• Title/Summary/Keyword: barcode watermark

Search Result 12, Processing Time 0.025 seconds

QR Barcode Readability Technique of the JPEG Image Based on Digital Watermarking

  • Seo, Jung Hee;Park, Hung Bok
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.3
    • /
    • pp.179-188
    • /
    • 2018
  • This paper proposes a quick response (QR) barcode watermarking algorithm in order to improve readability of the QR barcode in a JPEG image. The proposed algorithm embeds a watermark in a wavelet based-low frequency band for watermark robustness, and visually extracts a QR barcode after embedding the QR barcode image with confidential information into the original image via imperceptible watermarking technology. The visually extracted QR barcode watermark uses an approach to authenticate the ownership more easily through a common hardware and software-based mobile barcode reader app. Therefore, the QR barcode watermark may improve the ability to easily detect watermarks efficiently as well as imperceptibility and robustness, which is the main watermark requirement by embedding the QR barcode with watermark text information in a digital image and when compare to conventional watermarks.

The Performance Analysis of Digital Watermarking based on Merging Techniques

  • Ariunzaya, Batgerel;Chu, Hyung-Suk;An, Chong-Koo
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.3
    • /
    • pp.176-180
    • /
    • 2011
  • Even though algorithms for watermark embedding and extraction step are important issue for digital watermarking, watermark selection and post-processing can give us an opportunity to improve our algorithms and achieve higher performance. For this reason, we summarized the possibilities of improvements for digital watermarking by referring to the watermark merging techniques rather than embedding and extraction algorithms in this paper. We chose Cox's function as main embedding and extraction algorithm, and multiple barcode watermarks as a watermark. Each bit of the multiple copies of barcode watermark was embedded into a gray-scale image with Cox's embedding function. After extracting the numbers of watermark, we applied the watermark merging techniques; including the simple merging, N-step iterated merging, recover merging and combination of iterated-recover merging. Main consequence of our paper was the fact of finding out how multiple barcode watermarks and merging techniques can give us opportunities to improve the performance of algorithm.

Barcode Pattern Image Watermark Using Triplet (트리플릿을 이용한 바코드 패턴 이미지 워터마크)

  • Park, Byung-Su;Chu, Hyung-Suk;An, Chong-Koo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.12
    • /
    • pp.2330-2335
    • /
    • 2008
  • In this paper, we proposed a robust watermark scheme for image based on the discrete wavelet transform. In the first, we use the triplet method for embedding and extraction of watermark. Triplet method uses relationship among the discrete wavelet coefficients at the same position in the three detail subband of image. In the second, we use barcode Pattern Image for watermark scheme. By using barcode Pattern Images, a user is able to make many kinds of own watermark. In the third, the proposed method for image watermark provides the invisiblility which the other user can not discriminate watermark from watermarked image. The advantage of the proposed method is visibility when we extracted watermark from the image. The corresponding experimental results show that the proposed method has performance of a robustness from the noise attack.

Digital Watermarking Scheme based on SVD and Triplet (SVD 및 트리플릿 기반의 디지털 워터마킹 기법)

  • Park, Byung-Su;Chu, Hyung-Suk;An, Chong-Koo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.5
    • /
    • pp.1041-1046
    • /
    • 2009
  • In this paper, we proposed a robust watermark scheme for image based on SVD(Singular Value Transform) and Triplet. First, the original image is decomposed by using 3-level DWT, and then used the singular values changed for embedding and extracting of the watermark sequence in LL3 band. Since the matrix of singular values is not easily altered with various signal processing noises, the embedded watermark sequence has the ability to withstand various signal processing noise attacks. Nevertheless, this method does not guarantee geometric transformation(such as rotation, cropping, etc.) because the geometric transformation changes the matrix size. In this case, the watermark sequence cannot be extracted. To compensate for the above weaknesses, a method which uses the triplet for embedding a barcode image watermark in the middle of frequency band is proposed. In order to generate the barcode image watermark, the pattern of the watermark sequence embedded in a LL3 band is used. According to this method, the watermark information can be extracted from attacked images.

