• Title/Summary/Keyword: watermark

Search Result 793, Processing Time 0.03 seconds

Fragile Watermarking for Image Authentication and Detecting Image Modification (영상 인증과 변형 검출을 위한 Fragile 워터마킹)

  • Woo, Chan-Il;Jeon, Se-Gil
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.459-465
    • /
    • 2009
  • Digital watermarking is a technique to insert a visually imperceptible information into an image so that the information can be extracted for the purposes of ownership verification or authentication. And watermarking techniques can be classified as either fragile or robust. Robust watermarks are useful for copyright and ownership assertion purposes. They cannot be easily removed and should resist common image manipulation procedures such as rotation, scaling, cropping, etc. On the other hand, fragile watermarks are easily corrupted by any image processing procedure, it can detect any change to an image as well as localizing the areas that have been changed. In this paper, we propose a fragile watermarking algorithm using a special hierarchical structure for integrity verification of image and detection of manipulated location. In the proposed method, the image to be watermarked is divided into blocks in a multi-level hierarchy and calculating block digital signatures in this hierarchy. The proposed method thwarts the cut-and-paste attack and the experimental results to demonstrate the effectiveness of the proposed method.

  • PDF

Improvement of National Risk Alarm 4-Stage Criteria for Flood Disaster (홍수재난 대응을 위한 국가위기경보 4단계 설정기준 개선)

  • Lee, Sookyong;Park, Jae-Woo;Oh, Eun-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.3
    • /
    • pp.369-377
    • /
    • 2018
  • EAP, which is operated on the frame of Risk Alarm 4-stage of National Risk Management Guideline, is a critical method in order to promptly respond to disasters. Korea Flood Control Office issues major and moderate flood alarm at each river station by respectively 50% and 70% of design flood discharge in terms of watermark or sea level, however, the criteria deciding major and moderate floods are vague for field managers to control the disaster situations. On the other hand, Japan and USA use river water level as a main criterion in order to classify the stage of flood disaster, which is higher design flood level than Korea. Thus, the authors analyzed domestic and oversea EAP guidelines and suggested improved criteria showing easy display method and raising the criteria of flood level for reflecting more effective action plans through testing a simulation training on the test-bed.

A Study on Efficient Tamper Detection of Digital Image (디지털 영상의 효율적인 변형 검출에 관한 연구)

  • Woo, Chan-Il;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.196-201
    • /
    • 2016
  • Digital watermarking is a technique used to hide information within digital media. Digital watermarking techniques can be classified as either robust watermarking or fragile watermarking. Robust watermarking techniques are generally used for the purpose of copyright protection. In addition, fragile watermarking techniques are used for the authentication and integrity verification of a digital image. Therefore, fragile watermarks should be easily breakable for trivial tampering of a watermarked image. This paper proposes an efficient fragile watermarking method for image tamper detection in the spatial domain. In the proposed method, a hash code and symmetric key encryption algorithm are used. The proposed method of inserting a watermark by dividing the original image into many blocks of small sizes is not weak against attacks, such as cut and paste. The proposed method can detect the manipulated parts of a watermarked image without testing the entire block of the image.

Adaptive Video Watermarking based on 3D-DCT Using Image Characteristics (영상 특성을 이용한 3D-DCT 기반의 적응적인 비디오 워터마킹)

  • Park Hyun;Lee Sung-Hyun;Moon Young-Shik
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.3 s.309
    • /
    • pp.68-75
    • /
    • 2006
  • In this paper, we propose an adaptive video watermarking method using human visual system(HVS) and characteristics of three-dimensional cosine transform (3D-DCT) cubes. We classify 3D-DCT cubes into three patterns according to the distribution of coefficients in the 3D-DCT cube: cube with motion and textures, cube with high textures and little motion, and cube with little textures and line motion. Images are also classified into three types according to the ratio of these patterns: images with motion and textures, images with high textures and little motion, and images with little textures and little motion. The proposed watermarking method adaptivelyinserts the watermark on the coefficients of the mid-range in the 3D-DCT cube using the appropriately learned sensitivity table and the proportional constants depending on the patterns of 3D-DCT cubes and types of images. Experimental results show that the proposed method achieves better performance in terms of invisibility and robustness than the previous method.

Wavelet based data Watermarking (웨이브릿 기반의 데이터 워터마킹)

  • 김동현
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.6
    • /
    • pp.1224-1228
    • /
    • 2003
  • The use of digital imaging technique and digital contents based on internet has grown rapidly for last several years, and the needs of digital image protection become more important. For the purpose of copyright protection on digital image, the verification of authentication techniques like content authentication, ownership authentication, illegal copy and etc are needs. Digital watermarking, the invisible encryption technique to insert digital watermarking into image, the sophisticated perceptual information should be used for providing transparency and robustness of images on watermarking process. In this paper, we implement the algorithm for preventing forged attack. ownership protection and authentication by transforming the wavelet algorithms in frequency domain in terms of human visual system.

