• Title/Summary/Keyword: 워터마킹기법

Search Result 427, Processing Time 0.026 seconds

An Authentication Technique by Data Hiding Using Watermarking Technique (워터마킹 기법을 이용한 데이터의 은닉에 의한 인증 기법)

  • Kang, Seok;Aoki, Yoshinao;Kim, Yong-Gi
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.787-789
    • /
    • 2003
  • 네트워크 상에서 특정의 시스템 또는 컴퓨터에 접속하려고 하는 사람이 정당한 사용자인지를 판단, 그 결과에 근거하여 접근을 제어하는 일련의 프로그램 또는 하드웨어 장치들을 인증 시스템이라 하며, 최근에 들어 정보보호 측면에 있어서 그 중요성이 커지고 있다. 본 논문에서는 인증 데이터를 암호화 또는 부호화 시켜서 전송하는 종래의 인증 알고리즘과는 달리, 인증 데이터를 이미지와 같은 제3의 미디어에 은닉시켜서 전송함으로써 인증을 실시하는 새로운 인증 기법을 제안함과 아울러 시뮬레이션 결과를 제시함으로써 제안된 방법의 유효성을 나타내고 있다.

  • PDF

DCT Based Watermarking Technique Using Region of Interest (관심영역을 이용한 DCT기반 워터마킹 기법)

  • Shin, Jae-Wook;Jeong, Dong-Seok
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.37 no.1
    • /
    • pp.16-26
    • /
    • 2000
  • The proposed method inserts a watermark information not mto a whole Image region but only into regions of interest(ROIs) To extract the ROIs, we divide an original Image into sub-blocks and use modified Shi-Kuo Chang's PIM(picture information measure) as the criteria to select the ROIs Considering the directional information and frequency bands, we insert the watermark information into sub-blocks m the DCT domain. The proposed method can reduce the distortion in comparison With the other methods which utilize the whole Image as an nor The proposed method makes much less damaged Images m comparison to the other methods And those Images processed by the proposed algorithm are more robust to the changes caused by signal processing operations such as resampling, clipping. noise, and so on Also due to the block-based watermark insertion, the proposed method has the robustness to the Image compression processes such as JPEG and MPEG.

  • PDF

A Study on Wavelet Based Watermarking using Human visual system property (HVS 특성을 이용한 Wavelet 변환 공간에서의 효과적인 워터마킹 기법에 관한 연구)

  • 노상윤;박상주
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4A
    • /
    • pp.336-344
    • /
    • 2002
  • Recently, aegis of authentication and creator's copyright has become a matter of great concern by the diffusion of multimedia technique and the growth of the internet and the easily duplicated property of digital data. Consequently, many active researches have been made to protect copyright and to assure integrity by inserting watermark into the digital data. In this paper, watermark is repeated through the entire image and adapted to the content of the image. It is achieved by an underlying process of transforming the digital image to the frequency domain by wavelet transform, which has three (vertical, horizontal, diagonal) directions and Multi-resolution features, and then choosing frequency area inferior to the human perceptibility, and significant for invisible and robust watermark. Watermark is inserted by utilizing Human Visual System (HVS) feature in the wavelet transformed frequency domain. Especially, watermark inserted into the high frequency concentrated textual area makes itself invisible.

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

A Study of Spreading code for Watermarking of TxID of ATSC-DTV (ATSC-DTV의 송신기 식별을 위한 워터마킹용 확산코드에 관한 연구)

  • Cha, Jae-Sang;Choi, Sung-Jin;Lee, Seon-Hee;Lee, Kwang-Jik;Kim, Seung-Won
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2005.11a
    • /
    • pp.105-108
    • /
    • 2005
  • 본 논문에서는 지상파 디지털 방송시스템의 단일 주파수망 (SFN; Single Frequency Network) 구성을 위해 DTV (Digital Television) TxID (Transmitter Identification)용 저간섭 ZCD (Zero Correlation Duration) 확산코드를 제시하였다. ZCD 확산코드는 코드발생기의 구현이 용이함과 동시에 ZCD특성을 가짐으로 인해서, TxID에서 발생되는 인접코드 간섭 (ICI; Inter Code Interference) 및 다중경로 간섭 (MPI; Multi-Path Interference) 문제를 확산코딩기법을 이용하여 근원적으로 해결해주는 역할을 하고 있으며, 주기를 가변적으로 조절할 수 있어 TxID를 위한 워터마킹 (Watermarking)시에 발생하는 Truncated error를 제거할 수 있다. 본 논문에서는 AWGN (Additive White Gaussian Noise) 잡음 및 ICI, MPI와 같은 다양한 간섭환경을 모의실험에 반영하여 도출된 DER (Detection Error Rate)특성을 분석함으로써, TxID용 저간섭 ZCD 확산코드의 유용성을 입증하였다.

