• 제목/요약/키워드: Watermark Extraction

검색결과 77건 처리시간 0.022초

An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform

  • Zhang, Heng;Wang, Chengyou;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • 제13권5호
    • /
    • pp.1382-1396
    • /
    • 2017
  • In this paper, we analyze a recently proposed semi-fragile watermarking scheme based on local binary pattern (LBP) operators, and note that it has a fundamental flaw in the design. In this work, a binary watermark is embedded into image blocks by modifying the neighborhood pixels according to the LBP pattern. However, different image blocks might have the same LBP pattern, which can lead to false detection in watermark extraction process. In other words, one can modify the host image intentionally without affecting its watermark message. In addition, there is no encryption process before watermark embedding, which brings another potential security problem. To illustrate its weakness, two special copy-paste attacks are proposed in this paper, and several experiments are conducted to prove the effectiveness of these attacks. To solve these problems, an improved semi-fragile watermarking based on LBP operators is presented. In watermark embedding process, the central pixel value of each block is taken into account and Arnold transform is adopted to guarantee the security of watermark. Experimental results show that the improved watermarking scheme can overcome the above defects and locate the tampered region effectively.

EXTRACTION OF WATERMARKS BASED ON INDEPENDENT COMPONENT ANALYSIS

  • Thai, Hien-Duy;Zensho Nakao;Yen- Wei Chen
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2003년도 ISIS 2003
    • /
    • pp.407-410
    • /
    • 2003
  • We propose a new logo watermark scheme for digital images which embed a watermark by modifying middle-frequency sub-bands of wavelet transform. Independent component analysis (ICA) is introduced to authenticate and copyright protect multimedia products by extracting the watermark. To exploit the Human visual system (HVS) and the robustness, a perceptual model is applied with a stochastic approach based on noise visibility function (NVF) for adaptive watermarking algorithm. Experimental results demonstrated that the watermark is perfectly extracted by ICA technique with excellent invisibility, robust against various image and digital processing operators, and almost all compression algorithms such as Jpeg, jpeg 2000, SPIHT, EZW, and principal components analysis (PCA) based compression.

  • PDF

A Semi-fragile Image Watermarking Scheme Exploiting BTC Quantization Data

  • Zhao, Dongning;Xie, Weixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권4호
    • /
    • pp.1499-1513
    • /
    • 2014
  • This paper proposes a novel blind image watermarking scheme exploiting Block Truncation Coding (BTC). Most of existing BTC-based watermarking or data hiding methods embed information in BTC compressed images by modifying the BTC encoding stage or BTC-compressed data, resulting in watermarked images with bad quality. Other than existing BTC-based watermarking schemes, our scheme does not really perform the BTC compression on images during the embedding process but uses the parity of BTC quantization data to guide the watermark embedding and extraction processes. In our scheme, we use a binary image as the original watermark. During the embedding process, the original cover image is first partitioned into non-overlapping $4{\times}4$ blocks. Then, BTC is performed on each block to obtain its BTC quantized high mean and low mean. According to the parity of high mean and the parity of low mean, two watermark bits are embedded in each block by modifying the pixel values in the block to make sure that the parity of high mean and the parity of low mean in the modified block are equal to the two watermark bits. During the extraction process, BTC is first performed on each block to obtain its high mean and low mean. By checking the parity of high mean and the parity of low mean, we can extract the two watermark bits in each block. The experimental results show that the proposed watermarking method is fragile to most image processing operations and various kinds of attacks while preserving the invisibility very well, thus the proposed scheme can be used for image authentication.

