• Title/Summary/Keyword: digital image watermarking

Search Result 377, Processing Time 0.036 seconds

Performance Enhancement through Row-Column Cross Scanning in Differential Histogram-based Reversible Watermarking (차이값 히스토그램 기반 가역 워터마킹의 행열 교차 스캐닝을 통한 성능 향상 기법)

  • Yeo, Dong-Gyu;Lee, Hae-Yeoun;Kim, Byeong-Man
    • The KIPS Transactions:PartB
    • /
    • v.18B no.1
    • /
    • pp.1-10
    • /
    • 2011
  • Reversible watermarking inserts watermark into digital media in such a way that visual transparency is preserved, which enables the restoration of the original media from the watermarked one without any loss of media quality. It has various applications, where high capacity and high visual quality are major requirements. This paper presents a new effective multi-round embedding scheme for the differential histogram-based reversible watermarking that satisfies high capacity requirements of the application. The proposed technique exploits the row-column cross scanning to fully utilize the locality of images when multi-round embedding phase to the message inserted image. Through experiments using multiple kinds of test images, we prove that the presented algorithm provides 100% reversibility, effectiveness of multi-round embedding, and higher visual quality, while maintaining the induced-distortion low.

Research on Equal-resolution Image Hiding Encryption Based on Image Steganography and Computational Ghost Imaging

  • Leihong Zhang;Yiqiang Zhang;Runchu Xu;Yangjun Li;Dawei Zhang
    • Current Optics and Photonics
    • /
    • v.8 no.3
    • /
    • pp.270-281
    • /
    • 2024
  • Information-hiding technology is introduced into an optical ghost imaging encryption scheme, which can greatly improve the security of the encryption scheme. However, in the current mainstream research on camouflage ghost imaging encryption, information hiding techniques such as digital watermarking can only hide 1/4 resolution information of a cover image, and most secret images are simple binary images. In this paper, we propose an equal-resolution image-hiding encryption scheme based on deep learning and computational ghost imaging. With the equal-resolution image steganography network based on deep learning (ERIS-Net), we can realize the hiding and extraction of equal-resolution natural images and increase the amount of encrypted information from 25% to 100% when transmitting the same size of secret data. To the best of our knowledge, this paper combines image steganography based on deep learning with optical ghost imaging encryption method for the first time. With deep learning experiments and simulation, the feasibility, security, robustness, and high encryption capacity of this scheme are verified, and a new idea for optical ghost imaging encryption is proposed.

A Study on Steganography Using Cartoon Image (카툰 화상을 이용한 심층암호에 관한 연구)

  • Park, Young-Ran;Park, Ji-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.913-921
    • /
    • 2004
  • Steganography is a kind of data hiding which can hide secret information to digital media. It is performed so that another person does not recognize any information and make secret communication between each other. Specially, it is not easy to hide secret information without being visually recognized in scanned text image or cartoon image etc. In this paper, we propose an improved method that can embed a large quantity of secret information in a binary image without noticeable artifacts. Binary cartoon image is divided into block of 3-by-3 sizes. Secret information is embedded by using run-length of 8-neighborhood pixels except for the center pixel of the block. To improve the embedding capacity, we embed it into center pixel under to some condition.

  • PDF

The Implementation of the Digital watermarking for 3D Polygonal Model (3차원 형상 모델의 디지털 워터마킹 구현)

  • Kim, Sun-Hyung;Lee, Sun-Heum;Kim, Gee-Seog;Ahn, Deog-Sang
    • The KIPS Transactions:PartD
    • /
    • v.9D no.5
    • /
    • pp.925-930
    • /
    • 2002
  • This paper discusses techniques for embedding data into 3D polygonal models of geometry. Much researches of Watermarking had been gone as element technology of DRM (digital rights management). But, few research had gone to 3D polygonal model. Most research is limited at text document, 2D image, animation, music etc. RP system is suitable a few production in various goods species, and it is used much in industry to possible reason that produce prototype and find error or incongruent factor at early stage on design in product development childhood. This paper is research about method that insert watermark in STL ( stereolithography) file that have 3D shape model. Proposed algorithm inserts watermark in normal vector region and facet's interior region of 3D shape data. For this reason, 3D shape does not produce some flexure and fulfill invisibility of watermark. Experiment results that insert and extract watermark in normal netter region and facet's Interior region of 3D shape data by proposed algorithm do not influence entirely in 3D shape and show that insertion and extraction of watermark are possible.

EXTRACTION OF WATERMARKS BASED ON INDEPENDENT COMPONENT ANALYSIS

  • Thai, Hien-Duy;Zensho Nakao;Yen- Wei Chen
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.407-410
    • /
    • 2003
  • We propose a new logo watermark scheme for digital images which embed a watermark by modifying middle-frequency sub-bands of wavelet transform. Independent component analysis (ICA) is introduced to authenticate and copyright protect multimedia products by extracting the watermark. To exploit the Human visual system (HVS) and the robustness, a perceptual model is applied with a stochastic approach based on noise visibility function (NVF) for adaptive watermarking algorithm. Experimental results demonstrated that the watermark is perfectly extracted by ICA technique with excellent invisibility, robust against various image and digital processing operators, and almost all compression algorithms such as Jpeg, jpeg 2000, SPIHT, EZW, and principal components analysis (PCA) based compression.

