• Title/Summary/Keyword: watermark

Search Result 793, Processing Time 0.028 seconds

Characterization of Watermarked Hanji prepared with Non-Mulberry Mixed Fibers (대체보조섬유를 이용한 Watermark 삽입 한지의 제조)

  • Cho, Jung-Hye;Kim, Kang-Jae;Park, Seong-Bae;Kim, Chul-Hwan;Eom, Tae-Jin
    • Journal of Korea Technical Association of The Pulp and Paper Industry
    • /
    • v.41 no.3
    • /
    • pp.35-41
    • /
    • 2009
  • The new way of utilization of Hanji need to develop for adding high value added. An watermarked Hanji was prepared with non-mulberry mixed fibers and the properties were investigated. The mechanical properties of non-mulberry fiber mixed Hanji were very similar to mulberry fiber Hanji. The non-mulberry fiber mixed Hanji was a little brighter than original Hanji. The air permeability and pore size of the hot pepper fiber mixed Hanji were decreased depending on the content of hot pepper fiber. The printing ability of watermarked Hanji made of non-mulberry mixed fibers was higher than that of original paper mulberry Hanji. The preservation properties of non-mulberry fiber mixed watermarked Hanji were almost same as those of the original Hanji.

Joint Template Matching Algorithm for Associated Multi-object Detection

  • Xie, Jianbin;Liu, Tong;Chen, Zhangyong;Zhuang, Zhaowen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.395-405
    • /
    • 2012
  • A joint template matching algorithm is proposed in this paper to reduce the high rate of miss-detection and false-alarm caused by the traditional template matching algorithm during the process of multi-object detection. The proposed algorithm can reduce the influence on each object by matching all objects together according to the correlation information among different objects. Moreover, the rate of miss-detection and false-alarm in the process of single-template matching is also reduced based on the algorithm. In this paper, firstly, joint template is created from the information of relative positions among different objects. Then, matching criterion according to normalized cross correlation is generated for multi-object matching. Finally, the proposed algorithm is applied to the detection of watermarks in bill. The experiments show that the proposed algorithm has lower miss-detection and false-alarm rate comparing to the traditional NCC algorithm during the process of multi-object detection.

Robust Digital Video Watermarking Algorithm Using Dual Watermarks in Block DCT Domain

  • Kim, Byung-Ju;Lee, Suk-Hwan;Kwon, Ki-Ryong;Ahn, Sang-Ho;Kim, Tai-Suk;Lee, Kuhn-Il
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.6
    • /
    • pp.791-797
    • /
    • 2004
  • We proposed a novel digital video watermarking that embeds dual watermarks in the block DCT domain to solve the deadlock problem. Daul watermarks are composed of private watermarks and robust blind watermarks. Firstly, private watermarks are embedded into the lowest AC coefficients of the P or B-frames in accordance with the motion direction gained from a previous frame. Secondly, blind watermarks that have the robustness are inserted into the DC coefficients of the I-frames using a private key made from temporal I-frame motion information. Thus, when a deadlock situation occurs, the proposed algorithm can efficiently solve the problem. Experimental results confirmed that the proposed algorithm can produce good subjective and objective results for MPEG coding with a variety of bit rates. Furthermore, the proposed watermarking algorithm can potentially be applied to broadcasting monitoring systems due to its simplicity and high robustness.

  • PDF

An Empirical Study on the Watermark Inserting Location Selection in DCT Based Iris Image (DCT기반 홍채 영상 속 워터마크 삽입위치 선택에 대한 실증적 연구)

  • Choi, Jae-Gab;Moon, Ji-Hwan;Song, Nu-lee;Park, Jin-Ho;Kim, Gye-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.653-656
    • /
    • 2019
  • 현대 사회에서의 생체인식 기술의 발전을 통해 홍채, 지분 등의 정보를 사용하여 사용자의 신원확인 등이 가능하게 되었으며, 생체정보의 유출/위조 방지에 대한 중요성이 높아지면서 관련 연구가 활발히 이루어 지고 있다. 본 논문에서는 홍체 전체의 이미지에 삽입하거나 동공의 중심에 가까운 DCT(Discrete Cosine Transform)영역에 삽입방법, 동공 중심과 눈매의 영역을 검출하여 거리 및 DC 계수를 통하여 삽입 위치를 선택하는 방법 등 홍채영상 속 워터마크를 삽입하여 유출/위조된 홍채 영상을 검출하는 방법에서의 워터마크 삽입위치에 관한 방법을 연구하고, CASIA Irisimage Database ver 4.0의 워터마크를 삽입하여 NC(Normalized Correlation)의 값을 비교하여 워터마크 삽입 실험을 검증하였다.

Digital Watermarking Algorithm of Still Image Using Human Visual System Characteristics (인간시각체계 특성을 이용한 정지영상 디지털 워터마킹 알고리즘)

  • 지남현;전병민
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.2
    • /
    • pp.31-38
    • /
    • 2003
  • This paper proposes method to insert soong Watermark considering dull HVS properties to big change of Edge and Texture area. While conversion of existent Fourier form can acquire information for whole frequency ingredient of image, but Wavelet transform can look for Edge and Texture area locally. Therefore, use Wavelet transform to use HVS properites, and compare with Xia's Watermarking techniques to use Wavelet transform simply arid experimented these proposal algorithm. Experimented about fidelity and robusthness by attack method that is used in existing paper, and as a result, confirmed that proposal algorithm that use HVS properties is more superior than Xia's techniques.

