• Title/Summary/Keyword: Watermarking

Search Result 1,139, Processing Time 0.026 seconds

Digital watermarking algorithm for authentication and detection of manipulated positions in MPEG-2 bit-stream (MPEG-2비트열에서의 인증 및 조작위치 검출을 위한 디지털 워터마킹 기법)

  • 박재연;임재혁;원치선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.378-387
    • /
    • 2003
  • Digital watermarking is the technique that embeds invisible signalsincluding owner identification information, specific code, or pattern into multimedia data such as image, video and audio. Watermarking techniques can be classified into two groups; robust watermarking and fragile(semi-fragile) watermarking. The main purpose of the robust watermarking is the protection of copyright, whereas fragile(semi-fragile) watermarking prevents image or video data from illegal modifications. To achieve this goal watermark should survive from unintentional modifications such as random noise or compression, but it should be fragile for malicious manipulations. In this paper, an invertible semi-fragile watermarkingalgorithm for authentication and detection of manipulated location in MPEG-2 bit-stream is proposed. The proposed algorithm embeds two kinds of watermarks, which are embedded into quantized DCT coefficients. So it can be applied directly to the compressed bit-stream. The first watermark is used for authentication of video data. The second one is used for detection of malicious manipulations. It can distinguish transcodingin bit-stream domain from malicious manipulation and detect the block-wise locations of manipulations in video data. Also, since the proposed algorithm has an invertible property, recovering original video data is possible if the watermarked video is authentic.

Digital Hologram Watermarking using Quad-tree Fresnelet Transform (Quad-tree Fresnelet 변환을 이용한 디지털 홀로그램 워터마킹)

  • Seo, Young Ho;Koo, Ja Myung;Lee, Yoon Hyuk;Kim, Dong Wook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.79-89
    • /
    • 2013
  • This paper proposes a watermarking scheme to protect ownership of a digital hologram, an ultra-high value-added content. It performs pre-defined levels of quad-tree Fresnelet transforms. The relationship among the same-positional-blocks is extracted as the digital pre-watermark. For the relationship, we use properties of a digital hologram that a hologram pixel retains all the information of the object and that the same size of partial holograms reconstructs the same size of object but different in their view points. Also we mix a set of private data with the pre-watermark and the result is encrypted by a block cipher algorithm with a private key. Experimental results showed that the proposed scheme is very robust for the various malicious and non-malicious attacks. Also because it extracts the watermarking data instead of inserting, the watermarking process does not harm the original hologram data. So, it is expected to be used effectively for invisible and robust watermark for digital holograms.

Research on Robustness of 2D DWT-Based Watermarking in Intermediate Viewpoint by 3D Warping

  • Park, Scott;Choi, Hyun-Jun;Yang, Won-Jae;Kim, Dong-Wook;Seo, Young-Ho
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.3
    • /
    • pp.173-180
    • /
    • 2014
  • This paper investigates the robustness of watermarking techniques for stereo or multi-view images generated from texture and depth images. A three-dimensional (3D) warping technique is applied to texture and depth images to generate stereo or multi-view images for a 3D display. By using the 3D warping technique, in this paper, we developed watermarking techniques and evaluated the robustness of these techniques that can extract watermarks from texture images even when the viewpoints are moved. A depth image is used to generate a stereo image with the largest viewpoint difference to the left and right. The overlapping region in the stereo image that does not disappear after warping is then obtained, and DWT is applied to this region to embed a watermark in the LL sub-band. The proposed watermarking techniques were found to yield bit error rates of about 3%-16% when they were applied to stereo images generated from texture and depth images. Furthermore, the results showed that the copyright could be seen when the extracted watermark was visually confirmed.

Robustness Analysis and Improvement on Transformed-key Asymmetric Watermarking System (변환키 비대칭 워터마킹 시스템의 강인성 분석 및 개선)

  • Kim, Nam-Jin;Choi, Doo-Seop;Song, Won-Seok;Choi, Hyuk;Kim, Tae-Jeong
    • Journal of Internet Computing and Services
    • /
    • v.11 no.5
    • /
    • pp.119-126
    • /
    • 2010
  • In this paper, we analyze the robustness of transformed-key asymmetric watermarking system and show its improvement by proposing a new detection method. Based on the assumption that the transformed-key asymmetric watermarking system is under the threat of subtraction attack, we first propose the criterion for the detection performance of the watermarking system and analyze the optimum condition on the system. Next, a new detection method is proposed to improve the detection performance of the system based on the criterion. The proposed improvement makes the system robust to not only subtraction attack but also Wu's attack.

Adaptive Watermarking Using Wavelet Transform & Spread Spectrum Method (확산스펙트럼 방식과 웨이브렛 변환을 이용한 적응적인 워터마킹)

  • 김현환;김두영
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.2
    • /
    • pp.389-395
    • /
    • 2000
  • Digital Watermarking is a research area which aims at hiding secret information in digital multimedia content such as images, audio, and video. In this paper, we propose a new watermarking method with visually recognizable symbols into the digital images using wavelet transform, spread spectrum method and multilevel threshold value in considering the wavelet coefficients. The information of watermark can be extracted by subtracting wavelet coefficients with the original image and the watermarked image. The results of this experiment show that the proposed algorithm was superior to other similar watermarking algorithms. We showed Watermarking algorithm in JPEG lossy compression, resizing, LSB(Least Significant Bit) masking, and filtering.

