• Title/Summary/Keyword: Watermarking of information

Search Result 845, Processing Time 0.024 seconds

Zero-Watermarking based on Chaotic Side Match Vector Quantization (무질저한 SMVQ 기반의 제로-워터마킹)

  • Kim, Hyung-Do;Park, Chan-Kwon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.37-44
    • /
    • 2009
  • Digital watermarking is a technology for preventing illegal copying, for protecting intellectual property rights and copyrights, and for suggesting grounds of the ownership by inserting watermarks into digital contents. Generally speaking, watermarking techniques cannot escape from data distortion and quality degradation due to the watermark insertion. In order to overcome the shortcoming, zero-watermarking techniques which do not change the original data have been proposed recently. This paper proposes CSMVQ(Chaotic SMVQ), a zero-watermarking system for SMVQ(Side Match Vector Quantization) which shows better compression ratio and quality and less blocking effect than VQ(Vector Quantization). In SMVQ, compression progresses from left top to right bottom in order to use the information of the two neighbor blocks, so it is impossible to insert watermarks chaotically. In the process of encoding, CSMVQ dynamically considers the information of the (1 to 4) neighbor blocks already encoded. Therefore, watermark can be inserted into digital contents in chaotic way. Experimental results show that the image quality compressed by CSMVQ is better than that of SMVQ and the inserted watermark is robust against some common attacks.

Hybrid Asymmetric Watermarking using Correlation and Critical Criteria (상관도와 임계치 방식을 이용한 다중검출 비대칭 워터마킹)

  • Li De;Kim Jong-Weon;Choi Jong-Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.726-734
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are the same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched by several researchers as a next generation watermarking technology. In this paper, hybrid asymmetric watermarking algorithm is proposed. This algorithm is composed of correlation detection method and critical criteria method. Each method can be individually used to detect watermark from a watermarked content. Hybrid asymmetric detection is complement between two methods, and more feasible than when each method is used respectively, Private key and public key are generated by secure linear transformation and specific matrix. As a result, we have proved the proposed algorithm is secured than symmetric watermarking algorithms. This algorithm can expand to multi bits embedding watermark system and is robust to JPEG and JPEG2000 compression.

A Data Embedding Technique for Image Watermarking using Fresnel Transform (이미지 워터마킹을 위한 Fresnel 변환을 이용한 데이타 삽입 기법)

  • Seok Kang;Yoshinao Aoki
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.70-76
    • /
    • 2003
  • Digital watermarking is a technique embedding hidden information into multimedia data imperceptibly such as images and sounds. Generally an original image is transformed and coded watermark data is embedded in frequency domain watermarking models. In this paper, We propose a new data embedding method using Fresnel transform. A watermark image is fresnel-transformed and the intensity of transformed pattern is embedded into original image. Our watermarking model has the flexibility In data embedding. It is possible to get many embedding patterns from a single watermark image by using various distance parameters with Fresnel transform. All kinds of image models such af shape, letter and photo ran be used as a watermark data. The watermarking experiments were conducted to show the validity of the proposed method, and the results show that our method has the robustness against lossy compression, filtering and geometric transformation.

Digital watermarking algorithm for authentication and detection of manipulated positions in MPEG-2 bit-stream (MPEG-2비트열에서의 인증 및 조작위치 검출을 위한 디지털 워터마킹 기법)

  • 박재연;임재혁;원치선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.378-387
    • /
    • 2003
  • Digital watermarking is the technique that embeds invisible signalsincluding owner identification information, specific code, or pattern into multimedia data such as image, video and audio. Watermarking techniques can be classified into two groups; robust watermarking and fragile(semi-fragile) watermarking. The main purpose of the robust watermarking is the protection of copyright, whereas fragile(semi-fragile) watermarking prevents image or video data from illegal modifications. To achieve this goal watermark should survive from unintentional modifications such as random noise or compression, but it should be fragile for malicious manipulations. In this paper, an invertible semi-fragile watermarkingalgorithm for authentication and detection of manipulated location in MPEG-2 bit-stream is proposed. The proposed algorithm embeds two kinds of watermarks, which are embedded into quantized DCT coefficients. So it can be applied directly to the compressed bit-stream. The first watermark is used for authentication of video data. The second one is used for detection of malicious manipulations. It can distinguish transcodingin bit-stream domain from malicious manipulation and detect the block-wise locations of manipulations in video data. Also, since the proposed algorithm has an invertible property, recovering original video data is possible if the watermarked video is authentic.

Digital Watermarking in Wavelet Transform Domain for Information Protection of Color Image (칼라 영상 정보 보호를 위한 웨이브릿 변환 영역에서의 디지털 워터마킹)

  • 박정빈;황재문;정성환
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10c
    • /
    • pp.574-576
    • /
    • 1998
  • 본 논문은 디지털 칼라 영상 정보를 보호하기 위해 위치와 주파수 정보를 가지는웨이브릿 변환을 이용한 워터마킹(watermarking)방법에 대하여 연구하였다. 본 연구에서는 칼라 영상의 각 채널에 대해 인간의 시각에 덜 민감한 고주파 계수영역과 영상 압축에 견고한 저주파 계수영역에 워터마크를 삽입하였다. 이 방법은 불법적인 조작에 강한 워터마크를 구현할 수가 있다. 실험에서 칼라 영상의 각 채널을 웨이브릿 변환한 후 Seal 영상을 삽입하였다. 실험 결과, 워터마크된 칼라 영상에 삽입된 Seal 영상은 잡음으로 영상이 훼손된 경우라도 Seal 영상을 AND 연산함으로써 구할 수 있었고, 압축에도 견고함을 보였다.

