• Title/Summary/Keyword: 마크

Search Result 3,082, Processing Time 0.026 seconds

A Watermarking Technique using Block-based Wavelet Transform (블록 기반 웨이블릿 변환을 이용한 워터마킹 기법)

  • 이정수;김회율
    • Journal of Broadcast Engineering
    • /
    • v.5 no.2
    • /
    • pp.290-299
    • /
    • 2000
  • In this paper, we introduce a watermarking technique using a block-based wavelet transform. Our objective is to achieve the invisibility of the watermark embedded into an image. That is, the difference between the original image and the watermarked image is perceptually invisible. Also, we propose a scheme that is robust to common Image processing by embedding the watermark into ail frequencies. Especially, we certified that the proposed watermarking algorithm was robust to JPEG compression and noise. In addition, our detection scheme can detect the manipulated area for the purpose of authentication. From the experimental results, we conclude that the proposed watermarking system satisfied the objectives proposed in this paper.

  • PDF

Robust Watermarking Algorithm for 3D Mesh Models (3차원 메쉬 모델을 위한 강인한 워터마킹 기법)

  • 송한새;조남익;김종원
    • Journal of Broadcast Engineering
    • /
    • v.9 no.1
    • /
    • pp.64-73
    • /
    • 2004
  • A robust watermarking algorithm is proposed for 3D mesh models. Watermark is inserted into the 2D image which is extracted from the target 3D model. Each Pixel value of the extracted 2D image represents a distance from the predefined reference points to the face of the given 3D model. This extracted image is defined as “range image” in this paper. Watermark is embedded into the range image. Then, watermarked 3D mesh is obtained by modifying vertices using the watermarked range Image. In extraction procedure, the original model is needed. After registration between the original and the watermarked models, two range images are extracted from each 3D model. From these images. embedded watermark is extracted. Experimental results show that the proposed algorithm is robust against the attacks such as rotation, translation, uniform scaling, mesh simplification, AWGN and quantization of vertex coordinates.

Color Image Watermarking Using Human Visual System (인간시각시스템을 고려한 칼라 영상 워터마킹)

  • Lee, Joo-Shin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.6 no.2
    • /
    • pp.65-70
    • /
    • 2013
  • In this paper, we proposed color image watermarking using human visual system. A watermark is embedded by transforming a color image of RGB coordinate into a color image of HSI coordinate with considering that chromatic components are less sensitive than achromatic components. Watermark is embedded in the frequency domain of the chromatic channels by using discrete cosine transform. Watermark is extracted from watermarked image by using inverse discrete cosine transform. To verify the proposed method, a standard image and a fingerprint image are used for the original image and the watermark image, respectively. Simulation results are satisfied with invisibility and robustness from attacks as image compression.

A Watermarking System using Adaptive Thresholds (적응 임계값을 사용한 워터마킹 시스템)

  • Sang-Heun Oh;Sung-Wook Park;Bvyung-Jun Kim
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.30-37
    • /
    • 2003
  • In this paper, a discrete wavelet transform (DWT)-based watermarking system is proposed. The main feature of proposed system is that the embedding system uses adaptive thresholds to control the trade-off between the qualify of the watermarked image and the capacity of the watermark, and the trade-off between the quality and robustness of the watermarked image. Also, the extracting system rebuilds threshold according to various attacks and decides a watermark bit from the least distorted coefficient after measuring the distortion of coefficient. Finally, a new measure to detect the uniqueness of watermark is proposed. The experimental result shows that the proposed watermarking system is robust against conventional signal processing and intentional attacks.

A New Image Authentication Method through Isolation of Invalid Blocks (무효 블록의 격리를 이용한 새로운 이미지 인증 방법)

  • Kim, Hyo-Chul;Kim, Hyun-Chul;Yoo, Ki-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.17-24
    • /
    • 2002
  • In this paper, we propose a new watermarking method using isolation of invalid blocks for image authentication. We embed messages into the high frequency band in the DCT domain because of its imperceptibility and fragility. And we were able to inspect the identity of valid blocks between error corrected original images and watermarked images through experiments. As a result, we found that the watermarked image is enough to extract binary messages. Therefore, the extra information such as the original image or watermark was not necessary in our extracting process. Experiment results show that the proposed method can be used successfully for image authentication.

