• Title, Summary, Keyword: Watermarking

Search Result 1,102, Processing Time 0.042 seconds

Biological Infectious Watermarking Model for Video Copyright Protection

  • Jang, Bong-Joo;Lee, Suk-Hwan;Lim, SangHun;Kwon, Ki-Ryong
    • Journal of Information Processing Systems
    • /
    • v.11 no.2
    • /
    • pp.280-294
    • /
    • 2015
  • This paper presents the infectious watermarking model (IWM) for the protection of video contents that are based on biological virus modeling by the infectious route and procedure. Our infectious watermarking is designed as a new paradigm protection for video contents, regarding the hidden watermark for video protection as an infectious virus, video content as host, and codec as contagion medium. We used pathogen, mutant, and contagion as the infectious watermark and defined the techniques of infectious watermark generation and authentication, kernel-based infectious watermarking, and content-based infectious watermarking. We experimented with our watermarking model by using existing watermarking methods as kernel-based infectious watermarking and content-based infectious watermarking medium, and verified the practical applications of our model based on these experiments.

DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1402-1411
    • /
    • 2014
  • Buyer-seller watermarking protocol is defined as the practice of imperceptible altering a digital content to embed a message using watermarking in the encryption domain. This protocol is acknowledged as one kind of copyright protection techniques in electronic commerce. Buyer-seller watermarking protocol is fundamentally based on public-key cryptosystem that is operating using the algebraic property of an integer. However, in general usage, digital contents which are handled in watermarking scheme mostly exist as real numbers in frequency domain through DCT, DFT, DWT, etc. Therefore, in order to use the watermarking scheme in a cryptographic protocol, digital contents that exist as real number must be transformed into integer type through preprocessing beforehand. In this paper, we presented a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework and homomorphic encryption method for buyer-seller watermarking protocol. We applied integral-processing in order to modify the decimal layer. And we designed a direction-adaptive watermarking scheme by analyzing distribution property of the frequency coefficients in a block using JND threshold. From the experimental results, the proposed scheme was confirmed to have a good robustness and invisibility.

Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery

  • Wang, Chengyou;Zhang, Heng;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.510-522
    • /
    • 2018
  • As the major source of information, digital images play an indispensable role in our lives. However, with the development of image processing techniques, people can optionally retouch or even forge an image by using image processing software. Therefore, the authenticity and integrity of digital images are facing severe challenge. To resolve this issue, the fragile watermarking schemes for image authentication have been proposed. According to different purposes, the fragile watermarking can be divided into two categories: fragile watermarking for tamper localization and fragile watermarking with recovery ability. The fragile watermarking for image tamper localization can only identify and locate the tampered regions, but it cannot further restore the modified regions. In some cases, image recovery for tampered regions is very essential. Generally, the fragile watermarking for image authentication and recovery includes three procedures: watermark generation and embedding, tamper localization, and image self-recovery. In this article, we make a review on self-embedding fragile watermarking methods. The basic model and the evaluation indexes of this watermarking scheme are presented in this paper. Some related works proposed in recent years and their advantages and disadvantages are described in detail to help the future research in this field. Based on the analysis, we give the future research prospects and suggestions in the end.

Performance Comparison of Wavelet Transform Based Watermarking and DCT Transform Based Watermarking (Wavelet 변환과 DCT 변환을 이용한 워터마킹에 관한 연구)

  • 장용원;한승수;김인택
    • Proceedings of the IEEK Conference
    • /
    • /
    • pp.85-88
    • /
    • 2000
  • With the rapid growth of network distributions of digitized media(audio, image, and video), there is an urgent need for copyright protection. For now watermarking is a well-known technique for copyright protection of digital data. To embed a digital watermark to the image, discrete cosine transform(DCT) and wavelet transform are commonly used. In this paper, the performance of the DCT based watermarking technique and wavelet based watermarking technique were compared and the influences of the parameter a that decides the strength of the watermarking data were considered.

  • PDF

Review on Digital Image Watermarking Based on Singular Value Decomposition

  • Wang, Chengyou;Zhang, Yunpeng;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1585-1601
    • /
    • 2017
  • With the rapid development of computer technologies, a number of image modification methods have emerged, which have great impacts on the security of image information. Therefore, it is necessary to protect the integrity and authenticity of digital images, and digital watermarking technique consequently becomes a research hotspot. An effort is made to survey and analyze advancements of image watermarking algorithms based on singular value decomposition (SVD) in recent years. In the first part, an overview of watermarking techniques is presented and then mathematical theory of SVD is given. Besides, SVD watermarking model, features, and evaluation indexes are demonstrated. Various SVD-based watermarking algorithms, as well as hybrid watermarking algorithms based on SVD and other transforms for copyright protection, tamper detection, location, and recovery are reviewed in the last part.