  • PDF

Implementation of a Real Time Watermarking Hardware System for Copyright Protection of a Contents in Digital Broadcasting (디지털 방송에서 콘텐츠의 저작권 보호를 위한 실시간 워터마킹 하드웨어 시스템 구현)

  • Jeong, Yong-Jae;Kim, Jong-Nam;Moon, Kwang-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.51-59
    • /
    • 2009
  • A watermarking for copyright protection of digital contents for broadcasting have to be made for a real-time system. In this paper, we propose a real-time video watermarking system which is hardware-based watermarking system of SD/HD (standard definition/high definition) video with the STRATIX FPGA device from ALTERA. There was little visual artifact due to watermarking in subjective quality evaluation between the original video and the watermarked one in our experiment. Embedded watermark was extracted after robustness testscalled natural video attacks such as A/D (analog/digital) conversion. Our implemented watermarking hardware system can be useful in movie production and broadcasting companies that requires real-time contents protection systems.

A Watermarking Method Based on the Trellis Code with Multi-layer (다층구조를 갖는 trellis부호를 이용한 워터마킹)

  • Lee, Jeong Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.949-952
    • /
    • 2009
  • In this paper, a watermarking method based on the trellis code with multi-layer is proposed. An image is divided $8{\times}8$ block with no overlapping, and compute the discrete cosine transform(DCT) of each block, and the 12 medium-frequency AC terms from each block are extracted. Next it is compared with gaussian random vectors with zero mean and unit variance. As these processing, the embedding vectors with minimum linear correlation can be obtained by Viterbi algorithm at each layer of trellis coding. To evaluate the performance of proposed method, the average bit error rate of watermark message is calculated from different several images.

  • PDF

Multi-Watermarking for Image Authentication Based on DWT Coefficients (이미지 인증을 위한 DWT 계수기반 다중 워터마킹)

  • Lee Hye-Ran;Rhee Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.113-122
    • /
    • 2005
  • In this paper, we propose a multi-watermarking algorithm to satisfy two purposes: fragility against malicious attacks and robustness against non-malicious attacks. The algorithm can be used for image authentication using coefficients of Discrete Wavelet Transform(DWT). In the proposed method, watermarks are generated by combining binary image with some features extracted from the subband LL3, and then they are embedded into both the spatial and frequency domain. That is, on the spatial domain they are embedded into the Least Significant Bit(LSB) of all pixels of image blocks, and on the frequency domain the coefficients of the subband LH2 and HL2 are adjusted according to the watermarks. Thus the algorithm not only resists malicious attack but also permits non-malicious attacks such as blurring, sharpening, and JPEG compression.

Zero-Watermarking Algorithm in Transform Domain Based on RGB Channel and Voting Strategy

  • Zheng, Qiumei;Liu, Nan;Cao, Baoqin;Wang, Fenghua;Yang, Yanan
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1391-1406
    • /
    • 2020
  • A zero-watermarking algorithm in transform domain based on RGB channel and voting strategy is proposed. The registration and identification of ownership have achieved copyright protection for color images. In the ownership registration, discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) are used comprehensively because they have the characteristics of multi-resolution, energy concentration and stability, which is conducive to improving the robustness of the proposed algorithm. In order to take full advantage of the characteristics of the image, we use three channels of R, G, and B of a color image to construct three master shares, instead of using data from only one channel. Then, in order to improve security, the master share is superimposed with the copyright watermark encrypted by the owner's key to generate an ownership share. When the ownership is authenticated, copyright watermarks are extracted from the three channels of the disputed image. Then using voting decisions, the final copyright information is determined by comparing the extracted three watermarks bit by bit. Experimental results show that the proposed zero watermarking scheme is robust to conventional attacks such as JPEG compression, noise addition, filtering and tampering, and has higher stability in various common color images.

Secured Different Disciplinaries in Electronic Medical Record based on Watermarking and Consortium Blockchain Technology

  • Mohananthini, N.;Ananth, C.;Parvees, M.Y. Mohamed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.947-971
    • /
    • 2022
  • The Electronic Medical Record (EMR) is a valuable source of medical data intelligence in e-health systems. The watermarking techniques have been used to authenticate the owner and protect the EMR from illegal copying. The existing distributive strategies, successfully operated to secure the EMR, are found to be inadequate. Blockchain technology, mainly, is employed by a sharing database that allows the digital crypto-currency. It rapidly leads to the magnified expectations acme. In this excitement, the use of consortium adopting the technology based on Blockchain, in the EMR structure, is found improving. This type of consortium adds an immutable share with a translucent record of the entire business and it is accomplished with responsibility, along with faith and transparency. The combination of watermarking and Blockchain technology provides a singular chance to promote a secured, trustworthy electronic documents administration to share with the e-records system. The authors, in this article, present their views on consortium Blockchain technology which is incorporated in the EMR system. The ledger, used for the distribution of the block structure, has team healthcare models based on dissimilar multiple image watermarking techniques.