• Title/Summary/Keyword: Watermarking of information

검색결과 841건 처리시간 0.024초

Reversible Multipurpose Watermarking Algorithm Using ResNet and Perceptual Hashing

  • Mingfang Jiang;Hengfu Yang
    • Journal of Information Processing Systems
    • /
    • 제19권6호
    • /
    • pp.756-766
    • /
    • 2023
  • To effectively track the illegal use of digital images and maintain the security of digital image communication on the Internet, this paper proposes a reversible multipurpose image watermarking algorithm based on a deep residual network (ResNet) and perceptual hashing (also called MWR). The algorithm first combines perceptual image hashing to generate a digital fingerprint that depends on the user's identity information and image characteristics. Then it embeds the removable visible watermark and digital fingerprint in two different regions of the orthogonal separation of the image. The embedding strength of the digital fingerprint is computed using ResNet. Because of the embedding of the removable visible watermark, the conflict between the copyright notice and the user's browsing is balanced. Moreover, image authentication and traitor tracking are realized through digital fingerprint insertion. The experiments show that the scheme has good visual transparency and watermark visibility. The use of chaotic mapping in the visible watermark insertion process enhances the security of the multipurpose watermark scheme, and unauthorized users without correct keys cannot effectively remove the visible watermark.

웨이브릿 변환 영역에서 디지털 워터마킹의 성능분석 (Performance Analysis for Digital Watermarking on the Wavelet Transform Domain)

  • 김진태;김동욱
    • 한국정보통신학회논문지
    • /
    • 제7권2호
    • /
    • pp.314-321
    • /
    • 2003
  • 디지털 워터마킹은 멀티미디어 데이터의 저작권 보호 목적으로 최근에 많은 연구가 진행되고 있다. 본 논문에서는 디지털 영상에 저작권 정보를 은닉하는 디지털 워터마킹 방법의 기법을 고찰한다. 웨이브릿 변환 영역에서 각 대역에 삽입된 워터마크는 영상 압축 등의 처리과정을 거치면서 변형이 생기게 되는데, 영상처리 후에 각 대역의 통계적 특성에 따라 변형정도가 다르게 된다는 특성을 고려한다. 이를 통해 영상의 대역 특성에 따라 워터마크를 다르게 삽입해야 좋은 결과를 얻을 수 있음을 알 수 있다.

Java 프로그램에 적용가능한 소프트웨어 워터마킹 (A Software Watermarking for Java Programs)

  • 신원
    • 한국정보통신학회논문지
    • /
    • 제14권9호
    • /
    • pp.2049-2056
    • /
    • 2010
  • 컴퓨터 소프트웨어의 불법 복제는 정보화사회의 가장 큰 위협 중 하나이다. 이를 해결하기 위한 수많은 불법복제 방지 기술이 등장하였지만 급속히 발전하는 인터넷을 통한 배포를 막기에는 현실적으로 다양한 어려움이 존재한다. 본 논문에서는 인터넷 환경에서 많이 사용되는 Java 프로그램을 대상으로 저작권 보호를 위한 소프트웨어 워터마킹 방안을 제안한다. 제안 방안은 효율적인 구현이 가능하고 실행 파일 저작권 보호를 위해 강건한 소프트웨어 워터마크를 제공한다.

DWT(Discrete Wavelet Transform) 기반의 강인한 워터마킹(watermarking) 기법 (A Robust Digital Watermarking Method based on A Wavelet Transform)

  • 김상욱;오상헌;류용준;이근영
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2001년도 하계종합학술대회 논문집(4)
    • /
    • pp.77-80
    • /
    • 2001
  • In this paper, we have introduced a new watermarking method using the Discrete Wavelet Transform (DWT). This method has two features. Firstly the trade-off between the quality and the robustness, and between the quality and the capacitance can be controlled. Next, this method use different scheme according to the watermarks. We have also implemented numerical examples for several kinds of attack. It is found that watermarking method in this paper is robust to above attacks.

