• Title/Summary/Keyword: invisibility

Search Result 163, Processing Time 0.021 seconds

UN-Substituted Video Steganography

  • Maria, Khulood Abu;Alia, Mohammad A.;Alsarayreh, Maher A.;Maria, Eman Abu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.382-403
    • /
    • 2020
  • Steganography is the art of concealing the existence of a secret data in a non-secret digital carrier called cover media. While the image of steganography methods is extensively researched, studies on other cover files remain limited. Videos are promising research items for steganography primitives. This study presents an improved approach to video steganography. The improvement is achieved by allowing senders and receivers exchanging secret data without embedding the hidden data in the cover file as in traditional steganography methods. The method is based mainly on searching for exact matches between the secret text and the video frames RGB channel pixel values. Accordingly, a random key-dependent data is generated, and Elliptic Curve Public Key Cryptography is used. The proposed method has an unlimited embedding capacity. The results show that the improved method is secure against traditional steganography attacks since the cover file has no embedded data. Compared to other existing Steganography video systems, the proposed system shows that the method proposed is unlimited in its embedding capacity, system invisibility, and robustness. The system achieves high precision for data recovery in the receiver. The performance of the proposed method is found to be acceptable across different sizes of video files.

A Study on the Interpretation of Architectural Color of Digital Space (디지털 공간의 건축색채해석에 관한 연구)

  • Kim, Sun-Young
    • Korean Institute of Interior Design Journal
    • /
    • v.19 no.4
    • /
    • pp.39-47
    • /
    • 2010
  • As various materials and new methods can be used due to developments in science and expansion of thinking, modern architectural color composes extensive possibilities exceeding its physical role of the past. In particular, rather than the initial external expression, the secondary connotative interpretation is more important in interpreting architectural color. This is because color interpretation changes the meaning of space based on light. Also, the development of digital technology has shifted the use of architectural color from passive realization to a more proactive concept and value. In other words, such shift leads to a new discussion on architectural color such as non-representation, invisibility, and non-physicality as the concept of fixed time, space and movement has been weakened. This paper begins by conceptualizing the digital space, a term widely used to interpret the architectural color of digital space. And it will be categorized as non-representational architectural color, invisible architectural color, and non-physical architectural color, by combining the characteristics of digital space with the modern architecture's color examples. Digital space overcoming the space time is differently interpreted from the past color expression. Modern architecture's color which substitutes the passive view with active body takes a role delivering various axes of discussions with synaesthesia.

Content-based Video Retrieval for Illegal Copying Contents Detection using Hashing (Hashing을 이용한 불법 복제 콘텐츠 검출을 위한 내용 기반 영상 검색)

  • Son, Heusu;Byun, Sung-Woo;Lee, Soek-Pil
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.10
    • /
    • pp.1358-1363
    • /
    • 2018
  • As the usage of the Internet grows and digital media become more diversified, it has become much easier for digital contents to be distributed and shared. This makes easier to access the desired digital contents. On the other hand, there is an increasing need to protect the copyright of digital works. There are some prevalent ways to protect ownership, but they accompany several disadvantages. Among those ways, watermarking methods have the advantage of ensuring invisibility, but they also have a disadvantage that they are vulnerable to external attacks such as a noise and signal processing. In this paper, we propose the detecting method of illegal contents that is robust against external attacks to protect digital works. We extract HSV and LBP features from images and use Euclidian-based hashing techniques to shorten the searching time on high-dimensional and near-duplicate videos. According to the results, the proposed method showed higher detection rates than that of the Watermarking techniques in terms of the images with fabrications or deformations.

Color Image Watermarking Using Human Visual System (인간시각시스템을 고려한 칼라 영상 워터마킹)

  • Lee, Joo-Shin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.6 no.2
    • /
    • pp.65-70
    • /
    • 2013
  • In this paper, we proposed color image watermarking using human visual system. A watermark is embedded by transforming a color image of RGB coordinate into a color image of HSI coordinate with considering that chromatic components are less sensitive than achromatic components. Watermark is embedded in the frequency domain of the chromatic channels by using discrete cosine transform. Watermark is extracted from watermarked image by using inverse discrete cosine transform. To verify the proposed method, a standard image and a fingerprint image are used for the original image and the watermark image, respectively. Simulation results are satisfied with invisibility and robustness from attacks as image compression.

A Direction-Adaptive Watermarking Technique Based on 2DCT in the Buyer-Seller Watermarking Protocol (구매자-판매자 워터마킹 프로토콜상에서 DCT 기반의 방향성 적응 워터마킹)

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Kwon, Ki-Ryong;Woo, Chong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.7
    • /
    • pp.778-786
    • /
    • 2014
  • Buyer-seller watermarking protocol is one of the copyright protection techniques which combine a cryptographic protocol used in electronic commerce with a digital wetermarking scheme aiming at proving the ownership of multimedia contents and preventing the illegal reproduction and redistribution of digital contents. In this paper, it is proposed a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework. In order to implement watermarking scheme in a public-key cryptosystem, it is divided that frequency coefficients exist as real number into integer and decimal layer. And the decimal layer is modified integer type through integral-processing. Also, for robustness and invisibility required in watermarking scheme, it is designed a direction-adaptive watermarking scheme based on locally edge-properties of each block in an image through analyzing distribution property of the frequency coefficients in a block using JND threshold.

