• Title/Summary/Keyword: 은닉영상

Search Result 286, Processing Time 0.022 seconds

DCT영역에 기반한 반복적 이진위상컴퓨터형성홀로그램을 이용한 디지털 영상 워터마킹 기술

  • Kim, Cheol-Su
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2009.05a
    • /
    • pp.32-36
    • /
    • 2009
  • 본 논문에서는 DCT영역에서 반복적 이진위상컴퓨터형성홀로그램을 이용한 디지털 영상 워터마킹 기술을 제안하였다. 워터마크로 주로 사용되는 랜덤 시퀸스 또는 로고와 같은 은닉영상 대신 은닉영상을 손실없이 재생할 수 있는 이진위상컴퓨터형성홀로그램을 생성하고, 이를 반복적으로 표현해서 워터마크로 사용한다. 그리고 이 워터마크를 호스트영상의 DCT 계수에 적절한 규칙을 통해 가중치를 부여하여 삽입한 후, IDCT한다. 워터마크의 추출은 워터마킹된 영상과 호스트영상을 DCT하고, 삽입시 적용한 규칙을 통해서 수행한다. 그리고 추출된 워터마크의 역푸리에 변환과 호스트영상에 삽입하기전의 워터마크를 역푸리에 변환하여 재생한 은닉영상과의 상관을 취함으로써 워터마크의 존재여부를 검증한다. 제안한 방법은 워터마크 삽입/추출시 반복되는 홀로그램정보를 활용하고, 이진 값으로 구성되어 있으므로 기존의 어떠한 워터마킹 기술보다 외부 공격에 견실한 특징을 가지고 있으며, 컴퓨터 시뮬레이션을 통해 그 성능을 확인하였다.

  • PDF

The Hiding Scheme of Mass Security Messages Using the Difference Value of Image (영상의 차분 값을 이용한 대량의 비밀 메시지 은닉 기법)

  • 박영란;박지환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.171-174
    • /
    • 2004
  • 커버 영상에 비밀 메시지를 은닉하기 위한 효과적인 스테가노그라피 기법을 제안한다. 커버 영상을 겹치지 않게 연속된 3개의 픽셀 단위로 블록을 나누어, 가운데 픽셀을 중심으로 좌·우 픽셀과의 차분을 각각 계산하여 비밀 메시지를 은닉한다 본 논문에서는 영상의 질을 높이면서 대량의 비밀 메시지를 숨길 수 있는 방식을 제안한다. 또한, 비밀 메시지를 은닉시킬 때, 커버 영상의 특성을 고려하여 영상에 적응적으로 데이터를 삽입하였다.

  • PDF

Digital Image Watermarking Technique using Scrambled Binary Phase Computer Generated Hologram in Discrete Cosine Transform Domain (DCT영역에서 스크램블된 이진 위상 컴퓨터형성홀로그램을 이용한 디지털 영상 워터마킹 기술)

  • Kim, Cheol-Su
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.3
    • /
    • pp.403-413
    • /
    • 2011
  • In this paper, we proposed a digital image watermarking technique using scrambled binary phase computer generated hologram in the discrete cosine transform(DCT) domain. For the embedding process of watermark. Using simulated annealing algorithm, we would generate a binary phase computer generated hologram(BPCGH) which can reconstruct hidden image perfectly instead of hidden image and encrypt it through the scramble operation. We multiply the encrypted watermark by the weight function and embed it into the DC coefficients in the DCT domain of host image and an inverse DCT is performed. For the extracting process of watermark, we compare the DC coefficients of watermarked image and original host image in the DCT domain and dividing it by the weight function and decrypt it using descramble operation. And we recover the hidden image by inverse Fourier transforming the decrypted watermark. Finally, we compute the correlation between the original hidden image and recovered hidden image to determine if a watermark exits in the host image. The proposed watermarking technique use the hologram information of hidden image which consist of binary values and scramble encryption technique so it is very secure and robust to the various external attacks such as compression, noises and cropping. We confirmed the advantages of the proposed watermarking technique through the computer simulations.

