• Title/Summary/Keyword: robust watermarking

Search Result 318, Processing Time 0.03 seconds

Adaptive Video Watermarking using the Bitrate and the Motion Vector (비트율과 움직임 벡터를 이용한 적응적 동영상 워터마킹)

  • Ahn, I.Y.
    • 전자공학회논문지 IE
    • /
    • v.43 no.4
    • /
    • pp.37-42
    • /
    • 2006
  • This paper proposes a adaptive video watermarking algorithm according to bitrate and motion vector size in MPEG2 system. The watermark strength in the I-frames is adapted for quantization step size and the strength in the P-B-frames is adapted for quantization step size and motion vector of macroblock to make the watermark more robust against the accompanying degradation due to aggressively compression. A realtime watermark extraction is done directly in the DCT domain during MPEG decoding without full decoding of MPEG video. The experimental simulations show that the video quality results almost invisible difference between the watermarked frames and the original frames and the watermark is resistant to frame dropping, MPEG compression, GoP conversion and low pass filter attacks.

Robust Digital Watermarking Using Chaotic Sequence (카오스 시퀀스를 이용한 견고한 디지털 워터마킹)

  • 김현환;정기룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.4
    • /
    • pp.630-637
    • /
    • 2003
  • This paper proposed a new watermarking algorithm using chaotic sequence instead of conventional M-sequence for protecting copyright to the author. Robustness and security is very important for watermarking process. We use multi-threshold value according to the human visual system for improving robustness of watermarking to each subband images coefficient differently after wavelet transform. And then, we embedded watermark image to original image by multi-watermark weights which are made by random sequence generator. We detect watermark image from the difference data which is made from each wavelet subband images. We also simulate the efficiency from the various possible attacks. Chaotic sequence is better than M-sequence, because the one is very easy to make sequence and the chaotic sequence is changed easy according to the initial value. So, the chaotic sequence has the better security than the conventional M-sequence.

Digital Watermarking for JPEG2000 (JPEG2000을 위한 디지털 워터마킹)

  • 서용석;주상현;정호열
    • Journal of Broadcast Engineering
    • /
    • v.6 no.1
    • /
    • pp.32-40
    • /
    • 2001
  • In this paper, we propose a DWT (discrete Wavelet Transform) based watermarking method, which can be conveniently Integrated In the up-coming JPEG2770 baseline system. Although Conventional DWT based watermarking techniques insert watermark signal Into wavelet coefficients after the transform, our proposed method embeds a watermark into wavelet coefficients obtained from the ongoing process of lifting for DWT. The proposed method allows us to selectively determine frequency characteristics of the coefficients where the watermark is embedded. so that the Inserted watermark cannot be removed or altered even when the filter-bank for DWT is known. Through the simulation, we show that the proposed method is more secure and more robust against various attacks than conventional DWT barred watermarking techniques.

  • PDF

Digital Audio Watermarking Scheme Using Perceptual Modeling (지각 모델링을 이용한 디지털 오디오 워터마킹 방법)

  • 석종원;홍진우
    • Journal of Broadcast Engineering
    • /
    • v.6 no.2
    • /
    • pp.195-202
    • /
    • 2001
  • As a solution for copyright protection of digital multimedia contents, digital watermark technology is now drawing the attention. In this paper, we presented two novel audio watermarking algorithms as a solution for protecting unauthorized copy of digital audio. Proposed watermarking schemes include the psychoacoustic model of MPEG audio coding to achieve the perceptual transparency after watermark embedding and preprocessing procedure before correlation in watermark detection to extract copyright information without access to the original audio signal. Experimental results show that our watermarking scheme is robust to common signal Processing attacks and it Introduces no audible distortion after watermark insertion.

  • PDF

A Digital Watermarking Algorithm Using PIM and 2D Barcode (PIM과 2D 바코드를 이용한 워터마킹 알고리즘)

  • Han Su-Young;Kim Hong-Ryul;Lee Kee-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.103-108
    • /
    • 2005
  • In this Paper, we proposed a novel robust watermarking technique using PIM and 2D barcode for the copyright of the digital images. Because human is impervious to the change in the complex area, the embedding watermark to the selected coefficients using PIM enhances invisibility. A 2D barcode image is used for watermark in this research. The 2D barcode contains more information than conventional ID barcode and includes the error correction algorithm. Therefore the watermarking algorithm using 2D barcode enhances the robustness of watermark. From the experimental results , the proposed algorithm shows better invisibility and robustness performance in a general signal Processing such as JPEG and SPIHT lossy compression.