A Study of Transmitter Detection Method for LED-ID using OOK-SS Watermarking (OOK-SS Watermarking을 이용한 LED-ID용 송신기 검출기법에 관한 연구)

  • Cha, Jae-Sang;Kim, Jin-Young;Jang, Yeong-Min;Lim, Yoon-Sik;Kim, Jong-Tae;Lee, Kyong-Gun;Lee, Min-Ho
    • The Journal of The Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.281-285
    • /
    • 2010
  • We propose new identification method of LED location in indoor environment. It can transmit and receive position information and additional data, as applying OOK-SS watermarking method for LED transmission signal. Especially, we use a unipolar form code for watermarking spread code, because LED signal has unipolar characteristic. we analysis LED signal influence and interference with watermarking code, demonstrate usefulness of LED-ID using OOK-SS Watermarking.

A Direction-Adaptive Watermarking Technique Based on 2DCT in the Buyer-Seller Watermarking Protocol (구매자-판매자 워터마킹 프로토콜상에서 DCT 기반의 방향성 적응 워터마킹)

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Kwon, Ki-Ryong;Woo, Chong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.7
    • /
    • pp.778-786
    • /
    • 2014
  • Buyer-seller watermarking protocol is one of the copyright protection techniques which combine a cryptographic protocol used in electronic commerce with a digital wetermarking scheme aiming at proving the ownership of multimedia contents and preventing the illegal reproduction and redistribution of digital contents. In this paper, it is proposed a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework. In order to implement watermarking scheme in a public-key cryptosystem, it is divided that frequency coefficients exist as real number into integer and decimal layer. And the decimal layer is modified integer type through integral-processing. Also, for robustness and invisibility required in watermarking scheme, it is designed a direction-adaptive watermarking scheme based on locally edge-properties of each block in an image through analyzing distribution property of the frequency coefficients in a block using JND threshold.

Invisible Watermarking for Improved Security of Digital Video Application (디지털 동영상 어플리케이션의 향상된 보안성을 위한 비시각적인 워터마킹)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.175-183
    • /
    • 2011
  • Performance of digital video watermarking is an assessment that hides a lot of information in digital videos. Therefore, it is required to find a way that enables to store lots of bits of data into a high quality video of the frequency area of digital contents. Hence, this paper designs a watermarking system improving security with an enhancing watermarking based on invisible watermarking and embedding an watermarking on LH and HL subband and its subband by transforming wavelet after the extraction of luminance component from the frames of video by compromising robustness and invisible of watermarking elements. The performance analysis of security of watermarking is carried out with a statistic method, and makes an assessment of robustness against variety of attacks to invisible watermarking. We can verify the security of watermarking against variety of attacks by testing robustness and invisible through carrying out general signal processing like noise addition, lossy compression, and Low-Pass filtering.

Digital Watermarking for Copyright Protection of 3-D CAD Design Drawing Based on Vector Data Using Digital Watermarking

  • Kwon, Ki-Ryong;Lee, Suk-Hwan;Park, Seung-Seob;Jeong, Tai-Il
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.12
    • /
    • pp.1596-1606
    • /
    • 2006
  • There has been more increased the development of 3D technique since many 3D contents of 3D graphic model, 3D mobile/computer game, and 3D CAD have been serviced in Web or industry fields. Therefore, the watermarking system is more required to protect the copyright for 3D contents. Currently there has been researched about the watermarking for 3D graphic model of mesh or NURBS. However, watermarking technique based on CAD design drawing leaves something to be desired yet. This paper proposed the watermarking technique for 3D CAD design drawing using Line and Arc components. After drawing out Line and Arc components from designed drawing, we embed the watermark into both the length of Line component and the radius of Arc component. Experimental results verified that the proposed algorithm satisfies the transparency about watermarked drawing and also has the robustness against several attacks by using public CAD tool.

  • PDF

A Low Frequency Band Watermarking with Weighted Correction in the Combined Cosine and Wavelet Transform Domain

  • Deb, Kaushik;Al-Seraj, Md. Sajib;Chong, Ui-Pil
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.14 no.1
    • /
    • pp.13-20
    • /
    • 2013
  • A combined DWT and DCT based watermarking technique of low frequency watermarking with weighted correction is proposed. The DWT has excellent spatial localization, frequency spread and multi-resolution characteristics, which are similar to the theoretical models of the human visual system (HVS). The DCT based watermarking techniques offer compression while DWT based watermarking techniques offer scalability. These desirable properties are used in this combined watermarking technique. In the proposed method watermark bits are embedded in the low frequency band of each DCT block of selected DWT sub-band. The weighted correction is also used to improve the imperceptibility. The extracting procedure reverses the embedding operations without the reference of the original image. Compared with the similar approach by DCT based approach and DWT based approach, the experimental results show that the proposed algorithm apparently preserves superiori mage quality and robustness under various attacks such as JPEG compression, cropping, sharping, contrast adjustments and so on.