• Title/Summary/Keyword: 워터마크 정보 검출

Search Result 133, Processing Time 0.026 seconds

Digital watermarking algorithm for authentication and detection of manipulated positions in MPEG-2 bit-stream (MPEG-2비트열에서의 인증 및 조작위치 검출을 위한 디지털 워터마킹 기법)

  • 박재연;임재혁;원치선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.378-387
    • /
    • 2003
  • Digital watermarking is the technique that embeds invisible signalsincluding owner identification information, specific code, or pattern into multimedia data such as image, video and audio. Watermarking techniques can be classified into two groups; robust watermarking and fragile(semi-fragile) watermarking. The main purpose of the robust watermarking is the protection of copyright, whereas fragile(semi-fragile) watermarking prevents image or video data from illegal modifications. To achieve this goal watermark should survive from unintentional modifications such as random noise or compression, but it should be fragile for malicious manipulations. In this paper, an invertible semi-fragile watermarkingalgorithm for authentication and detection of manipulated location in MPEG-2 bit-stream is proposed. The proposed algorithm embeds two kinds of watermarks, which are embedded into quantized DCT coefficients. So it can be applied directly to the compressed bit-stream. The first watermark is used for authentication of video data. The second one is used for detection of malicious manipulations. It can distinguish transcodingin bit-stream domain from malicious manipulation and detect the block-wise locations of manipulations in video data. Also, since the proposed algorithm has an invertible property, recovering original video data is possible if the watermarked video is authentic.

Digital Watermarking Using Color Difference (색차 정보를 이용한 디지털 워터마킹)

  • 김희수;하영호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.1
    • /
    • pp.118-124
    • /
    • 2001
  • In this paper, we proposed the novel digital watermarking for color still image using the characteristics of human visual system and the distribution of DCT coefficients. We insert watermark signal in the chromatic components of YCrCb color space according the characteristics of the human visual system that chromatic component are less sensitive than achromatic components. In order to extract the watermark signal, we use the relationship among the DCT coefficients of watermarked image without using original one. Simulation results show that the proposed watermarking method is better quality on invisibility than the conventional methods.

  • PDF

Print-Scan Resilient Curve Watermarking using B-Spline Curve Model and its 2D Mesh-Spectral Transform (B-스프라인 곡선 모델링 및 메시-스펙트럼 변환을 이용한 프린트-스캔에 강인한 곡선 워터마킹)

  • Kim, Ji-Young;Lee, Hae-Yeoun;Im, Dong-Hyuck;Ryu, Seung-Jin;Choi, Jung-Ho;Lee, Heung-Kyu
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.307-314
    • /
    • 2008
  • This paper presents a new robust watermarking method for curves that uses informed-detection. To embed watermarks, the presented algorithm parameterizes a curve using the B-spline model and acquires the control points of the B-spline model. For these control points, 2D mesh are created by applying Delaunay triangulation and then the mesh spectral analysis is performed to calculate the mesh spectral coefficients where watermark messages are embedded in a spread spectrum way. The watermarked coefficients are inversely transformed to the coordinates of the control points and the watermarked curve is reconstructed by calculating B-spline model with the control points. To detect the embedded watermark, we apply curve matching algorithm using inflection points of curve. After curve registration, we calculate the difference between the original and watermarked mesh spectral coefficients with the same process for embedding. By calculating correlation coefficients between the detected and candidate watermark, we decide which watermark was embedded. The experimental results prove the proposed scheme is more robust than previous watermarking schemes against print-scan process as well as geometrical distortions.

Threshold Selection Method for Capacity Optimization of the Digital Watermark Insertion (디지털 워터마크의 삽입용량 최적화를 위한 임계값 선택방법)

  • Lee, Kang-Seung;Park, Ki-Bum
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.1
    • /
    • pp.49-59
    • /
    • 2009
  • In this paper a watermarking algorithm is proposed to optimize the capacity of the digital watermark insertion in an experimental threshold using the characteristics of human visual system(HVS), adaptive scale factors, and weight functions based on discrete wavelet transform. After the original image is decomposed by a 3-level discrete wavelet transform, the watermarks for capacity optimization are inserted into all subbands except the baseband, by applying the important coefficients from the experimental threshold in the wavelet region. The adaptive scale factors and weight functions based on HVS are considered for the capacity optimization of the digital watermark insertion in order to enhance the robustness and invisibility. The watermarks are consisted of gaussian random sequences and detected by correlation. The experimental results showed that this algorithm can preserve a fine image quality against various attacks such as the JPEG lossy compression, noise addition, cropping, blurring, sharpening, linear and non-linear filtering, etc.

  • PDF

A Study on Efficient Tamper Detection of Digital Image (디지털 영상의 효율적인 변형 검출에 관한 연구)

  • Woo, Chan-Il;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.196-201
    • /
    • 2016
  • Digital watermarking is a technique used to hide information within digital media. Digital watermarking techniques can be classified as either robust watermarking or fragile watermarking. Robust watermarking techniques are generally used for the purpose of copyright protection. In addition, fragile watermarking techniques are used for the authentication and integrity verification of a digital image. Therefore, fragile watermarks should be easily breakable for trivial tampering of a watermarked image. This paper proposes an efficient fragile watermarking method for image tamper detection in the spatial domain. In the proposed method, a hash code and symmetric key encryption algorithm are used. The proposed method of inserting a watermark by dividing the original image into many blocks of small sizes is not weak against attacks, such as cut and paste. The proposed method can detect the manipulated parts of a watermarked image without testing the entire block of the image.

