• 제목/요약/키워드: Watermarking of information

Search Result 841, Processing Time 0.025 seconds

Reversible Multipurpose Watermarking Algorithm Using ResNet and Perceptual Hashing

  • Mingfang Jiang;Hengfu Yang
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.756-766
    • /
    • 2023
  • To effectively track the illegal use of digital images and maintain the security of digital image communication on the Internet, this paper proposes a reversible multipurpose image watermarking algorithm based on a deep residual network (ResNet) and perceptual hashing (also called MWR). The algorithm first combines perceptual image hashing to generate a digital fingerprint that depends on the user's identity information and image characteristics. Then it embeds the removable visible watermark and digital fingerprint in two different regions of the orthogonal separation of the image. The embedding strength of the digital fingerprint is computed using ResNet. Because of the embedding of the removable visible watermark, the conflict between the copyright notice and the user's browsing is balanced. Moreover, image authentication and traitor tracking are realized through digital fingerprint insertion. The experiments show that the scheme has good visual transparency and watermark visibility. The use of chaotic mapping in the visible watermark insertion process enhances the security of the multipurpose watermark scheme, and unauthorized users without correct keys cannot effectively remove the visible watermark.

Performance Analysis for Digital Watermarking on the Wavelet Transform Domain (웨이브릿 변환 영역에서 디지털 워터마킹의 성능분석)

  • 김진태;김동욱
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.2
    • /
    • pp.314-321
    • /
    • 2003
  • Recently, many studies about digital watermarking have been doing, and their purpose is to protect copyright of multimedia data. In this paper, the performances of digital watermarkings, in order to hide information of copyright into digital images, are analyzed. The watermarks embedded in subbands on wavelet transform domain are transformed by the processing such as image compression, and the degree of the transformation in each subband depend on its statistical characteristics. That says, we must consider the characteristics of subbands for better watermarking.

A Software Watermarking for Java Programs (Java 프로그램에 적용가능한 소프트웨어 워터마킹)

  • Shin, Weon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.2049-2056
    • /
    • 2010
  • The illegal copy of computer software have been one of the most serious threats in information society. But a number of protection schemes to solve it have proposed, there are a lot of difficulties for prevention from illegally distributing software through emerging Internet environments. In this paper, we propose a software watermarking scheme for Java programs which it have been popular on the Internet. The proposed scheme can be efficiently implemented and provide a robust software watermark for the protection of the copyright of Java programs.

A Robust Digital Watermarking Method based on A Wavelet Transform (DWT(Discrete Wavelet Transform) 기반의 강인한 워터마킹(watermarking) 기법)

  • 김상욱;오상헌;류용준;이근영
    • Proceedings of the IEEK Conference
    • /
    • 2001.06d
    • /
    • pp.77-80
    • /
    • 2001
  • In this paper, we have introduced a new watermarking method using the Discrete Wavelet Transform (DWT). This method has two features. Firstly the trade-off between the quality and the robustness, and between the quality and the capacitance can be controlled. Next, this method use different scheme according to the watermarks. We have also implemented numerical examples for several kinds of attack. It is found that watermarking method in this paper is robust to above attacks.

  • PDF

An Audio Watermarking Technique Using BPSK with Variable Carrier Frequency (가변 반송파 BPSK를 이용한 오디오 워터마킹 기법)

  • 이형욱;박세형;문용민;한상우;신재호
    • Proceedings of the IEEK Conference
    • /
    • 2000.06d
    • /
    • pp.110-113
    • /
    • 2000
  • In this paper, we consider the problem of digital audio watermarking to robust about compression without original audio data. We specifically address the audio watermarking using BPSK with variable carrier frequency. This technique make audio data embeded watermarking robust with compression attack, for example MPEG, AC-3, etc.

  • PDF

3D Mesh Model Watermarking Based on Projection

  • Lee Suk-Hwan;Kwon Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.12
    • /
    • pp.1572-1580
    • /
    • 2005
  • The common requirements for watermarking are usually invisibility, robustness, and capacity. We proposed the watermarking for 3D mesh model based on projection onto convex sets for invisibility and robustness among requirements. As such, a 3D mesh model is projected alternatively onto two convex sets until it converge a point. The robustness convex set is designed to be able to embed watermark into the distance distribution of vertices. The invisibility convex set is designed for the watermark to be invisible based on the limit range of vertex movement. The watermark can be extracted using the decision values and index that the watermark was embedded with. Experimental results verify that the watermarked mesh model has both robustness against mesh simplification, cropping, affine transformations, and vertex randomization and invisibility.

  • PDF

Similar Patterns for Semi-blind Watermarking

  • Cho, Jae-Hyun
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.4
    • /
    • pp.251-255
    • /
    • 2004
  • In this paper, we present a watermarking scheme based on the DWT (Discrete Wavelet Transform) and the ANN (Artificial Neural Network) to ensure the copyright protection of the digital images. The problem to embed watermark is not clear to select important coefficient in the watermarking. We used the RBF (Radial-Basis Function) to solve the problem. We didn't apply the whole wavelet coefficients, but applied to only the wavelet coefficients in the selected node. Using the ANN, although even the watermark casting process and watermark verification process are in public, nobody knows the location of embedding watermark except of authorized user. As the result, the watermark is good at the strength test-filtering, geometric transform and etc.

Cryptanalysis of a Self-Recovery Fragile Watermarking Scheme

  • Oussama Benrhouma;Rhouma Rhouma;Ahmad Taleb
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.38-42
    • /
    • 2024
  • In this paper, we analyze the security of a self-recovery fragile watermarking scheme proposed by C. Wang et al. An attack against C. Wang et al.'s scheme is demonstrated. The theoretical and experimental results show that the proposed scheme is not secure against attacks.

Audio Watermarking Using Empirical Mode Decomposition (경험적 모드 분해법을 이용한 오디오 워터마킹)

  • Nguyen, Phuong;Kim, Jong-Myon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.01a
    • /
    • pp.89-92
    • /
    • 2014
  • This paper presents a secure and blind adaptive audio watermarking algorithm based on Empirical Mode Decomposition (EMD). The audio signal is divided into frames and each one is decomposed adaptively, by EMD, into several Intrinsic Mode Functions (IMFs). The watermark and the synchronization codes are then embedded into the extrema of the last IMF. The experimental results show that the proposed method has good imperceptibility and robustness against signal processing attacks.

  • PDF

An Algorithm for Scaling Parameter Optimization of Watermarking using Random Dot Images (랜덤한 점분포를 가진 영상을 사용한 워터마킹에서 스켈링 파라메타의 최적화 알고리즘)

  • Lee, In-Jung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.6C
    • /
    • pp.901-906
    • /
    • 2004
  • For a digital image watermarking some autostereograms are used such as random dot images. In there, the extraction efficiency is good and the distortion rate is low. In this paper, we shall select an optimized scaling parameter which derives low distortion rate and high extraction efficiency, when we use a random dot images as like as autostereograms into some images except for extremely biased gray level images.