An Iterative Digital Image Watermarking Technique using Encrypted Binary Phase Computer Generated Hologram in the DCT Domain (DCT 영역에서 암호화된 이진 위상 컴퓨터형성 홀로그램을 이용한 반복적 디지털 영상 워터마킹 기술)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.3
    • /
    • pp.15-21
    • /
    • 2009
  • In this paper, we proposed an iterative digital image watermarking technique using encrypted binary phase computer generated hologram in the discrete cosine transform(OCT) domain. For the embedding process of watermark, using simulated annealing algorithm, we would generate a binary phase computer generated hologram(BPCGH) which can reconstruct hidden image perfectly instead of hidden image and repeat the hologram and encrypt it through the XOR operation with key image that is ramdomly generated binary phase components. We multiply the encrypted watermark by the weight function and embed it into the DC coefficients in the DCT domain of host image and an inverse DCT is performed. For the extracting process of watermark, we compare the DC coefficients of watermarked image and original host image in the DCT domain and dividing it by the weight function and decrypt it using XOR operation with key image. And we recover the hidden image by inverse Fourier transforming the decrypted watermark. Finally, we compute the correlation between the original hidden image and recovered hidden image to determine if a watermark exits in the host image. The proposed watermarking technique use the hologram information of hidden image which consist of binary values and encryption technique so it is very secure and robust to the external attacks such as compression, noises and cropping. We confirmed the advantages of the proposed watermarking technique through the computer simulations.

Error Concealment Technique Using Motion Vectors of Neighboring Block (주변 블록의 움직임 벡터를 이용한 에러 은닉 기법)

  • 김승종;성해경
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.11a
    • /
    • pp.1-5
    • /
    • 2001
  • 네트워크를 통한 영상 데이터 전송 시 에러가 발생하면 복원 영상의 화질 열화는 매우 심각하다. 따라서, 에러 영상을 복원하기 위한 에러 은닉 기술은 복호기 쪽에 매우 중요하다. 본 논문에서는 매크로블록이 움직임 벡터와 함께 손상이 되었을 때 주변 매크로블록의 움직임 벡터를 이용한 빠르고 효율적인 에러 은닉 기법을 제안한다. 실험 결과 에러 은닉 기법을 제안한다. 실험 결과 에러 블록 주변의 경계화소를 이용한 기존의 방법과 비교하여 거의 동등한 복원 화질을 얻으면서도 에러 은닉을 위한 처리 시간을 획기적으로 단축하였다.

  • PDF

Image watermarking technique applying multiple encryption techniques (다중 암호화 기법을 적용한 영상 워터마킹 기법)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.503-510
    • /
    • 2020
  • In this paper, we proposed an effective technique that greatly improves the security of the watermark by concealing the multiple-encrypted watermark in the LSB of the image pixel. Even if multiple encrypted watermark hidden in the LSBs of an image pixel are extracted, it is impossible to decrypt them, so the security of the watermark is maintained very high. If the watermark is multiple encrypted and hidden in the image using the proposed technique, the visual quality of the watermark-hidden image is very high, making it impossible to distinguish between the original image and the resulting image in which the watermark is hidden. The original watermark data can be completely extracted without loss, according to the procedure of the proposed technique, from the resulting image that the watermark is encrypted and hidden in the original image. The performance of the proposed technique was analyzed mathematically and the superiority of the proposed technique was confirmed through experiments. The proposed technique is an excellent image watermarking technique that greatly improves the security of the watermark hidden in the image compared to the existing technique.

Adaptive Image Watermark Embedding Using JND Characteristic within Multiwavelet Transform (멀티웨이브릿 변환 영역에서 JND 특성을 이용한 적응 워터마크 은닉 기술)

