• 제목/요약/키워드: watermark

검색결과 794건 처리시간 0.022초

파워 스펙트럼 도메인 비대칭 워터마크의 성능 분석 (Performance analysis on the asymmetric watermark using power spectrum domain)

  • 서진수;유창동
    • 전자공학회논문지CI
    • /
    • 제40권3호
    • /
    • pp.164-170
    • /
    • 2003
  • 대표적인 비대칭 워터마킹 방법의 하나의 파워스펙트럼을 이용한 비대칭 워터마킹 방법의 성능을 분석하였다. 파워스펙트럼 도메인의 특성 분석을 통해 간단하면서도 성능 분석에 용이한 상관 검출기를 활용할 수 있음을 보였다. 제안된 상관 검출기를 이용하여 정보량을 늘려가면서 비트 검출 오류율 (bit error rate)을 구하였다. 실험 및 이론 분석 결과는 거의 일치하였으며, 파워스펙트럼 도메인 비대칭 워터마킹 방법은 삽입되는 데이터양이 증가할수록 급격히 그 성능이 나빠지는 것을 확인할 수 있었다.

공간 및 프레임간 정보를 이용한 비디오 워터마크와 시스템 구현에 관한 연구 (System Realization and Video Watermark with Spatial and interframe Information)

  • 김자환;류광렬
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2007년도 춘계종합학술대회
    • /
    • pp.157-160
    • /
    • 2007
  • 본 논문은 비디오 워터마킹 알고리즘을 적용한 비디오 시스템 구현에 관한 것이다. 시스템은 압축 알고리즘과 워터마킹 알고리즘을 실시간으로 처리하기 위해 DSP 프로세서를 기본으로 하여 구성하였다. 비디오 워터마킹 알고리즘은 공간영역과 프레임간의 정보를 이용하여 워터마크를 삽입하는 방법을 사용하였다. 실험결과, DSP에서 D1 영상 한 프레임 당 처리 시간이 약 32.1ms 소요되었다.

  • PDF

CRT-Based Color Image Zero-Watermarking on the DCT Domain

  • Kim, HyoungDo
    • International Journal of Contents
    • /
    • 제11권3호
    • /
    • pp.39-46
    • /
    • 2015
  • When host images are watermarked with CRT (Chinese Remainder Theorem), the watermark images are still robust in spite of the damage of the host images by maintaining the remainders in an unchanged state within some range of the changes that are incurred by the attacks. This advantage can also be attained by "zero-watermarking," which does not change the host images in any way. This paper proposes an improved zero-watermarking scheme for color images on the DCT (Discrete Cosine Transform) domain that is based on the CRT. In the scheme, RGB images are converted into YCbCr images, and one channel is used for the DCT transformation. A key is then computed from the DC and three low-frequency AC values of each DCT block using the CRT. The key finally becomes the watermark key after it is combined four times with a scrambled watermark image. When watermark images are extracted, each bit is determined by majority voting. This scheme shows that watermark images are robust against a number of common attacks such as sharpening, blurring, JPEG lossy compression, and cropping.

웨이블렛 영역에서 근사 계수의 증감정보를 이용한 블라인드 워터마크 (A Blind Watermarking Technique Using Difference of Approximation Coefficients in Wavelet Domain)

  • 윤혜진;최태선
    • 대한전자공학회논문지SP
    • /
    • 제41권2호
    • /
    • pp.65-72
    • /
    • 2004
  • 본 논문에서는 강인성과 인지성을 함께 발전시킨 블라인드 워터마킹 방법에 대해 언급한다. 워터마크의 삽입 위치를 선정하기 위해 영상을 이산 웨이블렛 변환한 후 이웃한 관사 계수간의 증감 정보를 이용한다. 제안된 방법을 시험하기 위해 실험 영상에 워터마크를 삽입한 후 JPEG 손실 압축과 여러 필터의 적용과 같은 변형을 가하여 삽입한 워터마크를 다시 찾아내는 실험을 실시한다. 실험 결과는 제안된 워터마킹 방법이 비인지성을 유지하면서도 여러 가지 공격(attack)에 강인함을 보여준다.

디지츨 영상의 복사 방지를 위한 적응 워터마킹 방법 (An Adaptive Watermarking Method for Copy Protectionof Digital Images)

  • 김덕령;박성한
    • 전자공학회논문지S
    • /
    • 제35S권4호
    • /
    • pp.85-95
    • /
    • 1998
  • In this paper, a new watermarking method for a copy protectionof images is proposed. The proposed method adaptively embeds a watermark in the frequency domain of images using human visual system model. For this purpose, the Just Noticeable Differences(JNDs) of each frequency coeffeicient value of a luminance plane is first found using Watson and Solomon's visual system model. An invisible maximum watermark value with is different in every position according to the characteristics of images is determined usig JND and Minkowski metric. A low frequency domain is divided into two sets based on a PN-sequence to protect thewatermark from the attack. The watermarks are added to one set of coefficients and detecting a watermark, the difference between the mean values of absolute coefficient values of both sets is calculated. The embedded watermark is tested using statistical hypothesis based on test static dertermined by the ean difference. To demonstrate the perfromance of the proposed method, the new watermarking method is applied to a high frequency image and low frequency images. Experimenatal results show the watermark is invisible and robust to JPEGlossy compression and noise.

