• Title/Summary/Keyword: Watermarking

Search Result 1,139, Processing Time 0.029 seconds

Template Recovery of DWT-DFT Composite Watermarking Scheme Using Collinear Cross-Ratio

  • Sepsirisuk, Kasemsuk;Atsuta, Kiyoaki;Kondo, Shozo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.225-228
    • /
    • 2005
  • According to a popularization of the Internet and digital lifestyle, digital watermarks have been proposed for protection of copyrighted multimedia content. In blind watermark detection, which an original image is not provided, robustness against geometric distortion and compression remains challenging. In this paper, we propose a new perceptual blind discrete wavelet transform - discrete Fourier transform (DWT-DFT) composite watermarking scheme that is robust against both general linear transform and JPEG compression. This algorithm constructs an image-dependent watermark in the most significant DWT coefficients, which is determined by using a hierarchical tree structure. Strength of watermark is determined from a just-noticeable difference (JND) profile of a perceptual model. Furthermore, a desired template is inserted into DFT domain of the watermarked image. In new manner, a cross-ratio of four collinear points is used for detecting the template. Experimental results have showed that the proposed scheme is robust against general linear distortion, JPEG compression and various general kinds of attacks in the Stirmark 3.1 watermark evaluation tool.

  • PDF

Similar Patterns for Semi-blind Watermarking

  • Cho, Jae-Hyun
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.4
    • /
    • pp.251-255
    • /
    • 2004
  • In this paper, we present a watermarking scheme based on the DWT (Discrete Wavelet Transform) and the ANN (Artificial Neural Network) to ensure the copyright protection of the digital images. The problem to embed watermark is not clear to select important coefficient in the watermarking. We used the RBF (Radial-Basis Function) to solve the problem. We didn't apply the whole wavelet coefficients, but applied to only the wavelet coefficients in the selected node. Using the ANN, although even the watermark casting process and watermark verification process are in public, nobody knows the location of embedding watermark except of authorized user. As the result, the watermark is good at the strength test-filtering, geometric transform and etc.

Improved Performance of Zerotrees Based Digital Watermarking

  • Panyapolsakul, S.;AmornraksaT.
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.868-871
    • /
    • 2002
  • Nowadays, zerotrees based digital watermarking techniques are considered to be an efficient watermarking technique used for multimedia data in a compressed form. This paper presents a technique for watermarking an image, by employing zerotrees derived from the wavelet packet coefficients of the transformed image to carry the watermark signal. By setting a proper threshold in zerotrees determining process, the watermark signal can be recovered without the need of original image. With our proposed technique, more amount of watermark signal can be embedded within the image, compared to ordinary wavelet transform based techniques. The experimental results show the improved performance in both qualities of the resultant watermarked image and robustness of the embedded watermark signal against common signal processing such as brightness/contrast enhancement, high-pass filtering, Gaussian noise adding and JPEG compression scheme

  • PDF

Wavelet Based Watermarking Technique Using PIM(Picture information measure) (PIM(Picture information measure)을 이용한 Wavelet기반 워터마킹 기법)

  • 김윤평;김영준;이동규;한수영;이두수
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1811-1814
    • /
    • 2003
  • In this paper, a novel watermarking technique is proposed to authenticate the owner-ship of copyright for the digital contents. Using the 2-level DWT(Discrete Wavelet Transform) we divide a specific frequency band into detailed blocks and apply PIM(picture information measure). After the complexity is calculated, the watermark is embedded in only on high complexity areas. Conventional watermarking technique damages to the original image, because it does not consider the feature of the whole area or a specific frequency band. Easily affected by noise and compression, it is difficult to extract the watermark. However, the proposed watermarking technique, considering the complexity of input image, does not damage to the original image Simulation result show that the proposed technique has the robustness of JPEG compression, noise and filtering such as a general signal processing

  • PDF

A Study on SVD & DWT -based watermarking for protecting rightful ownership (정당한 소유권 보호를 위한 DWT와 SVD기반의 디지털 워터마킹에 대한 연구)

  • 구대욱;한수영;이동규;이두수
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1815-1818
    • /
    • 2003
  • Digital watermarking is technique, which owner's information is inserted in digital image, with intention to protecting a copyright of digital image. In watermarking for copyright and authentication, watermark shouldn't be distorted or disappeared after general image processes like a compression and filtering. In this paper, we present a new digital image watermarking algorithm which combines the discrete wavelet transform (DWT) and the singular value decomposition (SVD). Simulation results show that the newly proposed algorithm is not only robust nevertheless variable attacks like noise, filtering and JPEG compression but also secure in application.

