• Title/Summary/Keyword: Watermarking of information

Search Result 841, Processing Time 0.028 seconds

Block Based Blind & Secure Gray Image Watermarking Technique Based on Discrete Wavelet Transform and Singular Value Decomposition

  • Imran, Muhammad;Harvey, Bruce A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.883-900
    • /
    • 2017
  • In this paper block based blind secure gray image watermarking scheme based on discrete wavelet transform and singular value decomposition is proposed. In devising the proposed scheme, security is given high importance along with other two requirements: robustness and imperceptibility. The use of discrete wavelet transform not only improves robustness but the selection of bands with high tolerance towards noise caused an improvement in terms of imperceptibility. The robustness further improved due to the involvement of singular vectors along with singular values in watermark embedding and extraction process. Finally, to achieve security, the selected DWT band is decomposed into smaller blocks and random blocks are chosen for modification. Furthermore, the elements of left and right singular vectors of selected blocks are chosen based on their dependence upon each other for watermark embedding. Various experiments using different images as host and watermark were conducted to examine and validate the proposed technique. Additionally, the proposed technique is tested against various attacks like compression, affine transformation, cropping, translation, X shearing, scaling, Y shearing, filtering, blurring, different kinds of noises, histogram equalization, rotation, etc. Lastly, the proposed technique is compared with state-of-the-art watermarking techniques and their comparison shows significant improvement of proposed scheme over existing techniques.

Watermarking Technique using Image Characteristics

  • Jung, Soo-Mok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.187-193
    • /
    • 2021
  • In this paper, we propose an image watermarking technique that effectively hides confidential data in the LSB of image pixels by utilizing the characteristics of the image. In the proposed technique, the image is precisely divided into boundary surface and normal region other than the boundary surface and performs different processing. The boundary surface existing in the image is created by meeting different regions and contains important information of the image. One bit of confidential data is concealed in the LSB of the pixel at the boundary surface to preserve the characteristics of the boundary surface. In normal region other than the boundary surface, the pixel values are similar, and the change with the adjacent pixel values is smooth. Based on this property, even if the 2 bits of confidential data are hidden in the lower 2 bits of the pixel in the normal region, the difference cannot be visually distinguished. When confidential data is concealed in an image as described above, the amount of confidential data concealed in an image can be increased while maintaining excellent image quality. Concealing confidential data by applying the proposed method increases the amount of confidential data concealed by up to 84.6% compared to the existing method. The proposed technique can be effectively used for commercial image watermarking that hides copyright information.

Audio Watermarking Technique for Embedding Side Information during Acoustic Transmission through the Air (공기 중 음향 전송 시 부가 정보 삽입을 위한 오디오 워터마킹 기법)

  • Choi, Joon-Hwan;Song, Won-Seok;Choi, Hyuk;Kim, Tae-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.150-156
    • /
    • 2010
  • Audio watermarking is the process of embedding inaudible information in an audio signal and has been widely used for copyright protection. In this research, we use the audio watermarking not for copyright protection but for the transmission of side information for user convenience, presenting an algorithm suitable for this purpose. Our new algorithm includes watermark embedding/extraction methods during acoustic transmission through the air that employ energy modulation of the audio signal and an efficient two-step synchronization method. The proposed algorithm is evaluated in experiments of conveying information from audio speakers to a mobile phone. The results show that reliable transmission is possible within a 5m range, which is an improvement achieved by our algorithm as compared to the existing one.

Design of Watermarking Algorithm of Medical Image Security based on Picture Archiving & Communication System (PACS을 기반으로 한 의료 영상 보안 워터마킹 알고리즘 설계)

  • Lee, Yun-Bae;Oh, Guan-Tack;Jung, Min-Six
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.527-530
    • /
    • 2008
  • The watermarking method was suggested to protect the right of the copyright and the right of property, data loss is yes or not, copy prevention and pursuit about the brainchild(music, image, video and so on) in the early 1990. In this paper, we suggest the watermarking algorithm against the geometrical transformation of the medical images applied the Watershed algorithm. The robust watermarking methodology is being suggested using the several algorithm against the attacks such as compression, filtering, noise and geometrical transformation of the medical image.

  • PDF

A Secret Key Watermarking for Authentication and Integrity (인증과 무결성을 위한 비밀키 워터마킹)

  • Woo, Chan-Il;Shin, In-Chul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3576-3583
    • /
    • 2000
  • Digital watermarks have recently been proposed for the purposes of copyright ptotechtion and autheutication for multimedia contents. A watermarking technique consists of an algorithm that incorporates a watermarking structure into an image in the spatial or frequency domains. In this paper we proposed a new watermarking method for authentication and integrity of digital images and the proposed algorithm uses the MD5 hash funiction and a symmetric key encryption algorithm. To decide the position of embedding watermark and the bit pasitionin the original image, the secret key is used as an input of the MD5 hash function. The simulation results show that the proposed algorithm has the advantage of difficulty to find positions of inserted watermarks, and keep the similar watermarked image quabty with Wong's method.

