• Title/Summary/Keyword: Watermarking of information

Search Result 841, Processing Time 0.027 seconds

Authentication Technologies of X-ray Inspection Image for Container Terminal Automation

  • Kim, Jong-Nam;Hwang, Jin-Ho;Ryu, Tae-Kyung;Moon, Kwang-Seok;Jung, Gwang-S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1684-1688
    • /
    • 2005
  • In this paper, authentication technologies for X-ray inspection images in container merchandises are introduced and a method of authentication for X-ray inspection images is proposed. Until now, X-ray images of container merchandises have been managed without any authentication of inspection results and environments, it means that there was no any action for protection of illegal copy and counterfeiting of X-ray images from inspection results. Here, authentication identifies that who did inspect container X-ray images and, whether the container X-ray images were counterfeited or not. Our proposed algorithm indicates to put important information about X-ray inspection results on an X-ray image without affecting quality of the original image. Therefore, this paper will be useful in determining an appropriate technology and system specification for authentication of X-ray inspection images. As a result of experiment, we find that the information can be embedded to X-ray image without large degradation of image quality. Our proposed algorithm has high detection ratio by Quality 20 of JPEG attack.

  • PDF

A Study on Implementation Methods of the Right to be Forgotten in SNS Environments (SNS 환경에서의 잊혀질 권리 구현 방안에 대한 고찰)

  • Sin, Cheol Ho;Kim, Nam A;Go, Byeong Woo;Kim, Seong Min;Lee, Jae Dong;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.894-896
    • /
    • 2013
  • 오늘날 전세계의 사람이 이용하는 SNS 상에 존재하는 보안 위협은 정보주체의 개인정보를 유출하고 스팸, 피싱 등의 2 차 피해를 야기하는 등 치명적인 결과를 초래한다. 본 논문에서는 잊혀질 권리와 SNS의 개념을 파악하고 SNS 상에 존재하는 보안 위협에 대해 논의하며 보안 위협을 해소하고 SNS 환경에서의 잊혀질 권리를 실현할 수 있는 UPP, Dual Watermarking Scheme, FaceCloak 등 기술적 방안을 제시한다.

Color Image Digital Watermarking based on a Luminance-Chrominance Signal (휘도-색차 신호 기반의 컬러 영상 디지털 워터마킹)

  • Seo Jung-Hee;Lim Young-Jin;Han Eun-Young;Park Hung-Bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.565-568
    • /
    • 2006
  • In the luminance and chrominance signal, luminance signal creates gray images, and is capable of making each color component compatible with monochrome system. And color components of luminance and chrominance signals are useful to encode or convert the signal because they have low correlation. Each color signal has low correlation statistically, but they are not independent of one another. Therefore, this paper proposes the watermark inserting algorithm for luminance and chrominance signal in the domain of frequency founded on wavelet, considering the interdependent characteristics of color components. Therefore, it can guarantee the robustness and invisible of digital watermark.

  • PDF

A New Wavelet Watermarking Based on Linear Bit Expansion (선형계수확장 기반의 새로운 웨이블릿 워터마킹)

  • Piao Yong-Ri;Kim Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.167-170
    • /
    • 2006
  • This study proposes a new wavelet watermark technique based on the Linear Bit Expansion. To ensure the security of the watermark, it is Amold Transformed before embedding. Then the wavelet transformation of watermark and original images is processed. Since the size of the watermark image is a quarter of the original site, it uses linear bit-expansion to enlarge the watermark image. Lastly, watermark is inserted in a given intensity to the corresponding low frequency subbands of the wavelet-transformed images proposed in this paper. When detecting the presence of watermark, the similarity between extracted watermark and the original watermark is compared applying the F norm function.

  • PDF

Adaptive Digital Watermarking with Perceptually Tuned Characteristic Based on Wavelet Transform (웨이브릿 변환영역에서 지각적 동조특성을 갖는 적응적 디지털 워터마킹)

  • 김현천;장봉주;서용수;김종진
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.6
    • /
    • pp.1008-1014
    • /
    • 2003
  • In this paper, we propose the image retrieval method based on object regions using bidirectional round filter in the wavelet transform domain. A conventional method that includes unnecessary background information reduce retrieval efficiency, because of the extraction of feature vectors from the whole region of subband. On proposed method, it extracts accurate feature vectors and keep certainly retrieval efficiency in case of reduced feature vectors, because of the extraction of feature vectors from the only extracted object region. Furthermore, it improve retrieval efficiency by removing unnecessary background information. Consequently, the retrieval efficiency is improved with 2.5%∼5.5% values, which have a little chances to vary according to characteristics of image.

  • PDF

Adaptive Video Watermarking Using Half-cell Motion Vector (반화소 움직임 벡터를 이용한 적응적 비디오워터마킹)

  • Shinn Brian-B.;Kim Min-Yeong;D Khongorzul;Lee In-Sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.7
    • /
    • pp.1214-1221
    • /
    • 2006
  • Header compression scheme is suggested as a solution to reduce the inefficient overhead of general packet stream data. Especially, it is shown that there are more overhead rate for real-time media stream links such as voice because of its short payload size, and it is possible to get higher bandwidth efficiency using the header compression scheme. There are two kinds of error recovery in header compression such as Periodic Header Refresh(PHR) and Header Request(HR) schemes. In this paper, we analyze the performance of these two compression recovery schemes, and some results such as the overhead rate, bandwidth gain and bandwidth efficiency(BE) are presented.

