• Title/Summary/Keyword: imperceptibility

Search Result 58, Processing Time 0.026 seconds

A Collusion-secure Fingerprinting Scheme for Three-dimensional Mesh Models (삼차원 메쉬 모델에 적용한 공모방지 핑거프린팅 기법)

  • Hur, Yung;Jeon, Jeong-Hee;Ho, Yo-Sung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.4
    • /
    • pp.113-123
    • /
    • 2004
  • This paper presents a new collusion-secure fingerprinting scheme to embed fingerprints into three-dimensional(3-D) mesh models efficiently. In the proposed scheme, we make the same number of fingerprints as the number of customers based on the finite projective geometry, partition a 3-D mesh model related to the number of bits assigned to each fingerprint and then embed a watermark representing copyright information into each submesh to be marked. Considering imperceptibility and robustness of the watermarking algorithm we embed the watermark signal into mid-frequency DCT coefficients obtained by transforming vertex coordinates in the triangle strips which are generated from the submeshes to be marked. Experimental results show that our scheme is robust to additive random noises, MPEG-4 SNHC 3-D mesh coding, geometrical transformations, and fingerprint attacks by two traitors' collusion. In addition, we can reduce the number of bits assigned to each fingerprint significantly.

Digital Watermarking for Three-Dimensional Polygonal Mesh Models in the DCT Framework (DCT영역에서 3차원 다각형 메쉬 모델의 디지헐 워터마킹 방법)

  • Jeon, Jeong-Hee;Ho, Yo-Sung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.3
    • /
    • pp.156-163
    • /
    • 2003
  • Most watermarking techniques insert watermarks into transform coefficients in the frequency domain because we can consider robust or imperceptible frequency bands against malicious attacks to remove them. However, parameterization of 3-D data is not easy because of irregular attribution of connectivity information, while 1-I) or 2-D data is regular. In this paper we propose a new watermarking scheme for 3-D polygonal mesh models in the DCT domain. After we generate triangle strips by traversing the 3-D model and transform its vertex coordinates into the DCT domain, watermark signals are inserted into mid-frequency bands of AC coefficients for robustness and imperceptibility. We demonstrate that our scheme is robust against additive random noise, the affine transformation, and geometry compression by the MPEG-4 SNHC standard.

A Study on Steganographic Method for Binary Images (이진영상을 위한 심층암호 기법에 관한 연구)

  • Ha Soon-Hye;Kang Hyun-Ho;Lee Hye-Joo;Shin Sang-Uk;Park Young-Ran
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.2
    • /
    • pp.215-225
    • /
    • 2006
  • Binary images, such as cartoon character images, text images and signature images, which consist of two values with black and white have more difficulties inserting imperceptible secret data than color images. Steganography using binary cover images is not easy to satisfy requirements for both the imperceptibility of stego images and a high embedding rate of secret data at the same time. In this paper, we propose a scheme that can get both the high quality of stego images and a high embedding rate by supplementing the advantages of previous research. In addition, the insertion of the proposed method changes only existing pixels of the imperceptible position and can embed the secret data of [$log_2(mn+1)-2$] bits in a block with size of $m{\times}n$.

  • PDF

A Digital Watermarking Technique for MPEG Image/Video Compression (MPEG 영상/비디오 압축을 위한 디지털 워터마킹 기법)

  • Yoo Byoung-Seok;Choi Hyun-Jun;Seo Young-Ho;Kim Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5C
    • /
    • pp.406-414
    • /
    • 2005
  • The necessity for a technique to protect intellectual property of a digital content has been increasing, especially for the image/video contents which are the most favorite because of their high information-intensive property. According to this demand, this paper proposed a digital watermarking algorithm, which is recognized as the most promising technique. This algorithm targets MPEG compression system and the watermarking process is to be performed during the compression process. It inserts watermark only in Y components of I-frames. Experimental results showed that the proposed method satisfied both imperceptibility and robustness against various attacks. The PSNR difference between the compressed images(the average compression ratio was about 27:1 with Y:Cb:Cr=4:2:0 color format for TM5-based compression) with and without watermarking was only 1.8dB ($4.2\%$). In each case that the resulting image after an attack was reusable the normalized correlation between the extracted watermark and the original one was above 0.8.