  • PDF

Fake Iris Image Detection based on Watermark

  • Kim, Man-Ki;Lee, Samuel;Kim, Gye-Young
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권4호
    • /
    • pp.33-39
    • /
    • 2018
  • In this paper, we propose a describes how to detect a false iris image by inserting watermark into a iris image. The existing method, which inserts the watermark into the entire iris image to detect a fake iris, has a problem that can evade it by segmenting iris region of an iris image. The purpose of overcoming the problem, this paper proposes a new fake iris detection technique based on digital watermark. It first searches a central point of an iris image, divide the image into blocks with respect to the point. executes Discrete Cosine Transform, inserts watermark into the blocks, and then verifies an iris image using NC(Normalized Correlation). In the experiments, we confirm the robustness for attacks - crop and JPEG.

웨이블렛 패킷 변환을 이용한 디지털 워터마킹 (Digital Watermarking using Wavelet Packet Transform)

  • 추형석;안종구
    • 전기학회논문지
    • /
    • 제57권8호
    • /
    • pp.1478-1483
    • /
    • 2008
  • In this paper, a digital watermarking method using the WPT (Wavelet Packet Transform) is proposed. The proposed algorithm transforms the input image by using the WPT and inserts the watermark by using the quad-tree algorithm and Cox's algorithm. The experiments for evaluating the performances of the proposed algorithm is carried out by inserting a watermark in each wavelet packet transform step and by inserting a watermark into the lowest frequency domain (LL). As a simulation result, the performance of the insertion of the watermark into the 6 levels of WPT is better than that of other cases. In addition, about $30{\sim}60%$ of all watermarks are inserted into the LL band, the correlation value is improved though the PSNR performance decreases $1{\sim}2dB$.

원본 동영상 대조 없이 가능한 Blind 검출 방식의 코드화된 워터마크 검출 알고리즘 (Coded Watermark Detecting Algorithm using a Blind Detecting Method Without Original Videos)

  • 황선철
    • 전기학회논문지P
    • /
    • 제59권4호
    • /
    • pp.395-400
    • /
    • 2010
  • Digital watermark technologies conceal the information of video contents that presents who is the owner and/or who is the user. In spite of various attempts to insert watermark, trials to mark information of users or buyers into contents have not been successful. It is the reason that the rates of detection is decreased seriously if there are some attacks to the contents such as resizing or bitrate decreasing. In this paper, the algorithm to insert the coded watermarks of users into video contents and to detect them without original contents under attacks will be described.

MPEG-2 Codec에 대한 디지털 워터마크 삽입 및 검출 시스템 개발 (Development of Digital Watermark Inserting and Detecting System for MPEG-2 Codec)

  • 황선철
    • 전기학회논문지P
    • /
    • 제59권4호
    • /
    • pp.390-394
    • /
    • 2010
  • This paper describes a study on developing an insert and detect system of digital watermark to the MPEG-2 coder and decoder. Digital watermark inserting system substitutes a coefficient among the DCT coefficients for new one. This replacement performs in MPEG-2 PS format. Watermark detecting system analyzes the input data stream of MPEG-2 and detect the probability of occurrence of a specific code or watermarking code. Our inserting system had very high invisibility and the PSNR of the results was 130 dB around. And our detection rate of watermark was over 99% in digital format and over 85% in analog captured format according to the quality of contents.

A novel watermarking scheme for authenticating individual data integrity of WSNs

  • Guangyong Gao;Min Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권3호
    • /
    • pp.938-957
    • /
    • 2023
  • The limited computing power of sensor nodes in wireless sensor networks (WSNs) and data tampering during wireless transmission are two important issues. In this paper, we propose a scheme for independent individual authentication of WSNs data based on digital watermarking technology. Digital watermarking suits well for WSNs, owing to its lower computational cost. The proposed scheme uses independent individual to generate a digital watermark and embeds the watermark in current data item. Moreover, a sink node extracts the watermark in single data and compares it with the generated watermark, thereby achieving integrity verification of data. Inherently, individual validation differs from the grouping-level validation, and avoids the lack of grouping robustness. The improved performance of individual integrity verification based on proposed scheme is validated through experimental analysis. Lastly, compared to other state-of-the-art schemes, our proposed scheme significantly reduces the false negative rate by an average of 5%, the false positive rate by an average of 80% of data verification, and increases the correct verification rate by 50% on average.