• Title/Summary/Keyword: Multiple Watermark

Search Result 37, Processing Time 0.024 seconds

Watermaking for still images in the DCT domain (DCT 영역에서의 정지 영상 Watermarking)

  • 권오형;김영식;박래홍
    • Journal of Broadcast Engineering
    • /
    • v.4 no.1
    • /
    • pp.68-75
    • /
    • 1999
  • In this paper. we propose a digital watermarking method for still images in the discrete cosine transform (DCT) domain. The adaptive watermark insertion method in the high frequency region within a given image is employed to increase the invisibility of the inserted watermark in images, in which variable block-size method is used for selection of the high frequency region. Experimental results show that the proposed watermarking method is robust to several common image processing techniques. including joint photographic experts group (JPEG) compression, lowpass filtering, multiple watermarking, and croppIng.

  • PDF

Performance analysis on the asymmetric watermark using power spectrum domain (파워 스펙트럼 도메인 비대칭 워터마크의 성능 분석)

  • 서진수;유창동
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.3
    • /
    • pp.164-170
    • /
    • 2003
  • This paper proposes a novel method to detect Furon's asymmetric watermark by using a correlation detector that is mathematically tractable and simple. The performance of the proposed method is tested under various conditions. The experimental results matched the theoretical results well, showing that the correlation detector can indeed be used for the detection of asymmetric watermark. The proposed detector is aplied to both single and multiple bit embedded watermark. Bit error rate (BER), obtained from the experiment, was compared to the one obtained from the theory. As the embedded information increases, the BER of the Furon's asymmetric watermarking method also increases rapidly.

Reversible DNA Watermarking Technique Using Histogram Shifting for Bio-Security (바이오 정보보호 위한 히스토그램 쉬프팅 기반 가역성 DNA 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Lee, Eung-Joo;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.244-253
    • /
    • 2017
  • Reversible DNA watermarking is capable of continuous DNA storage and forgery prevention, and has the advantage of being able to analyze biological mutation processes by external watermarking by iterative process of concealment and restoration. In this paper, we propose a reversible DNA watermarking method based on histogram multiple shifting of noncoding DNA sequence that can prevent false start codon, maintain original sequence length, maintain high watermark capacity without biologic mutation. The proposed method transforms the non-coding region DNA sequence to the n-th code coefficients and embeds the multiple bits of the n-th code coefficients by the non-recursive histogram multiple shifting method. The multi-bit embedding process prevents the false start codon generation through comparison search between adjacent concealed nucleotide sequences. From the experimental results, it was confirmed that the proposed method has higher watermark capacity of 0.004-0.382 bpn than the conventional method and has higher watermark capacity than the additional data. Also, it was confirmed that false start codon was not generated unlike the conventional method.

Multiple Digital Watermarking Framework for Joint-Creatorship Verification in VR Environment (VR 환경에서 공동 소유권 증명을 위한 다중 워터마킹 프레임워크)

  • Cho, Mi-Sung;Sohn, Yu-Seung
    • Korean Journal of Computational Design and Engineering
    • /
    • v.12 no.2
    • /
    • pp.95-100
    • /
    • 2007
  • Virtual Reality(VR) data in VR environments like Manufacturing industries are often created jointly by many creators. It is then necessary to provide protection of the joint-creatorship and the creatorship of each participating creator. This paper proposes Multiple Digital Watermarking Framework(MDWF) to solve the problem of joint-creatorship. The proposed framework, MDWF, makes use of 3D private watermarking technology and a novel key sharing protocol for joint-creatorship verification. MDWF embeds 3D private multiple watermarks for the creatorship of each participating creators in a non-overlapping manner during the creation process. After key agreement of all private keys, MDWF embeds an additional 3D private watermark for the joint-creatorship. Therefore MDWF successfully handles the creatorship dispute among creators. That is, each participation creator can prove his/her partial creatorship as well as joint-creatorship by MDWF. In addition, MDWF can solve the collusion problems because shared secret key(SSK) can be made by every users.

An Empirical Digital Image Watermarking using Frequency Properties of DWT (DWT의 주파수 특성을 이용한 실험적 디지털 영상 워터마킹)

  • Kang, I-Seul;Lee, Yong-Seok;Seob), Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.22 no.3
    • /
    • pp.295-312
    • /
    • 2017
  • Digital video content is the most information-intensive and high-value content. Therefore, it is necessary to protect the intellectual property rights of these contents, and this paper also proposes a watermarking method of digital image for this purpose. The proposed method uses the frequency characteristics of 2-Dimensional Discrete Wavelet Transform (2D-DWT) for digital images and digital watermark on global data without using local or specific data of the image for watermark embedding. The method to insert digital watermark data uses a simple Quantization Index Modulation (QIM) and a multiple watermarking method that inserts the same watermark data in multiple. When extracting a watermark, multiple watermarks are extracted and the final watermark data is determined by a simple statistical method. This method is an empirical method for experimentally determining the parameters in the watermark embedding process. The proposed method performs experiments on various images against various attacks and shows the superiority of the proposed method by comparing the performance with the representative existing methods.