  • 강균호;장봉주;조영웅;권성근;문광석;권기룡
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.855-860
    • /
    • 2002
  • 본 논문에서는 화질의 열화를 최소화함과 동시에 강인한 워터마크의 은닉을 위하여 멀티 웨이브릿 변환영역에서 인간 시각 특성(human visual system: HVS)을 고려한 적응 워터마크 은닉 기술을 제안한다. 멀티웨이브릿은 영상을 완전 복원시키는데 탁월한 효과가 있으며 경계영역에서 우수한 성능을 갖는다. 본 논문에서 사용한 멀티웨이브릿 함수는 근사화 차수가 2인 DHGM 멀티웨이브릿을 사용한다. 워터마크는 멀티웨이브릿 분해된 부대역들 중 저주파 영역을 제외한 중간 및 고주파 영역의 웨이브릿 계수 중에 HVS를 이용하여 얻은 문턱값에 의해 선택된 웨이브릿 계수들에만 은닉한다. 워터마크를 은닉하기 위한 지각모델은 영상 압축시 지각적 양자화기에 사용되는 정적 JND(just noticeable difference) 모델을 이용한다. 제안한 은닉모델은 영상의 특성에 따라 은닉하는 워터마크의 수가 각각 달라졌다. 또한, 여러 실험결과 우수한 비가시성과 강인성을 확인하였다.

  • PDF

Stereo 3 mm Millimeter Wave Imaging for Distance Estimation to Concealed Objects (스테레오 3mm 밀리미터파 영상을 이용한 은닉물체의 거리추정에 관한 연구)

  • Yeom, Seokwon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.18 no.1
    • /
    • pp.21-24
    • /
    • 2017
  • Passive millimeter wave (MMW) imaging penetrates clothing to detect concealed objects. The distances extraction to the concealed objects is critical for the security and defense. In this paper, we address a passive stereo 3 mm MMW imaging system to extract the longitudinal distance to the concealed object. The concealed object area is segmented and extracted by the k-means clustering algorithm with splitting initialization. The distance to the concealed object is estimated by the corresponding centers of the segmented objects. In the experimental two pairs (each pair for horizontal and vertical polarization) of stereo MMW images are obtained to estimate distances to concealed objects.

  • PDF

Error Resilient Scheme in Video Data Transmission using Information Hiding (정보은닉을 이용한 동영상 데이터의 전송 오류 보정)

  • Bae, Chang-Seok;Choe, Yoon-Sik
    • The KIPS Transactions:PartB
    • /
    • v.10B no.2
    • /
    • pp.189-196
    • /
    • 2003
  • This paper describes an error resilient video data transmission method using information hiding. In order to localize transmission errors in receiver, video encoder embeds one bit for a macro block during encoding process. Embedded information is detected during decoding process in the receiver, and the transmission errors can be localized by comparing the original embedding data. The localized transmission errors can be easily corrected, thus the degradation in a reconstructed image can be alleviated. Futhermore, the embedded information can be applied to protect intellectual property rights of the video data. Experimental results for 3 QCIF sized video sequenced composed of 150 frames respectively show that, while degradation in video streams in which the information is embedded is negligible, especially in a noisy channel, the average PSNR of reconstructed images can be improved about 5 dB by using embedded information. Also, intellectual property rights information can be effectively obtained from reconstructed images.

An Advanced Color Watermarking Technique using Various Spatial Encryption Techniques (다양한 공간적 암호화 기법을 적용한 개선된 컬러 영상 워터마킹 기법)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.3
    • /
    • pp.262-266
    • /
    • 2020
  • In this paper, we proposed an effective technique for hiding the watermark in the LSB of a color image by applying spatial encryption techniques. Even if the watermark hidden in the LSB of the image is extracted, the information of the extracted watermark cannot be decrypted because the watermark is encrypted using various spatial encryption techniques. Therefore, if the watermark is concealed in the LSB using the spatial encryption techniques proposed in this paper, the security is greatly improved compared to the existing technique of embedding the watermark in the LSB. When watermarking is performed by applying the proposed technique, the image quality of the watermark-concealed image is very good, so it is impossible to distinguish it from the original image, and the watermark, which is confidential data, can be extracted from the watermarked image without loss. The performance of the proposed technique was mathematically analyzed and the superiority of the proposed technique was confirmed through experiments. When the watermark was concealed by applying the proposed technique to Lenna, airplane, Tiffany, and pepper images having a size of 512×512, the PSNR values of the watermarked images were 53.91dB, 54.10dB, 54.09dB, and 54.13dB, respectively.