  • PDF

Wavelet Based Intelligence image Watermarking Using Machine Vision of LabVIEW (LabVIEW의 Machine Vision을 이용한 웨이블릿 기반 지능형 이미지 Watermarking)

  • 송윤재;강두영;김형권;안태천
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.10a
    • /
    • pp.521-524
    • /
    • 2004
  • Recently, acgis of authentication and crcator's copyright has become a matter of great concern by the diffusion of multimedia technique and the growth of the internet and the easily duplicated property of digital data. Consequently, many active researches have been made to protect copyright and to assure integrity by inserting watermark into the digital data. In this paper, watermark is repealed through the entire image and adapted to the content of the image. Achieved by an underlying process of transforming the digital image to the frequency domain by wavelet transform, which has three (vertical, horizontal, diagonal) directions and Multi-resolution features, and then choosing frequency area inferior to the human perceptibility and significant for invisible and robust watermark. We realize wavelet based image watermarking using Machine Vision of LabVIEW.

  • PDF

A Study on Blind Watermarking Technique of Digital Image using 2-Dimensional Empirical Mode Decomposition in Wavelet Domain (웨이블릿 평면에서의 2D-EMD를 이용한 디지털 영상의 블라인드 워터마킹 기술에 관한 연구)

  • Lee, Young-Seock;Kim, Jong-Weon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.99-107
    • /
    • 2010
  • In this paper a blind watermarking algorithm for digital image is presented. The proposed method operates in wavelet domain. The watermark is decomposed into 2D-IMFs using BEMD which is the 2-dimensional extension of 1 dimensional empirical mode decomposition. The CDMA based on SS technique is applied to watermark embedding and detection process. In the watermark embedding process, each IMF of watermark is embedded into middle frequency subimages in wavelet domain, so subimages just include partial information about embedded watermark. By characteristics of BEMD, when the partial information of watermark is synthesized, the original watermark is reconstructed. The experimental results show that the proposed watermarking algorithm is imperceptible and moreover is robust against JPEG compression, common image processing distortions.

A adaptively robust method of DCT-based watermarking (DCT 기반 워터마킹의 적응적 강인화 방법)

  • Jun, Young-Min;Kim, Gye-Young;Choi, Hyung-Il
    • The KIPS Transactions:PartB
    • /
    • v.10B no.6
    • /
    • pp.629-638
    • /
    • 2003
  • In this paper, we propose an improved method of watermarking to increase the invisibility of a watermark and robustness against attacks for the purpose of removing the embedded watermark. The proposed method adaptively selects DCT blocks and determines position and intensity for watermarking based on the characteristics of human visual system. The used features are texture, luminance and contrast. We show the experimental results against image processing attacks such as cropping, image enhancement, low pass filtering, and JPEG compression, and then discuss the performance of the proposed method.

A Novel Blind Watermarking Scheme Using Block Indexing (블록 인덱싱을 이용한 블라인드 워터마킹 기법)

  • Kang Hyun-Ho;Shin Sang-Uk;Han Seung-Wu
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.331-342
    • /
    • 2005
  • In this paper, we propose an efficient watermarking algorithm using block indexing. The proposed algorithm is a novel blind watermarking scheme using the indexed watermark value based on the spread spectrum method. The watermark insertion is allocated into index value of each block after dividing original image into sub-blocks. The watermark embedded in mappinged with index values of blocks, And the mappinged blocks convert to DCT and then the PN sequence embedded to middle frequency band. Consequently the watermark is expressed by index value of sub-blocks. The watermark extracted from the correlation of between PN sequence and watermarked image. Experimental results demonstrate that the watermarked image has a good quality in terms of imperceptibility and is robust against various attacks.

  • PDF

Correlation-based Robust Blind Watermarking (상관도 기반의 강인한 블라인드 워터마킹)

  • Joo, Snag-Hyun;Seo, Yong-Seok
    • The KIPS Transactions:PartB
    • /
    • v.10B no.5
    • /
    • pp.479-484
    • /
    • 2003
  • We propose a blind watermarking method that embeds a binary pseudo-random sequence (watermarks), (-1, 1), into wavelet dc components, while most watermarking techniques embed watermarks in the middle frequency range for robustness and fidelity. In our scheme, the watermarks are embedded into particular locations to be selected by a key, where some watermark embeddings are skipped to avoid severe degradation in quality. Our robustness is compared to some results registered to the ChechMark [1] that is one of the most popular benchmarking tools.