  • PDF

Digital Watermarking of 2D Vector Map Data for the Accuracy and Topology of the Data (벡터 맵 데이터의 정확성과 위상을 고려한 디지털 워터마킹)

  • Kim, Junh-Yeop;Park, Soo-Hong
    • Spatial Information Research
    • /
    • v.17 no.1
    • /
    • pp.51-66
    • /
    • 2009
  • There have been concerned about the copyright as numerous data are digitalized because of the growth of performance of the computer and Internet. Digital watermarking is one of strong methods to protect copyright. We proposed a novel digital watermarking for vector map data. Although vector map data are used widely in GIS, there is little interest in copyright. The proposed method is to embed and extract watermarks using CRC principle. The experimental results show that this method can protect the copyright of the vector map by extracting embedded watermarks. Therefore, the proposed method can be utilized as the technique to protect vector map data.

  • PDF

A Study on the DVR System Realization with Watermarking and MPEG-4 for Realtime Processing Speed Improvement (워터마킹과 MPEG4를 적용한 DVR 시스템과 실시간 처리 속도 향상에 관한 연구)

  • Kim, Ja-Hwang;Hur, Chang-Wu;Ryu, Kwang-Ryol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.1107-1111
    • /
    • 2005
  • The DVR system realization with watermarking and MPEG-4 for real time processing speed improvement is presented in this paper. For the real time processing the system is used the DSP processor, Quick DMA for data transmission, watermarking for security and MPEG-4 compression for facility. The algorithms are that the operational structure has the internal memory of processor, and the optimal realization is suitable to form the DSP processor structure r processed for the iterative operations. The experimental result shows the real time processing is improved 12% over for the D1 image in comparison with the other system.

  • PDF

Coefficient Adaptive Multiple Insertion Method With Blind Watermarking (계수 적응적 다중삽입 블라인드 워터마킹 기법)

  • Shin, Chang-Doon;Kim, Bong-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.489-497
    • /
    • 2009
  • Most of existent blind watermarking methods in frequency domain use coefficient relationship to detect the watermark without original image. But the change in coefficient values occurred when the original image was attacked by lossy JPEG compression or noise addition. So robustness of watermark detection was weaken. In order to solve these problems, this paper presents a robust watermarking method, which enables multiple watermark insertion. Also, in order to reduce errors in the detected value of watermarks according to small changes in the coefficient relationship when detecting watermarks, it set the change guard value for variation of the coefficients. The experimental results show that the proposed method has good image quality and is robust to various attacks such as the JPEG lossy compression, noise addition, etc.

A New Watermarking Algorithm Using the Edge and PN Code (에지와 대역확산기술을 이용한 디지털 워터마킹 기법)

  • Song Sang-Ju;Lee Doo-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.13-18
    • /
    • 2004
  • In this paper, we proposed a new digital watermarking technique. It uses frequency domain of discrete wavelet transform(DWT). watermarking technique is one of the most important tools for DRM(Digital Right Management) We proposed a new algorithm watermark insertion and detection. This technique cleats the watermark sequence using the edge image, spread spectrum technique and DWT. We tested the technique with various attacks. and found that it satisfies the watermarking evaluation criteria. Cox similarity measurement value is more than 6 on the Lena image and PSNR is more than 40dB on JPEG, Collusion. Clopping and Scatting. By the result, we proved that the new technique satisfies the requirement of Digital contents distribution, which are undeletablility tenacity, statistical undetectablility.

  • PDF

A Wavelet-based Blind Watermarking Scheme Using Pixel Correlation of Low Sub-band (저주파 대역의 픽셀 상관도를 이용한 웨이블릿 기반 블라인드 워터마킹 기법)

  • Yoo, Kil-Sang;Jahng, Sung-Gahb;Lee, Won-Hyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9C
    • /
    • pp.1298-1305
    • /
    • 2004
  • Most watermarking techniques embed watermarks in the middle frequency range for robustness and invisibility. In our proposed watermarking algorithms embed the gaussian sequence watermark into low frequency area of the wavelet transform domain because the histogram of low sub-band area is composed by similar coefficients. Also, our proposed scheme doesn't need the original image in extraction procedure The experimental results show good robustness against the Check Mark benchmarking tools.