• Title/Summary/Keyword: The Blind Watermarking

Search Result 110, Processing Time 0.023 seconds

A Blind Video Watermarking Technique Using Luminance Masking and DC Modulus Algorithm (휘도 마스킹과 DC Modulus 알고리즘을 이용한 비디오 워터마킹)

  • Jang Yong-Won;Kim, In-Taek;Han, Seung-Soo
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.7
    • /
    • pp.302-307
    • /
    • 2002
  • Digital watermarking is the technique, which embeds an invisible signal including signal including owner identification and copy control information into multimedia data such as audio, video, and images for copyright protection. A new MPEG watermark embedding algorithm using complex block effect based on the Human Visual System(HVS) is introduced in this paper. In this algorithm, $8{\times}8$ dark blocks are selected, and the watermark is embedded in the DC component of the discrete cosine transform(DCT) by using quantization and modulus calculation. This algorithm uses a blind watermark retrieval technique, which detects the embedded watermark without using the original image. The experimental results show that the proposed watermark technique is robust against MPEG coding, bitrate changes, and various GOP(Group of Picture) changes.

Blind Watermarking Scheme Using Singular Vectors Based on DWT/RDWT/SVD

  • Luong, Ngoc Thuy Dung;Sohn, Won
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2015.11a
    • /
    • pp.173-175
    • /
    • 2015
  • We proposed a blind watermarking scheme using singular vectors based on Discrete Wavelet Transform (DWT) and Redundant Discrete Wavelet Transform (RDWT) combined with Singular Value Decomposition (SVD) for copyright protection application. We replaced the 1st left and right singular vectors decomposed from cover image with the corresponding ones from watermark image to overcome the false-positive problem in current watermark systems using SVD. The proposed scheme realizes the watermarking system without a false positive problem, and shows high fidelity and robustness.

  • PDF

A New Robust Blind Crypto-Watermarking Method for Medical Images Security

  • Mohamed Boussif;Oussema Boufares;Aloui Noureddine;Adnene Cherif
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.93-100
    • /
    • 2024
  • In this paper, we propose a novel robust blind crypto-watermarking method for medical images security based on hiding of DICOM patient information (patient name, age...) in the medical imaging. The DICOM patient information is encrypted using the AES standard algorithm before its insertion in the medical image. The cover image is divided in blocks of 8x8, in each we insert 1-bit of the encrypted watermark in the hybrid transform domain by applying respectively the 2D-LWT (Lifting wavelet transforms), the 2D-DCT (discrete cosine transforms), and the SVD (singular value decomposition). The scheme is tested by applying various attacks such as noise, filtering and compression. Experimental results show that no visible difference between the watermarked images and the original images and the test against attack shows the good robustness of the proposed algorithm.

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images

  • Zhang, Heng;Wang, Chengyou;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.13 no.2
    • /
    • pp.385-399
    • /
    • 2017
  • Nowadays, with the development of signal processing technique, the protection to the integrity and authenticity of images has become a topic of great concern. A blind image authentication technology with high tamper detection accuracy for different common attacks is urgently needed. In this paper, an improved fragile watermarking method based on local binary pattern (LBP) is presented for blind tamper location in images. In this method, a binary watermark is generated by LBP operator which is often utilized in face identification and texture analysis. In order to guarantee the safety of the proposed algorithm, Arnold transform and logistic map are used to scramble the authentication watermark. Then, the least significant bits (LSBs) of original pixels are substituted by the encrypted watermark. Since the authentication data is constructed from the image itself, no original image is needed in tamper detection. The LBP map of watermarked image is compared to the extracted authentication data to determine whether it is tampered or not. In comparison with other state-of-the-art schemes, various experiments prove that the proposed algorithm achieves better performance in forgery detection and location for baleful attacks.

Video Watermarking Based on Wavelet Magnitude Modulus Subband

  • Byun, Jin-Kyung;Moon, Young-Deuk;Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.6
    • /
    • pp.737-744
    • /
    • 2007
  • This paper proposes the blind watermarking algorithm for digital video based on magnitude modulus subband in wavelet transform domain. After transforming each of frames into wavelet domain, the proposed algorithm divides LH, HL, and HH subbands of 2-level into $3{\times}3$ blocks and calculates average magnitude modulus of all blocks. Then the watermark bit is embedded into a target magnitude modulus comparing with an average magnitude modulus within a block. Experimental results were confirmed that the proposed algorithm has the good robustness against MPEG and frame attacks than the conventional algorithm.

