• Title/Summary/Keyword: Watermarking of information

Search Result 841, Processing Time 0.024 seconds

A Study on Systems to Protect Copyright of Digital Contents (디지털저작물 저작권보호시스템)

  • Kim, Yong;NamKoong, Hwang
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.11 no.2
    • /
    • pp.49-64
    • /
    • 2000
  • 디지털기술의 급속한 발전으로 인해 현재 대부분의 문서가 디지털화된 형태를 이루고 있으며 이러한 정보는 지속적으로 증가하고 있는 상황이다. 웹 및 문서저작도구의 발전과 함께, 정보의 생성과 공유가 쉬워지면서 중복적으로 존재하는 정보의 비율이 갈수록 높아지고 있으며 일부를 표절하여 자신의 정보로 사용하는 문서의 불법적인 복제문제가 발생할 수 있다. 현재 온라인 상에서 제공되고 있는 수많은 정보는 그것을 접하는 사용자들에게 유용하게 사용될 수도 있지만 불법복제 (illegal copy)나 표절(plagiarism)과 같은 형태로 이용될 수 있는 가능성도 높다. 두 경우에 있어서 원문의 부분 또는 전체를 그대로 사용하는 경우가 있으며, 특히, 표절의 경우에 있어서는 문장의 재구성, 유사단어로 대체하는 것처럼 원문과는 다른 형태로 나타날 수 있다. 그러나 표절에 있어서 엄청난 양의 정보중에서 일부를 표절한 사실을 알아내기란 쉽지가 않다 왜냐하면 표절을 판별하기 위해서는 기존에 존재하는 모든 정보를 알고 있어야 하는데 이것은 이론상으로 사람의 힘으로는 불가능하기 때문이다. 또한 저작자의 동의 없이 이루어지는 불법적인 복제는 디지털콘텐츠의 유통을 위한 커다란 걸림돌이 되고 있다. 따라서 기존의 문서와의 유사성 판별을 통해서 자동적으로 표절의 가능성을 제시해 줄 수 있는 기술과 함께 근본적으로 디지털 저작물에 대한 불법적인 복제를 막을 수 있는 방법이 필요하다.

  • PDF

DCT Based Watermarking Technique Using Region of Interest (관심영역을 이용한 DCT기반 워터마킹 기법)

  • Shin, Jae-Wook;Jeong, Dong-Seok
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.37 no.1
    • /
    • pp.16-26
    • /
    • 2000
  • The proposed method inserts a watermark information not mto a whole Image region but only into regions of interest(ROIs) To extract the ROIs, we divide an original Image into sub-blocks and use modified Shi-Kuo Chang's PIM(picture information measure) as the criteria to select the ROIs Considering the directional information and frequency bands, we insert the watermark information into sub-blocks m the DCT domain. The proposed method can reduce the distortion in comparison With the other methods which utilize the whole Image as an nor The proposed method makes much less damaged Images m comparison to the other methods And those Images processed by the proposed algorithm are more robust to the changes caused by signal processing operations such as resampling, clipping. noise, and so on Also due to the block-based watermark insertion, the proposed method has the robustness to the Image compression processes such as JPEG and MPEG.

  • PDF

Multi-Level Digital Watermarking for Color Image of Multimedia Contents (멀티미디어 컨텐츠의 컬러 영상에 대한 다중 레벨 디지털 워터마킹)

  • Park, Hung-Bog;Seo, Jung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.1946-1953
    • /
    • 2006
  • Because the embedded watermark of luminance component guarantees the extraction of ownership information when the color image is converted to gray scale image, the information of ownership right as to the luminance component is embedded in the luminance-chrominance color space such as YCbCr. Therefore, this paper proposes watermark embedding, extraction and authentication algorithm of color image. which considers the device and performance of multimedia contents service by focusing on the robustness and invisibility of watermark. The color image is converted from RGB color space to YCbCr color space, and then the properties of each component of Y(Luminance), Cb(Color Differences) and Cr(Color Differences) are considered in order to embed, extract and certify multi-level watermark in the frequency domain based on the wavelet. As a result, it can guaranteed the robustness for the JPEG compression and invisibility of watermark for multi-level.