GCST 기반 디지털 영상 워터마킹 방법 (A GCST-based Digital Image Watermarking Scheme)

  • 이적식
    • 융합신호처리학회논문지
    • /
    • 제13권3호
    • /
    • pp.142-149
    • /
    • 2012
  • 여러 영상 변환들은 영상을 압축하고, 영상 속에 존재하는 잡음을 제거하고, 유용한 특징을 추출하기 위해서 사용될 수 있다. DCT와 DWT 변환은 멀티미디어의 확산으로 워터마킹 기법에 많이 연구되고 있다. 본 논문에서는 인간시각필터로 고려되는 Gabor 코사인과 사인 함수를 이용한 변환을 디지털 영상의 워터마크 삽입과 추출에 사용하였다. 15가지 공격에 대해서 제안한 변환 방법을 워터마킹에 적용한다. 삽입한 워터마크는 무작위 정규분포 잡음이고, 삽입한 워터마크와 추출한 워터마크 사이의 유사성을 측정하기 위하여 상관값을 계산하였으며, 기존의 DCT 방법과 성능을 비교하였다. 추출된 워터마크는 무작위 정규분포 시퀀스와 상관값을 계산하여 가장 큰 값을 갖는 시퀀스를 삽입된 워터마크로 선언하였다. 주파수 성분을 여러 대역으로 구분하여, 저주파와 중간 주파수 대역에서 실험한 결과는 제안한 방법이 좋은 워터마킹 방법으로 사용할 수 있음을 나타내며, 아울러 DCT보다 더 좋은 성능을 보여준다.

간단한 DXF파일에 워터마크삽입과 추출에 관한 연구 (A study on the insertion & extraction for the simple DXF File Watermark)

  • 강환일;김갑일;정철균;이성의;박경용;박귀태
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2001년도 하계학술대회 논문집 D
    • /
    • pp.2777-2781
    • /
    • 2001
  • This paper presents an algorithm of the watermark insertion and extraction on the vector image. Most parts of the vector image consist of the array of the coordinate values. The vector watermarking method by Sakamoto et al [1] uses the mask within which all the coordinate values of all the vertices are changed depending on the value of the watermark. The proposed algorithm is the change of the vector image file instead of the change of the coordinate values on the vector image. We use the Drawing Exchange Format (DXF) files since the DXF file is one of the general files in the field of the vector image.

  • PDF

웨이브릿과 마스킹 효과를 이용한 디지털 오디오 워터마킹 (A Digital Audio Watermark Using Wavelet Transform and Masking Effect)

  • Hwang, Won-Young;Kang, Hwan-Il;Han, Seung-Soo;Kim, Kab-Il;Kang, Hwan-Soo
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 컴퓨터소사이어티 추계학술대회논문집
    • /
    • pp.243-246
    • /
    • 2003
  • In this paper, we propose a new digital audio watermarking technique with the wavelet transform. The watermark is embedded by eliminating unnecessary information of audio signal based on human auditory system (HAS). This algorithm is an audio watermarking method, which does not require any original audio information in watermark extraction process. In this paper, the masking effect is used for audio watermarking, that is, post-tempera] masking effect. We construct the window with the synchronization signal and we extract the best frame in the window by using the zero-crossing rate (ZCR) and the energy of the audio signal. The watermark may be extracted by using the correlation of the watermark signal and the portion of the frame. Experimental results show good robustness against MPEG1-layer3 compression and other common signal processing manipulations. All the attacks are made after the D/A/D conversion.

  • PDF

High-Capacity and Robust Watermarking Scheme for Small-Scale Vector Data

  • Tong, Deyu;Zhu, Changqing;Ren, Na;Shi, Wenzhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.6190-6213
    • /
    • 2019
  • For small-scale vector data, restrictions on watermark scheme capacity and robustness limit the use of copyright protection. A watermarking scheme based on robust geometric features and capacity maximization strategy that simultaneously improves capacity and robustness is presented in this paper. The distance ratio and angle of adjacent vertices are chosen as the watermark domain due to their resistance to vertex and geometric attacks. Regarding watermark embedding and extraction, a capacity-improved strategy based on quantization index modulation, which divides more intervals to carry sufficient watermark bits, is proposed. By considering the error tolerance of the vector map and the numerical accuracy, the optimization of the capacity-improved strategy is studied to maximize the embedded watermark bits for each vertex. The experimental results demonstrated that the map distortion caused by watermarks is small and much lower than the map tolerance. Additionally, the proposed scheme can embed a copyright image of 1024 bits into vector data of 150 vertices, which reaches capacity at approximately 14 bits/vertex, and shows prominent robustness against vertex and geometric attacks for small-scale vector data.