Multiple Audio Watermarking using Quantization Index Modulation on Frequency Phase and Magnitude Response (주파수 위상 응답과 크기 응답에 QIM을 이용한 다중 오디오 워터마킹)

  • Seo, Yejin;Cho, Sangjin;Chong, Uipil
    • The Journal of the Acoustical Society of Korea
    • /
    • v.32 no.1
    • /
    • pp.71-78
    • /
    • 2013
  • This paper describes a multiple audio watermarking using Quantization Index Modulation (QIM) on frequency phase and magnitude response. Proposed embedding procedure is composed of two stage. At the first stage, the watermark is embedded on the frequency phase response using QIM. In the second stage, the watermark is embedded using adaptive QIM with the step-size that is adaptively determined using the maximum value of the frequency magnitude response of every frame. The watermark is extracted by calculating the Euclidean distance as the blind detection. The proposed method is robust against most of attacks of audio watermark benchmarking. For the Fourier attacks, the proposed method shows over 95% recovery rate.

An Embedded Watermark into Multiple Lower Bitplanes of Digital Image (디지털 영상의 다중 하위 비트플랜에 삽입되는 워터마크)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.6 s.312
    • /
    • pp.101-109
    • /
    • 2006
  • Recently, according to the number of internet in widely use and the development of the related application program, the distribution and use of multimedia content(text, images, video, audio etc.) is very easy. Digital signal may be easily duplicated and the duplicated data can have same quality of original data so that it is difficult to warrant original owner. For the solution of this problem, the protection method of copyright which is encipher and watermarking. Digital watermarking is used to protect IP(Intellectual Property) and authenticate the owner of multimedia content. In this paper, the proposed watermarking algerian embeds watermark into multiple lower bitplanes of digital image. In the proposed algorithm, original and watermark images are decomposed to bitplanes each other and the watermarking operation is executed in the corresponded bitplane. The position of watermark image embedded in each bitplane is used to the watermarking key and executed in multiple lower bitplane which has no an influence on human visual recognition. Thus this algorithm can present watermark image to the multiple inherent patterns and needs small watermarking quantity. In the experiment, the author confirmed that it has high robustness against attacks of JPEG, MEDIAN and PSNR but it is weakness against attacks of NOISE, RNDDIST, ROT, SCALE, SS on spatial domain when a criterion PSNR of watermarked image is 40dB.

Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol (익명 Buyer-Seller 워터마킹 프로토콜 기반 모바일 3D 콘텐츠의 기하학적 다중 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.2
    • /
    • pp.244-256
    • /
    • 2009
  • This paper presents multiple watermarking method for the copyright protection and the prevention of illegal copying of mobile 3D contents. The proposed method embeds an unique watermark and a WCA watermark into the spatial and encryption domains of mobile 3D content based on anonymous Buyer-Seller watermarking protocol. The seller generates an unique watermark and embeds it into the distribution of vertex data of 3D content object. After receiving the encrypted watermark from WCA, the seller embeds it into the encrypted vertex data by using operator that satisfies the privacy homo morphic property. The proposed method was implemented using a mobile content tool, Power VR MBX and experimental results verified that the proposed method was capable of copyright protection and preventing illegal copying, as the watermarks were also accurately extracted in the case of geometrical attacks, such as noise addition, data accuracy variation, and data up/down scaling.

  • PDF

Design of watermark trace-back system to supplement connection maintenance problem

  • Kim, Hwan-Kuk;Han, Seung-Wan;Seo, Dong-Il;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2151-2154
    • /
    • 2003
  • Internet is deeply rooted in everyday life and many things are performed using internet in real-world, therefore internet users increased because of convenience. Also internet accident is on the increase rapidly. The security vendor developed security system to protect network and system from intruder. Many hackings can be prevented and detected by using these security solutions. However, the new hacking methods and tools that can detour or defeat these solutions have been emerging and even script kids using these methods and tools can easily hack the systems. In consequence, system has gone through various difficulties. So, Necessity of intruder trace-back technology is increased gradually. Trace-back technology is tracing back a malicious hacker to his real location. trace-back technology is largely divided into TCP connection trace-back and IP packet trace-back to trace spoofed IP of form denial-of-service attacks. TCP connection trace-back technology that autonomously traces back the real location of hacker who attacks system using stepping stone at real time. In this paper, We will describe watermark trace-back system using TCP hijacking technique to supplement difficult problem of connection maintenance happened at watermark insertion. Through proposed result, we may search attacker's real location which attempt attack through multiple connection by real time.

  • PDF

An Extension of Visual Cryptography and Its Application into Digital Watermark (시각암호의 확장과 디지털 워터마크에 응용)

  • 이혜주;박지환
    • Journal of Korea Multimedia Society
    • /
    • v.1 no.1
    • /
    • pp.80-89
    • /
    • 1998
  • In this paper, we consider the method which a secret information is distributed in hard-copied image using visual cryptography that the secret can be identifying simply by human eyes. If slides constructed by patterning, which is one of dithering method, are considered from the viewpoint of visual cryptography, each slides will maintain the shape of original image because these slides have different Hamming weights. Therefore, this method has the advantage that information distributed into slides by stacking them can decode and the shape about the original image can be keeping as well. In this paper, we propose the method which shares the secret information into multiple original images by extension of ONM (Oka-Nakamura-Matsui) method which is devised to embed a secret information on hard-copied image. As a result, this proposed method is applicable to digital watermark because the copyright of image can be identified by stacking an image of owner for verification and the distributed multiple images.

  • PDF