  • PDF

A Study on Digital Watermarking of Digital Image Using Fourier Transform (퓨리어 변환을 이용한 디지털 영상의 워터마킹에 관한 연구)

  • 김은실;정숙이;박지환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2000.04a
    • /
    • pp.55-59
    • /
    • 2000
  • 고도 정보화 사회의 발전에 따라 멀티미디어의 발달, 그리고 인터넷의 보급으로 인하여 멀티미디어 정보의 지적 소유권 보호를 목적으로 영상 데이터에 기밀정보를 삽입하는 정보 은닉에 관한 많은 연구가 이루어지고 있다. 정보 은닉의 한 방법인 디지털 워터마킹 기술은 크게 화소 값에 직접 정보를 삽입하는 공간 영역(spatial domain) 기반 워터마킹과 주파수 영역으로 변환하여 정보를 삽입하는 주파수 영역(frequency domain)기반 워터마킹으로 나눌 수 있다. 본 논문에서는 영상의 디지털 데이터를 FFT에 의해 주파수 영역으로 변환하여 인간의 시각으로는 지각할수 없는 주파수 영역에 워터마크를 삽입한 후, 무결성의 정도를 측정하여 워터마크를 검출하는 주파수 영역기반(frequency domain based) 디지털 워터마킹 기법을 제안한다.

  • PDF

A Study on Watermark Technique for Copyright Protection of Digital Images (디지털 영상물의 저작권 보호를 위한 워터마크 기술에 관한 연구)

  • Hong, Min-Suk;Park, Kang-Seo;Chung, Tae-Yun;Shin, Joon-In;Park, Sang-Hui
    • Proceedings of the KIEE Conference
    • /
    • 1998.11b
    • /
    • pp.606-608
    • /
    • 1998
  • Digital watermarking is the technique which embeds the invisible signal into multimedia data such as audio, video, images, for copyright protection, including owner identification and copy control information. In this paper, a new watermark detection algorithm by local masking cross covariance between watermarked signal and pseudo noise signal is proposed. The proposed algorithm enhances the detection probability for embedding information. Since reducing detection errors for the weak embedding signals, the algorithm improves the image quality and robusts against illegal attack to delete the embedding information and data compression applications such as JPEG and MPEGs.

  • PDF

Optimal Watermark Coefficient Extraction by Statistical Analysis of DCT Coefficients (DCT 계수의 통계적 분석을 통한 최적의 워터마크 계수 추출)

  • 최병철;김용철
    • Proceedings of the IEEK Conference
    • /
    • 2000.11c
    • /
    • pp.69-72
    • /
    • 2000
  • In this paper, a novel algorithm for digital watermarking is proposed. We use two pattern keys from BCH (15, 7) code and one randomizing key. In the embedding process, optimal watermark coefficients are determined by statistical analysis of the DCT coefficients from the standpoint of HVS. In the detection, watermark coefficients are restored by correlation matching of the possible pattern keys and minimizing the estimation errors. Attacks tested in the experiments ate image enhancement and image compression (JPEG). Performance is evaluated by BER of the logo images and SNR/PSNR of the restored images. Our method has higher performance against JPEG attacks. Analysis for the performance is included.

  • PDF

Robust and Blind Watermarking for DIBR attacked 3D Digital Image (3D 디지털 영상의 DIBR 공격을 위한 강인성 블라인드 워터마킹)

  • Lee, Yong-Seok;Seo, Young-Ho;Kim, Dong-Wook
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2015.11a
    • /
    • pp.176-179
    • /
    • 2015
  • 본 논문에서는 3D 디지털 영상 컨텐츠의 저작권 보호를 위해 DWT(Discrete Wavelet Transform)를 이용하여 강인성(robustness), 비가시성(invisibility), 보안성(security)을 만족하는 블라인드(Blind) 워터마킹 방법을 제안한다. 이 방법은 깊이 영상 기반 랜더링(DIBR, Depth Image Based Rendering)에 효과적으로 대처하기위해 고안된 알고리즘으로, 랜더링시 발생하는 왜곡에 영향이 적은 1-Level DWT LH 부대역에 워터마크를 삽입하는 방법이다. 이 방법에서 저작권에 대한 판단은 추출한 워터마크 정보를 통합 판단하는 방법을 사용한다. 이 방법은 저작권 보호를 위해 원본 영상을 보관할 필요가 없으며, 깊이 영상 기반 랜더링 baseline distance 5% 공격에 좌,우시점 영상 모두 효율적으로 적은 에러율을 보이며 워터마크로서 충분한 강인성을 보여준다.

  • PDF

Digital Watermarking on the Color coordinate (칼라 좌표계에서의 디지털 워크마킹)

  • Lee Chang-Soon;Jung Song-Ju
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.10 no.2
    • /
    • pp.102-108
    • /
    • 2005
  • CIELAB coordinate is represented by one lightness component and two chromaticity components and similar to human visual system. Visual devices such as computer monitor display images using RGB coordinate. We propose a technique for inserting the watermark of visually recognizable mark into the middle frequency domain of image. RGB coordinate image is transformed into CIELAB coordinate, which include the characteristics of Human vision and then a* component is transformed into DFT(Discrete Fourier transform) transform.

  • PDF