Watermark Authentication Cryptography for Medical Image Security (의료영상 보안을 위한 워터마크 인증 암호화 기법)

  • Cho, Young-bok;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.759-766
    • /
    • 2017
  • In this paper, we preserve the transparency of digital contents by compressing and storing the medical image for a certain period so as to be safe and robust against various attacks of medical images. The proposed algorithm generates an encrypted image authentication code that extracts the feature value of the original image and combines it with the user's information. in order to extract hidden data, the authentication code is first decrypts the encrypted medical image and extracts the hidden data using the spatial characteristics of image. The proposed algorithm guarantees integrity when comparing extracted authentication code and newly generated authentication code for image authentication after directly inserting it into content itself through watermarking. We have proved various security of attack of image data and proved that the certification rate is improved to 98.4%.

A Study on Copyright Protection Method of Web Image Contents (웹 이미지 콘텐츠 저작권보호 방법에 관한 연구)

  • Yi, Yeong-Hun;Cho, Man-Gi;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.37-43
    • /
    • 2015
  • Technical treatments of image contents on the web include the copy protection method such as the image capture protection technology and the traitor tracing method to detect unauthorized duplications through watermarking insertion or feature information technology. However, these two methods have their own weaknesses. The image capture protection method is unable to protect illegal captures when the URLs of image sources are exposed. The traitor tracing method is fundamentally unable to protect illegal captures due to its post-treatment method. Besides, the weakness of using the copyright information display technology involves easy removal of copyright information from copyrighted contents. This paper suggests a model of the web image contents protection system which makes it hard to separate copyright information from web image contents and allows image contents to be shown only in the authorized websites.

Reversible Data Hiding Method Based on Min/Max in 2×2 Sub-blocks (2×2 서브블록에서 최소/최대값을 이용한 가역 정보은닉기법 연구)

  • Kim, Woo-Jin;Kim, Pyung-Han;Lee, Joon-Ho;Jung, Ki-Hyun;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.4
    • /
    • pp.69-75
    • /
    • 2014
  • A novel reversible data hiding method using pixel value ordering and prediction error expansion in the sub-block is resented in this paper. For each non-overlapping $2{\times}2$ sub-block, we divide into two groups. In the min group, the lowest value is changed to embed a secret bit and the highest value is changed in the max group. The experimental results show that the proposed method achieves a good visual quality and high capacity. The proposed method can embed 13,900 bits on average, it is higher 4,553 bits than the previous method and the visual quality is maintained 31.39dB on average.

Image Fusion Watermarks Using Multiresolution Wavelet Transform (다해상도 웨이블릿 변환을 이용한 영상 융합 워터마킹 기법)

  • Kim Dong-Hyun;Ahn Chi-Hyun;Jun Kye-Suk;Lee Dae-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.6
    • /
    • pp.83-92
    • /
    • 2005
  • This paper presents a watermarking approach that the 1-level Discrete Wavelet Transform(DWT) coefficients of a $64{\ast}64$ binary logo image as watermarks are inserted in LL band and other specific frequency bands of the host image using Multi-Resolution Analysis(MRA) Wavelet transform for copyright protection of image data. The DWT coefficients of the binary logo image are inserted in blocks of LL band and specific bands of the host image that the 3-level DWT has been performed in the same orientation. We investigate Significant Coefficients(SCs) in each block of the frequency areas in order to prevent the quality deterioration of the host image and the watermark is inserted by SCs. When the host image is distorted by difference of the distortion degree in each frequency, we set the thresholds of SCs on each frequency and completely insert the watermark in each frequency of the host image. In order to be invisibility of the watermark, the Human Visual System(HVS) is applied to the watermark. We prove the proper embedding method by experiment. Thereby, we rapidly detect the watermark using this watermarking method and because the small size watermarks are inserted by HVS and SCs, the results confirm the superiority of the proposed method on invisibility and robustness.

