• Title/Summary/Keyword: The Blind Watermarking

Search Result 110, Processing Time 0.032 seconds

A Blind Watermarking Algorithm of 3D Mesh Model for Rapid Prototyping System Application (RP 시스템 적용을 위한 3차원 메쉬 모델의 블라인드 워터마킹)

  • Ji-Zhe, Cui
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12C
    • /
    • pp.1194-1202
    • /
    • 2007
  • In this paper, we proposed a blind watermarking algorithm to apply to the rapid prototyping system. The 3D mesh model is used in the step of the CAD modeling before the making of the prototype system of the rapid prototyping system. STL type mesh modeling which is used in this system reduces the error of the system and improves the accuracy of the system. In the step of the CAD modeling, some transformations which do not change the model accuracy are used, but some transformations which change the model accuracy are not used because the mesh model error is related to the accuracy of the prototype system. Most watermarking algorithms embedded a specific random noise as the watermark information into the model. These kinds of the algorithms are not proper to the 3D model watermarking. The proposed algorithm can be used for the accurate prototyping system because it does not change the model after the watermark embedding This means it can be used for the copyright marking and the data integrity.

Digital Image Watermarking based on Wavelet Transform and Spatial (웨이브렛 변환 및 공간지각특성을 이용한 디지털영상 워터마킹)

  • Bae, Mi-Young;Lee, Jeong-Hwan;Kim, Yun-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.1165-1168
    • /
    • 2005
  • This paper proposes an digital image watermarking method based on discrete wavelet transform(DWT) and spatial perceptual properties of human visula system. first, an digital image is transformed by DWT and inserted gaussian watermark into the frequency domain. To increase the robustness and perceptual invisibility of watermark, the proposed algorithm is combined with the characteristics of digital image and human visual system. The proposed method is invisible and blind watermarking which the original image is not required to detect watermarks. Simulation results show that the proposed method is robust to the general attack such as JPEG compression, enhancement, noise, cropping, and filtering etc.

  • PDF

Application and Evaluation of Vector Map Watermarking Algorithm for Robustness Enhancement (강인성 향상을 위한 벡터 맵 워터마킹 알고리즘의 적용과 평가)

  • Won, Sung Min;Park, Soo Hong
    • Spatial Information Research
    • /
    • v.21 no.3
    • /
    • pp.31-43
    • /
    • 2013
  • Although the vector map data possesses much higher values than other types of multimedia, the data copyright and the protection against illegal duplication are still far away from the attention. This paper proposes a novel watermarking technique which is both robust to diverse attacks and optimized to a vector map structure. Six approaches are proposed for the design of the watermarking algorithm: point-based approach, building a minimum perimeter triangle, watermark embedding in the length ratio, referencing to the pixel position of the watermark image, grouping, and using the one-way function. Our method preserves the characteristics of watermarking such as embedding effectiveness, fidelity, and false positive rate, while maintaining robustness to all types of attack except a noise attack. Furthermore, our method is a blind scheme in which robustness is independent of the map data. Finally, our method provides a solution to the challenging issue of degraded robustness under severe simplification attacks.

A Novel Watermarking using Cellular Automata Transform (셀룰러 오토마타 변환을 이용한 새로운 워터마킹)

  • Piao, Yong-Ri;Kim, Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.155-158
    • /
    • 2008
  • In this paper, we propose a novel blind watermarking Method using 2D CAT (Two dimensional cellular automata transform). In our scheme, firstly, we obtain the gateway values to generate a dual-state, dual-coefficients basis function. Secondly, the basis function transforms images into cellular automata space. Lastly, we use the cellular automata transform coefficients to embed random noise watermark in the cover images. The proposed scheme allows only one 2D CAT basis function per gateway value. Since there are $2^{96}$ possible gateway values, better security is guaranteed. Moreover, the new method not only verifies higher fidelity than the existing method but also stronger stability on JPEG lossy compression, filtering, sharpening and noise through tests for robustness.

