DCT Based Watermarking Technique Using Region of Interest

관심영역을 이용한 DCT기반 워터마킹 기법

  • 신재욱 ((주)한국컴퓨터 기술 연구소) ;
  • 정동석 (인하대학교 전자공학과)
  • Published : 2000.01.25

Abstract

The proposed method inserts a watermark information not mto a whole Image region but only into regions of interest(ROIs) To extract the ROIs, we divide an original Image into sub-blocks and use modified Shi-Kuo Chang's PIM(picture information measure) as the criteria to select the ROIs Considering the directional information and frequency bands, we insert the watermark information into sub-blocks m the DCT domain. The proposed method can reduce the distortion in comparison With the other methods which utilize the whole Image as an nor The proposed method makes much less damaged Images m comparison to the other methods And those Images processed by the proposed algorithm are more robust to the changes caused by signal processing operations such as resampling, clipping. noise, and so on Also due to the block-based watermark insertion, the proposed method has the robustness to the Image compression processes such as JPEG and MPEG.

영상에서 관심영역을 추출하여 그 부분에만 워터마크 정보를 넣는다. 관심영역은 영상의 복잡도플 나타내는 방법중의 하나인 PIM(picture information measure)을 변형하여 사용한다 이렇게 추출된 영역에 대하여 DCT(discrete cosine transform)를 이용하여 주파수 공간으로 신호를 변형시킨 후, DCT 계수 값들의 성질인 방향성 정보와 주파수 특성을 이용해 워터마크 정보를 넣는다 기존에 제안된 방법의 단점은 영상의 특징을 사용하지 않고 영상의 전 부분에 걸쳐 워터마크 정보를 넣었기 때문에 영상의 왜곡이 심하다 세안된 방법은 영상의 특징을 이용하기 때문에 영상의 왜곡을 줄일 수 있었다 그리고 영상의 재표본화(resampling), 잡음과 같은 신호처리에 의한 변화에도 강인함을 보여준다 또한 블록에 기반 하여 워터마크를 집어넣기 때문에 JPEG이나 MPEG과 같은 영상의 압축에도 강인한 성질을 갖는 것을 확인 할 수 있었다

Keywords

References

  1. Mei Kobayashi, 'Digital Watennarking Historical Reports,' Research Report, RT0199, IBM Japan, April 22, 1997
  2. Fumitada Takahashi, 'Special Report Digital Watermark Safeguards Multimedia Copyright,' Nikkel Electroics Asia, May 1997
  3. Norishige Monmoto, 'Techniques for Data Hiding in Audio Files,' MIT Master Thesis, June 1995
  4. I. Cox, J. Kilian, T. Leighton, and T Shamoon, 'Secure Spread Spectrum Watermarking for Multimedia,' Technical Report, 95-10, NEC Research Institute, 1995
  5. The American Heritage Dictionary, 3rd Edition, Dell Publishing, 1994
  6. Mike May, 'Invisible Watermarks,' American Scientist, Vol 85, pp 124-125, March-April 1997
  7. 'IBM Digital Library,' http //www.softwareibm.com/is/dig-lib/vatican/manuscript.html
  8. http //www.pathfinder.com/money/lastest /press/BU/1998Jul15/828 html
  9. W Bender, D Gruhl, N Monmoto, and A. Lu, 'Techniques for Data Hiding.' IBM System Journal, Vol. 35, pp 313-336, 1996
  10. 'The Data Hiding Homepage,' http://nif www media mit edu/DataHiding /index html
  11. Jian Zhao, and Eckhard Koch, 'Towards Robust and Hidden Image Copyright Labeling,' Proc of IEEE Workshop on Nonlinear Signal Processing, Greece, 1995
  12. Matthew Holliman, Nsair Memon, B I Yeo, and Minerva Yeung, 'Adaptive Public Watermarking of DCT-based Compressed Images,' Proceeding of SPIE Storage and Retrieval or Image and Video Database VI, Vol. 3312, pp 284-295, 1998 https://doi.org/10.1117/12.298461
  13. A Piva, M Barni, F Bartolini, and V Cappellini, 'DCT-based Watermark Recovering without Resorting to the Uncorrupted Original Image,' Proc of the 1997 IEEE Int Conf on Image Processing, Vol III, pp 520-523, 1997 https://doi.org/10.1109/ICIP.1997.647964
  14. Shi-Kuo Chang, Principles of Pictorial Information Systems Design, Prentice Hall, pp 61-81, 1989
  15. Tae-Hee Kim and Dong-Seok Jeong, 'Image indexing method using entropy measures with multilevel-multiresolution approach,' SPIE, Storage and Retrieval Image and Video Database VI, vol 3312 pp 383-391, 1998
  16. K. R. Rao, and J J Hwang, Techniques and Standards for Image/Video and Audio Coding, Prentice Hall, 1996
  17. Jae-Wook Shin, Dong-Seok Jeong, 'A New Watermarking Method Using EntropyBased Region Segmentation,' SPIE, Multimedia Systems and Applications, vol 3528, pp 531-538, 1998