• Title/Summary/Keyword: watermarked paper

Search Result 156, Processing Time 0.025 seconds

Print-Scan Resilient Curve Watermarking using B-Spline Curve Model and its 2D Mesh-Spectral Transform (B-스프라인 곡선 모델링 및 메시-스펙트럼 변환을 이용한 프린트-스캔에 강인한 곡선 워터마킹)

  • Kim, Ji-Young;Lee, Hae-Yeoun;Im, Dong-Hyuck;Ryu, Seung-Jin;Choi, Jung-Ho;Lee, Heung-Kyu
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.307-314
    • /
    • 2008
  • This paper presents a new robust watermarking method for curves that uses informed-detection. To embed watermarks, the presented algorithm parameterizes a curve using the B-spline model and acquires the control points of the B-spline model. For these control points, 2D mesh are created by applying Delaunay triangulation and then the mesh spectral analysis is performed to calculate the mesh spectral coefficients where watermark messages are embedded in a spread spectrum way. The watermarked coefficients are inversely transformed to the coordinates of the control points and the watermarked curve is reconstructed by calculating B-spline model with the control points. To detect the embedded watermark, we apply curve matching algorithm using inflection points of curve. After curve registration, we calculate the difference between the original and watermarked mesh spectral coefficients with the same process for embedding. By calculating correlation coefficients between the detected and candidate watermark, we decide which watermark was embedded. The experimental results prove the proposed scheme is more robust than previous watermarking schemes against print-scan process as well as geometrical distortions.

Robust watermarking technique in geometric distortion and authentication of digital images (기하학적인 변형에 강건한 워터마킹 기법과 디지털 영상의 인증)

  • Lee, Na-Young;Kim, Won;Kim, Gye-Young; Choi, Hyung-Il
    • The KIPS Transactions:PartB
    • /
    • v.10B no.4
    • /
    • pp.367-372
    • /
    • 2003
  • The existing watermarking techniques for copyright protection of a digital image are fragile in geometric distortion and it is hard to detect whether it was manipulated artificially. In this paper, we proposed the new copyright protection system that can authorize a digital mage and :an embed or extract a robust watermark in a artificial manipulation in order to solve these problems. In a watermarking part, the proposed a watermarking technique embeds a watermark in a phase component after a Complex Wavelet Transform (CWT) with an original image, and a watermark is extracted from an watermarked image by stages. A copyright about an image can be insisted on than a threshold after comparing a correlation of an original watermark with an extracted watermark if large. In an authentication part of a digital image, EZW (Embedded Zerotree Wavelet) is used, and an authentication cord of an watermarked image is generated. An authentication code of an image to have been distribute to is compared with a generated authentication cord, and artificial operation isn´t than a threshold if large. The proposed copyright protection system through performance evaluation display that it was robust in geometric distortion and a artificial operation was able to be detected.

A Study on Efficient Tamper Detection of Digital Image (디지털 영상의 효율적인 변형 검출에 관한 연구)

  • Woo, Chan-Il;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.196-201
    • /
    • 2016
  • Digital watermarking is a technique used to hide information within digital media. Digital watermarking techniques can be classified as either robust watermarking or fragile watermarking. Robust watermarking techniques are generally used for the purpose of copyright protection. In addition, fragile watermarking techniques are used for the authentication and integrity verification of a digital image. Therefore, fragile watermarks should be easily breakable for trivial tampering of a watermarked image. This paper proposes an efficient fragile watermarking method for image tamper detection in the spatial domain. In the proposed method, a hash code and symmetric key encryption algorithm are used. The proposed method of inserting a watermark by dividing the original image into many blocks of small sizes is not weak against attacks, such as cut and paste. The proposed method can detect the manipulated parts of a watermarked image without testing the entire block of the image.

A Blind Audio Watermarking using the Tonal Characteristic (토널 특성을 이용한 브라인드 오디오 워터마킹)

  • 이희숙;이우선
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.816-823
    • /
    • 2003
  • In this paper, we propose a blind audio watermarking using the tonal characteristic. First, we explain the perceptional effect of tonal on the existed researches and shout the experimental result that tonal characteristic is more stable than other characteristics used in previous watermarking studies against several signal processing. On the base of the result, we propose the blind audio watermarking using the relation among the signals on the frequency domain which compose a tonal masker. To evaluate the sound quality of our watermarked audios, we used the SDG(Subjective Diff-Grades) and got the average SDG 0.27. This result says the watermarking using the perceptional effect of tonal is available from the viewpoint of non-perception. And we detected the watermark hits from the watermarked audios which were changed by several signal processing and the detection ratios with exception of the time shift processing were over 98%. About the time shift processing, we applied the new method that searched the most proper position on the time domain and then detected the watermark bits by the ratio of 90%.