A Hybrid Digital Watermarking Technique for Copyright Protection and Tamper Detection on Still images (정지영상에서 저작권 보호 및 위변조 검출을 위한 하이브리드 디지털 워터마킹 기법)

  • Yoo Kil-Sang;Song Geun-Sil;Choi Hyuk;Lee Won-Hyung
    • Journal of Internet Computing and Services
    • /
    • v.4 no.4
    • /
    • pp.27-34
    • /
    • 2003
  • Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Therefore. copyright protection of digital contents and insurance of digital image integrity become major issues. In this paper, we propose a hybrid watermarking method to identify locations of tampered region as well as copyright. Our proposed algorithms embed the PN-sequence into low frequency sub-band of the wavelet transform domain and it doesn't need the original image in extraction procedure. The experimental results show good robustness against any signal processing with tamper detection on still image.

  • PDF

Digital Image Watermarking Algorithm using Integer Block Transform (정수 블록 변환을 이용한 디지털 이미지 워터마킹 알고리즘)

  • Oh Kwan-Jung;Ho Yo-Sung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.5 s.311
    • /
    • pp.57-67
    • /
    • 2006
  • Intellectual property rights are gathering strength theses days. Because digital contents are easily reproduced and distributed by advanced computers and networks. Digital watermarking is one of the best solutions for this problem. Generally, frequency-domain watermarking algorithms are preferred since they are more robust than spatial-domain algorithms. However, coefficients in the frequency domain are floating-point numbers. Thus, it is not easy to manipulate those floating-point coefficients and frequency-domain watermarking algorithms have some limitations in their applications. In order to overcome this difficulty, we employ an integer transform in this paper. In addition, our proposed algerian can extract the watermark from both the spatial and frequency domains. We embed the watermark into a specific bit-plane of mid-frequency coefficients. This is equivalent to the differential energy watermarking (DEW) in the spatial domain. Our simulation results show that the proposed algorithm is imperceptible, good for the watermark payload, and robustness against various attacks. Moreover, it is more efficient than any other algorithm working in only one domain.

Mobile Watermarking Based on the Distortion Analysis of Display-Capture Image in a Smart Phone (스마트폰에서 디스플레이-캡쳐 영상의 왜곡분석에 기반한 모바일 워터마킹)

  • Bae, Jong-Wook;Jung, Sung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.7
    • /
    • pp.847-858
    • /
    • 2012
  • In this paper, we propose a mobile watermarking based on the distortion analysis of display-capture image in a smart phone. We compose a random sequence by utilizing the property of frequency band in the wavelet domain. Then we calculate the CCS (Coefficients Comparative Sum) using the block wavelet coefficients of selected subbands after the wavelet transformation and the random sequence and repeatedly embed a watermark using an insertion threshold for the watermark robustness. For correcting a distortion caused by the display-capture process, we adopt a frame at the outside of watermarked image, then we can equate a watermark synchronization by detecting the frame. And we can improve frame detection ratio by using an iteratively adaptive threshold. A proposed scheme embedded information of 206 bits into standard digital images and it shows an average about 41.42 dB in PSNR. In watermark extract experiments, a proposed scheme accurately recognizes the frame more than 97% in total captured images. Also in BER (Bit Error Ratio) of captured images, it shows about 3.73%, then it was improved more than 70%, compared with the Pramila's method.

Hierarchical watermarking technique for detecting digital watermarking attacks (디지털 워터마킹 공격 탐지를 위한 계층적 워터마킹 기법)

  • Do-Eun Kim;So-Hyun Park;Il-Gu Lee
    • Annual Conference of KIPS
    • /
    • 2024.05a
    • /
    • pp.283-284
    • /
    • 2024
  • 디지털 워터마킹은 디지털 컨텐츠에 정보를 삽입하는 기술이다. 종래의 디지털 워터마킹 기술은 견고성과 비가시성 사이에 트레이드오프 관계를 가지고, 변형 및 노이즈 공격 등에 취약하다. 본 논문에서는 호스트 이미지의 비가시성을 보장하면서 효율적인 공격 탐지와 소유자 식별이 가능한 워터마킹 기법을 제안한다. 제안한 방식은 주파수 분할 기반의 계층적 워터마킹 및 공격 탐지 시그니처 삽입을 통해 비가시성을 보장하며 용량과 견고성 측면에서 종래의 방법보다 향상된 성능을 보였다. 실험 결과에 따르면 종래의 디지털 워터마크가 무력화되는 왜곡 공격 상황에서 공격 탐지 시그니처 검출이 가능하여 워터마크 공격을 탐지하고 소유자를 식별할 수 있었다.

A Blind Watermarking for 3-D Mesh Sequence Using Temporal Wavelet Transform of Vertex Norms (꼭지점 좌표 벡터 크기값의 시간축 웨이블릿 변환을 이용한 3차원 메쉬 시퀀스의 블라인드 워터마킹)

  • Kim, Min-Su;Cho, Jae-Won;Prost, Remy;Jung, Ho-Youl
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3C
    • /
    • pp.256-268
    • /
    • 2007
  • In this paper, we present a watermarking method for 3-D mesh sequences. The main idea is to transform vertex norm with the identical connectivity index along temporal axis using wavelet transform and modify the distribution of wavelet coefficients in temporally high (or middle) frequency frames according to watermark bit to be embedded. All vertices are divided into groups, namely bin, using the distribution of coefficients in low frequency frames. As the vertices with the identical connectivity index over whole frames belong to one bin, their wavelet coefficients are also assigned into the same bin. Then, the watermark is embedded into the wavelet coefficients of vertex norm. Due to the use of the distribution, our method can retrieve the hidden watermark without any information about original mesh sequences in the process of watermark detection. Through simulations, we show that the proposed is flirty robust against various attacks that are probably concerned in copyright protection of 3-D mesh sequences.