• Title/Summary/Keyword: watermark

Search Result 794, Processing Time 0.024 seconds

Monitoring System for TV Advertisement Using Watermark (워터마크를 이용한 TV방송 광고모니터링 시스템)

  • Shin, Dong-Hwan;Kim, Geung-Sun;Kim, Jong-Weon;Choi, Jong-Uk
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.15-18
    • /
    • 2004
  • In this paper, it is implemented the monitoring system for TV advertisement using video watermark. The functions of an advertisement monitoring system are automatically monitoring for the time, length, and index of the on-air advertisement, saving the log data, and reporting the monitoring result. The performance of the video watermark used in this paper is tested for TV advertisement monitoring. This test includes LAB test and field test. LAB test is done in laboratory environment and field test in actually broadcasting environment. LAB test includes PSNR, distortion measure in image, and the watermark detection rate in the various attack environment such as AD/DA(analog to digital and digital to analog) conversion, noise addition, and MPEG compression The result of LAB test is good for the TV advertisement monitoring. KOBACO and SBS are participated in the field test. The watermark detection rate is 100% in both the real-time processing and the saved file processing. The average deviation of the watermark detection time is 0.2 second, which is good because the permissible average error is 0.5 second.

  • PDF

An Adaptive Watermark Detection Algorithm for Vector Geographic Data

  • Wang, Yingying;Yang, Chengsong;Ren, Na;Zhu, Changqing;Rui, Ting;Wang, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.323-343
    • /
    • 2020
  • With the rapid development of computer and communication techniques, copyright protection of vector geographic data has attracted considerable research attention because of the high cost of such data. A novel adaptive watermark detection algorithm is proposed for vector geographic data that can be used to qualitatively analyze the robustness of watermarks against data addition attacks. First, a watermark was embedded into the vertex coordinates based on coordinate mapping and quantization. Second, the adaptive watermark detection model, which is capable of calculating the detection threshold, false positive error (FPE) and false negative error (FNE), was established, and the characteristics of the adaptive watermark detection algorithm were analyzed. Finally, experiments were conducted on several real-world vector maps to show the usability and robustness of the proposed algorithm.

Digital Audio Watermarking in The Cepstrum Domain (켑스트럼 영역에서의 오디오 워터마킹 방법)

  • 이상광;호요성
    • Journal of Broadcast Engineering
    • /
    • v.6 no.1
    • /
    • pp.13-20
    • /
    • 2001
  • In this paper, we propose a new digital audio watermarking scheme In the cepstrum domain. We insert a digital watermark signal Into the cepstral components of the audio signal using a technique analogous to spread spectrum Communications, hiding a narrow band signal in a wade band channel. In our proposed method, we use pseudo-random sequences to watermark the audio signal. The watermark Is then weighted in the cepstrum domain according to the distribution of cepstral coefficients and the frequency masking characteristics of the human auditory system. The proposed watermark embedding scheme minimizes audibility of the watermark signal. and the embedded watermark is robust to mu1tip1e watermarks, MPEG audio ceding and additive noose.

  • PDF

A Study on the design of Video Watermarking System for TV Advertisement Monitoring (TV광고 모니터링을 위한 비디오 워터마킹 시스템의 설계에 관한 연구)

  • Shin, Dong-Hwan;Kim, Sung-Hwan
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.1
    • /
    • pp.206-213
    • /
    • 2007
  • In this paper, The monitoring system for TV advertisement is implemented using video watermark. The functions of the advertisement monitoring system are monitoring the time, length, and index of the on-air advertisement, saving the log data, and reporting the monitoring result. The performance of the video watermark used in this paper is tested for TV advertisement monitoring. This test includes LAB test and field test. LAB test is done in laboratory environment and field test in actually broadcasting environment. LAB test includes PSNR, distortion measure in image, and the watermark detection rate in the various attack environment such as AD/DA(analog to digital and digital to analog) conversion, noise addition, and MPEG compression. The result of LAB test is good for the TV advertisement monitoring. KOBACO and SBS are participated in the field test. The watermark detection rate is 100% in both the real-time processing and the saved the processing. The average deviation of the watermark detection time is 0.2 second, which is good because the permissible average error is 0.5 second.

Digital Image Watermarking Schemes Based on GCST and SVD (GCST-SVD 기반 디지털 영상 워터마킹 방법)

  • Lee, Juck-Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.14 no.3
    • /
    • pp.154-161
    • /
    • 2013
  • In this paper, Gabor cosine and sine transform considered as human visual filter is applied to watermarking methods for digital images. Four algorithms by using singular values or principal components of SVD in the frequency domain are proposed for watermark embedding and extraction. Two dimensional image is used as an embedded watermark. To measure the similarity between the embedded watermark image and the extracted one, a normalized correlation value is computed for the comparison of the four proposed methods with various attacks. Extracted watermark images are also provided for visual inspection. The proposed GCST-SVD method which embeds a watermark image into the lowest vertical or horizontal ac frequency band can provide useful watermarking algorithm with high correlation values and visual watermark features from experimental results for various attacks.

