• Title/Summary/Keyword: Pattern Watermark

Search Result 39, Processing Time 0.024 seconds

Image Watermark Method Using Multiple Decoding Keys (다중 복호화 키들을 이용한 영상 워터마크 방법)

  • Lee, Hyung-Seok;Seo, Dong-Hoan;Cho, Kyu-Bo
    • Korean Journal of Optics and Photonics
    • /
    • v.19 no.4
    • /
    • pp.262-269
    • /
    • 2008
  • In this paper, we propose an image watermark method using multiple decoding keys. The advantages of this method are that the multiple original images are reconstructed by using multiple decoding keys in the same watermark image, and that the quality of reconstructed images is clearly enhanced based on the idea of Walsh code without any side lobe components in the decoding process. The zero-padded original images, multiplied with random-phase pattern to each other, are Fourier transformed. Encoded images are then obtained by taking the real-valued data from these Fourier transformed images. The embedding images are obtained by the product of independent Walsh codes, and these spreaded phase-encoded images which are multiplied with new random-phase images. Also we obtain the decoding keys by multiplying these random-phase images with the same Walsh code images used in the embedding images. A watermark image is then made from the linear superposition of the weighted embedding images and a cover image, which is multiplied with a new independent Walsh code. The original image is simply reconstructed by the inverse-Fourier transform of the despreaded image of the multiplication between the watermark image and the decoding key. Computer simulations demonstrate the efficiency of the proposed watermark method with multiple decoding keys and a good robustness to the external attacks such as cropping and compression.

A robust watermarking method using the correlation of the sinusoidal pattern (정현파 패턴의 상관관계를 이용한 강인한 워터마킹)

  • Kim, Sang-Bum;Won, Chee-Sun
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.1
    • /
    • pp.22-28
    • /
    • 2008
  • In this paper, we propose a DCT coefficient domain watermarking scheme, which makes use of the sinusoidal patterns created by the watermark embedding. The embedded watermark can be detected in the spatial domain by computing the correlation. Also, the proposed algorithm can detect the spatial synchronization without additional sync bit embedding. Experimental results show that the proposed algorithm is robust to various StirMark attacks.

Hybrid Watermarking Scheme using a Data Matrix and Cryptograph Key (데이터 매트릭스와 암호 키를 이용한 하이브리드 워터마킹 기법)

  • Jeon, Seong-Goo;Kim, Myung-Dong;Kim, Il-Hwan
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.9
    • /
    • pp.423-428
    • /
    • 2006
  • In this paper we propose a new watermarking scheme using a data matrix and a cryptograph key. The data matrix of two-dimensional bar codes is a new technology capable of holding relatively large amounts of data compared to the conventional one-dimensional bar code. And a cryptograph key is used to prevent a watermark from malicious attacks. We encoded the copyright information into a data matrix bar code, and it was spread as a pseudo random pattern using the owner key. The experimental results show that the proposed scheme has good quality and is robust to various attacks, such as JPEG compression, filtering and resizing. Also the performance of the proposed scheme is verified by comparing the copyright information with the information which is extracted from the watermark.

A Data Embedding Technique for Image Watermarking using Fresnel Transform (이미지 워터마킹을 위한 Fresnel 변환을 이용한 데이타 삽입 기법)

  • Seok Kang;Yoshinao Aoki
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.70-76
    • /
    • 2003
  • Digital watermarking is a technique embedding hidden information into multimedia data imperceptibly such as images and sounds. Generally an original image is transformed and coded watermark data is embedded in frequency domain watermarking models. In this paper, We propose a new data embedding method using Fresnel transform. A watermark image is fresnel-transformed and the intensity of transformed pattern is embedded into original image. Our watermarking model has the flexibility In data embedding. It is possible to get many embedding patterns from a single watermark image by using various distance parameters with Fresnel transform. All kinds of image models such af shape, letter and photo ran be used as a watermark data. The watermarking experiments were conducted to show the validity of the proposed method, and the results show that our method has the robustness against lossy compression, filtering and geometric transformation.

Geometrical Distortion-Resilient Watermarking Based on Image Features

  • Shim, Hiuk-Jae;Byeungwoo Jeon;Kim, Rin-Chul
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1268-1271
    • /
    • 2002
  • The major threat of geometric manipulations is that they change the positions of watermarks, therefore the detection process fails to extract watermark properly. Since they cause the same effects on the host image as watermarks simultaneously, evaluating the distorted host image can be helpful to measure the nature of distortions. In this paper, we propose a geometrical distortion-resilient watermarking algorithm based on this property. Firstly we evaluate the orientation of a host image by filtering it with directional Gabor kernels, then we insert embedding pattern aligned to the estimated orientation. In its detection step, we evaluate the orientation again by Gabor filtering, then simply project and average the projected value to obtain a 1-D projection average pattern. Finally, auto-correlation function of the 1-D projection average pattern identifies periodic peaks. Analysed are experimental results against geometrical attacks including aspect ratio changes.

