• Title/Summary/Keyword: robust watermarking

Search Result 318, Processing Time 0.026 seconds

Capacity Analysis for Convergence System of Broadcasting and Telecommunication (방송통신융합 시스템을 위한 채널용량 분석)

  • Kim, Joo-Chan;Kim, Eun-Cheol;Kim, Jin-Young
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.7
    • /
    • pp.67-71
    • /
    • 2010
  • In this paper, channel capacity analysis is investigated for design of convergence system of broadcasting and telecommunication. To do this, we derive and analyze channel capacity of the proposed system with dual-branch MRC diversity technique in correlated Hoyt fading channel. Spread spectrum watermarking scheme which is known as a robust promising technique in noisy environment can be applied to transmit additional data sequence. From numerical results, we confirm that the channel capacity of the proposed system can be determined by channel parameters.

A New Watermarking Method for Video (동영상을 위한 새로운 워터마킹 방법)

  • Kim, Dug-Ryung;Park, Sung-Han
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.12
    • /
    • pp.97-106
    • /
    • 1999
  • We propose a new watermarking method to embed a label in a video which is robust against the change of the group of picture. The proposed method embeds labels in the pixel domain, but detects the label in the DCT frequency domain. For embedding a label, the size of watermark based on the human visual system is calculated to keep a quality of videos. A lookup table haying the pixel patterns and the sequences of a sign of DCT coefficients is used for detecting a label in the DCT frequency domain. In this paper, we analyze bit error rates for labels of videos compressed by MPEG2 using the central limit theorem and compare the simulation results with previous methods.

  • PDF

Effective Watermark Detection Using Asymmetric Thresholds (비대칭 임계치를 이용한 효과적인 워터마크 검출 방법)

  • Shin, Chang-Doon;Oh, Hae-Seok
    • The KIPS Transactions:PartB
    • /
    • v.10B no.6
    • /
    • pp.619-628
    • /
    • 2003
  • In this paper, an effective watermark detection technique in the wavelet transform domain is proposed. In this proposed method, the image is 2-level wavelet transformed, and then the watermark with a binary logo is embedded into middle band except baseband and high band to consider Invisibility and robustness. In this paper, we use an asymmetric thresholds watermarking (ATW) in which detection threshold is higher than inserting threshold in order to enhance watermark detection ratio in attacked images. In watermark detection phase, the detection value is not changed when the difference of the selected wavelet neighboring coefficient pairs Is smaller than specific value. The experimental results show that the proposed method has good quality and is robust to various attacks such as the JPEG lossy compression, noise addition, cropping, blurring, etc.

Blind Color Image Watermarking Based on DWT and LU Decomposition

  • Wang, Dongyan;Yang, Fanfan;Zhang, Heng
    • Journal of Information Processing Systems
    • /
    • v.12 no.4
    • /
    • pp.765-778
    • /
    • 2016
  • In watermarking schemes, the discrete wavelet transform (DWT) is broadly used because its frequency component separation is very useful. Moreover, LU decomposition has little influence on the visual quality of the watermark. Hence, in this paper, a novel blind watermark algorithm is presented based on LU transform and DWT for the copyright protection of digital images. In this algorithm, the color host image is first performed with DWT. Then, the horizontal and vertical diagonal high frequency components are extracted from the wavelet domain, and the sub-images are divided into $4{\times}4$ non-overlapping image blocks. Next, each sub-block is performed with LU decomposition. Finally, the color image watermark is transformed by Arnold permutation, and then it is inserted into the upper triangular matrix. The experimental results imply that this algorithm has good features of invisibility and it is robust against different attacks to a certain degree, such as contrast adjustment, JPEG compression, salt and pepper noise, cropping, and Gaussian noise.

Wavelet-based Digital Watermarking with Chaotic Sequences (카오스 시퀀스를 이용한 웨이브릿-기반 디지털 워터마크)

  • 김유신;김민철;원치선;이재진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1B
    • /
    • pp.99-104
    • /
    • 2000
  • In this paper, as a digital watermark we propose to use a chaotic sequence instead of the conventional Gaussian sequence. It is relatively easy to generate the chaotic sequence and is very sensitive to the change of initial value. The chaotic sequence adopted in this paper is a modified version of logistic map to give the sequence distribution of Chebyshev map. In the experiments, we applied the Gaussian sequence and chaotic sequence to wavelet coefficients of images to compare the similarity distribution. The results show that, as id the DCT-based watermarking system, the chaotic sequence is robust for various signal processing attacks, Moreover, the similarity variance is smaller than the Gaussian sequence for iterative experiments. It also shows a better performance for compression errors than the Gaussian sequence.

