• Title/Summary/Keyword: Watermarking of information

Search Result 841, Processing Time 0.026 seconds

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

Watermark Detection Algorithm Using Statistical Decision Theory (통계적 판단 이론을 이용한 워터마크 검출 알고리즘)

  • 권성근;김병주;이석환;권기구;권기용;이건일
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.1
    • /
    • pp.39-49
    • /
    • 2003
  • Watermark detection has a crucial role in copyright protection of and authentication for multimedia and has classically been tackled by means of correlation-based algorithms. Nevertheless, when watermark embedding does not obey an additive rule, correlation-based detection is not the optimum choice. So a new detection algorithm is proposed which is optimum for non-additive watermark embedding. By relying on statistical decision theory, the proposed method is derived according to the Bayes decision theory, Neyman-Pearson criterion, and distribution of wavelet coefficients, thus permitting to minimize the missed detection probability subject to a given false detection probability. The superiority of the proposed method has been tested from a robustness perspective. The results confirm the superiority of the proposed technique over classical correlation- based method.

Novel Synchronization Scheme for Ubiquitous Home Network Systems (유비쿼터스 홈 네트워크 시스템을 위한 동기화 기법)

  • Kim, Yoon Hyun;Lee, Sung Hun;Hwang, Yu Min;Shin, Dong Soo;Rho, Jung Kyu;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.3
    • /
    • pp.80-85
    • /
    • 2014
  • In this paper, we propose and analyze a novel synchronization scheme for ubiquitous home network system. In ubiquitous home network system, synchronization method is very important because many consumer electronic devices send the data simultaneously to each other through infrastructure such as access point. We employ digital watermarking sequence to improve synchronization performance without system overhead. The performance of proposed scheme is analyzed in terms of correlation performance. The results of the paper can be applied to design of various applications for ubiquitous home network systems.

Audio Forensic Marking System for Copyright Protection of Streaming Music Service (스트리밍 음악 서비스의 저작권 보호를 위한 오디오 포렌식마킹 시스템)

  • Seo, Yongseok;Park, Jihyun;Yoo, Wonyoung
    • Journal of Digital Contents Society
    • /
    • v.15 no.3
    • /
    • pp.357-363
    • /
    • 2014
  • In this paper, we propose a new audio forensic marking system for protecting the copyright of the Internet-based music streaming services. In the proposed method, in order to guarantee the QoS of the streaming service, high speed, and generates a forensic mark inserted MP3 file. We make pre-marking process and generate a new forensic marked MP3 file, a combination of the pre-marked MP3 frame, the inserted user information. Experimental results show that the proposed method satisfactory results robustness and imperceptibility, and real-time properties. In addition, we were confirmed that the real-time embedding and detection from the streaming-based audio forensic marking system that has been implemented on the server/client is possible.

A Multi-Stage Encryption Technique to Enhance the Secrecy of Image

  • Mondal, Arindom;Alam, Kazi Md. Rokibul;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo;Morimoto, Yasuhiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2698-2717
    • /
    • 2019
  • This paper proposes a multi-stage encryption technique to enhance the level of secrecy of image to facilitate its secured transmission through the public network. A great number of researches have been done on image secrecy. The existing image encryption techniques like visual cryptography (VC), steganography, watermarking etc. while are applied individually, usually they cannot provide unbreakable secrecy. In this paper, through combining several separate techniques, a hybrid multi-stage encryption technique is proposed which provides nearly unbreakable image secrecy, while the encryption/decryption time remains almost the same of the exiting techniques. The technique consecutively exploits VC, steganography and one time pad (OTP). At first it encrypts the input image using VC, i.e., splits the pixels of the input image into multiple shares to make it unpredictable. Then after the pixel to binary conversion within each share, the exploitation of steganography detects the least significant bits (LSBs) from each chunk within each share. At last, OTP encryption technique is applied on LSBs along with randomly generated OTP secret key to generate the ultimate cipher image. Besides, prior to sending the OTP key to the receiver, first it is converted from binary to integer and then an asymmetric cryptosystem is applied to encrypt it and thereby the key is delivered securely. Finally, the outcome, the time requirement of encryption and decryption, the security and statistical analyses of the proposed technique are evaluated and compared with existing techniques.

