• Title/Summary/Keyword: 이미지 워터마킹

Search Result 155, Processing Time 0.025 seconds

RST Invariant Image Watermarking

  • 이정수;이한호;장재영;김종원
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.440-442
    • /
    • 2003
  • 본 논문에서는 기하학적인 변형에 강인하고 멀티비트 정보를 삽입할 수 있는 이미지 워터마킹 방법을 제안한다. 멀티비트 정보를 삽입하기 위해 이미지와 Base watermark와의 상관 특성을 나타내는 피크의 위치정보를 이용한다, 기하학적인 변형에 대비하기 위해서는 RS 정보를 따로 삽입하게 되는데, 워터마크 이미지로부터 이 RS정보를 추출함으로써 변형 정보를 뽑아낼 수 있게 된다. 제안된 방법의 성능을 테스트 하기 위해 다양한 기하학적인 변형을 이미지에 가한 후, 또한 삽입한 멀티비트 정보를 삽입하고 뽑아내는 데 효율적인 방법임을 알 수 있다.

  • PDF

Digital watermarking algorithm for authentication and detection of manipulated positions in MPEG-2 bit-stream (MPEG-2비트열에서의 인증 및 조작위치 검출을 위한 디지털 워터마킹 기법)

  • 박재연;임재혁;원치선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.378-387
    • /
    • 2003
  • Digital watermarking is the technique that embeds invisible signalsincluding owner identification information, specific code, or pattern into multimedia data such as image, video and audio. Watermarking techniques can be classified into two groups; robust watermarking and fragile(semi-fragile) watermarking. The main purpose of the robust watermarking is the protection of copyright, whereas fragile(semi-fragile) watermarking prevents image or video data from illegal modifications. To achieve this goal watermark should survive from unintentional modifications such as random noise or compression, but it should be fragile for malicious manipulations. In this paper, an invertible semi-fragile watermarkingalgorithm for authentication and detection of manipulated location in MPEG-2 bit-stream is proposed. The proposed algorithm embeds two kinds of watermarks, which are embedded into quantized DCT coefficients. So it can be applied directly to the compressed bit-stream. The first watermark is used for authentication of video data. The second one is used for detection of malicious manipulations. It can distinguish transcodingin bit-stream domain from malicious manipulation and detect the block-wise locations of manipulations in video data. Also, since the proposed algorithm has an invertible property, recovering original video data is possible if the watermarked video is authentic.

Digital Image Fingerprinting Technique Against JFEG Compression and Collusion Attack (JPEG 압축 및 공모공격에 강인한 디지털 이미지 핑거프린팅 기술)

  • Kim, Kwang-Il;Kim, Jong-Weon;Choi, Jong-Uk
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.313-316
    • /
    • 2006
  • 디지털 핑거프린팅(Digital Fingerprinting)은 기 밀 정보를 디지털 콘텐츠에 삽입하는 측면에서는 디지털 워터마킹과 동일 하다고 볼 수 있으나 저작권자나 판매자의 정보가 아닌 콘텐츠를 구매한 사용자의 정보를 삽입함으로써 콘텐츠 불법 배포자를 추적할 수 있도록 한다는 점에서 워터마킹과 차별화된 기술이다. 이러한 핑거프린팅 기술은 소유권에 대한 인증뿐만 아니라 개인 식별 기능까지 제공해야 하므로 기존의 워터마킹이 갖추어야 할 요구사항인 비가시성, 견고성, 유일성과 더불어 공모허용, 비대칭성, 익명성, 조건부 추적성 등이 부가적으로 필요하다. 본 논문에서는 행렬의 한 열을 선택 후 쉬프팅 기법을 사용 하서 사용자 정보로 조합하여 핑거프린트를 생성하였다. 이렇게 생성된 핑거프린트 정보를 2레벨 웨이블릿 변환 영역 중 LH2, HL2, HH2 부대역에 삽입하였다. 쉬프팅 정보와 도메인 개념을 사용하여 보다 많은 사용자에게 핑거프린트 정보를 삽입할 수 있으며, 공모공격과 JPEG 압축에서도 최소한 1명 이상의 공모자를 검출할 수 있는 핑거프린팅의 기본 조건을 만족하였다.

  • PDF

Copyright Protection of Application Softwares using Digital Watermarking (디지털워터마킹 기법을 이용한 응용프로그램 저작권보호)

  • Song, Jang-Ho;Kim, Young-Jin;Lee, Won-Don
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11a
    • /
    • pp.19-22
    • /
    • 2002
  • 워터마킹(watermarking) 기술은 판매하거나 배포할 자료들 중, 특히 이미지, 오디오, 텍스트, 비디오 및 멀티미디어 데이터 등에 원래의 소유주를 표시할 수 있는 특정 데이터, 즉 워터마크를 넣어 소유주를 확인할 수 있게 하는 저작권 보호(copyright protection)기법으로 근래에 들어 그 필요성이 크게 대두되고 있는 기술이다. 본 논문에서는 wave format 파일을 읽어들여 음향에 효과를 주는 응용프로그램의 불법사용을 막는 데에 대한 저작권 보호를 연구 기술하였다. 원본 없이 추출 가능한 디지털 워터마킹 기법[1]을 음악파일에 삽입하고 응용프로그램이 그것을 추출하여 편집저장할 여부를 결정하도록 하는 방법에 주요 관점을 두고 실험 및 구현을 하였다.