  • PDF

3D Face Image Watermarking using Wavelet Transform (웨이브렛 변환을 이용한 3차원 얼굴영상 워터마킹)

  • 이정환;박세훈;이시웅
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.691-694
    • /
    • 2003
  • This paper proposes an 3D face image watermarking method based on discrete wavelet transform(DWT). First, 3D face image are transformed by DWT and inserted gaussian watermark into frequency domain. To increase the robustness and perceptual invisibility of watermark, the proposed algorithm is combined with the characteristics of 3D face image and human visual system. The proposed method is invisible and blind watermarking which the original image is not required. Simulation results show that the proposed method is robust to the general attack such as JPEG compression, enhancement, noise, cropping, and filtering etc.

  • PDF

Watermarking Technique Using Exchanging Wavelet Coefficients (웨이블릿 계수 교환을 이용한 워터마킹 기법)

  • 주낙근;이재현;김동서
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.49-56
    • /
    • 2003
  • In this paper, we propose an efficient blind watermarking algorithm using wavelet transform. The proposed algorithm inserts watermark into the high frequency subbands that were transformed by 1-level wavelet transform of original image. Watermark insertion is achieved by exchanging each of the corresponding coefficients in the HL, LH, and HH, subbands according to the inserted watermark value. And watermark is extracted by the relation of wavelet coefficients without original image. Experimental results demonstrate that watermarked image has a good quality in terms of imperceptibility and is robust against various attacks.

Video Watermarking Algorithm for H.264 Scalable Video Coding

  • Lu, Jianfeng;Li, Li;Yang, Zhenhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.56-67
    • /
    • 2013
  • Because H.264/SVC can meet the needs of different networks and user terminals, it has become more and more popular. In this paper, we focus on the spatial resolution scalability of H.264/SVC and propose a blind video watermarking algorithm for the copyright protection of H.264/SVC coded video. The watermark embedding occurs before the H.264/SVC encoding, and only the original enhancement layer sequence is watermarked. However, because the watermark is embedded into the average matrix of each macro block, it can be detected in both the enhancement layer and base layer after downsampling, video encoding, and video decoding. The proposed algorithm is examined using JSVM, and experiment results show that is robust to H.264/SVC coding and has little influence on video quality.

Similar Patterns for Semi-blind Watermarking

  • Cho, Jae-Hyun
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.4
    • /
    • pp.251-255
    • /
    • 2004
  • In this paper, we present a watermarking scheme based on the DWT (Discrete Wavelet Transform) and the ANN (Artificial Neural Network) to ensure the copyright protection of the digital images. The problem to embed watermark is not clear to select important coefficient in the watermarking. We used the RBF (Radial-Basis Function) to solve the problem. We didn't apply the whole wavelet coefficients, but applied to only the wavelet coefficients in the selected node. Using the ANN, although even the watermark casting process and watermark verification process are in public, nobody knows the location of embedding watermark except of authorized user. As the result, the watermark is good at the strength test-filtering, geometric transform and etc.

A Blind Vector Digital Watermarking for GIS using the Closest Pair of Points (최근점 쌍을 이용한 벡터 맵 디지털 워터마킹)

  • Kim, Jung-Yeop;Park, Soo-Hong
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.536-544
    • /
    • 2009
  • This paper proposed a novel vector digital watermarking method to protect copyright. The proposed method embeds watermarks after finding the closest pair of points and calculating the distance of the points. We tested the robustness of the method through several attacks on watermarked data. The experimental results show that the proposed method has more robustness than previous methods. And the new method doesn't change the topology of the vector data. Therefore, this method can be 'the vector digital watermarking for GIS.

Robust Audio Watermarking Using HAS and Neural Network (신경망과 HAS을 이용한 강인한 오디오 워터마킹 알고리즘)

  • Jung, Se-Won;Piao, Cheng-Ri;Han, Seung-Soo
    • Proceedings of the KIEE Conference
    • /
    • 2006.07d
    • /
    • pp.2101-2102
    • /
    • 2006
  • In this paper, a new digital audio watermarking algorithm is presented. The proposed algorithm embeds watermark into audio signal based on human auditory system (HAS). This algorithm is a blind audio watermarking method, which does not require any prior information during watermark extraction process. This algorithm finds watermarking position using time-domain masking effect. First we insert the watermark into wavelet domain, and then we use a back-propagation neural network (BPN) to learn the characteristics of relationship between the watermark and the watermarked audio. Due to the teaming and adaptive capabilities of the BPN, the false recovery of the watermark can be greatly reduced by the trained BPN. Experimental results show that the proposed method has good inaudibility and high robustness to common audio processing attacks.

  • PDF