• Title/Summary/Keyword: watermark

Search Result 792, Processing Time 0.024 seconds

An Iterative Watermarking Method Using Human Visual System (인간 시각 시스템을 이용한 반복적 워터마킹 기법)

  • 김희정;김지홍
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.267-270
    • /
    • 2002
  • In this paper, a new watermarking method using an iterative scheme is proposed. The proposed method consists of two parts: watermark generation and its insertion. In the watermark generation, random signals with normalized distribution N(0,1) are produced and modified using an iterative scheme. In the watermark insertion, the resulting watermark signals are inserted into selected transform coefficients with various scaling parameters in order to achieve the invisibility and robustness against illegal attacks. The simulation results show that the proposed method has good performance for various attacks including image compression, filtering, etc.

  • PDF

Incremental Watermarking using Complex Wavelet Transform (콤플렉스 웨이블릿 변환을 이용한 점진적 워터마킹)

  • Lee Na-Young;Kim Won;Kim Kwan-Jung;Kim Gye-Young
    • Journal of Internet Computing and Services
    • /
    • v.4 no.3
    • /
    • pp.39-46
    • /
    • 2003
  • Generally, the existing watermarking techniques for copyright protection of a digital image are fragile in geometric distortion and all watermark extractions need the same time regardless of degree of distortion. In this paper, we propose the incremental watermarking technique that used a Complex Wavelet Transform(CWT) in order to solve these problems. The proposed incremental watermarking technique embeds a watermark in a phase component after a CWT with an original image, and a watermark is extracted from an watermarked image by stages. A watermark owner can insist on copyright of an image after comparing a correlation between the extracted watermark and the original watermark if it is larger than the threshold. Also, the incremental watermark extraction determines the extraction time of a watermark by the level of distortion. The proposed technique through performance evaluation displayed that it was robust in geometric distortion than the existing watermarking technique.

  • PDF

Design on Protection and Authentication System of IPTV Contents using HSI Watermark (HSI 워터마크를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.55-62
    • /
    • 2010
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents illicit copying and distribution of copyright meterials tends to draw more attentions. So we need a right service system that can protect contents and copyright using watermark inserting. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But this system can not protect the contents when acquiring them from TV output using A/D convertor. So we apply watermark method using HSI color space against contents illicit copying. And for distribution of copyright materials. we compound unique settop ID and copyrighter's ID to make new ID that is watermark. When inserting watermark, we use the watermark for copyright protection and authentication. So we can protect copyright and identify last settop's user in illicit distribution. we design download based IPTV contents protection and authentication system using HSI watermark method.

Estimation-based Watermarking Algorithm with Low Density Parity Check (LDPC) Codes (LDPC를 이용한 예측 기반 워터마킹 알고리듬)

  • Lim, Jae-Hyuck;Won, Chee-Sun
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.1
    • /
    • pp.76-84
    • /
    • 2007
  • The goal of this paper is to improve the watermarking performance using the following two methods; watermark estimation and low density parity check (LDPC) codes. For a blind watermark decoding, the power of a host image, which is hundreds times greater than the watermark power, is the main noise source. Therefore, a technique that can reduce the effect of the power of the host image to the detector is required. To this end, we need to estimate watermark from the watermarked image. In this paper, the watermark estimation is done by an adaptive estimation method with the generalized Gaussian distribution modeling of sub-band coefficients in the wavelet domain. Since the watermark capacity as well as the error rate can be improved by adopting optimum decoding principles and error correcting codes (ECC), we employ the LDPC codes for the decoding of the estimated watermark. Also, in LDPC codes, the knowledge about the noise power can improve the error correction capability. Simulation results demonstrate the superior performance of the proposed algorithm comparing to LDPC decoding with other estimation-based watermarking algorithms.

Fragile Watermark System using Quantization and DC Coefficients (양자화와 DC 계수를 이용한 연성 워터마크 시스템)

  • Yoo, Heung-Ryol;Son, Yung-Deug
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.774-779
    • /
    • 2018
  • This paper presents fragile watermark system using quantization and DC coefficients. It is a way to prevent the watermark fro, being detected if the original has been modified in any way. In other words, the detection of a watermark ca be said to be originality after the watermark is inserted, without any damage. Since lossy compression such as JPEG is often allowed or required in practical applications, authentication methods, authentication methods should be distinguished from malicious modifications such as image shifting, cropping, filtering, and replacement. The proposed algorithm implements a fragile watermarking algorithm that shows image authentication with JPEC compression and the watermark easily breaks other malicious variants.