  • PDF

A Multiresolution Digital Watermarking Based on Image Statistics (영상의 통계적 특성에 기반한 다해상도 디지털 워터마킹)

  • 한성현
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.2
    • /
    • pp.25-32
    • /
    • 2000
  • Digital watermarking has been recently proposed as the means of intellectual property right protection of multimedia data. We present a novel watermarking scheme to hide a copyright information in a digital image. The method Is based on the 2D DWT(Discrete Wavelet Transform) and image statistics. Gaussian and Laplacian noises as the watermarks are added to the large wavelet coefficients at the high and middle frequency bands in the wavelet domain. Experimental results show that the proposed Laplacian watermark is stronger to several common image distortions, such as noises, JPEG coding as different qualities, Gaussian blurring, and edge enhancement.

  • PDF

Watermarking Method using Similarity between Frames in the Scene (장면내의 프레임간 유사성을 이용한 워터마킹 방법)

  • Ahn, I.Y.
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.42 no.4
    • /
    • pp.21-26
    • /
    • 2005
  • This paper presents a watermarking method using similarity between frames in the scene to resist to various attacks and to improve the video quality. This method inserts and detects a watermark in the frame pair every 3 frame. The experimental simulations show that the video quality is improved more than 45dB compared with previous methods and the watermark is resistant to frame drop, MPEG compression and low pass filter attacks.

Application of watermarking to error concealment in video communications (영상통신에서의 패킷 오류 은닉에 활용되는 워터마킹 기법)

  • Oh, Tae-Suk;Kim, Yong-Cheol
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.84-86
    • /
    • 2006
  • An informed watermarking algorithm is proposed in this work that aids in concealing packet loss errors in video communications. This watermark-based error concealment(WEC) method embeds a low resolution version of the video frame inside itself as watermark data. At the receiver, the extracted watermark is used as a reference for error concealment. The proposed DCT-based algorithm has features of informed watermarking in order to minimize the distortion of the host frame. At the encoder, a predictive feedback loop Is employed which helps to adjusts the strength of the scale factor Furthermore, some of the modified coefficients of the DCT signal are virtually free from distortion by employing bit- sign adaptivity. The performance of the detector is Qualitatively analyzed for error concealment applications where full-frame DCT embedding proved to be more advantageous.

  • PDF

Blind Watermarking Using DCT and Variance (DCT 및 분산을 이용한 블라인드 워터마킹)

  • Shin, Yong-Dal
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.10
    • /
    • pp.1276-1281
    • /
    • 2006
  • In this paper, We proposed a robust blind digital watermarking algorithm using variance and DCT domain. The proposed method embedded watermark signals into DC components of $8{\times}8$ block DCT using valiance, texture regions and smooth regions. In the digital watermarking algorithms using DCT domain, more robustness can be achieved if watermarks are embedded in DC components since DC components have much larger perceptual capacity than AC components. Experiment showed that robustness of the proposed method better than that of the conventional methods in JPEG quality and scaling attack.

  • PDF

A Feature-Based Robust Watermarking Scheme Using Circular Invariant Regions

  • Doyoddorj, Munkhbaatar;Rhee, Kyung-Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.5
    • /
    • pp.591-600
    • /
    • 2013
  • This paper addresses a feature-based robust watermarking scheme for digital images using a local invariant features of SURF (Speeded-Up Robust Feature) descriptor. In general, the feature invariance is exploited to achieve robustness in watermarking schemes, but the leakage of information about hidden watermarks from publicly known locations and sizes of features are not considered carefully in security perspective. We propose embedding and detection methods where the watermark is bound with circular areas and inserted into extracted circular feature regions. These methods enhance the robustness since the circular watermark is inserted into the selected non-overlapping feature regions instead of entire image contents. The evaluation results for repeatability measures of SURF descriptor and robustness measures present the proposed scheme can tolerate various attacks, including signal processing and geometric distortions.