• Title/Summary/Keyword: robust watermarking

Search Result 318, Processing Time 0.026 seconds

Design of robust Watermarking Algorithm against the Geometric Transformation for Medical Image Security (의료 영상보안을 위한 기하학적 변형에 견고한 워터마킹 알고리즘 설계)

  • Lee, Yun-Bae;Oh, Guan-Tack
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2586-2594
    • /
    • 2009
  • A digital watermarking technique used as a protection and certifying mechanism of copyrighted creations including music, still images, and videos in terms of finding any loss in data, reproduction and pursuit. This study suggests using a selected geometric invariant point through the whole processing procedure of an image and inserting and extracting based on the invariant point so that it will be robust in a geometric transformation attack. The introduced algorithm here is based on a watershed splitting method in order to make medical images strong against RST(Rotation Scale, Translation) transformation and other processing. It also helps to maintain the watermark in images that are compressed and stored for a period of time. This algorithm also proved that is has robustness against not only JPEG compression attack, but also RST attack and filtering attack.

Digital Watermarking using ART2 Algorithm (ART2 알고리즘을 이용한 디지털 워터마킹)

  • 김철기;김광백
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.81-97
    • /
    • 2003
  • In this paper, we suggest a method of robust watermarking for protection of multimedia data using the wavelet transform and artificial neural network. for the purpose of implementation, we decompose a original image using wavelet transform at level 3. After we classify transformed coefficients of other subbands using neural network except fur the lowest subband LL$_3$, we apply a calculated threshold about chosen cluster as the biggest. We used binary logo watermarks to make sure that it is true or not on behalf of the Gaussian Random Vector. Besides, we tested a method of dual watermark insertion and extraction. For the purpose of implementation, we decompose a original image using wavelet transform at level 3. After we classify transformed coefficients of other subbands using neural network except for the lowest subband LL$_3$, we apply a above mentioned watermark insert method. In the experimental results, we found that it has a good quality and robust about many attacks.

  • PDF

A Watermarking Algorithm of 3D Mesh Model Using Spherical Parameterization (구면 파라미터기법을 이용한 3차원 메쉬 모델의 워더마킹 알고리즘)

  • Cui, Ji-Zhe;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.149-159
    • /
    • 2008
  • In this paper, we propose a blind watermarking algorithm of 3d mesh model using spherical parameterization. Spherical parameterization is a useful method which is applicable to 3D data processing. Especially, orthogonal coordinate can not analyse the feature of the vertex coordination of the 3D mesh model, but this is possible to analyse and process. In this paper, the centroid center of the 3D model was set to the origin of the spherical coordinate, the orthogonal coordinate system was transformed to the spherical coordinate system, and then the spherical parameterization was applied. The watermark was embedded via addition/modification of the vertex after the feature analysis of the geometrical information and topological information. This algorithm is robust against to the typical geometrical attacks such as translation, scaling and rotation. It is also robust to the mesh reordering, file format change, mesh simplification, and smoothing. In this case, the this algorithm can extract the watermark information about $90{\sim}98%$ from the attacked model. This means it can be applicable to the game, virtual reality and rapid prototyping fields.

Robust DNA Watermarking based on Coding DNA Sequence (부호 영역 DNA 시퀀스 기반 강인한 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.123-133
    • /
    • 2012
  • This paper discuss about DNA watermarking using coding DNA sequence (CDS) for the authentication, the privacy protection, or the prevention of illegal copy and mutation of DNA sequence and propose a DNA watermarking scheme with the mutation robustness and the animo acid preservation. The proposed scheme selects a number of codons at the regular singularity in coding regions for the embedding target and embeds the watermark for watermarked codons and original codons to be transcribed to the same amino acids. DNA base sequence is the string of 4 characters, {A,G,C,T} ({A,G,C,U} in RNA). We design the codon coding table suitable to watermarking signal processing and transform the codon sequence to integer numerical sequence by this table and re-transform this sequence to floating numerical sequence of circular angle. A codon consists of a consecutive of three bases and 64 codons are transcribed to one from 20 amino acids. We substitute the angle of selected codon to one among the angle range with the same animo acid, which is determined by the watermark bit and the angle difference of adjacent codons. From in silico experiment by using HEXA and ANG sequences, we verified that the proposed scheme is more robust to silent and missense mutations than the conventional scheme and preserve the amino acids of the watermarked codons.

Application and Evaluation of Vector Map Watermarking Algorithm for Robustness Enhancement (강인성 향상을 위한 벡터 맵 워터마킹 알고리즘의 적용과 평가)

  • Won, Sung Min;Park, Soo Hong
    • Spatial Information Research
    • /
    • v.21 no.3
    • /
    • pp.31-43
    • /
    • 2013
  • Although the vector map data possesses much higher values than other types of multimedia, the data copyright and the protection against illegal duplication are still far away from the attention. This paper proposes a novel watermarking technique which is both robust to diverse attacks and optimized to a vector map structure. Six approaches are proposed for the design of the watermarking algorithm: point-based approach, building a minimum perimeter triangle, watermark embedding in the length ratio, referencing to the pixel position of the watermark image, grouping, and using the one-way function. Our method preserves the characteristics of watermarking such as embedding effectiveness, fidelity, and false positive rate, while maintaining robustness to all types of attack except a noise attack. Furthermore, our method is a blind scheme in which robustness is independent of the map data. Finally, our method provides a solution to the challenging issue of degraded robustness under severe simplification attacks.

