• Title/Summary/Keyword: digital Watermarking

Search Result 601, Processing Time 0.026 seconds

Tamper Detection of Digital Images using Hash Functions (해쉬 함수를 이용한 디지털 영상의 위변조 검출)

  • Woo, Chan-Il;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.7
    • /
    • pp.4516-4521
    • /
    • 2014
  • Digital watermarking for digital image authentication and integrity schemes are based on fragile watermarking and can detect any modifications in a watermark embedded image by comparing the embedded watermark with the regenerated watermark. Therefore, the digital watermark for image authentication and integrity should be erased easily when the image is changed by digital image processing, such as scaling or filtering etc. This paper proposes an effective tamper detection scheme for digital images. In the proposed scheme, the original image was divided into many non-overlapping $2{\times}2$ blocks. The digital watermark was divided into two LSB of each block and the image distortion was imperceptible to the human eye. The watermark extraction process can be used to determine if the watermarked image has been tampered. The experimental results successfully revealed the effectiveness of the proposed scheme.

Digital Color Image Watermarking for JPEG2000 (JPEG2000을 위한 디지털 칼라 영상 워터마킹)

  • Park Jong-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1755-1759
    • /
    • 2004
  • Digital watermarking technology is one of method of protecting property from the illegal reproduction of digital data. This technology inserts the specific data in a certain file to identify the property, that is an author and rights, not for human to be seen and heard. In this paper, the watermarking technology which inserts a RGB color watermark in a JPEG2000 color image using the visual characteristics of wavelet coefficient was proposed. After applying various attack at a watermarked image according to proposed technology, the likeness between the original image, the watermark and the extracted watermark was measured and investigated. As a result, the PSNR value of image was varied depending on perceptual parameter, but we can obtain 32dB as a whole.

Image Adaptive Block DCT-Based Perceptual Digital Watermarking (영상 특성에 적응적인 블록 DCT 기반 지각적 디지털 워터마킹)

  • 최윤희;최태선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.6
    • /
    • pp.221-229
    • /
    • 2004
  • We present new digital watermarking scheme that embeds a watermark according to the characteristics of the image or video. The scheme is compatible with established image compression standard. We define a weighting function using a parent-child structure of the DCT coefficients in a block to embed a maximum watermark. The spatio-frequency localization of the DCT coefficients can be achieved with this structure. In the detection stage, we present an optimum a posteriori threshold with a given false detection error probability based on the statistical analysis. Simulation results show that the proposed algorithm is efficient and robust against various signal processing techniques. Especially, they are robust against widely used coding standards, such as JPEG and MPEG.

Digital watermarking technique using Computer-Generated Hologram and optoelectrical extraction algorithm (컴퓨터 형성 홀로그램과 광전자적 추출 알고리즘을 이용한 디지털 워터마킹 방법)

  • Cho, Kyu-Bo;Shin, Chang-Mok;Kim, Soo-Joong
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.1
    • /
    • pp.31-37
    • /
    • 2006
  • We propose a digital watermarking technique using a computer generated hologram. The proposed method uses two random patterns separated from the computer generated hologram (CGH). One of those is embedded into the original image as hidden watermark information and then the reconstructed image can be obtained by an optical decoding algorithm with the other one as a decoding key. We analyze an occlusion of the watermarked image that is the original image containing the hidden pattern. The embedding process is performed digitally and reconstruction optically Computer simulation and an optical experiment are shown in support of the proposed technique.

Digital Watermarking for Multi-Level Data Hiding to Color Images (컬러 영상에서 다중-레벨 데이터 은닉을 위한 디지털 워터마킹)

  • Seo, Jung-Hee;Park, Hung-Bog
    • The KIPS Transactions:PartB
    • /
    • v.14B no.5
    • /
    • pp.337-342
    • /
    • 2007
  • Multi-level has advantage to express image in all levels with different images. This paper proposes digital watermarking built-in technique to transform color image to YCbCr color space to guarantee robustness and imperceptibility of the watermark in the various expression of color images, and to hide multi-level data which shows spread spectrum from low resolution to whole resolution for the Y-signal of multi-level. In color signal, Y-signal and low resolution built-in watermark has risk to be visible, but it can guarantee the robustness of watermark in various colors and transformed images. As a result of the experiment, wavelet compression image with built-in watermark showed robustness and imperceptibility of watermark.