  • PDF

가변 반송파 BPSK를 이용한 오디오 워터마킹 기법 (An Audio Watermarking Technique Using BPSK with Variable Carrier Frequency)

  • 이형욱;박세형;문용민;한상우;신재호
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 하계종합학술대회 논문집(4)
    • /
    • pp.110-113
    • /
    • 2000
  • In this paper, we consider the problem of digital audio watermarking to robust about compression without original audio data. We specifically address the audio watermarking using BPSK with variable carrier frequency. This technique make audio data embeded watermarking robust with compression attack, for example MPEG, AC-3, etc.

  • PDF

3D Mesh Model Watermarking Based on Projection

  • Lee Suk-Hwan;Kwon Ki-Ryong
    • 한국멀티미디어학회논문지
    • /
    • 제8권12호
    • /
    • pp.1572-1580
    • /
    • 2005
  • The common requirements for watermarking are usually invisibility, robustness, and capacity. We proposed the watermarking for 3D mesh model based on projection onto convex sets for invisibility and robustness among requirements. As such, a 3D mesh model is projected alternatively onto two convex sets until it converge a point. The robustness convex set is designed to be able to embed watermark into the distance distribution of vertices. The invisibility convex set is designed for the watermark to be invisible based on the limit range of vertex movement. The watermark can be extracted using the decision values and index that the watermark was embedded with. Experimental results verify that the watermarked mesh model has both robustness against mesh simplification, cropping, affine transformations, and vertex randomization and invisibility.

  • PDF

Similar Patterns for Semi-blind Watermarking

  • Cho, Jae-Hyun
    • Journal of information and communication convergence engineering
    • /
    • 제2권4호
    • /
    • pp.251-255
    • /
    • 2004
  • In this paper, we present a watermarking scheme based on the DWT (Discrete Wavelet Transform) and the ANN (Artificial Neural Network) to ensure the copyright protection of the digital images. The problem to embed watermark is not clear to select important coefficient in the watermarking. We used the RBF (Radial-Basis Function) to solve the problem. We didn't apply the whole wavelet coefficients, but applied to only the wavelet coefficients in the selected node. Using the ANN, although even the watermark casting process and watermark verification process are in public, nobody knows the location of embedding watermark except of authorized user. As the result, the watermark is good at the strength test-filtering, geometric transform and etc.

Cryptanalysis of a Self-Recovery Fragile Watermarking Scheme

  • Oussama Benrhouma;Rhouma Rhouma;Ahmad Taleb
    • International Journal of Computer Science & Network Security
    • /
    • 제24권3호
    • /
    • pp.38-42
    • /
    • 2024
  • In this paper, we analyze the security of a self-recovery fragile watermarking scheme proposed by C. Wang et al. An attack against C. Wang et al.'s scheme is demonstrated. The theoretical and experimental results show that the proposed scheme is not secure against attacks.

경험적 모드 분해법을 이용한 오디오 워터마킹 (Audio Watermarking Using Empirical Mode Decomposition)

  • ;김종면
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2014년도 제49차 동계학술대회논문집 22권1호
    • /
    • pp.89-92
    • /
    • 2014
  • This paper presents a secure and blind adaptive audio watermarking algorithm based on Empirical Mode Decomposition (EMD). The audio signal is divided into frames and each one is decomposed adaptively, by EMD, into several Intrinsic Mode Functions (IMFs). The watermark and the synchronization codes are then embedded into the extrema of the last IMF. The experimental results show that the proposed method has good imperceptibility and robustness against signal processing attacks.

  • PDF

랜덤한 점분포를 가진 영상을 사용한 워터마킹에서 스켈링 파라메타의 최적화 알고리즘 (An Algorithm for Scaling Parameter Optimization of Watermarking using Random Dot Images)

  • Lee, In-Jung
    • 한국통신학회논문지
    • /
    • 제29권6C호
    • /
    • pp.901-906
    • /
    • 2004
  • For a digital image watermarking some autostereograms are used such as random dot images. In there, the extraction efficiency is good and the distortion rate is low. In this paper, we shall select an optimized scaling parameter which derives low distortion rate and high extraction efficiency, when we use a random dot images as like as autostereograms into some images except for extremely biased gray level images.