A Digital Image Watermarking Method using Non-linear Property (비선형 특성을 이용한 디지털 영상 워터마킹 방법)

  • Koh, Sung-Shik;Chung, Yong-Duk;Kim, Chung-Hwa
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.3
    • /
    • pp.28-34
    • /
    • 2002
  • This paper describes embedding non-linearly watermark data in the components of pixel intensities in the spatial domain of an image. The principle of the proposed method is that when an image is segmented regularly to the blocks, the pixels of the block have the non-linear properties without any similarity. That is, for the block with strong non-linear property human can't feel the visual different to the modified pixel values, on the other hand for the block with weak non-linear property human can feel the visual different to the a little modified pixel values. Thus we could embed the watermark data according to the non-linear property of the blocks. As the result of the simulation, against some general image processing attacks our algorithm could keep robust and be responsible for the copyright certainly. 

Additive Data Insertion into MP3 Bitstream Using linbits Characteristics (Linbits 특성을 이용하여 MP3 비트스트림에 부가적인 정보를 삽입하는 방법에 관한 연구)

  • 김도형;양승진;정재호
    • The Journal of the Acoustical Society of Korea
    • /
    • v.22 no.7
    • /
    • pp.612-621
    • /
    • 2003
  • As the use of MP3 audio compression increased, the demand for the insertion of additive data about copyright or information on music contents has been groved and the related research has been progressed actively. When an additive data is inserted into MP3 bitstream, it should not to happen any distortion of music quality or the change of file size, due to the modification of MP3 bitstream structure. In our study, to make these conditions satisfied, we inserted some additive data to bitstream by modifying some bits of linbits among the quantized integer coefficients having big values. At this time, we consider the characteristics of linbits and their distributions. As a result of subjective sound quality test through MOS test, we confirmed that the quality of MOS 4.6 can be achieved at the data insertion rate of 60 bytes/sec. Using the proposed method, it is possible to effectively insert an additive data such as copyright information or information about media itself, so that various applications like audio database management can be realized.

A Collusion-secure Fingerprinting Scheme for Three-dimensional Mesh Models (삼차원 메쉬 모델에 적용한 공모방지 핑거프린팅 기법)

  • Hur, Yung;Jeon, Jeong-Hee;Ho, Yo-Sung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.4
    • /
    • pp.113-123
    • /
    • 2004
  • This paper presents a new collusion-secure fingerprinting scheme to embed fingerprints into three-dimensional(3-D) mesh models efficiently. In the proposed scheme, we make the same number of fingerprints as the number of customers based on the finite projective geometry, partition a 3-D mesh model related to the number of bits assigned to each fingerprint and then embed a watermark representing copyright information into each submesh to be marked. Considering imperceptibility and robustness of the watermarking algorithm we embed the watermark signal into mid-frequency DCT coefficients obtained by transforming vertex coordinates in the triangle strips which are generated from the submeshes to be marked. Experimental results show that our scheme is robust to additive random noises, MPEG-4 SNHC 3-D mesh coding, geometrical transformations, and fingerprint attacks by two traitors' collusion. In addition, we can reduce the number of bits assigned to each fingerprint significantly.

Lossless Data Hiding Using Modification of Histogram in Wavelet Domain (웨이블릿 영역에서 히스토그램 수정을 이용한 무손실 정보은닉)

  • Jeong Cheol-Ho;Eom Il-Kyu;Kim Yoo-Shin
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.4 s.310
    • /
    • pp.27-36
    • /
    • 2006
  • Lossless data embedding is a method to insert information into a host image that guarantees complete restoration when the extraction has been done. In this paper, we propose a noble reversible data embedding algorithm for images in wavelet domain. The proposed embedding technique, which modifies histogram of wavelet coefficient, is composed of two inserting steps. Data is embedded to wavelet coefficient using modification of histogram in first embedding process. Second embedding step compensates the distortion caused by the first embedding process as well as hides more information. Hence we achieve higher inserting capacity. In view of the relationship between the embedding capacity and the PSNR value, our proposed method shows considerably higher performance than the current reversible data embedding methods.

Steganography on Android Smart Devices (안드로이드 스마트기기에서의 스테가노그래피 연구)

  • Jung, Ki-Hyun;Lee, Joon-Ho;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.4
    • /
    • pp.99-105
    • /
    • 2015
  • As increasing the use of smart phones, the interest of iOS and Android operating system is growing up. In this paper, a novel steganographic method based on Android platform is proposed. Firstly, we analyze the skia based image format that is supporting 2D graphic libraries in Android operating system. Then, we propose a new data hiding method based on the Android bitmap image format. The proposed method hides the secret data on the four true color areas which include Alpha, Red, Green, Blue. In especial, we increase the embedding capacity of the secret data on the Alpha area with a less image distortion. The experimental results show that the proposed method has a higher embedding capacity and less distortion by changing the size of the secret bits on the Alpha area.