  • PDF

Channel Capacity Analysis of SSW Technique in Wireless Channels for ITS System (ITS 시스템을 위한 무선 채널에서의 SSW 기법의 채널용량 분석)

  • Kim, Joo-Chan;Bae, Jung-Nam;Kim, Jin-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.2
    • /
    • pp.68-74
    • /
    • 2010
  • In this paper, we analyze and simulate the channel capacity of a spread spectrum watermarking (SSW) technique in wireless fading channel to apply ITS system. Channel capacity analysis causing minimum effect to existing system is required necessary to apply SSW technique. We derive the channel capacity as a closed-form approximation formula in Rayleigh and Rician fading channel model. The numerical results are demonstrated and good approximated results are reported.

Watermark Authentication Cryptography for Medical Image Security (의료영상 보안을 위한 워터마크 인증 암호화 기법)

  • Cho, Young-bok;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.759-766
    • /
    • 2017
  • In this paper, we preserve the transparency of digital contents by compressing and storing the medical image for a certain period so as to be safe and robust against various attacks of medical images. The proposed algorithm generates an encrypted image authentication code that extracts the feature value of the original image and combines it with the user's information. in order to extract hidden data, the authentication code is first decrypts the encrypted medical image and extracts the hidden data using the spatial characteristics of image. The proposed algorithm guarantees integrity when comparing extracted authentication code and newly generated authentication code for image authentication after directly inserting it into content itself through watermarking. We have proved various security of attack of image data and proved that the certification rate is improved to 98.4%.

A Robust Watermarking Technique Using Affine Transform and Cross-Reference Points (어파인 변형과 교차참조점을 이용한 강인한 워터마킹 기법)

  • Lee, Hang-Chan
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.3
    • /
    • pp.615-622
    • /
    • 2007
  • In general, Harris detector is commonly used for finding salient points in watermarking systems using feature points. Harris detector is a kind of combined comer and edge detector which is based on neighboring image data distribution, therefore it has some limitation to find accurate salient points after watermark embedding or any kinds of digital attacks. In this paper, we have used cross reference points which use not data distribution but geometrical structure of a normalized image in order to avoid pointing error caused by the distortion of image data. After normalization, we find cross reference points and take inverse normalization of these points. Next, we construct a group of triangles using tessellation with inversely normalized cross reference points. The watermarks are affine transformed and transformed-watermarks are embedded into not normalized image but original one. Only locations of watermarks are determined on the normalized image. Therefore, we can reduce data loss of watermark which is caused by inverse normalization. As a result, we can detect watermarks with high correlation after several digital attacks.

A Watermarking Technique Using Means and Differences of Neighboring Wavelet Transform Coefficient Pairs (이웃한 웨이브릿 변환 계수 쌍의 평균과 차이를 이용한 워터마킹 기법)

  • Kim, Hyeon-Sun;Bae, Seong-Ho;Park, Gil-Heum
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1980-1987
    • /
    • 2000
  • In this paper, an efficient watermarking technique in wavelet transform domain is proposed. Watermarking is embedding a digital signal called as 'watermark' into images to claim the ownership. In the proposed method, the image is 1-level wavelet transformed, and then the watermark with a binary stamp is embedded into the baseband. The watermark is embedded by inverting the polarities of he selected coefficient paris. In the inverting process, we can increase image quality by finding means and differences of the selected neighboring coefficient paris, and then adding values, which are inversely proportional to the differences, to th means. The experimental results show that the proposed method has good quality and is robust to various attacks such as the JPEG lossy comparison, noise addition, clipping, blurring, etc.

  • PDF

Secure Contents Distribution Scheme Using Steganographic Technique and Its Applications (심층암호 기술을 이용한 안전한 콘텐츠 유통과 응용)

  • 이형우;한군희;전병민
    • The Journal of the Korea Contents Association
    • /
    • v.1 no.1
    • /
    • pp.83-92
    • /
    • 2001
  • In this study, we combine information hiding technique with digital contents protection scheme. For providing secure distribution on digital contents, a new paradigm can be proposed after considering both watermarking and fingerprinting techniques. In detail, publicly verifiable digital signature schemes are applied into digital contents. On signing digital copyrights, we can publicly verify its correctness if needed.

  • PDF