Digital Watermarking Using Color Difference (색차 정보를 이용한 디지털 워터마킹)

  • 김희수;하영호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.1
    • /
    • pp.118-124
    • /
    • 2001
  • In this paper, we proposed the novel digital watermarking for color still image using the characteristics of human visual system and the distribution of DCT coefficients. We insert watermark signal in the chromatic components of YCrCb color space according the characteristics of the human visual system that chromatic component are less sensitive than achromatic components. In order to extract the watermark signal, we use the relationship among the DCT coefficients of watermarked image without using original one. Simulation results show that the proposed watermarking method is better quality on invisibility than the conventional methods.

  • PDF

A 3D Watermarking on STL using Vertex domain (버텍스 영역을 이용한 STL에서의 3차원 디지털 워터마킹)

  • 김기석;천인국
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.901-906
    • /
    • 2002
  • This paper is a research about method, that is used in Rapid Prototyping system, that inserts and extracts watermark in STL(standard transform language) that has a 3D geometrical model. The proposed algorithm inserts watermark in the vertex domain of STL facet without the distortion of 3D model. If we make use of a established algorithm for watermarking of STL, a watermark inserted to 3D model can be removed by simple attack that change order of facet. The proposed algorithm has robustness about these attack. Experiment results verify that the proposed algorithm, to encode and decode watermark in STL 3D geometrical model, doesn't distort a 3D model at all. And it shows that the proposed algorithm is available.

  • PDF

Digital Watermarking using the suitable watermark strength and length (최적의 워터마크 강도와 길이를 이용한 디지털 워터마킹)

  • Lee, Young-Hee;Lee, Jung-Hee;Cha, Eui-Young
    • The Journal of Korean Association of Computer Education
    • /
    • v.9 no.5
    • /
    • pp.77-84
    • /
    • 2006
  • In this paper, we propose an adaptive image watermarking algorithm in DWT domain by using HVS(human Visual system) and SOM(Self-Organizing Map) among neural networks. HVS can be described in terms of two properties of HVS: brightness and texture sensitivity. The SOM is used to obtain the local characteristics of image, Therefore, the suitable strength and length of embedded watermark is determined by using HVS and SOM. The experimental results show that proposed method provides a suitable strength and length of watermark and has good perceptual invisibility and robustness for various attacks.

  • PDF

A Study on Gender Identity shown in Movie Costumes from 1930′s to 1990′s -Focused on the Third Sex - (1930-1990년대 영화 의상에 나타난 젠더 정체성(III) - 제 3의 성(the third sex)을 중심으로-)

  • 정세희;양숙희
    • Journal of the Korean Home Economics Association
    • /
    • v.40 no.6
    • /
    • pp.21-37
    • /
    • 2002
  • The third sex implying a mismatch between sex and gender has been regarded as an extreme socio-cultural violation. In its earlier version, such a violation was expressed by cross-dressing; Women's cross-dressing was thought to invoke eroticism, while men's cross-dressing was considered comic or delinquent. However, as feminism developed more with the homosexual identity expressed openly, the third sex began to be visual. Thus, in 1990's, some homosexual monies began to develop to be pluralized enough to suggest the third sex and thereby, change the negative sex into a positive one. In this study, such a pluralization is discussed in terms of invisibility, dichotomy and androgyny. The cross-dressing movies show females in male attire or males in female attire to reflect the third sex. The cross-dressing may be divided into men's playful cross-dressing, women's political cross-dressing and homosexuals'cross-dressing or 'drag'. Gender identity is not an attribute fixed by some physical characteristics, but it tends to be changed or expanded by some social factors over time. In short, it may be a flexible, plural, individual and self-introspective attribute. Movies present diverse types of gender identities, and in particular, the movie costumes specify them. In other words, the costumes may be model means expressing the gender identities, and the gender identities shown in the movies tend to be imitated, re-created or assumed by the audience.

Digital Image Watermarking Scheme using Adaptive Block Division

  • Cho, Soo-Hyung;Jung, Tae-Yeon;Joung, Young-Hoon;Lee, Kyeong-Hwan;Kim, Duk-Gyoo
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1228-1231
    • /
    • 2002
  • Digital image watermarking scheme using adaptive block division is proposed. To increase the perceptual invisibility, the image is divided into blocks by local properties and the human visual system (HVS), then the significant blocks are selected in the divided blocks. The significant coefficient is determined by Weber's law in these blocks. To increase the robustness, low frequency domains of the discrete cosine transform (DCT) and the discrete wavelet transform (DWT) are used. The watermark is embedded into the selected significant blocks of the DCT's and DWT's low frequency domains with adaptive watermark strengths. The watermark strength is determined by the variance and the local properties of the significant block. The experimental results prove that the proposed scheme has a good robustness against several image processing operations (e.g. median filtering, cropping, scaling, JPEG, JPEG2000, etc.) without significant degradation of the watermarked image.

  • PDF