing techniques. including joint photographic experts group (JPEG) compression, lowpass filtering, multiple watermarking, and croppIng.

  • PDF

Design of watermark trace-back system to supplement connection maintenance problem

  • Kim, Hwan-Kuk;Han, Seung-Wan;Seo, Dong-Il;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2151-2154
    • /
    • 2003
  • Internet is deeply rooted in everyday life and many things are performed using internet in real-world, therefore internet users increased because of convenience. Also internet accident is on the increase rapidly. The security vendor developed security system to protect network and system from intruder. Many hackings can be prevented and detected by using these security solutions. However, the new hacking methods and tools that can detour or defeat these solutions have been emerging and even script kids using these methods and tools can easily hack the systems. In consequence, system has gone through various difficulties. So, Necessity of intruder trace-back technology is increased gradually. Trace-back technology is tracing back a malicious hacker to his real location. trace-back technology is largely divided into TCP connection trace-back and IP packet trace-back to trace spoofed IP of form denial-of-service attacks. TCP connection trace-back technology that autonomously traces back the real location of hacker who attacks system using stepping stone at real time. In this paper, We will describe watermark trace-back system using TCP hijacking technique to supplement difficult problem of connection maintenance happened at watermark insertion. Through proposed result, we may search attacker's real location which attempt attack through multiple connection by real time.

  • PDF

Protection Algorithm of the Multimedia Contents in the Mobile Environment (모바일 환경하에서 멀티미디어 컨텐츠 보호 알고리즘)

  • Kim Hang-Rae;Park Young;Choi Nam-Hyung
    • Journal of Digital Contents Society
    • /
    • v.5 no.1
    • /
    • pp.87-94
    • /
    • 2004
  • In this paper, the digital watermarking algorithm is proposed using CDMA technique for protection of the mobile contents in the mobile environment. The digital watermarking was designed to robust the errors in the mobile environment where pathloss, multipath fading, interference, and noise exist. In case of the multimedia content service in the mobile environment, the construction method of the watermark, the algorithm of insertion and detection are also proposed. The watermark consists of the information of the mobile user. Invisibility and robustness required in watermarking are etimated. It is observed that PSNR of the mobile content inserted the watermark is 90.31 dB, and the signal processing and noise attack are also robust. Especially, because random noise occurs in wireless transmission can overcome, the proposed watermarking algorithm is adequate for protection of the multimedia contents in the mobile environment.

  • PDF