• 제목/요약/키워드: Watermarking of information

검색결과 841건 처리시간 0.021초

A Domain-independent Dual-image based Robust Reversible Watermarking

  • Guo, Xuejing;Fang, Yixiang;Wang, Junxiang;Zeng, Wenchao;Zhao, Yi;Zhang, Tianzhu;Shi, Yun-Qing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권12호
    • /
    • pp.4024-4041
    • /
    • 2022
  • Robust reversible watermarking has attracted widespread attention in the field of information hiding in recent years. It should not only have robustness against attacks in transmission but also meet the reversibility of distortion-free transmission. According to our best knowledge, the most recent robust reversible watermarking methods adopt a single image as the carrier, which might lead to low efficiency in terms of carrier utilization. To address the issue, a novel dual-image robust reversible watermarking framework is proposed in this paper to effectively utilize the correlation between both carriers (namely dual images) and thus improve the efficiency of carrier utilization. In the dual-image robust reversible watermarking framework, a two-layer robust watermarking mechanism is designed to further improve the algorithm performances, i.e., embedding capacity and robustness. In addition, an optimization model is built to determine the parameters. Finally, the proposed framework is applied in different domains (namely domain-independent), i.e., Slantlet Transform and Singular Value Decomposition domain, and Zernike moments, respectively to demonstrate its effectiveness and generality. Experimental results demonstrate the superiority of the proposed dual-image robust reversible watermarking framework.

Wavelet-Based Digital Image Watermarking by Using Lorenz Chaotic Signal Localization

  • Panyavaraporn, Jantana;Horkaew, Paramate
    • Journal of Information Processing Systems
    • /
    • 제15권1호
    • /
    • pp.169-180
    • /
    • 2019
  • Transmitting visual information over a broadcasting network is not only prone to a copyright violation but also is a forgery. Authenticating such information and protecting its authorship rights call for more advanced data encoding. To this end, electronic watermarking is often adopted to embed inscriptive signature in imaging data. Most existing watermarking methods while focusing on robustness against degradation remain lacking of measurement against security loophole in which the encrypting scheme once discovered may be recreated by an unauthorized party. This could reveal the underlying signature which may potentially be replaced or forged. This paper therefore proposes a novel digital watermarking scheme in temporal-frequency domain. Unlike other typical wavelet based watermarking, the proposed scheme employed the Lorenz chaotic map to specify embedding positions. Effectively making this is not only a formidable method to decrypt but also a stronger will against deterministic attacks. Simulation report herein highlights its strength to withstand spatial and frequent adulterations, e.g., lossy compression, filtering, zooming and noise.

위상 홀로그램과 광학적 간섭계를 이용한 디지털 워터마킹 (Digital Watermarking using Phase hologram and Optical Interferometer)

  • 김병열;조규보;신창목;서동환;김수중
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 하계종합학술대회 논문집(2)
    • /
    • pp.87-90
    • /
    • 2002
  • A digital watermark is an invisible mark embedded in a digital image which used for copyright protection. In this paper, we propose a new optical watermarking system. A optical watermarking system is applied for digital watermarking by phase hologram and Mach-Zehnder interferometer. A optical watermarking technique to be hidden is phase modulated in a random patten, and its Fourier-transformed hologram image is superposed on a content image. The autentication information extract by using Mach-zehnder interferometer.

  • PDF

위상 홀로그램과 광학적 간섭계를 이용한 디지털 워터마킹 (Digital Watermarking using Phase hologram and Optical Interferometer)

  • 김병열;조규보;신창목;서동환;김수중
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 하계종합학술대회 논문집(1)
    • /
    • pp.227-230
    • /
    • 2002
  • A digital watermark is an invisible mark embedded in a digital image which used for copyright protection. In this paper, we propose a new optical watermarking system. A optical watermarking system is applied for digital watermarking by phase hologram and Mach-Zehnder interferometer. A optical watermarking technique to be hidden is phase modulated in a random patten, and its Fourier-transformed hologram image is superposed on a content image. The autentication information extract by using Mach-zehnder interferometer.

  • PDF

On the Robustness of Watermarking in the Frequency Domain for Still Images

  • Miyazaki, Akio;Ejima, Masataka
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 ITC-CSCC -2
    • /
    • pp.861-864
    • /
    • 2000
  • This paper aims to establish fundamentals of measuring and evaluating the performance of water-marking systems. We first present the general model of a watermarking method for still images. Based on this model, we propose a statistical method of measuring the performance and robustness of the watermarking system. Then, the DCT-based watermarking system is analyzed and its performance is evaluated by using the proposed method.