A Study on the Dual Video Watermarking for Authentication and Signature using DC/AC Components of Block Layer (블록계층의 DC/AC 성분을 이용한 인증과 서명의 이중 비디오 워터마킹에 관한 연구)

  • Boo, Hee-Hyung;Park, Seong-Mi;Bae, Ho-Young;Lee, Bae-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.743-746
    • /
    • 2005
  • 본 논문에서는 디지털 비디오 인코딩 과정의 VLC(variable length coding) 영역에서 블록계층의 DC/AC 성분을 이용한 인증과 서명의 이중 비디오 워터마킹 시스템을 제안하였다. 제안한 기법은 블록계층의 DC 성분과 AC 성분에서 HVS(human visual system)의 특성을 고려한 것이다. 인증 워터마킹은 주요한 정보를 포함하는 저주파 영역과 윤곽선 정보를 포함하는 중간 주파수 영역을 이용하여 인트라 프레임의 DC 성분과 움직임 벡터의 부호를 변형시켰고, 서명 워터마킹은 모든 프레임의 AC 성분들 중에서 마지막 AC 성분의 Level이 '1'인 경우에만 워터마크를 삽입하였다. 서명 워터 마크 검출은 저작권자의 비밀 키에 의해서만 가능하고, 기술적인 면에서 저자권자의 판별 기준이 될 수 있다. 제안한 이중 비디오 워터마킹 시스템의 특징은 인증과 서명의 두 가지 기능을 선택적으로 수행할 수 있으며, 계산과정이 복잡하지 않으면서 비트 스트림(bit-stream)을 유지시킨다. 그리고 실험 결과에서 기존의 방법보다 화질 면에서 $2{\sim}3dB$ 더 높은 수치를 얻어 우수함을 보였고, 인코딩 수행 속도에 미치는 영향은 거의 없었으며, 향후 실시간 인코딩 처리에 응용될 수 있다.

  • PDF

Design and Implement of a Certification System for Digital Contents Circulation and Secure (디지털 콘텐츠 유통 및 보호를 위한 인증 시스템 설계 및 구현)

  • 고병수;장재혁;최용락
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.1-8
    • /
    • 2003
  • The growth of Internet is the main factor that activates the Digital Contents Market. However the Digital Contents Market could be shrunk by an illegal reprinting and imprudent using. Therefore we urgently need a new technology which can prevent the contents from illegal using, illegal reprinting and imprudent using. We developed the system prohibits a imprudent using in order to activate the Digital Contents Market. We developed the system protects the contents safely by removing the dangerous for the illegal reprinting with providing the encoded contents and the system removes the contents according to the number of usage and the user authentication through Network.

  • PDF

Process Analysis of Digital Right Management for Web-Based Multicast Contents

  • Toyib, Wildan;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.12
    • /
    • pp.1601-1612
    • /
    • 2011
  • In recent years, advanced in digital technologies have created significant changes in the way we reproduce, distribute and market Intellectual Property (IP). DRM for multicast contents is complicated risk, the further technology development and human demand, this approaching is still being researched by the scientist and all by the company which is conducting in piracy management reduced, and every country has national policy to make this consortium to limit piracy properties, based on this paper research development, just only two approaching to reduce piracy in DRM they are Industrial Property (IP) and Copyright. In this paper, we are not only figuring and analyzing about the processes to reduce and limit the piracy and unprotected copy law but also describing about the encryption process, watermarking and digital signature process algorithms. The basic concepts of this encryption process for web-based multicast content in DRM are implemented in Java. We conduct this method is a computerized through web based application system approaching to reduce unprotected copy and piracy. Which is used in DRM for multicast content in every section, by providing a fundamental in information technology development, we believe this research is reliable to prove that is unprotected copy, and piracy can be reduced by protecting with this paradigm.

A Camera Image Authentication Using Image Information Copyright Signature for Mobile Device without Distortion (무왜곡 휴대용 단말기 영상정보 권한서명을 이용한 카메라 영상 인증)

  • Han, Chan-Ho;Moon, Kwang-Seok
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.2
    • /
    • pp.30-36
    • /
    • 2014
  • Quality and resolution of camera in mobile device is improved significantly. In this paper, we propose block-based information hide techniques without image distortion for mobile device to solve image degradation in conventional watermarking methods. Information of image is composed with text such as camera maker, model, date, time, etc. Each text is converted to $8{\times}8$ pixel blocks and is added to the bottom of image. Generally image including block based information for image authentication are compressed using JPEG in mobile device. The vertical line value in JPEG header is modified by original size of image sensor. This technique can hide the block based authentication information using general decoder. In the experimental results, JPEG file size is slightly increased within 0.1% for the proposed block based authentication information encoding. Finally proposed methods can be adopted for various embedded systems using medical image, smart phone and DSLR camera.