An invisible watermarking scheme using the SVD (특이치 분해를 이용한 비가시적 워터마크 기법)

  • 유주연;유지상;김동욱;김대경
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11C
    • /
    • pp.1118-1122
    • /
    • 2003
  • In this paper, we propose a new invisible digital watermarking scheme based on wavelet transform using singular value decomposition. Embedding process is started by decomposing the lowest frequency band image with 3${\times}$3 block among which we define the watermark block chosen by a key set; entropy and condition number of the block. A watermark is embedded in the singular values of each watermark blocks. This provides a robust watermarking in lowest possible time-frequency domain. To detect the watermark, we are locally modeling an attack as 3${\times}$3 matrices on the watermark blocks. Combining with the SVD and the attack matrices, we estimate watermark set corresponding to the watermark blocks. In each watermark block, we determine an optimal watermark which is justified by the T-testing. A numerical experiment shows that the proposed watermarking scheme efficiently detects the watermarks from several JPEG attacks.

Digital Video Watermarking Using Frame Division And 3D Wavelet Transform (프레임 분할과 3D 웨이블릿 변환을 이용한 비디오 워터마킹)

  • Kim, Kwang-Il;Cui, Jizhe;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.155-162
    • /
    • 2008
  • In this paper we proposed a video watermarking algorithm based on a three dimension discrete wavelet transform (3D DWT) and direct spread spectrum (DSS). In the proposed method, the information watermark is embedded into followed frames, after sync watermark is embedded into the first frame. Input frames are divided into sub frames which are located odd row and even row. The sub frames are arranged as 3D frames, and transformed into 3D wavelet domain. In this domain the watermark is embedded using DSS. Existing video watermarking using 3D DWT is non-blind method but, proposed algorithm uses blind method. The experimental results show that the proposed algorithm is robust against frame cropping, noise addition, compression, etc. acquiring BER of 10% or below and sustains level of 40dB or above on the average.

Digital watermarking using binary phase hologram and optical interferometer (이진 위상 홀로그램과 광학적 간섭계를 이용한 디지털 워터마킹)

  • 김병열;서동환;조규보;신창목;김수중;김철수
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.4
    • /
    • pp.377-382
    • /
    • 2003
  • We propose a new optical watermarking method, which can protect the copyright of digital data, using a binary phase hologram and a Mach-Zehnder interferometer. Using a simulated annealing algorithm, the binary phase hologram of the mark image to be hidden is designed. We obtained a watermarked image by linearly superposing the hologram, which is the watermark, in the original image. The extraction processing of the mark image from the watermarked image is achieved by placing the phase-modulated watermarked image on a LCD in one path and the phase-modulated original image on another LCD in the other path in the Mach-Zehnder interferometer. The mark image was obtained by inverse Fourier transforming the phase modulated interference intensity. We confirmed that the proposed method is robust for the cropped images through computer simulation, and we implemented it optically using LCDs which are phase modulation devices.

An Efficient PN Sequence Embedding and Detection Method for High Quality Digital Audio Watermarking (고음질 디지털 오디오 워터마킹을 위한 효율적인 PN 시퀸스 삽입 및 검출 방법)

  • 김현욱;오현오;김연정;윤대희
    • Journal of Broadcast Engineering
    • /
    • v.6 no.1
    • /
    • pp.21-31
    • /
    • 2001
  • In the PN-sequence based audio watermarking system, the PN sequence is shaped by a filter derived from the psychoacoustic model to increase robustness and inaudibility The psychoacoustic model calculated in each audio segment, however, requires heavy computational loads. In this paper, we propose an efficient watermarking system adopting a fixed-shape perceptual filter that substitutes psychoacoustic model derived filter. The proposed filter can shape the PN-sequence to be inaudible and enable to embed the robust watermark in a simple manner. Moreover, we propose an anchitecture for the PN-sequence compensation fitter In the watermark detecter to increase correlation between the watermark and the PN-sequence. With the proposed architecture, the blind watermark detection performance has been enhanced.

  • PDF

A Digital Watermarking of 3D Geometric Model STL for Rapid Prototyping System (쾌속조형 시스템을 위한 3차원 기하학적 형상인 STL의 디지털 워터마킹)

  • 김기석;천인국
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.5
    • /
    • pp.552-561
    • /
    • 2002
  • In this paper, a new watermarking algorithm for STL files which contains 3D geometric information as triangular facets is proposed. STL files are widely used in rapid prototyping industry as a standard interchange format. The proposed algorithm inserts multi-bit watermark information into the surface normal vector and vertex description area of STL file without distorting the original 3D geometric information. According to the watermark bits, the position of normal vector and the direction of vertex sequence are modulated. The proposed algorithm is robust to the attack of changing the order of the triangular meshes. In addition, the invisibility requirement is also satisfied. Experiment results show that the proposed algorithm can encode and decode watermark bits into the various STL files without any distortion of 3D shape.

  • PDF