A Study on the describability of landmarks in route communication using virtual reality (가상현실을 이용한 루트 커뮤니케이션에서의 랜드마크의 설명 용이성(Describability)에 관한 연구)

  • 정진우
    • Archives of design research
    • /
    • v.16 no.2
    • /
    • pp.255-270
    • /
    • 2003
  • The main goal of this study is to find the role of landmarks in route communication process and to explore the describability of landmarks, a linguistic factor of landmarks that was not noted frequently by previous wayfinding studies. Through analysis of landmarks in this study, the describability of landmarks was identified and this study hypothesized that the describability affects to the whole process of route communication. A virtual reality (VR) simulation test was conducted to examine the effect of the describability of landmarks in route communication. The independent variable was the describability of landmarks and landmarks. As dependent variables, the total time to find final destination and the number of errors were measured. Results showed that the describability of landmarks gives positive effect to the whole of route communication processes. Consequently, this study provides the solution of wayfinding problems in route communication and suggests the usage of landmarks as a prerequisite for planning spaces having the efficiency of wayfinding.

  • PDF

A Wavelet-Based Watermarking Scheme of Digital Image Using ROI Method (ROI를 이용한 웨이브렛 기반 디지털 영상의 워터마킹 기법)

  • Kim, Tae-Jung;Hong, Choong-Seon;Sung, Ji-Hyun;Hwang, Jae-Ho;Lee, Dae-Young
    • The KIPS Transactions:PartB
    • /
    • v.11B no.3
    • /
    • pp.289-296
    • /
    • 2004
  • General watermarking techniques tend not to consider intrinsic characteristics of image, so that watermarks are embeded to entire images. In this paper, we present a watermarking algorithm based on wavelet domain, and the watermark is embedded into large coefficients in region of interest(ROI) being based on principle of multi-threshold watermark coding(MTWC) for robust watermark insertion. We try to accomplish both image duality and robustness using human visual system(HVS). The watermarks are embedded in middle frequency bands because the distortion degree of watermarked images appears to be less than lower frequency bands, and the embedded watermarks in the middle bands showed high extraction ratios after some distortion. The watermarks are consisted of pseudo random sequences and detected using Cox's similarity mesurement.

Invisible Watermarking for Improved Security of Digital Video Application (디지털 동영상 어플리케이션의 향상된 보안성을 위한 비시각적인 워터마킹)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.175-183
    • /
    • 2011
  • Performance of digital video watermarking is an assessment that hides a lot of information in digital videos. Therefore, it is required to find a way that enables to store lots of bits of data into a high quality video of the frequency area of digital contents. Hence, this paper designs a watermarking system improving security with an enhancing watermarking based on invisible watermarking and embedding an watermarking on LH and HL subband and its subband by transforming wavelet after the extraction of luminance component from the frames of video by compromising robustness and invisible of watermarking elements. The performance analysis of security of watermarking is carried out with a statistic method, and makes an assessment of robustness against variety of attacks to invisible watermarking. We can verify the security of watermarking against variety of attacks by testing robustness and invisible through carrying out general signal processing like noise addition, lossy compression, and Low-Pass filtering.

A Hybrid Watermarking Scheme for Color Images (컬러 영상을 위한 하이브리드 워터마킹)

  • Lee Hyun-Suk;Oktavia Vivi;Kim Mi-Ae;Lee Won-Hyung
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.73-86
    • /
    • 2004
  • This paper presents a hybrid digital watermarking scheme for color images, We insert two watermarks in the DWT domain using spread-spectrum correlation-based watermarking in luminance component of the color image and in spatial domain using pixel-value substitution of blue channel of color image. The objectives of this paper are to have the watermark robust to common signal processing and to detect any changes on the watermarked image for tamper detection at the same time. This watermark scheme will have the robustness characteristic as typical in frequency domain watermark, and also ability to detect any changes on the image (tamper detection).

  • PDF

A study on relationship among Love Marks, Brand Identification, Brand Equity & Behavior Intention (관광목적지의 러브마크, 브랜드 동일시, 브랜드자산 및 행동의도와의 관계)

  • Lee, Jung-Eun;Seo, Gyeong-Do
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.165-173
    • /
    • 2017
  • The purpose of this study was to identify the causal relationship between the brand, the brand equity and brand equity of a tourist destination. The effect of love mark on self identification is that the relationship between love mark performance and self-identification time is significant, and that of love mark is in the order of self identification. Trust mark of love mark has a significant relationship with self identification. The relationship between brand intimacy and brand quality and the relationship between trust and brand quality were significant in relation to the brand mark, but brand mark was not significant. In addition, in the relationship between brand value and love-mark, there is a significant relationship between performance and brand value, relationship between intimacy and brand value, and performance is not significant in brand value. There was a significant relationship between gender and behavioral intention. The relationship between gender identity and behavioral intention was positively related to brand equity.