  • PDF

Wavelet based Blind Watermarking using Self-reference Method (웨이블릿 기반의 자기참조 기법을 이용한 블라인드 워터마킹)

  • Piao, Yong-Ri;Kim, Seok-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1C
    • /
    • pp.62-67
    • /
    • 2008
  • In this paper, wavelet based blind watermarking using self-reference method is proposed. First, we process wavelet transform of original image. Then, we set all domain except for the low-frequency domain to zero and make self-reference image after wavelet reverse transformation. By choosing specific domain according to the pixel value difference between original image and self-reference image, we make random sequence, use as watermark and embed. The experimental results of the watermark embedding and extraction on various images show that the proposed scheme not only has good image quality, but also has stability on JPEG lossy compression, filtering, sharpening, blurring and noise.

Blind Watermarking Using HVS and Wavelet Transform (HVS 모델과 웨이블릿 변환을 이용한 블라인드 워터마킹)

  • 주상현;이선화
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11C
    • /
    • pp.1169-1176
    • /
    • 2003
  • In this paper, we propose a blind watermarking that embeds watermarks into wavelet middle frequency subbands using human visual system. Wavelet middle frequency pairs(MFP) show similar distortion against general image processing attacks such as compression and filtering. So the quantization between MFPs is more robust than conventional methods that directly quantize DWT coefficients. We use a noise visibility function(NVF) to obtain a good visual quality This is able to preserve embedding positions after many attacks. Our experimental results show that the proposed scheme is robust to various image processing such as JPEG, while preserving good visual quality above 44㏈.

Blind Watermarking Algorithms: A Tutorial (블라인드 워터마킹: 튜토리얼)

  • 김형중;여인권
    • Journal of Broadcast Engineering
    • /
    • v.6 no.3
    • /
    • pp.270-282
    • /
    • 2001
  • This paper Introduces three well-known blind watermarking algorithms in terms of signal processing aspects. Those three methods include correlation-based, echo-hiding, and patchwork algorithms. Those algorithms can be applied either in time-domain (or equivalently spatial-domain) or frequency-domain (or equivalently transform-domain). This paper describes watermark embedding and detection algorithms as well as basic ideas for those watermarking algorithms. In addition, we include some experimental results.

  • PDF

A Blind Watermarking Technique Using Difference of Approximation Coefficients in Wavelet Domain (웨이블렛 영역에서 근사 계수의 증감정보를 이용한 블라인드 워터마크)

  • 윤혜진;최태선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.2
    • /
    • pp.65-72
    • /
    • 2004
  • In this paper, we propose a new blind image watermarking method in wavelet domain. It is necessary to find out watermark insertion location in blind watermark. To select the watermark embedding locations, we use the increment and decrement information of the successive approximation coefficients after discrete wavelet transformed. In order to evaluate the proposed algorithm we embed watermark into test images and detect the watermark after attacks like JPEG lossy compression and performing of various liters. Experimental results show that the proposed method is robust against various kinds of attacks and still remains transparency.

Modulus Blind Watermarking Algorithm and Parameter Optimization (Modulus Blind Watermarking 알고리즘 및 최적 파라미터 추정)

  • Jang, Yong-Won;Kim, In-Taek;Han, Seung-Soo
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.2681-2683
    • /
    • 2001
  • 최근 인터넷과 컴퓨터의 보급 확대로 디지털 매체의 수요가 늘어나면서 불법복제의 증가로 디지털정보에 대한 저작권 보호가 큰 문제로 대두되고 있다. 이를 위한 디지털 매체의 소유권을 주장하는 방법 중에 하나가 워터마크를 삽입하는 것이다. 본 논문에서는 원본 이미지를 DCT 변환하여 DC 성분에 modulus 연산을 이용하여 워터마크를 삽입하는 알고리즘을 제시하였고, 강인성에 영향을 주는 파라미터 값을 최적화하였다. 새로운 알고리즘은 삽입한 워터마크를 추출할 때 원본이미지가 필요치 않은 blind 워터마킹 방법이며, 워터마크를 삽입할 때 사용된 key값만을 가지고 삽입된 워터마크를 추출한다. 본 알고리즘을 이용하여 워터마크를 삽입한 이미지에 JPEG압축, clipping, noise 삽입, resize 등의 4가지 공격을 가하였을 때 워터마크의 검출률이 90% 이상이 되는 강인성을 보였다.

  • PDF