Invisible Watermarking Based Optical Wireless Communications (Invisible 워터마킹 기반의 광무선통신)

  • Hossain, Mohammad Arif;Le, Nam-Tuan;Islam, Amirul;Hong, Chang Hyun;Jang, Yeong Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.2
    • /
    • pp.198-205
    • /
    • 2016
  • In the contemporary world, the breakthrough of the ultra-modern technologies has been blessed with the camera. This device has become omnipresent either integrated on with other devices such as smartphones, notebooks, laptops, handheld devices and so on. In addition, digital signage, display and monitors have also become very widespread around us everywhere. These types of scenarios have made imaginable to imagine about the consuming of the unused resources. The dual use of displayed contents can make it possible to use it as an advertisement as well as a transmitter for camera based communication. In this study, a digital watermarking algorithm based communication method has been analyzed. We have introduced Binary Pattern (BP) based a new message extracting algorithm to extract message in an efficient way from the watermarked image compared to other algorithms. Besides, the previous works using camera and display have been illustrated using comparative analysis. This paper has demonstrated an advantageous overview using the experimental results which reveals that the proposed methodology significantly reduces the complexity while augmenting the advantages of the proposed scheme. Moreover, the simulation results have shown the advantages of the proposed scheme over the other schemes.

Double Encryption of Digital Hologram Based on Phase-Shifting Digital Holography and Digital Watermarking (위상 천이 디지털 홀로그래피 및 디지털 워터마킹 기반 디지털 홀로그램의 이중 암호화)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2017
  • In this Paper, Double Encryption Technology Based on Phase-Shifting Digital Holography and Digital Watermarking is Proposed. For the Purpose, we First Set a Logo Image to be used for Digital Watermark and Design a Binary Phase Computer Generated Hologram for this Logo Image using an Iterative Algorithm. And Random Generated Binary Phase Mask to be set as a Watermark and Key Image is Obtained through XOR Operation between Binary Phase CGH and Random Binary Phase Mask. Object Image is Phase Modulated to be a Constant Amplitude and Multiplied with Binary Phase Mask to Generate Object Wave. This Object Wave can be said to be a First Encrypted Image Having a Pattern Similar to the Noise Including the Watermark Information. Finally, we Interfere the First Encrypted Image with Reference Wave using 2-step PSDH and get a Good Visible Interference Pattern to be Called Second Encrypted Image. The Decryption Process is Proceeded with Fresnel Transform and Inverse Process of First Encryption Process After Appropriate Arithmetic Operation with Two Encrypted Images. The Proposed Encryption and Decryption Process is Confirmed through the Computer Simulations.

A Study on Image Electronic Money based on Watermarking Technique (워터 마킹 기술을 활용한 이미지 전자화폐에 관한 연구)

  • Lee, Jung-Soo;Kim, Whoi-Yul
    • The KIPS Transactions:PartD
    • /
    • v.11D no.6
    • /
    • pp.1335-1340
    • /
    • 2004
  • This study introduces a technology utilizing digital images as electronic money by inserting watermark into the images. Watermarking technology assign contents ID to images and inserts the contents ID into the images in an unnoticeable way. The server that manages the issue and the usage of mage electronic money (called ‘WaterCash’ hereafter) stores issued contents ID to database and manage them as electronic money. WaterCash guarantees anonymity and prevents the forgery and modification of WaterCash based on semi-fragile watermarking technique. In addition, WaterCash is transferable and the illegal use of WaterCash can be prevented based on the watermarking technology. The watermarking .technology used in this paper was designed to be robust to image compression but vulnerable to intentional or non-intentional Image processing.

An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform

  • Zhang, Heng;Wang, Chengyou;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1382-1396
    • /
    • 2017
  • In this paper, we analyze a recently proposed semi-fragile watermarking scheme based on local binary pattern (LBP) operators, and note that it has a fundamental flaw in the design. In this work, a binary watermark is embedded into image blocks by modifying the neighborhood pixels according to the LBP pattern. However, different image blocks might have the same LBP pattern, which can lead to false detection in watermark extraction process. In other words, one can modify the host image intentionally without affecting its watermark message. In addition, there is no encryption process before watermark embedding, which brings another potential security problem. To illustrate its weakness, two special copy-paste attacks are proposed in this paper, and several experiments are conducted to prove the effectiveness of these attacks. To solve these problems, an improved semi-fragile watermarking based on LBP operators is presented. In watermark embedding process, the central pixel value of each block is taken into account and Arnold transform is adopted to guarantee the security of watermark. Experimental results show that the improved watermarking scheme can overcome the above defects and locate the tampered region effectively.