  • PDF

Watermarking technique and algorithm review of digital data for GIS

  • Kim Jung-Yeop;Hong Sung-Eon;Lee Yong-Ik;Park Soo-Hong
    • Spatial Information Research
    • /
    • v.13 no.4 s.35
    • /
    • pp.393-400
    • /
    • 2005
  • Due to the development of the network and Internet, it is easy to copy and spread digital data. These data has the advantage of being able to be copy without loss. However, this has generated a problem over copyright. The problem occurred in GIS, too. Although GIS data acquisition is the major cost there is insufficient effort made to protect copyright. For this reason watermarking could be a good method to guarantee owner's copyright. This paper will explain watermarking, and show an overview of watermarking studies connecting image and vector data.

  • PDF

A High Capacity Reversible Watermarking Using Histogram Shifting (히스토그램 이동을 이용한 고용량 리버서블 워터마킹)

  • Bae, Sung-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.76-82
    • /
    • 2010
  • Reversible watermarking hides some information in a digital image in such a way that an authorized party could decode the hidden information and also restore the image to its original state. In this paper, a high capacity reversible watermarking method using histogram shifting is proposed. In order to increase embedding capacity, the proposed method divides the image into $2{\times}2$ blocks and uses a paring(horizontal, vertical, diagonal) inside each block, then finds a maximum embedding bin which has the most frequent difference values among the parings. Also, the proposed method removes the overflow and underflow by using location map which including the maximum embedding bin and increases the embedding capacity by embedding iteratively. The experimental results show that the proposed method provides a high embedding capacity and good visual quality compared with the conventional reversible watermarking methods.

Reversible DNA Watermarking Technique Using Histogram Shifting for Bio-Security (바이오 정보보호 위한 히스토그램 쉬프팅 기반 가역성 DNA 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Lee, Eung-Joo;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.244-253
    • /
    • 2017
  • Reversible DNA watermarking is capable of continuous DNA storage and forgery prevention, and has the advantage of being able to analyze biological mutation processes by external watermarking by iterative process of concealment and restoration. In this paper, we propose a reversible DNA watermarking method based on histogram multiple shifting of noncoding DNA sequence that can prevent false start codon, maintain original sequence length, maintain high watermark capacity without biologic mutation. The proposed method transforms the non-coding region DNA sequence to the n-th code coefficients and embeds the multiple bits of the n-th code coefficients by the non-recursive histogram multiple shifting method. The multi-bit embedding process prevents the false start codon generation through comparison search between adjacent concealed nucleotide sequences. From the experimental results, it was confirmed that the proposed method has higher watermark capacity of 0.004-0.382 bpn than the conventional method and has higher watermark capacity than the additional data. Also, it was confirmed that false start codon was not generated unlike the conventional method.

Watermarking Algorithm that is Adaptive on Geometric Distortion in consequence of Restoration Pattern Matching (복구패턴 정합을 통한 기하학적 왜곡에 적응적인 워터마킹)

  • Jun Young-Min;Ko Il-Ju;Kim Dongho
    • The KIPS Transactions:PartB
    • /
    • v.12B no.3 s.99
    • /
    • pp.283-290
    • /
    • 2005
  • The mismatched allocation of watermarking position due to parallel translation, rotation, and scaling distortion is a problem that requires an answer in watermarking. In this paper, we propose a watermarking method robust enough to hold against geometrical distorting using restoration pattern matching. The proposed method defines restoration pattern, then inserts the pattern to a watermark embedded image for distribution. Geometrical distortion is verified by comparing restoration pattern extracted from distributed image and the original restoration pattern inserted to the image. If geometrical distortion is found, inverse transformation is equally performed to synchronize the watermark insertion and extraction position. To evaluate the performance of the proposed method, experiments in translation, rotation, and scaling attack are performed.

Robust video watermarking algorithm for H.264/AVC based on JND model

  • Zhang, Weiwei;Li, Xin;Zhang, Yuzhao;Zhang, Ru;Zheng, Lixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2741-2761
    • /
    • 2017
  • With the purpose of copyright protection for digital video, a novel H.264/AVC watermarking algorithm based on JND model is proposed. Firstly, according to the characteristics of human visual system, a new and more accurate JND model is proposed to determine watermark embedding strength by considering the luminance masking, contrast masking and spatial frequency sensitivity function. Secondly, a new embedding strategy for H.264/AVC watermarking is proposed based on an analysis on the drift error of energy distribution. We argue that more robustness can be achieved if watermarks are embedded in middle and high components of $4{\times}4$ integer DCT since these components are more stable than dc and low components when drift error occurs. Finally, according to different characteristics of middle and high components, the watermarks are embedded using different algorithms, respectively. Experimental results demonstrate that the proposed watermarking algorithm not only meets the imperceptibility and robustness requirements, but also has a high embedding capacity.