  • PDF

Feature based Text Watermarking for Binary Document Image (이진 문서 영상을 위한 특징 기반 텍스트 워터마킹)

  • Choo Hyon-Gon;Kim Whoi-yul
    • The KIPS Transactions:PartB
    • /
    • v.12B no.2 s.98
    • /
    • pp.151-156
    • /
    • 2005
  • In this paper, we propose feature based character watermarking methods based on geometical features specific to characters of text in document image. The proposed methods can satisfy both data capacity and robustness simultaneously while none of the conventional methods can. According to the characteristics of characters, watermark can be embed or detected through changes of connectivity of the characters, differences of characteristics of edge pixels or changes of area of holes. Experimental results show that our identification techniques are very robust to distortion and have high data capacity.

A Watermarking Scheme for Shapefile-Based GIS Digital Map Using Polyline Perimeter Distribution

  • Huo, Xiao-Jiao;Lee, Suk-Hwan;Kwon, Seong-Geun;Moon, Kwan-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.5
    • /
    • pp.595-606
    • /
    • 2011
  • This paper proposes a robust watermarking scheme for GIS digital map by using the geometric properties of polyline and polygon, which are the fundamental components in vector data structure. In the proposed scheme, we calculate the lengths and the perimeters of all polylines and polygons in a map and cluster them to a number of groups. Then we embed the binary watermark by changing the mean of lengths and perimeters in an embedding group. For improving the safety and robustness, we permute the binary watermark through PRNS(pseudo-random number sequence) processing and embed it repeatedly in a model. Experimental results verified that our scheme has a good invisibility, safety and robustness to various geometric attacks and also our scheme needs not the original map in the extracting process of watermark.

A Study on the Digital Watermarking Embedded Transmission of Still Image in Wireless Multimedia Communication Environment (무선 멀티미디어 통신 환경에서 정지영상 전송에 삽입되는 디지털 워터마킹에 관한 연구)

  • Jo, Song-Back;Lee, Yang-Sun;Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.8 no.2
    • /
    • pp.169-175
    • /
    • 2004
  • We analyzed about digital watermarking embedded transmission of still image in wireless multimedia communication environment. Also, we proposed improved watermark techniques. It effects that get in original image than method to use conventional image is less and shows robust watermark restoration ability from outside attack. Performance analysis achieved about still image and restoration of watermark information using OFDM/QPSK still image transmission system in wireless channel environment. Analysis result, VI watermark performance that influence in original image is very small. And it could know that show high restoration performance. Also, It showed superior copyright information extraction performance than image watermark in wireless channel environment of same transmission error condition.

  • PDF

Multiple Audio Watermarking using Quantization Index Modulation on Frequency Phase and Magnitude Response (주파수 위상 응답과 크기 응답에 QIM을 이용한 다중 오디오 워터마킹)

  • Seo, Yejin;Cho, Sangjin;Chong, Uipil
    • The Journal of the Acoustical Society of Korea
    • /
    • v.32 no.1
    • /
    • pp.71-78
    • /
    • 2013
  • This paper describes a multiple audio watermarking using Quantization Index Modulation (QIM) on frequency phase and magnitude response. Proposed embedding procedure is composed of two stage. At the first stage, the watermark is embedded on the frequency phase response using QIM. In the second stage, the watermark is embedded using adaptive QIM with the step-size that is adaptively determined using the maximum value of the frequency magnitude response of every frame. The watermark is extracted by calculating the Euclidean distance as the blind detection. The proposed method is robust against most of attacks of audio watermark benchmarking. For the Fourier attacks, the proposed method shows over 95% recovery rate.

A Study on Digital Image Watermarking for Embedding Audio Logo (음성로고 삽입을 위한 디지털 영상 워터마킹에 관한 연구)

  • Cho, Gang-Seok;Koh, Sung-Shik
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.3
    • /
    • pp.21-27
    • /
    • 2002
  • The digital watermarking methods have been proposed as a solution for solving the illegal copying and proof of ownership problems in the context of multimedia data. But it is still difficult to have been overcame the problem of the protection of property to multimedia data, such as digital images, digital video, and digital audio. This paper describes a watermarking algorithm that embeds non-linearly audio logo watermark data which is converted from audio signal of the ownership in the components of pixel intensities in an original image and that insists of ownership by hearing the audio signal transformed from the extracted audio logo through the speaker. Experimental results show that our algorithm using audio logo proposed in this paper is robust against attacks such as particularly lossy JPEG image compression.