• Title/Summary/Keyword: Watermarked image

Search Result 123, Processing Time 0.024 seconds

A Secret Key Watermarking for Authentication and Integrity (인증과 무결성을 위한 비밀키 워터마킹)

  • Woo, Chan-Il;Shin, In-Chul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3576-3583
    • /
    • 2000
  • Digital watermarks have recently been proposed for the purposes of copyright ptotechtion and autheutication for multimedia contents. A watermarking technique consists of an algorithm that incorporates a watermarking structure into an image in the spatial or frequency domains. In this paper we proposed a new watermarking method for authentication and integrity of digital images and the proposed algorithm uses the MD5 hash funiction and a symmetric key encryption algorithm. To decide the position of embedding watermark and the bit pasitionin the original image, the secret key is used as an input of the MD5 hash function. The simulation results show that the proposed algorithm has the advantage of difficulty to find positions of inserted watermarks, and keep the similar watermarked image quabty with Wong's method.

  • PDF

Watermarking Technique Using Exchanging Wavelet Coefficients (웨이블릿 계수 교환을 이용한 워터마킹 기법)

  • 주낙근;이재현;김동서
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.49-56
    • /
    • 2003
  • In this paper, we propose an efficient blind watermarking algorithm using wavelet transform. The proposed algorithm inserts watermark into the high frequency subbands that were transformed by 1-level wavelet transform of original image. Watermark insertion is achieved by exchanging each of the corresponding coefficients in the HL, LH, and HH, subbands according to the inserted watermark value. And watermark is extracted by the relation of wavelet coefficients without original image. Experimental results demonstrate that watermarked image has a good quality in terms of imperceptibility and is robust against various attacks.

Tamper Detection of Digital Images using Hash Functions (해쉬 함수를 이용한 디지털 영상의 위변조 검출)

  • Woo, Chan-Il;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.7
    • /
    • pp.4516-4521
    • /
    • 2014
  • Digital watermarking for digital image authentication and integrity schemes are based on fragile watermarking and can detect any modifications in a watermark embedded image by comparing the embedded watermark with the regenerated watermark. Therefore, the digital watermark for image authentication and integrity should be erased easily when the image is changed by digital image processing, such as scaling or filtering etc. This paper proposes an effective tamper detection scheme for digital images. In the proposed scheme, the original image was divided into many non-overlapping $2{\times}2$ blocks. The digital watermark was divided into two LSB of each block and the image distortion was imperceptible to the human eye. The watermark extraction process can be used to determine if the watermarked image has been tampered. The experimental results successfully revealed the effectiveness of the proposed scheme.

Fragile Watermarking for Image Authentication and Detecting Image Modification (영상 인증과 변형 검출을 위한 Fragile 워터마킹)

  • Woo, Chan-Il;Jeon, Se-Gil
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.459-465
    • /
    • 2009
  • Digital watermarking is a technique to insert a visually imperceptible information into an image so that the information can be extracted for the purposes of ownership verification or authentication. And watermarking techniques can be classified as either fragile or robust. Robust watermarks are useful for copyright and ownership assertion purposes. They cannot be easily removed and should resist common image manipulation procedures such as rotation, scaling, cropping, etc. On the other hand, fragile watermarks are easily corrupted by any image processing procedure, it can detect any change to an image as well as localizing the areas that have been changed. In this paper, we propose a fragile watermarking algorithm using a special hierarchical structure for integrity verification of image and detection of manipulated location. In the proposed method, the image to be watermarked is divided into blocks in a multi-level hierarchy and calculating block digital signatures in this hierarchy. The proposed method thwarts the cut-and-paste attack and the experimental results to demonstrate the effectiveness of the proposed method.

  • PDF

Digital Watermarking Technique using self-similarity (자기유사성을 이용한 디지털 워터마킹 기법)

  • Lee, Mun-Hee;Lee, Young-hee
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.4
    • /
    • pp.37-47
    • /
    • 2003
  • In this paper. we propose a new digital watermarking technique which uses the self-similarity of OCT(Discrete Cosine Transform) coefficients for the ownership protection of an image, similar coefficients are classified by SOM(Self-Organizing Map) out of Neural Network. The watermark is inserted into the selected cluster among clusters which consist of coefficients. Generally, the inserted watermark in high frequency regions of an image is eliminated by the compression process such as JPEG compressions, and the inserted watermark in low frequency regions of an image causes the distortion of an image quality. Therefore, the watermark is inserted into the cluster that has many coefficients in the middle frequency regions. This algorithm reduces the distortion of an image quality because of inserting the watermark into an image according to the number of coefficients in selected cluster. To extract watermarks from the watermarked image, the selected cluster is used without an original image. In the experiment, the new proposed algorithm have a good quality and endure attacks(JPEG compressions, filtering. zoom in, zoom out, cropping, noises) very well.

  • PDF

An Improved Watermark Detection Method Through Correlation Analysis (상관성 분석에 기반한 신뢰성있는 워터마크 검출 방법)

  • 강현수;최재각;이시웅;안치득;홍진우
    • Journal of Broadcast Engineering
    • /
    • v.6 no.2
    • /
    • pp.177-186
    • /
    • 2001
  • A digital watermark Is a perceptually unobtrusive signal embedded in some multimedia asset such as an Image for copyright protection. In many cases watermark detection amounts to thresholding a correlation vague between a watermark and a received image. Watermarking detection schemes can be classified into two types. Type 1 is based on a correlation process that is applied to the difference between an original image and an input Image to be tested. Type 2 is based on a correlation process that is directly applied to an input Image. The type 1 fails to prove the rightful ownership, while type 2 has an advantage in terms of rightful ownership compared with type 1. However, type 2 has a problem that doesnt appear in type 1. The problem is that correlation between a watermark and an original Image to be watermarked is trio significant to be ignored, when it Is normalized by watermarks energy. In this paper, based on the analysis of the correlation, we propose a novel watermarking scheme to minimize the effect and also verify the performance of the proposed scheme by experiments.