A Digital Watermarking Algorithm Using PIM and 2D Barcode (PIM과 2D 바코드를 이용한 워터마킹 알고리즘)

  • Han Su-Young;Kim Hong-Ryul;Lee Kee-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.103-108
    • /
    • 2005
  • In this Paper, we proposed a novel robust watermarking technique using PIM and 2D barcode for the copyright of the digital images. Because human is impervious to the change in the complex area, the embedding watermark to the selected coefficients using PIM enhances invisibility. A 2D barcode image is used for watermark in this research. The 2D barcode contains more information than conventional ID barcode and includes the error correction algorithm. Therefore the watermarking algorithm using 2D barcode enhances the robustness of watermark. From the experimental results , the proposed algorithm shows better invisibility and robustness performance in a general signal Processing such as JPEG and SPIHT lossy compression.

  • PDF

Error Correcting using the Check digit on Barcode, and the present and future of Barcode (바코드에 있어서 체크숫자를 이용한 오류수정과 바코드의 현재와 미래)

  • Kim, Hwa-Joon
    • Journal for History of Mathematics
    • /
    • v.21 no.2
    • /
    • pp.103-118
    • /
    • 2008
  • Barcode technology is becoming an essential tool for every companies, and this makes help us to gain time, analysis of goods, an inventory control, a prevention of burglar and so on. In this paper, we have treated about the history of barcode, its error correcting using the check digit, and the present and future of barcode. We wish roles of mathematician on new barcode system which it bring on an economical efficiency and stability.

  • PDF

Barcode watermarking for photographs of mobile phone (모바일 폰의 영상 촬영에 대한 바코드 워터마킹)

  • Hwang, Tae-won;Seo, Jung-hee;Park, Hung-bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.763-764
    • /
    • 2017
  • The use of barcodes in mobile phones has become generalized, and barcodes are widely used in security-sensitive applications, including mobile payment and personal identification. Generally, images photographed by a mobile phone generate geometric distortion due to the shooting angle, resulting in low quality images. Embedding watermark for low quality images makes it difficult to satisfy transparency. To solve such problem, this paper focuses on the technique of embedding barcode images in the image taken by mobile phone and proposes barcode watermarking for protecting mobile-based ownership. The barcode watermark embedded in the image can be used to prove ownership since it is readable by a machine such as illegal copy.

  • PDF

New Watermarking Technique Using Data Matrix and Encryption Keys

  • Kim, Il-Hwan;Kwon, Chang-Hee;Lee, Wang-Heon
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.4
    • /
    • pp.646-651
    • /
    • 2012
  • Meaningful logos or random sequences have been used in the current digital watermarking techniques of 2D bar code. The meaningful logos can not only be created by copyright holders based on their unique information, but are also very effective when representing their copyrights. The random sequences enhance the security of the watermark for verifying one's copyrights against intentional or unintentional attacks. In this paper, we propose a new watermarking technique taking advantage of Data Matrix as well as encryption keys. The Data Matrix not only recovers the original data by an error checking and correction algorithm, even when its high-density data storage and barcode are damaged, but also encrypts the copyright verification information by randomization of the barcode, including ownership keys. Furthermore, the encryption keys and the patterns are used to localize the watermark, and make the watermark robust against attacks, respectively. Through the comparison experiments of the copyright information extracted from the watermark, we can verify that the proposed method has good quality and is robust to various attacks, such as JPEG compression, filtering and resizing.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

Multiple Barcode Watermarking Technique for Improve Robustness and Imperceptibility (강인성과 비지각성 향상을 위한 다중 바코드 워터마킹 기법)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1723-1729
    • /
    • 2016
  • Digital watermarking is tried to get an optimum tradeoffs between its performance characteristics, robustness, transparency and capacity. This paper is, therefore, suggesting a watermarking technique that builds multiple barcodes in various frequency bands to implement embedded watermarks that is imperceptible and robust against various attacks. Even though a watermark technique with duplicated barcode watermarks embedded in various frequency bands can satisfy robustness as there is high possibility that watermarks embedded in an image remains after various attacks, the duplicated barcode data can weaken imperceptibility. Thus, to satisfy the conflicting characteristic requirements of watermarks, robustness and imperceptibility, different barcode data is embedded in each frequency band. The test shows that ownership authentication with the technique suggested in this thesis does not require specialized hardware, and extracted watermarks can be easily identified through a mobile barcode scanner app, which allows low complexity, low cost and swift identification.