• 제목/요약/키워드: Watermark key

검색결과 79건 처리시간 0.027초

Storage Feature-Based Watermarking Algorithm with Coordinate Values Preservation for Vector Line Data

  • Zhou, Qifei;Ren, Na;Zhu, Changqing;Tong, Deyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권7호
    • /
    • pp.3475-3496
    • /
    • 2018
  • Most of current watermarking algorithms for GIS vector data embed copyright information by means of modifying the coordinate values, which will do harm to its quality and accuracy. To preserve the fidelity of vector line data and protect its copyright at the same time, a lossless watermarking algorithm is proposed based on storage feature in this paper. Firstly, the superiority of embedding watermark based on storage feature is demonstrated theoretically and technically. Then, the basic concepts and operations on storage feature have been defined including length and angle of the polyline feature. In the process of embedding watermark, the watermark information is embedded into directions of polyline feature by the quantitative mechanism, while the positions of embedding watermark are determined by the feature length. Hence, the watermark can be extracted by the same geometric features without original data or watermark. Finally, experiments have been conducted to show that coordinate values remain unchanged after embedding watermark. Moreover, experimental results are presented to illustrate the effectiveness of the method.

영상의 양자화 계수를 이용한 DCT 기반 워터마킹 기법 (Improvement of DCT-based Watermarking Scheme using Quantized Coefficients of Image)

  • 임용순;강은영;박재표
    • 한국인터넷방송통신학회논문지
    • /
    • 제14권2호
    • /
    • pp.17-22
    • /
    • 2014
  • 모바일 정지영상 동영상 등의 정보에 디지털 신호를 삽입하여 저작권을 주장하는 방안으로 워터마킹 알고리즘을 들 수 있다. 본 논문에서는 영상의 양자화 계수를 이용한 이산 코사인 변환(DCT)을 기반으로 하는 워터마킹 알고리즘 방법을 제안하였다. 워터마크 삽입 기법은 디지털 원영상의 DCT와 양자화를 통하여 계수들(Quantized Coefficient)를 얻게 되었고, 양자화 계수들은 원하는 위치(Key)에 따라 DCT를 기반으로 한 워터마크(DCT-based watermark)를 삽입하게 되었다. 워터마크가 삽입된 부호화 정보는 역 양자화와 역 DCT를 통하여 워터마크 된 영상을 얻게 된다. 워터마크 추출 기법은 워터마크된 영상과 위치(Key)만을 사용하며, 워터마크 된 영상을 DCT와 양자화를 통하여 원하는 위치(Key)에서 계수를 분리하여 역 DCT하여 원 워터마크를 얻을 수 있었다. 모의실험 결과, 워터마크된 영상과 추출된 워터마크에서 영상의 화질(PSNR)과 워터마크의 정규화 상관도 (NC) 에서 만족할 만한 결과를 확인하였다.

웨이블릿 영역에서 부대역간 트리구조의 에너지 분포에 의한 디지털 워터마크 삽입 알고리즘 (Digital Watermark Algorithm Based on Energy Distribution of Subband Tree Structure in Wavelet Domain)

  • 서영호;최순영;박진영;김동욱
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 하계종합학술대회 논문집(4)
    • /
    • pp.85-88
    • /
    • 2002
  • In this paper, the proposed watermark algorithm is based on energy distribution of the subband coefficients in the frequency domain and edge of the original image in the spacial domain. Out of these information, the KeyMap which decides the embedded position of watermark is produced. And then the binary watermark is embedded into the wavelet coefficient of LL3 subband using KeyMap and LFSR(Linear Feedback Shift Register).

  • PDF

CRT-Based Color Image Zero-Watermarking on the DCT Domain

  • Kim, HyoungDo
    • International Journal of Contents
    • /
    • 제11권3호
    • /
    • pp.39-46
    • /
    • 2015
  • When host images are watermarked with CRT (Chinese Remainder Theorem), the watermark images are still robust in spite of the damage of the host images by maintaining the remainders in an unchanged state within some range of the changes that are incurred by the attacks. This advantage can also be attained by "zero-watermarking," which does not change the host images in any way. This paper proposes an improved zero-watermarking scheme for color images on the DCT (Discrete Cosine Transform) domain that is based on the CRT. In the scheme, RGB images are converted into YCbCr images, and one channel is used for the DCT transformation. A key is then computed from the DC and three low-frequency AC values of each DCT block using the CRT. The key finally becomes the watermark key after it is combined four times with a scrambled watermark image. When watermark images are extracted, each bit is determined by majority voting. This scheme shows that watermark images are robust against a number of common attacks such as sharpening, blurring, JPEG lossy compression, and cropping.

데이터 매트릭스와 비밀 키를 이용한 하이브리드 워터마킹 방법 (Hybrid Watermarking Scheme using a Data Matrix and Secret Key)

  • 전성구;김일환
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2006년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.144-146
    • /
    • 2006
  • The Data Matrix of two-dimensional bar codes is a new technology capable of holding relatively large amounts of data compared to the conventional one-dimensional bar code which is just a key that can access detailed information to the host computer database. A secret key is used to prevent a watermark from malicious attacks. We encoded copyright information into a Data Matrix bar code for encoding process and it was spread a pseudo random pattern using owner key. We embedded a randomized watermark into the image using watermark's embedding position, pattern generated with a secret key. The experimental results have shown that the proposed scheme has good quality and is very robust to various attacks, such as JPEG compression and noise. Also the performance of the proposed scheme is verified by comparing the copyright information with the information which is extracted from a bar code scantier.