  • PDF

A Hybrid Watermarking Scheme for Color Images (컬러 영상을 위한 하이브리드 워터마킹)

  • Lee Hyun-Suk;Oktavia Vivi;Kim Mi-Ae;Lee Won-Hyung
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.73-86
    • /
    • 2004
  • This paper presents a hybrid digital watermarking scheme for color images, We insert two watermarks in the DWT domain using spread-spectrum correlation-based watermarking in luminance component of the color image and in spatial domain using pixel-value substitution of blue channel of color image. The objectives of this paper are to have the watermark robust to common signal processing and to detect any changes on the watermarked image for tamper detection at the same time. This watermark scheme will have the robustness characteristic as typical in frequency domain watermark, and also ability to detect any changes on the image (tamper detection).

  • PDF

Error Detection and Concealment of Transmission Error Using Watermark (워터마크를 이용한 전송 채널 에러의 검출 및 은닉)

  • 박운기;전병우
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2C
    • /
    • pp.262-271
    • /
    • 2004
  • There are channel errors when video data are transmitted between encoder and decoder. These channel errors would make decoded image incorrect, so it is very important to detect and recover channel errors. This paper proposes a method of error detection and recovery by hiding specific information into video bitstream using fragile watermark and checking it later. The proposed method requires no additional bits into compressed bitstream since it embeds a user-specific data pattern in the least significant bits of LEVELs in VLC codewords. The decoder can extract the information to check whether the received bitstream has an error or not. We also propose to use this method to embed essential data such as motion vectors that can be used for error recovery. The proposed method can detect corrupted MBs that usually escape the conventional syntax-based error detection scheme. This proposed method is quite simple and of low complexity. So the method can be applied to multimedia communication system in low bitrate wireless channel.

Forgery Protection System and 2D Bar-code inserted Watermark (워터마크가 삽입된 이차원 바코드와 위.변조 방지 시스템)

  • Lee, Sang-Kyung;Ko, Kwang-Enu;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.6
    • /
    • pp.825-830
    • /
    • 2010
  • Generally, the copy protection mark and 2D bar-code techniques are widely used for forgery protection in printed public documents. But, it is hard to discriminate truth from the copy documents by using exisiting methods, because of that existing 2D-barcode is separated from the copy protection mark and it can be only recognized by specified optical barcord scanner. Therefor, in this paper, we proposed the forgery protection tehchnique for discriminating truth from the copy document by using watermark inserted 2D-barcord, which can be accurately distinguished not only by naked eye, but also by scanner. The copy protection mark consists of deformed patterns that are caused by the lowpass filter characteristic of digital I/O device. From these, we verified the performance of the proposed techniques by applying the histogram analysis based on the original, copy, and scanned copy image of the printed documents. Also, we suggested 2D-barcord confirmation system which can be accessed through the online server by using certification key data which is detected by web-camera, cell phone camera.

Active Water-Level and Distance Measurement Algorithm using Light Beam Pattern (광패턴을 이용한 능동형 수위 및 거리 측정 기법)

  • Kim, Nac-Woo;Son, Seung-Chul;Lee, Mun-Seob;Min, Gi-Hyeon;Lee, Byung-Tak
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.4
    • /
    • pp.156-163
    • /
    • 2015
  • In this paper, we propose an active water level and distance measurement algorithm using a light beam pattern. On behalf of conventional water level gauge types of pressure, float-well, ultrasonic, radar, and others, recently, extensive research for video analysis based water level measurement methods is gradually increasing as an importance of accurate measurement, monitoring convenience, and much more has been emphasized. By turning a reference light beam pattern on bridge or embankment actively, we suggest a new approach that analyzes and processes the projected light beam pattern image obtained from camera device, measures automatically water level and distance between a camera and a bridge or a levee. As contrasted with conventional methods that passively have to analyze captured video information for recognition of a watermark attached on a bridge or specific marker, we actively use the reference light beam pattern suited to the installed bridge environment. So, our method offers a robust water level measurement. The reasons are as follows. At first, our algorithm is effective against unfavorable visual field, pollution or damage of watermark, and so on, and in the next, this is possible to monitor in real-time the portable-based local situation by day and night. Furthermore, our method is not need additional floodlight. Tests are simulated under indoor environment conditions from distance measurement over 0.4-1.4m and height measurement over 13.5-32.5cm.

Semi-fragile Watermarking Technique for a Digital Camera

  • Lee, Myung-Eun;Hyun Lim;Park, Soon-Young;Kang, Seong-Jun;Wan_hyun Cho
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.2411-2414
    • /
    • 2003
  • In this paper, we present a digital image authentication using semi-fragile watermarking techniques. The algorithm is robust to innocuous manipulations while detecting malicious manipulations. Specifically, the proposed method is designed for the purpose of the real time authentication of an image frame captured from a digital camera due to its easy H/W implementation, security and visible verification. To achieve the semi-fragile characteristics that survive a certain amount of compression, we employ the invariant property of DCT coefficients' quantization proposed by Lin and Chang [1]. The binary watermark bits are generated by exclusive ORing the binary logo with pseudo random binary sequences. Then watermark bits are embedded into the LSBs of pre-quantized DCT coefficients in the medium frequency range. Verification is carried out easily due to visually recognizable pattern of the logo extracted by exclusive ORing the LSBs of the embedded DCT coefficient with pseudo random number seeded by a secret key. By the experiment results, this method is not only robust to JPEG compression but also it detects powerfully alterations of the original image, such as the tempering of images.

  • PDF