• Title/Summary/Keyword: Watermarking of information

Search Result 841, Processing Time 0.022 seconds

A Rotation Resistant Logo Embedding Watermark on Frequency Domain (회전 변환에 강인한 주파수 영역 로고 삽입 워터마크 방법)

  • Lee, In-Jung;Lee, Hyoung;Min, Joon-Young
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2006.06a
    • /
    • pp.730-736
    • /
    • 2006
  • In this paper, we propose a rotation resistant robust logo embedding watermarking technique. Geometric manipulations make the detection process very complex and difficult. Watermark embedding ill the normalized image directly suffers from smoothing effect due to the interpolation during the image normalization. This can be avoided by estimating the transform parameters using image normalization technique, instead of embedding in the normalized image. Conventional rotation resistant schemes that use full frame transform. In this paper, we adopt $8{\times}8$ block DCT and calculate masking using a spatio-frequency localization of the $8{\times}8$ block DCT coefficients. Experimental results show that the proposed algorithm is robust against rotation process.

  • PDF

The Protection System of Digital Contents using a Frame Filter Information based on Public Key (공개키 기반의 프레임 필터 정보를 이용한 디지털 콘텐츠 보호 시스템)

  • Koh Byoung-Soo;Jang Jae-Hyuk;Kang Seok-Jue;Choi Yong-Rak
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.1-9
    • /
    • 2004
  • The growth of Internet is the main factor that activates the Digital Contents Market and gives the convenience, efficiency and usefulness to the users. However the Digital Contents Market could be shrunk by an illegal reprinting and imprudent using. As a result, recently we can see that using the contents illegally through Internet makes the troubles between providers and customers and finally they are at law. Therefore we urgently need a new technology which can prevent the contents from illegal using, illegal reprinting and imprudent using, We developed the system prohibits a imprudent using in order to activate the Digital Contents Market, We developed the system protects the contents safely by removing the dangerous for the illegal reprinting with providing the encoded contents and the system removes the contents according to the number of usage and the user authentication through network.

  • PDF

A Study on Enhancing VMS Services by FM Car Radio (차량 내 FM라디오를 이용한 VMS서비스 개선 연구)

  • Park, Bum-Jin;Moon, Byeong-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.6
    • /
    • pp.22-32
    • /
    • 2010
  • Increasingly advanced Information Technology (IT) has changed the operator so as to create more diversified and advanced traffic information demand. To deal with the changing demand in private sector, a concept of on-demand traffic information has been rapidly introduced. However VMS, a product of the first generation of ITS, which was designed to provide the unspecified individuals during driving the car with the basic level of traffic information by the public failed to actively change itself in such a changing pattern. This study was intended to describe the VMS system (tentatively, FM-VMS) which was further developed to accommodate the needs favoring the sophisticated PDA with the public role of providing the unspecified individuals with the equal information. FM-VMS introduced in this study is the device designed to transmit the voice and message to the drivers through the radio information device mounted on a car. A core technology is, unlike FM-DARC and RDS, the Water Making technology which directly inserts the digital signal into FM frequency in use. It's been currently used for broadcasting and security purpose. A detection rate as a result of testing FM-VMS system using Water Making technology was 90% or more in voice and message within 20m from test VMS. When a public-developed VMS information could be transmitted using FM frequency to the relatively vulnerable users (vulnerable to traffic information) in voice on a real-time basis to provide the regional traffic information, and furthermore, VMS message could be received through radio liquid using FM frequency only, it would obviously bring about the innovation in ITS as well as pave the way for creating the new added value down the road.

Security of Image Information using Steganography and QR Code in IoT (IoT에서 스테가노그라피와 QR 코드를 이용한 영상 정보의 보안)

  • Im, Yong-Soon;Kang, Eun-Young;Park, Jae-Pyo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.31-37
    • /
    • 2015
  • The security of the image information is very important in many areas of the IoT(Internet of Things), and study a number of ways to display the security (copyright, etc.). In this paper, information of image that is used by the IoT is converted to a DCT(Discrete Cosine Transform) and QC(Quantization Coefficient). And watermark (message) is to create a new encoded message(WMQR) through a QR Code. QC and WMQR applies LSB steganography techniques, can get the security (copyright, etc.) of image information. LSB steganographic techniques may be inserted according to a message (Watermark) to determine the location (Secret Key). The encoded image is sent to the recipient via the Internet. The reverse process can be obtained image and a QR code, a watermark (Message). A method for extracting a watermark from the security of the image information is coded using only the image and Secret Key, through the DCT and quantization process, so obtained by separating the watermark (Message) for the image. In this paper, we were able to improve the security of the method of image information, the image quality of the image by the simulations (PSNR), in turn, benefits were also normalized correlation (NC) and security.

A Data Hiding Scheme for Binary Image Authentication with Small Image Distortion (이미지 왜곡을 줄인 이진 이미지 인증을 위한 정보 은닉 기법)

  • Lee, Youn-Ho;Kim, Byoung-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.2
    • /
    • pp.73-86
    • /
    • 2009
  • This paper proposes a new data hiding scheme for binary image authentication with minimizing the distortion of host image. Based on the Hamming-Code-Based data embedding algorithm, the proposed scheme makes it possible to embed authentication information into host image with only flipping small number of pixels. To minimize visual distortion, the proposed scheme only modifies the values of the flippable pixels that are selected based on Yang et al's flippablity criteria. In addition to this, by randomly shuffling the bit-order of the authentication information to be embedded, only the designated receiver, who has the secret key that was used for data embedding, can extract the embedded data. To show the superiority of the proposed scheme, the two measurement metrics, the miss detection rate and the number of flipped pixels by data embedding, are used for the comparison analysis between the proposed scheme and the previous schemes. As a result of analysis, it has been shown that the proposed scheme flips smaller number of pixels than the previous schemes to embed the authentication information of the same bit-length. Moreover, it has been shown that the proposed scheme causes smaller visual distortion and more resilient against recent steg-analysis attacks than the previous schemes by the experimental results.