Deep Learning Framework for Watermark-Adaptive and Resolution-Adaptive Image Watermarking (워터마크 및 해상도 적응적인 영상 워터마킹을 위한 딥 러닝 프레임워크)

  • Lee, Jae-Eun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.25 no.2
    • /
    • pp.166-175
    • /
    • 2020
  • Recently, application fields for processing and using digital image contents in various forms and types are rapidly increasing. Since image content is high value-added content, the intellectual property rights of this content must be protected in order to activate the production and use of the digital image content. In this paper, we propose a deep learning based watermark embedding and extraction network. The proposed method is to maximize the robustness of the watermark against malicious/non-malicious attacks while preserving the invisibility of the host image. This network consists of a preprocessing network that changes the watermark to have the same resolution as the host image, a watermark embedding network that embeds watermark data while maintaining the resolution of the host image by three-dimensionally concatenating the changed host image and the watermark information, and a watermark extraction network that reduces the resolution and extracts watermarks. This network verifies the invisibility and robustness of the proposed method by experimenting with various pixel value change attacks and geometric attacks against various watermark data and host images with various resolutions, and shows that this method is universal and practical.

Generation and Protection of Efficient Watermark Signals and Image Quality Preservation in Transmission Channel Using Turbo Coding (효과적인 워터마크 신호의 생성과 보호 및 터보코딩을 이용한 전송채널상에서의 화질 보존)

  • Cho, Dong-Uk;Bae, Young-Lae
    • The KIPS Transactions:PartB
    • /
    • v.9B no.1
    • /
    • pp.91-98
    • /
    • 2002
  • In this paper, an implementation method of the efficient image transmission stage using watermarking and channel ceding is proposed. Usually, image communication system consists of both a transmitter part and a receiver part. The transmitter part takes charge of copyright protection of the generated image data, and image coding and compression that can deal with channel noises when transmitting. In the transmitter part, we propose a channel coding method which protects both the watermark signal and the original signal for protecting the copyright of image data and solving channel noises when transmitting. Firstly, copyright protection of image data is conducted. For this, image structure analysis is performed, and both the improvement of image quality and the generation of the watermark signal are made. Then, the histogram is constructed and the watermark signals are selected from this. At this stage, by embedding of the coefficients of curve fittness into the lower 4 bits of the image data pixels, image quality degradation due to the embedding of watermark signals are prevented. Finally, turbo coding, which has the most efficient error correction capability in error correction codes, has been conducted to protect signals of watermark and preserved original image quality against noises on the transmission channel. Particularly, a new interleaving method named "semi random inter]easer" has been proposed.

Content Adaptive Watermarkding Using a Stochastic Visual Model Based on Multiwavelet Transform

  • Kwon, Ki-Ryong;Kang, Kyun-Ho;Kwon, Seong-Geun;Moon, Kwang-Seok;Lee, Joon-Jae
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1511-1514
    • /
    • 2002
  • This paper presents content adaptive image watermark embedding using stochastic visual model based on multiwavelet transform. To embedding watermark, the original image is decomposed into 4 levels using a discrete multiwavelet transform, then a watermark is embedded into the JND(just noticeable differences) of the image each subband. The perceptual model is applied with a stochastic approach fer watermark embedding. This is based on the computation of a NVF(noise visibility function) that have local image properties. The perceptual model with content adaptive watermarking algorithm embed at the texture and edge region for more strongly embedded watermark by the JND. This method uses stationary Generalized Gaussian model characteristic because watermark has noise properties. The experiment results of simulation of the proposed watermark embedding method using stochastic visual model based on multiwavelet transform techniques was found to be excellent invisibility and robustness.

  • PDF