Digital Watermarking Technique in Wavelet Domain for Protecting Copyright of Contents (컨텐츠의 저작권 보호를 위한 DWT영역에서의 디지털 워터마킹 기법)

  • Seo, Young-Ho;Choi, Hyun-Jun;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1409-1415
    • /
    • 2010
  • In this paper we proposed the watermarking technique using the markspace which is selected by tree-structure between the subbands in the wavelet domain and feature information in the spatial domain. The watermarking candidate region in the wavelet domain is obtained by the markspace selection algorithm divides the highest frequency subband to several segments and calculates theirs energy and the averages value of the total energy of the subband. Also the markspace of the spatial domain is obtained by the boundary information of a image. The final markspace is selected by the markspaces of the wavelet and spatial domain. The watermark is embedded into the selected markspace using the random addresses by LFSR. Finally the watermarking image is generated using the inverse wavelet transform. The proposed watermarking algorithm shows the robustness against the attacks such as JPEG, blurring, sharpening, and gaussian noise.

A Study on Digital Watermarking of MPEG Coded Video Using Wavelet Transform (웨이블릿 변환를 이용한 MPEG 디지털동영상 워터마킹에 관한 연구)

  • Lee, Hak-Chan;Jo, Cheol-Hun;Song, Jung-Won
    • The KIPS Transactions:PartB
    • /
    • v.8B no.5
    • /
    • pp.579-586
    • /
    • 2001
  • Digital watermarking is to embed imperceptible mark into image, video, audio, and text data to prevent the illegal copy of multimedia data. arbitrary modification, and also illegal sales of the copies without agreement of copyright ownership. In this paper, we study for the embedding and extraction of watermark key using wavelet in the luminance signal in order to implement the system to protect the copyright for image MPEG. First, the original image is analyzed into frequency domain by discrete wavelet transform. The RSA(Rivest, Shamir, Aldeman) public key of the coded target is RUN parameter of VLD(variable length coding). Because the high relationship among the adjacent RUN parameters effect the whole image, it prevents non-authorizer not to possess private key from behaving illegally. The Results show that the proposed method provides better moving picture and the distortion more key of insert than direct coded method on low-frequency domain based DCT.

  • PDF

Invisible Watermarking for Improved Security of Digital Video Application (디지털 동영상 어플리케이션의 향상된 보안성을 위한 비시각적인 워터마킹)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.175-183
    • /
    • 2011
  • Performance of digital video watermarking is an assessment that hides a lot of information in digital videos. Therefore, it is required to find a way that enables to store lots of bits of data into a high quality video of the frequency area of digital contents. Hence, this paper designs a watermarking system improving security with an enhancing watermarking based on invisible watermarking and embedding an watermarking on LH and HL subband and its subband by transforming wavelet after the extraction of luminance component from the frames of video by compromising robustness and invisible of watermarking elements. The performance analysis of security of watermarking is carried out with a statistic method, and makes an assessment of robustness against variety of attacks to invisible watermarking. We can verify the security of watermarking against variety of attacks by testing robustness and invisible through carrying out general signal processing like noise addition, lossy compression, and Low-Pass filtering.

Digital Watermarking for Three-Dimensional Polygonal Mesh Models in the DCT Framework (DCT영역에서 3차원 다각형 메쉬 모델의 디지헐 워터마킹 방법)

  • Jeon, Jeong-Hee;Ho, Yo-Sung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.3
    • /
    • pp.156-163
    • /
    • 2003
  • Most watermarking techniques insert watermarks into transform coefficients in the frequency domain because we can consider robust or imperceptible frequency bands against malicious attacks to remove them. However, parameterization of 3-D data is not easy because of irregular attribution of connectivity information, while 1-I) or 2-D data is regular. In this paper we propose a new watermarking scheme for 3-D polygonal mesh models in the DCT domain. After we generate triangle strips by traversing the 3-D model and transform its vertex coordinates into the DCT domain, watermark signals are inserted into mid-frequency bands of AC coefficients for robustness and imperceptibility. We demonstrate that our scheme is robust against additive random noise, the affine transformation, and geometry compression by the MPEG-4 SNHC standard.

A Robust DNA Watermarking in Lifting Based 1D DWT Domain (Lifting 기반 1D DWT 영역 상의 강인한 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong;Kwon, Seong-Geun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.10
    • /
    • pp.91-101
    • /
    • 2012
  • DNA watermarking have been interested for both the security of private genetic information or huge DNA storage information and the copyright protection of GMO. Multimedia watermarking has been mainly designed on the basis of frequency domain, such as DCT, DWT, FMT, and so on, for the robustness and invisibility. But a frequency domain watermarking for coding DNA sequence has a considerable constraint for embedding the watermark because transform and inverse transform must be performed without completely changing the amino acid sequence. This paper presents a coding sequence watermarking on lifting based DWT domain and brings up the availability of frequency domain watermarking for DNA sequence. From experimental results, we verified that the proposed scheme has the robustness to until a combination of 10% point mutations, 5% insertion and deletion mutations and also the amino preservation and the security.