  • PDF

A Study on the Digital Audio Watermarking for a High Quality Audio (고음질을 위한 디지털 오디오 워터마킹에 관한 연구)

  • Jo, Byeong-Rok;Jeong, Il-Yong;Park, Chang-Gyun;Lee, Gang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.39 no.3
    • /
    • pp.53-61
    • /
    • 2002
  • In this paper, the authors proposed the digital audio watermarking algorithm for a high quality audio. Today, the digital watermark is used to confirm to the digital copyright protection, not only the digital image but the digital audio study is an activeness in the digital watermarking area. Especially, the watermark insertion in the digital audio area affects deeply not only a robustness but the audio quality of the watermarked audio data. Generally, the audio watermark is inserted in the frequence domain after FFT, the quality of audio data is affected by the watermark insertion. Thus, a high quality audio to be maintained at the same time, the study related a inserting of the robustness watermark happened to a hot issue. In this paper, the authors proposed the digital audio watermarking algorithm using psychoacoustic model and MDCT/IMDCT (Modified Discrete Cosine Transform/Inverse Modified Discrete Cosine Transform). In the proposed scheme, the authors experimented the stereo audio file with 44.1KHz, and 128kbps for the audio watermarking algorithm proposed. When the audio data is processed by MDCT, the watermark is able to insert into the frequence domain with 256, 1024 and 2048 interval. In case of 50㎳ RMS window, it was confirmed that the difference between the original audio data and the watermarked audio data of RMS power is 0.8㏈.

An Image Retrieving Scheme Using Salient Features and Annotation Watermarking

  • Wang, Jenq-Haur;Liu, Chuan-Ming;Syu, Jhih-Siang;Chen, Yen-Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.213-231
    • /
    • 2014
  • Existing image search systems allow users to search images by keywords, or by example images through content-based image retrieval (CBIR). On the other hand, users might learn more relevant textual information about an image from its text captions or surrounding contexts within documents or Web pages. Without such contexts, it's difficult to extract semantic description directly from the image content. In this paper, we propose an annotation watermarking system for users to embed text descriptions, and retrieve more relevant textual information from similar images. First, tags associated with an image are converted by two-dimensional code and embedded into the image by discrete wavelet transform (DWT). Next, for images without annotations, similar images can be obtained by CBIR techniques and embedded annotations can be extracted. Specifically, we use global features such as color ratios and dominant sub-image colors for preliminary filtering. Then, local features such as Scale-Invariant Feature Transform (SIFT) descriptors are extracted for similarity matching. This design can achieve good effectiveness with reasonable processing time in practical systems. Our experimental results showed good accuracy in retrieving similar images and extracting relevant tags from similar images.

Improved Performance of Zerotrees Based Digital Watermarking

  • Panyapolsakul, S.;AmornraksaT.
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.868-871
    • /
    • 2002
  • Nowadays, zerotrees based digital watermarking techniques are considered to be an efficient watermarking technique used for multimedia data in a compressed form. This paper presents a technique for watermarking an image, by employing zerotrees derived from the wavelet packet coefficients of the transformed image to carry the watermark signal. By setting a proper threshold in zerotrees determining process, the watermark signal can be recovered without the need of original image. With our proposed technique, more amount of watermark signal can be embedded within the image, compared to ordinary wavelet transform based techniques. The experimental results show the improved performance in both qualities of the resultant watermarked image and robustness of the embedded watermark signal against common signal processing such as brightness/contrast enhancement, high-pass filtering, Gaussian noise adding and JPEG compression scheme

  • PDF

Multi-watermarking method for copyright protection and confidentiality for digital image (디지털 영상의 저작권 보호와 기밀성을 위한 다중워터마킹 방법)

  • 이성우;이형욱;신재호
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.1071-1074
    • /
    • 1999
  • In this paper, we present a multi-watermarking method for a copyright protection and confidentiality for an original digital image. One watermark is used for a copyright protection and another for a copyright protection and another for a confidentiality and a detection of unauthorized copies.

  • PDF

Digital Watermarking Scheme Adopting Variable Spreading Sequence in Wireless Image Transmission (무선 이미지 전송에서 가변확산부호를 적용한 Digital Watermarking 기법)

  • 조복은;노재성;조성준
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.109-112
    • /
    • 2002
  • In this paper, we propose the efficient digital watermarking scheme to transmit effectively the compressed medical image that embedded with watermarking data in mobile Internet access channel. The wireless channel error based on multiple access interference (MAI) is closely related to the length of spreading sequence in CDMA system. Also, the fixed length coded medical image with watermark bit stream can be classified by significance of source image. In the simulation, we compare the peak signal to noise ratio (PSNR) performance when the watermarked image with a simple symbol and when the watermarked image with a text file is transmitted using variable length of spreading sequences in case of limited length of spread sequence.

  • PDF