Robust Audio Watermarking in Frequency Domain for Copyright Protection (저작권 보호를 위한 주파수 영역에서의 강인한 오디오 워터마킹)

  • Dhar, Pranab Kumar;Kim, Jong-Myon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.109-117
    • /
    • 2010
  • Digital watermarking has drawn extensive attention for protecting digital contents from unauthorized copying. This paper proposes a new watermarking scheme in frequency domain for copyright protection of digital audio. In our proposed watermarking system, the original audio is segmented into non-overlapping frames. Watermarks are then embedded into the selected prominent peaks in the magnitude spectrum of each frame. Watermarks are extracted by performing the inverse operation of watermark embedding process. Simulation results indicate that the proposed scheme is robust against various kinds of attacks such as noise addition, cropping, resampling, re-quantization, MP3 compression, and low pass filtering. Our proposed watermarking system outperforms Cox's method in terms of imperceptibility, while keeping comparable robustness with the Cox's method. Our proposed system achieves SNR (signal-to-noise ratio) values ranging from 20 dB to 28 dB. This is in contrast to Cox's method which achieves SNR values ranging from only 14 dB to 23 dB.

Analysis of CGH and Watermarking Method using Global 2DDCT (전역 2차원 DCT를 이용한 디지털 홀로그램의 분석 및 워터마킹 기법)

  • Choi, Hyun-Jun;Seo, Young-Ho;Yoo, Ji-Sang;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1267-1274
    • /
    • 2007
  • In this paper, we propose a digital watermarking algorithm for digital hologram generated by computer generated hologram(CGH) method. Digital hologram generated by a computer calculation(CGH) is one of the most expensive contents and its usage is being expanded. Thus, it is highly necessary to protect the ownership of digital hologram. In this paper two digital watermarking schemes are introduced hologram-domain and global 2DDCT-domain scheme. Proposed watermarking scheme showed very high imperceptibility and quite high robustness against the attacks. The purpose of this paper is to introduce these global 2DDCT based watermarking schemes. Thus, we expect that these and the contents in this paper can be very useful bases for the further digital watermarking schemes of the digital holograms.

An Approach of Hiding Hangul Secret Message in Image using XNOR-XOR and Fibonacci Technique (XNOR-XOR과 피보나치 기법을 이용하여 이미지에서 한글 비밀 메시 지를 은닉하는 방법)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.109-114
    • /
    • 2021
  • As various users increase in a network environment, it is difficult to protect sensitive and confidential information transmitted and received from attackers. Concealing bitwise secret data in an image using the LSB technique can be very vulnerable to attack. To solve this problem, a hybrid method that combines encryption and information hiding is used. Therefore, an effective method for users to securely protect secret messages and implement secret communication is required. A new approach is needed to improve security and imperceptibility to ensure image quality. In this paper, I propose an LSB steganography technique that hides Hangul messages in a cover image based on MSB and LSB. At this time, after separating Hangul into chosung, jungsung and jongsung, the secret message is applied with Exclusive-OR or Exclusive-NOR operation depending on the selected MSB. In addition, the calculated secret data is hidden in the LSB n bits of the cover image converted by Fibonacci technique. PSNR was used to confirm the effectiveness of the applied results. It was confirmed 41.517(dB) which is suitable as an acceptable result.

The Problems in Digital Watermarking into Intra-Frames of H.264/AVC (H.264-기반 인트라 프레임의 디지털 워터마킹 문제)

  • Choi, Hyun-Jun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.233-242
    • /
    • 2009
  • This paper intend to show the affect of the intra-prediction on the typical digital watermarking method and the fact that the watermarking method has very low effectiveness when it is performed for the intra-frames of H.264. The target watermarking method was the one for imperceptibility and robustness and was assumed to be performed during the intra-compression process by the H.264 technique. Also this method was assumed to insert watermark data and to extract it for certification if needed. The problem is that the resulting data from the re-engineering of the watermark insertion process to extract the watermark data is different from the one before. We experimentally showed that it stems from the intra-prediction itself. That is, we showed that the resulting image data from only compression without watermarking changes if it is re-compressed by the same conditions as the first compression and it is because the intra-prediction modes as well as the coefficient values change. Also, we applied one blind and one semi-blind watermarking methods to show that the typical attacks after watermarking makes this problem much more serious and lowers the effectiveness of the watermarking method dramatically. Therefore we concluded by considering the experimental data that a typical watermarking method which has been researched so far cannot guarantee the effectiveness of intra-frame watermarking and it is highly required to developed a new kind of methodologies.