Efficient Optical Watermark Using Multiple Phase Wrapping and Real-Valued Functions (다중위상래핑과 실수값 함수를 이용한 효율적인 광 워터마킹)

  • Cho, Kyu-Bo;Seo, Dong-Hoan;Lee, Seung-Hee;Hong, Jae-Keun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.3
    • /
    • pp.10-19
    • /
    • 2009
  • In this paper, an efficient optical watermark method using multiple phase wrapping and real-valued decoding key is proposed. In the embedding process, two zero-padded original images placed in two quadrants on input plane are multiplied with two statistically independent random phase patterns and are Fourier transformed, respectively. Two encoded images are obtained by taking the real-valued data from these Fourier transformed images. And then two phase-encoded patterns, used as a hidden image and a decoding key, are generated by the use of multiple phase wrapping from each of the encoded images. A transmitted image is made from the linear superposition of the weighted hidden images and a cover image. In reconstruction process, the mirror reconstructed images can be obtained at all quadrants by the inverse-Fourier transform of the product of the transmitted image and the decoding key. Computer simulation and optical experiment are demonstrated in order to confirm the proposed method.

High Performance Lossless Data Embedding Using a Moving Window (움직이는 창을 이용한 고성능 무손실 데이터 삽입 방법)

  • Kang, Ji-Hong;Jin, Honglin;Choe, Yoon-Sik
    • Journal of Broadcast Engineering
    • /
    • v.16 no.5
    • /
    • pp.801-810
    • /
    • 2011
  • This paper proposes a new lossless data embedding algorithm on spatial domain of digital images. A single key parameter is required to embed and extract data in the algorithm instead of embedding any additional information such as the location map. A $3{\times}3$ window slides over the cover image by one pixel unit, and one bit can be embedded at each position of the window. So, the ideal embedding capacity equals to the number of pixels in an image. For further increase of embedding capacity, new weight parameters for the estimation of embedding target pixels have been used. As a result, significant increase in embedding capacity and better quality of the message-embedded image in high capacity embedding have been achieved. This algorithm is verified with simulations.

Effective Error Detection Method for Video using Fragile Watermark (연성 워터마크를 이용한 비디오의 효율적인 에러 검출 방법)

  • Hwang, Young-Hooi;Jeon, Byeung-Woo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.39 no.6
    • /
    • pp.602-611
    • /
    • 2002
  • Recent advances in technology have resulted in rapid growth in mobile communication. With this explosive growth, reliable transmission and error resilient technique become increasingly necessary to offer high quality multimedia service. The success of error resilient techniques at decoder sensitively depends on error detection performance. Therefore, this paper proposes a computationally very simple and efficient error detection technique using fragile watermark for real-time video communication. To balance between image quality degradation and error detection efficiency, fragile watermark is embedded only in least significant bits of selected transform coefficients. The proposed method is workable without additional bit in video bitstream and can be implemented very efficiently. This method will be useful in video communication in error prone environment such as wireless channel.

Design of Security Method for Network Rendering of Augmented Reality Object (홀로그램 용 증강현실 객체의 네트워크 랜더링을 위한 보안 기법 설계)

  • Kim, Seoksoo;Kim, Donghyun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.92-98
    • /
    • 2019
  • Due to the development of hologram display technology, various studies are being conducted to provide realistic contents for augmented reality. In the case of the HMD for hologram, since augmented reality objects must be rendered by a small processor, it is necessary to use a low-capacity content. To solve this problem, there is a need for a technique of rendering resources by providing resources through a network. In the case of the existing augmented reality system, there is no problem of contents modulation because the resources are loaded and rendered in the internal storage space. However, when providing resources through the network, security problems such as content tampering and malicious code insertion should be considered. Therefore, in this paper, we propose a network rendering technique applying security techniques to provide augmented reality contents in a holographic HMD device.

ESP : A DVR File Format for Enhanced Recording and Searching (ESP : 녹화 및 검색 기능 향상을 위한 DVR전용 파일 포맷)

  • Park, Jae-Kyung;Yang, Seung-Min
    • The KIPS Transactions:PartB
    • /
    • v.16B no.1
    • /
    • pp.25-34
    • /
    • 2009
  • DVR(Digital Video Recorder) system stores video inputs in compressed digital formats and retrieve them. DVR system has several advantages over traditional analog tape recorder system which are (1) improved real-time monitoring, recording and searching capability, and (2) other capabilities such as watermarking and remote monitoring through network. AVI format is the most popular format used for DVR systems. However, AVI format has drawbacks in recording and searching due to structural problem. Some vendors develop and use their own format, do not open the format to the public. In this paper, ESP format is proposed. ESP format solves the drawbacks of AVI format, and the advantages of AVI format apply to ESP format. Moreover, ESP format provides multistream recording/replay and event-recording. In result, ESP format enchances functionality of recording and searching in DVR system.