  • PDF

A Semi-fragile Image Watermarking Scheme Exploiting BTC Quantization Data

  • Zhao, Dongning;Xie, Weixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1499-1513
    • /
    • 2014
  • This paper proposes a novel blind image watermarking scheme exploiting Block Truncation Coding (BTC). Most of existing BTC-based watermarking or data hiding methods embed information in BTC compressed images by modifying the BTC encoding stage or BTC-compressed data, resulting in watermarked images with bad quality. Other than existing BTC-based watermarking schemes, our scheme does not really perform the BTC compression on images during the embedding process but uses the parity of BTC quantization data to guide the watermark embedding and extraction processes. In our scheme, we use a binary image as the original watermark. During the embedding process, the original cover image is first partitioned into non-overlapping $4{\times}4$ blocks. Then, BTC is performed on each block to obtain its BTC quantized high mean and low mean. According to the parity of high mean and the parity of low mean, two watermark bits are embedded in each block by modifying the pixel values in the block to make sure that the parity of high mean and the parity of low mean in the modified block are equal to the two watermark bits. During the extraction process, BTC is first performed on each block to obtain its high mean and low mean. By checking the parity of high mean and the parity of low mean, we can extract the two watermark bits in each block. The experimental results show that the proposed watermarking method is fragile to most image processing operations and various kinds of attacks while preserving the invisibility very well, thus the proposed scheme can be used for image authentication.

An Image Watermarking Scheme by Image Fusion in the Wavelet Domain (웨이블릿영역에서 영상융합에 의한 영상 워터마킹 기법)

  • Kim, Dong-Hyun;Choi, In-Ha
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.443-453
    • /
    • 2008
  • In this paper, the 1-level DWT(Discrete Wavelet Transform) coefficients of a binary logo image are used as the watermark. The watermark should be inserted in the same band which is equivalent to the host image when the watermark is inserted in the wavelet domain. This is the image fusion of the proposed watermarking method. The watermark is inserted in relatively significant coefficients after the insertion area is defined. The more significant coefficients have the important information because they are identified as the edge and major surface in images. The significant coefficients are defined when their absolute value exceeds the threshold. The standard deviation is used as the weight value of watermark insertion in order to strengthen the weight of the watermark insertion according to the value of the coefficients. The proposed watermarking method is an adaptive scheme, and the proposed two detection algorithms can be adaptively used when the watermarked image is distorted by cropping, filtering, or compression.

  • PDF

A Study on Semi-fragile Watermarking for Robust Authentication on Image Compression (영상압축에 강인한 변질검증 워터마킹에 관한 연구)

  • Ahn, Sung-Cheol;Lee, Kyoung-Hak;Park, Hwa-Bum;Ko, Hyung-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12C
    • /
    • pp.1165-1172
    • /
    • 2006
  • The rapid progress of the software has enabled individuals to copy and remark digital contents, which was only done by professionals. As a solution for the problems, contents producer needs to have certification and inspection of its contents and hold the proprietary right. A fragile watermarking method is able to detect the distortion and damage of watermarked image, but the watermark is also fragile on standardized image compression. That is the problem of fragile watermarking technique. We propose semi-fragile watermarking technique that is robust in the image processing such as JPEG compression used on computer, but it is fragile on the addition of noise and other attacks. In the proposed method, we can generate the watermarks of an image from the relationship between two block coefficients, also the generated watermark is inserted into insensible part of HVS(Human Visual System) after processing DCT(Discrete Cosine Transform) and using quantization. As a result, on the spatial domain, high detection of distortion has been possible even in slight changes, and could detect the corrupted blocks on image. Therefore, it is simple to judge the pixels at which some location has been changed in the space.

An adaptive digital watermark using the spatial masking (공간 마스킹을 이용한 적응적 디지털 워터 마크)

  • 김현태
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.39-52
    • /
    • 1999
  • In this paper we propose a new watermarking technique for copyright protection of images. The proposed technique is based on a spatial masking method with a spatial scale parameter. In general it becomes more robust against various attacks but with some degradations on the image quality as the amplitude of the watermark increases. On the other hand it becomes perceptually more invisible but more vulnerable to various attacks as the amplitude of the watermark decreases. Thus it is quite complex to decide the compromise between the robustness of watermark and its visibility. We note that watermarking using the spread spectrum is not robust enought. That is there may be some areas in the image that are tolerable to strong watermark signals. However large smooth areas may not be strong enough. Thus in order to enhance the invisibility of watermarked image for those areas the spatial masking characteristics of the HVS(Human Visual System) should be exploited. That is for texture regions the magnitude of the watermark can be large whereas for those smooth regions the magnitude of the watermark can be small. As a result the proposed watermarking algorithm is intend to satisfy both the robustness of watermark and the quality of the image. The experimental results show that the proposed algorithm is robust to image deformations(such as compression adding noise image scaling clipping and collusion attack).