Discrete Multiwavelet-Based Video Watermarking Scheme Using SURF

  • Narkedamilly, Leelavathy;Evani, Venkateswara Prasad;Samayamantula, Srinivas Kumar
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.595-605
    • /
    • 2015
  • This paper proposes a robust, imperceptible block-based digital video watermarking algorithm that makes use of the Speeded Up Robust Feature (SURF) technique. The SURF technique is used to extract the most important features of a video. A discrete multiwavelet transform (DMWT) domain in conjunction with a discrete cosine transform is used for embedding a watermark into feature blocks. The watermark used is a binary image. The proposed algorithm is further improved for robustness by an error-correction code to protect the watermark against bit errors. The same watermark is embedded temporally for every set of frames of an input video to improve the decoded watermark correlation. Extensive experimental results demonstrate that the proposed DMWT domain video watermarking using SURF features is robust against common image processing attacks, motion JPEG2000 compression, frame averaging, and frame swapping attacks. The quality of a watermarked video under the proposed algorithm is high, demonstrating the imperceptibility of an embedded watermark.

Embedding Binary Watermark Image using DWT Coefficients (이산 웨이블릿 변환계수를 이용한 이진 워터마크 영상)

  • Park, Kwang-Chae;Bae, Ceol-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6317-6321
    • /
    • 2014
  • Multimedia documents can be transferred quickly and easily across the Internet, and has attracted considerable interest in multimedia security and multimedia copyright protection. This paper proposes an animage watermarking scheme embedding a binary watermark image using Discrete Wavelet Transform (DWT) coefficients. The original image is transformed to the wavelet domain and decomposed in subbands. The binary watermark image, as a sequence of bits, is embedded into the middle frequency subbands. The original image is not needed to detect the watermark image. The proposed method detected fewer watermark bits but produced an approximately 10dB higher PSNR than the max/min method.

An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform

  • Zhang, Heng;Wang, Chengyou;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1382-1396
    • /
    • 2017
  • In this paper, we analyze a recently proposed semi-fragile watermarking scheme based on local binary pattern (LBP) operators, and note that it has a fundamental flaw in the design. In this work, a binary watermark is embedded into image blocks by modifying the neighborhood pixels according to the LBP pattern. However, different image blocks might have the same LBP pattern, which can lead to false detection in watermark extraction process. In other words, one can modify the host image intentionally without affecting its watermark message. In addition, there is no encryption process before watermark embedding, which brings another potential security problem. To illustrate its weakness, two special copy-paste attacks are proposed in this paper, and several experiments are conducted to prove the effectiveness of these attacks. To solve these problems, an improved semi-fragile watermarking based on LBP operators is presented. In watermark embedding process, the central pixel value of each block is taken into account and Arnold transform is adopted to guarantee the security of watermark. Experimental results show that the improved watermarking scheme can overcome the above defects and locate the tampered region effectively.

An adaptive digital watermark using the spatial masking (공간 마스킹을 이용한 적응적 디지털 워터 마크)

  • 김현태
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.39-52
    • /
    • 1999
  • In this paper we propose a new watermarking technique for copyright protection of images. The proposed technique is based on a spatial masking method with a spatial scale parameter. In general it becomes more robust against various attacks but with some degradations on the image quality as the amplitude of the watermark increases. On the other hand it becomes perceptually more invisible but more vulnerable to various attacks as the amplitude of the watermark decreases. Thus it is quite complex to decide the compromise between the robustness of watermark and its visibility. We note that watermarking using the spread spectrum is not robust enought. That is there may be some areas in the image that are tolerable to strong watermark signals. However large smooth areas may not be strong enough. Thus in order to enhance the invisibility of watermarked image for those areas the spatial masking characteristics of the HVS(Human Visual System) should be exploited. That is for texture regions the magnitude of the watermark can be large whereas for those smooth regions the magnitude of the watermark can be small. As a result the proposed watermarking algorithm is intend to satisfy both the robustness of watermark and the quality of the image. The experimental results show that the proposed algorithm is robust to image deformations(such as compression adding noise image scaling clipping and collusion attack).

Deep Learning Framework for Watermark-Adaptive and Resolution-Adaptive Image Watermarking (워터마크 및 해상도 적응적인 영상 워터마킹을 위한 딥 러닝 프레임워크)

  • Lee, Jae-Eun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.25 no.2
    • /
    • pp.166-175
    • /
    • 2020
  • Recently, application fields for processing and using digital image contents in various forms and types are rapidly increasing. Since image content is high value-added content, the intellectual property rights of this content must be protected in order to activate the production and use of the digital image content. In this paper, we propose a deep learning based watermark embedding and extraction network. The proposed method is to maximize the robustness of the watermark against malicious/non-malicious attacks while preserving the invisibility of the host image. This network consists of a preprocessing network that changes the watermark to have the same resolution as the host image, a watermark embedding network that embeds watermark data while maintaining the resolution of the host image by three-dimensionally concatenating the changed host image and the watermark information, and a watermark extraction network that reduces the resolution and extracts watermarks. This network verifies the invisibility and robustness of the proposed method by experimenting with various pixel value change attacks and geometric attacks against various watermark data and host images with various resolutions, and shows that this method is universal and practical.