  • PDF

Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권2호
    • /
    • pp.504-523
    • /
    • 2014
  • This paper presents a multiple-watermarking scheme for copyright protection and the prevention of illegal copying of mobile 3D contents with low resolution. The proposed scheme embeds a unique watermark and a watermark certification authority (WCA) watermark into the spatial and encryption domains of a mobile 3D content based on the buyer-seller watermarking protocol. The seller generates a unique watermark and embeds it into the local maximum curvedness of a 3D object. After receiving the encrypted watermark from the WCA, the seller embeds it into the encrypted vertex data using an operator that satisfies the privacy homomorphic property. The proposed method was implemented using a mobile content tool, and the experimental results verify its capability in terms of copyright protection and the prevention of illegal copying.

이미지 워터마킹 기법에 관한 연구 (A Study on the Image Watermarking Method)

  • 이두성;김선형;김기석
    • 디지털산업정보학회논문지
    • /
    • 제5권4호
    • /
    • pp.161-168
    • /
    • 2009
  • There are many research for efficient, robust and invisible watermarking system that protects the digital contents like a image and animation according to growth of IT industry. First of all, frequency domain watermarking system like DWT(Descrete Wavelet Transform) is excellent because of minimum loss of original image and robustness of external attack. But, if we raise the insertion strength of watermark, then blazing of image occurs on existing DWT watermarking system and we should have a regular square image. In this study, we research the overflow check for preventing image from blazing and a robust and invisible watermarking algorithm. And we research a free-size DWT watermarking system using padding bytes, without a dependency of size.

화상의 작은 영역 변화를 검출 가능한 연성 워터마킹 (Fragile Watermarking to detect change of small range on image)

  • Lee, Hye-Joo;Oh, Yun-Hee;Park, Ji-Hwan;Kim, Kwangjo
    • 한국멀티미디어학회:학술대회논문집
    • /
    • 한국멀티미디어학회 2000년도 추계학술발표논문집
    • /
    • pp.493-497
    • /
    • 2000
  • Fragile watermarking is a technique far autoentication/integrity of digital data. Unlike robust watermarking, il has to design to be vulnerable against some slight processing to verify the modification of digital data. Feature of fragile watermarking is to identify the modifications of data and to locate some places modification occurred at the same time, so it has to identify slight changes of small range if possible. In this paper, fragile watermarking is proposed that the changes of small range on image can be identified using the watermark sequence with period and the values of low bit planes in an image.

  • PDF

디지털 동영상 어플리케이션의 향상된 보안성을 위한 비시각적인 워터마킹 (Invisible Watermarking for Improved Security of Digital Video Application)

  • 서정희;박흥복
    • 한국컴퓨터정보학회논문지
    • /
    • 제16권10호
    • /
    • pp.175-183
    • /
    • 2011
  • 디지털 비디오 워터마킹의 성능은 디지털 비디오에서 많은 정보를 은닉하는 방법에 대한 평가이다. 그러므로 디지털 컨텐츠에 대한 주파수 영역의 고화질의 동영상에 많은 비트의 데이터를 저장하는 방법이 요구되고 있다. 따라서 본 논문은 워터마크 요소 중 강인성과 비시각성 사이의 절충을 통해서 동영상의 프레임에 대해 휘도 성분을 추출한 후 웨이블릿 변환을 수행하여 LH와 HL 부대역에 워터마크를 내장하고 비시각적인 워터마크 기반의 강인한 워터마크를 통해 향상된 워터마크의 보안성을 위한 워터마크 시스템을 설계한다. 워터마크의 보안성에 대한 성능의 분석은 통계적인 방법을 사용하여 비시각적인 워터마킹에서의 다양한 공격에 대한 강인성을 평가한다. 실험 결과에 따르면 노이즈 추가, 손실 압축, Low-Pass 필터링과 같은 일반적인 신호 처리를 수행하여 워터마크 강인성과 비시 각성을 평가하였고, 다양한 공격에 대한 워터마크의 보안성을 검증할 수 있었다.

Reversible Watermarking Using Adaptive Edge-Guided Interpolation

  • Dai, Ningjie;Feng, Guorui;Zeng, Qian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권4호
    • /
    • pp.856-873
    • /
    • 2011
  • Reversible watermarking is an open problem in information hiding field, with embedding the encoded bit '1' or '0' into some sensitive images, such as the law enforcement, medical records and military images. The technique can retrieve the original image without distortion, after the embedded message has been extracted. Histogram-based scheme is a remarkable breakthrough in reversible watermarking schemes, in terms of high embedding capacity and low distortion. This scheme is lack of capacity control due to the requirement for embedding large-scale data, because the largest hidden capacity is decided by the amount of pixels with the peak point. In this paper, we propose a reversible watermarking scheme to enlarge the number of pixels with the peak point as large as possible. This algorithm is based on an adaptive edge-guided interpolation, furthermore, hides messages by interpolation-error, i.e. the difference between the original and interpolated image value. Simulation results compared with other state-of-the-art reversible watermarking schemes in this paper demonstrate the validity of the proposed algorithm.