• Title/Summary/Keyword: Watermarking of information

Search Result 841, Processing Time 0.023 seconds

Robust Fractal Compression Based Watermarking System (프랙탈 압축 기법을 이용한 워터마킹 시스템)

  • 김연희;김동윤;위영철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10b
    • /
    • pp.421-423
    • /
    • 2001
  • 디지털 워터마킹(Digital Watermarking)은 디지털 영상에 저작권을 증명할 수 있는 정보를 삽입하는 방법으로써 영상의 화질 저하를 최소화하면서 저작권 신호 추출의 정확도를 최대화하여야 한다. 본 논문에서는 프랙탈(Fractal) 영상 압축에서 변환 함수의 계수를 디지털 워터마킹 키(Key)에 따라 제한하여 디지털 워터마킹(Digital Watermarking) 신호를 삽입하는 방법을 제한한다. 본 방법은 탐색 범위 제한에 의한 기존의 프랙탈(Fractal) 기반 디지털 위터마킹(Digital Watermarking) 방법보다 영상 변형에 강인하고 화질의 저하를 완화하는 장점을 가진다.

  • PDF

Wavelet based Watermarking Technique for the Digital Contents Protection (지적재산권 보호를 위한 웨이블릿 기반 워터마킹 기술)

  • 송학현;김윤호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.912-917
    • /
    • 2004
  • The increase of illegal usage and conflict in digital content market would diminish motivation of creators for their work, furthermore break down digital content market on cyber-space. Watermarking technology support to the legal users by the protection technique based on the digital content copyright protection method(DRM). Most of previous digital watermarking have embeded to the content. In this paper, we propose a wavelet based watermarking method which is used for implementing in the frequency domain.

HSI Channel Analysis for Effective Image Watermarking (효율적 영상 워터마킹을 위한 HSI 채널 분석)

  • Lee, Joo-Shin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.6 no.3
    • /
    • pp.183-188
    • /
    • 2013
  • Image watermarking schemes are researched in the field of digital watermarking for multimedia data copyright protection, but color image watermarking scheme is a little bit insufficient. In this paper, we analyzed HSI channel analysis in color models for effective image watermarking. Simulation results are satisfied with invisibility and correlation from the extracted watermark.

A Study on the Wavelet-based Watermarking Techniques Comparison for Digital Image (웨이블릿 기반의 영상 워터마킹 기법 비교 연구)

  • 김선우;최연성;박한엽;김현주
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.629-632
    • /
    • 2001
  • In this paper, We compared with advantage and disadvantage about several wavelet-basis watermarking techniques for digital image. Watermarking is embedding a digital signal called as 'watermark' into images to claim the ownership. In this study, simulation performed using wavelet based method among the various watermarking techniques proposed on domestic and foreign country. The experimental results show that the efficiency watermarking techniques among the proposed various techniques with good quality and robustness property.

  • PDF

Removable Logo Watermarking Technique (제거 가능한 로고 워터마킹 기법)

  • Cho, Dong-Joon;Choi, Hyuk
    • The KIPS Transactions:PartD
    • /
    • v.15D no.6
    • /
    • pp.857-860
    • /
    • 2008
  • In this paper, we propose a removable logo watermarking technique for copyright protection of digital image. Then, visible logo is inserted into digital image to protect copyright, and the information removed by the logo is embedded by a new quantization watermarking. In a legal usage, the image can be reconstructed without logo after watermarking detection process. Experiment results show that the proposed method maintains high image quality in both watermarked images and reconstructed images, and is practical and effective in protection of image copyright.

An Implementation on the Digital Audio Watermarking for High Quality Audio

  • Park, Jong-Tae;Kang Hyeon RHEE
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.454-457
    • /
    • 2002
  • In this paper, we proposed digital audio watermarking algorithm for high quality audio. Nowadays, digital watermark used to confirm to digital copyright protection, not only digital image but also digital audio is active in the digital watermarking study. In this paper, we proposed digital audio watermarking algorithm using psychoacoustics model and MDCT/IMDCT (Modified Discrete Cosine Transform/Inverse Modified Discrete Cosine Transform) for the high quality audio watermark. In the proposed scheme, we used to 441KHz, 128kbps and stereo audio data for audio watermarking algorithm. Audio data is passed by MDCT; watermark can be inserted into the frequency domain with 256,1024 and 2048 interval.