  • PDF

Integrity Authentication Algorithm of JPEG Compressed Images through Reversible Watermarking (가역 워터마킹 기술을 통한 JPEG 압축 영상의 무결성 인증 알고리즘)

  • Jo, Hyun-Wu;Yeo, Dong-Gyu;Lee, Hae-Yeoun
    • The KIPS Transactions:PartB
    • /
    • v.19B no.2
    • /
    • pp.83-92
    • /
    • 2012
  • Multimedia contents can be copied and manipulated without quality degradation. Therefore, they are vulnerable to digital forgery and illegal distribution. In these days, with increasing the importance of multimedia security, various multimedia security techniques are studied. In this paper, we propose a content authentication algorithm based on reversible watermarking which supports JPEG compression commonly used for multimedia contents. After splitting image blocks, a specific authentication code for each block is extracted and embedded into the quantized coefficients on JPEG compression which are preserved against lossy processing. At a decoding process, the watermarked JPEG image is authenticated by extracting the embedded code and restored to have the original image quality. To evaluate the performance of the proposed algorithm, we analyzed image quality and compression ratio on various test images. The average PSNR value and compression ratio of the watermarked JPEG image were 33.13dB and 90.65%, respectively, whose difference with the standard JPEG compression were 2.44dB and 1.63%.

A Robust Watermark System for MPEG-2 Video Against Geometric and Bitrate Varying Attacks (기하학적 공격 및 비트율 변화 공격에 강한 MPEG-2 동영상 워터마크 시스템 개발)

  • Hwang, Seon-Cheol
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.59 no.3
    • /
    • pp.258-262
    • /
    • 2010
  • This paper describes a watermarking system that has the robust characteristics against the geometric attacks of resizing and the bitrate varying attacks. While the existing watermark methods of marking on AC in DCT coefficients are weak against the geometric attacks, the methods of tiny increasing the DC in DCT coefficients and the system implementations are suggested in this paper. We measure the differences between the original images and the watermarked images and the detecting rate from the geometric and bitrate attacked images. Results of experiments show that our method is robust against that attacks.

Steganography based Multi-modal Biometrics System

  • Go, Hyoun-Joo;Chun, Myung-Geun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.2
    • /
    • pp.148-153
    • /
    • 2007
  • This paper deals with implementing a steganography based multi-modal biometric system. For this purpose, we construct a multi-biometrics system based on the face and iris recognition. Here, the feature vector of iris pattern is hidden in the face image. The recognition system is designed by the fuzzy-based Linear Discriminant Analysis(LDA), which is an expanded approach of the LDA method combined by the theory of fuzzy sets. Furthermore, we present a watermarking method that can embed iris information into face images. Finally, we show the advantages of the proposed watermarking scheme by computing the ROC curves and make some comparisons recognition rates of watermarked face images with those of original ones. From various experiments, we found that our proposed scheme could be used for establishing efficient and secure multi-modal biometric systems.

Video Watermarking Algorithm for H.264 Scalable Video Coding

  • Lu, Jianfeng;Li, Li;Yang, Zhenhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.56-67
    • /
    • 2013
  • Because H.264/SVC can meet the needs of different networks and user terminals, it has become more and more popular. In this paper, we focus on the spatial resolution scalability of H.264/SVC and propose a blind video watermarking algorithm for the copyright protection of H.264/SVC coded video. The watermark embedding occurs before the H.264/SVC encoding, and only the original enhancement layer sequence is watermarked. However, because the watermark is embedded into the average matrix of each macro block, it can be detected in both the enhancement layer and base layer after downsampling, video encoding, and video decoding. The proposed algorithm is examined using JSVM, and experiment results show that is robust to H.264/SVC coding and has little influence on video quality.

On the watermark insertion and extraction methods using the secret sharing method (비밀정보 분할 방식을 적용한 워터마크 삽입.추출 방법)

  • 서창호;김석우;성열욱
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.47-55
    • /
    • 2001
  • This paper proposes a method which inserts watermark created by secret sharing method and then extracts it from watermarked image for the protection of copyrights of digital images. To do this, after image's DCT transform, once some values created by Key sharing method which used Lagrange interpolation are inserted into a frequency domain, one can recreate original watermark even if only k seeds are extracted among n of inserted seeds ($n{\geq}k$).

  • PDF

Parameter Estimations of ML Test Based Decoders for Perceptually Watermarked Images

  • Lee, Jin-Geol
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.12
    • /
    • pp.1631-1637
    • /
    • 2005
  • Based on the generalized Gaussian pdf of DCT coefficients of images, Hernandez et al. propose the ML test applied watermark decoder. For images with watermarks shaped by the visibility thresholds of DCT coefficients and the luminance masking of human visual system, they conclude that the ML test with an appropriately chosen parameter associated with the pdf of DCT coefficients outperforms the correlation based decoder. In this paper, the parameter is estimated using various methods including a novel one for watermarks shaped by the visibility thresholds of DCT coefficients and the luminance masking as Hernandez et al. did and with the contrast masking added, and its effect on performance is compared.

  • PDF