  • PDF

교차 참조 점을 이용한 정지영상의 워터마크 삽입기법 (A Watermark Embedding Technique for Still Images Using Cross-Reference Points)

  • 이항찬
    • 대한전기학회논문지:시스템및제어부문D
    • /
    • 제55권4호
    • /
    • pp.165-172
    • /
    • 2006
  • In this paper we present a technique for detecting cross-reference points that allows improving watermark detect-ability. In general, Harris detector is commonly used for finding salient points. Harris detector is a kind of combined corner and edge detector which is based on neighboring image data distribution, therefore it has some limitation to find accurate salient points after watermark embedding or any kinds of digital attacks. The new method proposed in this paper used not data distribution but geometrical structure of a normalized image in order to avoid pointing error caused by the distortion of image data. After normalization, we constructed pre-specified number of virtual lines from top to bottom and left to right, and several of cross points were selected by a random key. These selected points specify almost same positions with the accuracy more than that of Harris detector after digital attacks. These points were arranged by a random key, and blocks centered in these points were formed. A reference watermark is formed by a block and embedded in the next block. Because same alteration is applied to the watermark generated and embedded blocks. the detect-ability of watermark is improved even after digital attacks.

키와 로고 방식을 혼합한 이미지 워터마킹의 강인성 평가 (Robustness Evaluation of Image Watermarking mixed Key and Logo Scheme)

  • 박영;김윤호;최세하;이명길
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2002년도 춘계종합학술대회
    • /
    • pp.598-601
    • /
    • 2002
  • 본 연구에서는 키와 로고 방식을 혼합한 이미지 워터마킹의 강인성을 평가하였다. 저작권자의 개인 ID(IDentification)는 키가 되고 워터마크는 로고영상을 선택하였다. 원 영상으로 사용한 실험영상은 Baboon, Cameraman과 Lena 표준영상을 사용하였고, 워터마크 영상은 32$\times$32와 64$\times$64 크기의‘Park’이라는 2진 영상을 사용하였다. 워터마크의 강인성 평가를 위하여 영상변형 및 JPEG 손실 압축이 가해진 워터마크가 삽입된 영상으로부터 워터마크 복원율을 구하였다. 실험 결과, 표준 영상들에 대하여 64$\times$64 크기의 워터마크를 삽입한 경우에 비하여 32$\times$32 크기의 워터마크 영상을 삽입한 경우에 영상축소에서는 평균 5.9%, 회전에서는 평균 13.9%, 잡음에서는 평균 6.5%, JPEG 손실 압축에서는 평균 4.2%로 더 우수한 복원율을 보였다.

  • PDF

An Adaptive Watermark Detection Algorithm for Vector Geographic Data

  • Wang, Yingying;Yang, Chengsong;Ren, Na;Zhu, Changqing;Rui, Ting;Wang, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.323-343
    • /
    • 2020
  • With the rapid development of computer and communication techniques, copyright protection of vector geographic data has attracted considerable research attention because of the high cost of such data. A novel adaptive watermark detection algorithm is proposed for vector geographic data that can be used to qualitatively analyze the robustness of watermarks against data addition attacks. First, a watermark was embedded into the vertex coordinates based on coordinate mapping and quantization. Second, the adaptive watermark detection model, which is capable of calculating the detection threshold, false positive error (FPE) and false negative error (FNE), was established, and the characteristics of the adaptive watermark detection algorithm were analyzed. Finally, experiments were conducted on several real-world vector maps to show the usability and robustness of the proposed algorithm.

High-Capacity and Robust Watermarking Scheme for Small-Scale Vector Data

  • Tong, Deyu;Zhu, Changqing;Ren, Na;Shi, Wenzhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.6190-6213
    • /
    • 2019
  • For small-scale vector data, restrictions on watermark scheme capacity and robustness limit the use of copyright protection. A watermarking scheme based on robust geometric features and capacity maximization strategy that simultaneously improves capacity and robustness is presented in this paper. The distance ratio and angle of adjacent vertices are chosen as the watermark domain due to their resistance to vertex and geometric attacks. Regarding watermark embedding and extraction, a capacity-improved strategy based on quantization index modulation, which divides more intervals to carry sufficient watermark bits, is proposed. By considering the error tolerance of the vector map and the numerical accuracy, the optimization of the capacity-improved strategy is studied to maximize the embedded watermark bits for each vertex. The experimental results demonstrated that the map distortion caused by watermarks is small and much lower than the map tolerance. Additionally, the proposed scheme can embed a copyright image of 1024 bits into vector data of 150 vertices, which reaches capacity at approximately 14 bits/vertex, and shows prominent robustness against vertex and geometric attacks for small-scale vector data.

Reversible Multipurpose Watermarking Algorithm Using ResNet and Perceptual Hashing

  • Mingfang Jiang;Hengfu Yang
    • Journal of Information Processing Systems
    • /
    • 제19권6호
    • /
    • pp.756-766
    • /
    • 2023
  • To effectively track the illegal use of digital images and maintain the security of digital image communication on the Internet, this paper proposes a reversible multipurpose image watermarking algorithm based on a deep residual network (ResNet) and perceptual hashing (also called MWR). The algorithm first combines perceptual image hashing to generate a digital fingerprint that depends on the user's identity information and image characteristics. Then it embeds the removable visible watermark and digital fingerprint in two different regions of the orthogonal separation of the image. The embedding strength of the digital fingerprint is computed using ResNet. Because of the embedding of the removable visible watermark, the conflict between the copyright notice and the user's browsing is balanced. Moreover, image authentication and traitor tracking are realized through digital fingerprint insertion. The experiments show that the scheme has good visual transparency and watermark visibility. The use of chaotic mapping in the visible watermark insertion process enhances the security of the multipurpose watermark scheme, and unauthorized users without correct keys cannot effectively remove the visible watermark.