  • PDF

Contents based Watermarking on Image (영상의 내용 기반 워터마킹)

  • 강호경;정용주;노용만
    • Proceedings of the IEEK Conference
    • /
    • 2000.11d
    • /
    • pp.207-210
    • /
    • 2000
  • We propose a content based watermarking technique in multimedia management system. In the proposed technique, a content description technique of MPEG-7 for the multimedia database is adopted into a watermarking technique. With multimedia features described by MPEG-7 standard, we propose a novel watermarking technique where MPEG-7 descriptors are regarded as perceptually significant portions. The watermark is embedded in cooperating with multimedia features such as MPEG-7 descriptor. To verify the feasibility and performance of proposed watermarking technique, experiments with the MPEG-7 database are performed.

  • PDF

A Robust DNA Watermarking in Lifting Based 1D DWT Domain (Lifting 기반 1D DWT 영역 상의 강인한 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong;Kwon, Seong-Geun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.10
    • /
    • pp.91-101
    • /
    • 2012
  • DNA watermarking have been interested for both the security of private genetic information or huge DNA storage information and the copyright protection of GMO. Multimedia watermarking has been mainly designed on the basis of frequency domain, such as DCT, DWT, FMT, and so on, for the robustness and invisibility. But a frequency domain watermarking for coding DNA sequence has a considerable constraint for embedding the watermark because transform and inverse transform must be performed without completely changing the amino acid sequence. This paper presents a coding sequence watermarking on lifting based DWT domain and brings up the availability of frequency domain watermarking for DNA sequence. From experimental results, we verified that the proposed scheme has the robustness to until a combination of 10% point mutations, 5% insertion and deletion mutations and also the amino preservation and the security.

A Semi-fragile Image Watermarking Scheme Exploiting BTC Quantization Data

  • Zhao, Dongning;Xie, Weixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1499-1513
    • /
    • 2014
  • This paper proposes a novel blind image watermarking scheme exploiting Block Truncation Coding (BTC). Most of existing BTC-based watermarking or data hiding methods embed information in BTC compressed images by modifying the BTC encoding stage or BTC-compressed data, resulting in watermarked images with bad quality. Other than existing BTC-based watermarking schemes, our scheme does not really perform the BTC compression on images during the embedding process but uses the parity of BTC quantization data to guide the watermark embedding and extraction processes. In our scheme, we use a binary image as the original watermark. During the embedding process, the original cover image is first partitioned into non-overlapping $4{\times}4$ blocks. Then, BTC is performed on each block to obtain its BTC quantized high mean and low mean. According to the parity of high mean and the parity of low mean, two watermark bits are embedded in each block by modifying the pixel values in the block to make sure that the parity of high mean and the parity of low mean in the modified block are equal to the two watermark bits. During the extraction process, BTC is first performed on each block to obtain its high mean and low mean. By checking the parity of high mean and the parity of low mean, we can extract the two watermark bits in each block. The experimental results show that the proposed watermarking method is fragile to most image processing operations and various kinds of attacks while preserving the invisibility very well, thus the proposed scheme can be used for image authentication.

Geometrically Invariant Image Watermarking Using Connected Objects and Gravity Centers

  • Wang, Hongxia;Yin, Bangxu;Zhou, Linna
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2893-2912
    • /
    • 2013
  • The design of geometrically invariant watermarking is one of the most challenging work in digital image watermarking research area. To achieve the robustness to geometrical attacks, the inherent characteristic of an image is usually used. In this paper, a geometrically invariant image watermarking scheme using connected objects and gravity center is proposed. First, the gray-scale image is converted into the binary one, and the connected objects according to the connectedness of binary image are obtained, then the coordinates of these connected objects are mapped to the gray-scale image, and the gravity centers of those bigger objects are chosen as the feature points for watermark embedding. After that, the line between each gravity center and the center of the whole image is rotated an angle to form a sector, and finally the same version of watermark is embedded into these sectors. Because the image connectedness is topologically invariant to geometrical attacks such as scaling and rotation, and the gravity center of the connected object as feature points is very stable, the watermark synchronization is realized successfully under the geometrical distortion. The proposed scheme can extract the watermark information without using the original image or template. The simulation results show the proposed scheme has a good invisibility for watermarking application, and stronger robustness than previous feature-based watermarking schemes against geometrical attacks such as rotation, scaling and cropping, and can also resist common image processing operations including JPEG compression, adding noise, median filtering, and histogram equalization, etc.