Semi-fragile Watermarking Scheme for H.264/AVC Video Content Authentication Based on Manifold Feature

  • Ling, Chen;Ur-Rehman, Obaid;Zhang, Wenjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4568-4587
    • /
    • 2014
  • Authentication of videos and images based on the content is becoming an important problem in information security. Unfortunately, previous studies lack the consideration of Kerckhoffs's principle in order to achieve this (i.e., a cryptosystem should be secure even if everything about the system, except the key, is public knowledge). In this paper, a solution to the problem of finding a relationship between a frame's index and its content is proposed based on the creative utilization of a robust manifold feature. The proposed solution is based on a novel semi-fragile watermarking scheme for H.264/AVC video content authentication. At first, the input I-frame is partitioned for feature extraction and watermark embedding. This is followed by the temporal feature extraction using the Isometric Mapping algorithm. The frame index is included in the feature to produce the temporal watermark. In order to improve security, the spatial watermark will be encrypted together with the temporal watermark. Finally, the resultant watermark is embedded into the Discrete Cosine Transform coefficients in the diagonal positions. At the receiver side, after watermark extraction and decryption, temporal tampering is detected through a mismatch between the frame index extracted from the temporal watermark and the observed frame index. Next, the feature is regenerate through temporal feature regeneration, and compared with the extracted feature. It is judged through the comparison whether the extracted temporal watermark is similar to that of the original watermarked video. Additionally, for spatial authentication, the tampered areas are located via the comparison between extracted and regenerated spatial features. Experimental results show that the proposed method is sensitive to intentional malicious attacks and modifications, whereas it is robust to legitimate manipulations, such as certain level of lossy compression, channel noise, Gaussian filtering and brightness adjustment. Through a comparison between the extracted frame index and the current frame index, the temporal tempering is identified. With the proposed scheme, a solution to the Kerckhoffs's principle problem is specified.

Audio Watermark Design Using Hilbert Transform

  • Lee, Jin-Geol
    • The Journal of the Acoustical Society of Korea
    • /
    • v.25 no.2E
    • /
    • pp.56-59
    • /
    • 2006
  • A novel audio watermark design using Hilbert transform is proposed, and its superiority of performance over the existing design using the absolute values of the audio signal is demonstrated experimentally with measurements of bit error rate (BER) in correlation based decoder. (Classification No. 3.3)

Robust Digital Image Watermarking Algorithm Using RBF Neural Networks in DWT domain

  • Piao, Cheng-Ri;Guan, Qiang;Choi, Jun-Rim;Han, Seung-Soo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.2
    • /
    • pp.143-147
    • /
    • 2007
  • This paper proposes a new watermarking scheme in which a logo watermark is embedded into the discrete wavelet transform (DWT) domain of the original image using exact radial basis function neural networks (RBF). RBF will learn the characteristics of the image, and then watermark is embedded and extracted by the trained RBF. A watermark is added to the coefficients at the low frequency band of the DWT of an image and a watermark is embedded into the DWT domain using the trained RBF. The trained RBF also used in watermark extracting process. Experimental results show that the proposed method has good imperceptibility and high robustness to common image processing attacks.

A Model to Predict the Strength of Watermark in DWT-Based Image Watermarking

  • Moon, Ho-Seok;Park, Suk-Bong;Bae, Hyun-Wung
    • Journal of the Korean Data and Information Science Society
    • /
    • v.19 no.2
    • /
    • pp.475-485
    • /
    • 2008
  • One of main issues in watermarking is to resolve the strength of watermark for solving the problem of trade-off between fidelity and robustness of watermarking. In the previous research, the strength of watermark has been resolved fixed value generally without considering local image characteristics such as image brightness, contrast, and edge. This paper proposes a new model to predict the strength of watermark considering local image characteristics such as image brightness, contrast, and edge for digital wavelet transform(DWT)-based image watermarking. For the study, psychological experiment was fulfilled to measure the human image perception and regression analysis showed the proposed model was statistically significant at the level of ${\alpha}\;=\;0.01$. Also the model is practically validated on fidelity and robustness of watermarking.

  • PDF

Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.504-523
    • /
    • 2014
  • This paper presents a multiple-watermarking scheme for copyright protection and the prevention of illegal copying of mobile 3D contents with low resolution. The proposed scheme embeds a unique watermark and a watermark certification authority (WCA) watermark into the spatial and encryption domains of a mobile 3D content based on the buyer-seller watermarking protocol. The seller generates a unique watermark and embeds it into the local maximum curvedness of a 3D object. After receiving the encrypted watermark from the WCA, the seller embeds it into the encrypted vertex data using an operator that satisfies the privacy homomorphic property. The proposed method was implemented using a mobile content tool, and the experimental results verify its capability in terms of copyright protection and the prevention of illegal copying.