비축 홀로그램을 이용한 디지털 워터마킹

Digital Watermarking using Of-axis Hologram

  • 발행 : 2004.05.01

초록

We propose a now watermarking scheme that can be used to embed multiple bits and also resilient to geometrical transforms such as scaling, rotation, and cropping, based on off - axis holographic watermark that allows multiple watermark recovery without original content(cover image). The holographic watermark is that Fourier transformed digital hologram is embedded into cover image in the spatial domain. The proposed method has not only increased robustness with a stronger embedding but also imprescriptibility of the watermark in the evaluation process. To compare with the convention기 scheme, the spread spectrum, we embedded and recovered maximum 1,024 bits that consist of binary number over PSNR(peak signal-to-noise ratio) 39dB. And also, we computed robustness with BER(bit error rate) corresponding the above attack

키워드

참고문헌

  1. I. J. Cox, J. kilian, T. Leighton, and T. Sharnoon, 'Secure spread spectrum watermarking for multi media,' NEC Res. Insti., Princeton, NJ, Tech Rep., pp.95-100, 1995
  2. I. Pitas and T. Kaskalis, 'Applying Signatures on Digital Image,' Workshop on Nonlinear Signal and Image Processing, pp.460-463, June 1995
  3. K. T. Kim, J H. Kim, and E. S. Kim, 'Multiple Information Hiding Technique using Random Sequence and Hadamard Matrix,' Opt. Eng, vol.40, no.11, pp, 2489-2494, 2001 https://doi.org/10.1117/1.1410104
  4. J. J. K. O'Rauanidh and Thierry Pun, 'Rotation, Scale and Translation Invariant Digital Image Watermarking', Signal processing journal, 1998 https://doi.org/10.1016/S0165-1684(98)00012-7
  5. C. Y. Lin, 'Public Watermarking Surviving General Scaling and Cropping: An Application for Print and-Scan Process', ACM Multimedia 99, Orlando, FL, USA, Oct 1999
  6. C. Y. Lin and Shih-Fu Chang, 'Distortion Modeling and Invariant Extraction for Digital Image Print -and-Scan Process', ISMIP 99, Taipei, Taiwan, Dec. 1999
  7. R. Caldelli, M. Bami, F. Bartolini, and A. Piva, 'Geo-metric-Invariant Robust Watermarking through Constellation Matching in the Frequency domain,' Proceedings of 7th IEEE ICIP 2000, vol. II, pp.65-68, Vancouver, Canada, Sep., 2000 https://doi.org/10.1109/ICIP.2000.899227
  8. C. R. Choi and J. Jeong, 'Robust Image Watermarking Scheme Resilient to De-synchronization Attacks,' SPIE 2002 Security and Watermarking of Multimedia Contents W, San Jose, USA, Jan., 2002
  9. D. Gaber, 'A New Microscope Principle,' Nature, Vol.161, pp.777, 1948
  10. E. N. Leith and J. Upatnieks, 'Reconstructed Wavefronts and Communication Theory,' J Opt Soc. Am vol.52, pp.1377, 1962
  11. F. Hartung, J. K Su, and B. Girod, 'Spread Spectrum Watermarking: Malicious Attacks and Counterattacks,' Proceedings of SPIE 3657, Security and Watermarking of Multimedia Cotents, pp. 147-158, 1999