무선 멀티미디어 통신 환경에서 정지영상 전송에 삽입되는 디지털 워터마킹에 관한 연구 (A Study on the Digital Watermarking Embedded Transmission of Still Image in Wireless Multimedia Communication Environment)

  • 조송백;이양선;강희조
    • 한국항행학회논문지
    • /
    • 제8권2호
    • /
    • pp.169-175
    • /
    • 2004
  • 본 논문에서는 무선 멀티미디어 통신 환경에서 정지영상 전송에 삽입되는 디지털 워터마킹에 관하여 분석하였다. 또한, 기존의 이미지를 사용한 방법보다 원 영상에 미치는 영향이 적고 외부공격으로부터 강인한 워터마크 복원 능력을 보이는 개선된 워터마크 기법을 제안 하였다. 성능분석으로써 무선 멀티미디어 서비스를 위해 OFDM/QPSK 영상전송 시스템을 이용하여 무선채널 환경에서의 정지영상 이미지와 워터마크로 사용된 정보에 미치는 영향을 분석하였다. 분석 결과, 본 논문에서 제안한 VI 워터마크를 삽입함으로써 원영상에 미치는 영향이 매우작고, 높은 복원 성능을 보여줌을 알 수 있었다. 또한, 동일한 전송에러 조건의 무선 채널환경에서 이미지 워터마크에 비해 우수한 저작권 정보 추출 성능을 보였다.

  • PDF

랜덤한 점분포를 가진 영상을 사용한 워터마킹의 견고성 (A Robustness of Watermarking Using Random Dot Distribute Image)

  • 이인정
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2002년도 추계공동학술대회 정보환경 변화에 따른 신정보기술 패러다임
    • /
    • pp.66-71
    • /
    • 2002
  • 삽입하려는 암호영상이 원본 전체 이미지 내에 랜덤하게 분포할수록 삽입과 추출성능이 좋아지는데 본 논문에서는 랜덤성이 우수한 오토스테레오그램을 삽입암호 영상으로 사용하여 워터마크 하였을 때 복원과 추출성능이 양호함을 알아보았고 이를 이용하여 로고영상을 워터마크하려는 영상의 전 영역에 랜덤하게 고루 분포하게하여 워터마크한 후 역으로 변환하여 로고를 찾았다. 영상이 많이 손상되었을 때도 추출된 로고가 육안으로 식별할 수 있을 정도로 견고성이 우수함을 알아보았다.

  • PDF

랜덤한 점분포를 가진 영상을 사용한 워터마킹의 견고성 (A Robustness of Watermarking Using Random Dot Distribute Image)

  • 이인정
    • 한국산업정보학회:학술대회논문집
    • /
    • 한국산업정보학회 2002년도 추계공동학술대회
    • /
    • pp.66-71
    • /
    • 2002
  • 삽입하려는 암호영상이 원본 전체 이미지 내에 랜덤하게 분포할수록 삽입과 추출성능이 좋아지는데 본 논문에서는 랜덤성이 우수한 오토스테레오그램을 삽입암호 영상으로 사용하여 워터마크 하였을 때 복원과 추출성능이 양호함을 알아보았고 이를 이용하여 로고영상을 워터마크 하려는 영상의 전 영역에 랜덤하게 고루 분포하게 하여 워터마크 한 후 역으로 변환하여 로고를 찾았다. 영상이 많이 손상되었을 때도 추출된 로고가 육안으로 식별할 수 있을 정도로 견고성이 우수함을 알아보았다.

  • PDF