  • PDF

CNN-based watermarking processor design optimization method (CNN기반의 워터마킹 프로세서 설계 최적화 방법)

  • Kang, Ji-Won;Lee, Jae-Eun;Seo, Young-Ho;Kim, Dong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.644-645
    • /
    • 2021
  • In this paper, we propose a hardware structure of a watermarking processor based on deep learning technology to protect the intellectual property rights of ultra-high resolution digital images and videos. We propose an optimization methodology to implement a deep learning-based watermarking algorithm in hardware.

  • PDF

Wavelet Watermarking of Digital Image Date (디지털 이미지 데이터의 웨이브릿 워터마킹)

  • Lee Jeong-Gi;Hue Jin;Lee Gwang;Lee Ho-Yeong;Lee Joon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.490-494
    • /
    • 2005
  • Multispectral image is wavelet trans formed and classified into one of three classes considering reference characteristics of the subband with the lowest resolution. Recently, aegis of authentitation and creator's copyright has become a matter of great concern by the diffusion of multimedia technique and the growth of the internet and the easily duplicated property of digital data. Consequently, many active researches have been made to protect copyright and to assure integrity by inserting watermark into the digital data. In this paper, watermark is repeated through the entire image and adapted to the content of the image.

  • PDF

Watermarking technique and algorithm review of digital data for GIS

  • Kim Jung-Yeop;Hong Sung-Eon;Lee Yong-Ik;Park Soo-Hong
    • Spatial Information Research
    • /
    • v.13 no.4 s.35
    • /
    • pp.393-400
    • /
    • 2005
  • Due to the development of the network and Internet, it is easy to copy and spread digital data. These data has the advantage of being able to be copy without loss. However, this has generated a problem over copyright. The problem occurred in GIS, too. Although GIS data acquisition is the major cost there is insufficient effort made to protect copyright. For this reason watermarking could be a good method to guarantee owner's copyright. This paper will explain watermarking, and show an overview of watermarking studies connecting image and vector data.

  • PDF

Nonvisibility and robustness evaluation of image watermarking mixed Key and Logo method (키와 로고 방식을 혼합한 이미지 워터마킹의 비가시성과 강인성 평가)

  • Park, Young;Song, Hag-Hyun;Choi, Se-Ha;Lee, Myong-Kil;Kim, Yoon-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.3
    • /
    • pp.464-469
    • /
    • 2002
  • In this research, nonvisibility and robustness of image watermarking mixed Key and Logo method were evaluated. The role of the Key was performed by a personal ID of a copyrighter and the logo images were used as the watermark. The standard image of Lena was used for experimental image and binary images of `Park'with size 32${\times}$32 and 64${\times}$64 were used for the watermark, respectively In order to evaluate nonvisibility of the proposed watermarking scheme, PSNR(Peak Signal to Noise Ratio) of the watermarked image was obtained and for robustness reconstructive rates of the reconstructed watermark were obtained from the watermarked image with image transformation of JPEG lossy compression. The experimental results show that nonvisibility is excellent as PSNR of the watermarked image is 93.75dB and the reconstructive rates of the case of 322${\times}$32 watermark was better than the case of the 64${\times}$64 watermark; average 5.9%, 13.9%, 6.5%, and 4.2% in the case of scale-down rates, rotational rates, impulse noise power density, and JPEG lossy compression rates, respectively.

DWT Based Watermarking for Authentication and Detection of Image Modification (이미지 인증 및 변형 검출을 위한 DWT기반 워터마킹)

  • Jang Ho-Hyun;Kang Tae-Hwan;Kim Dong-Seo;Joo Nak-Keun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.181-185
    • /
    • 2005
  • In this paper, the DWT(Discrete Wavelet Transform) based watermarking method for authentication and detection of image modification was proposed. The proposed algorithm inserts watermark into high frequency domain after 1-level wavelet transform by exchanging wavelet coefficients and embeds the characteristic values of high frequency domain of original image into the LSB part of watermarked image. Therefore, By extracting LSB values and watermark in the high frequency domain from the watermarked image, we can authenticate the image and detect modified positions.

  • PDF

An Efficient Watermarking for Tamper Localization Proofing (국부적인 변형 검출을 위한 효율적인 워터마킹)

  • Woo, Chan-Il;Jeon, Se-Gil
    • 전자공학회논문지 IE
    • /
    • v.43 no.2
    • /
    • pp.87-92
    • /
    • 2006
  • Many watermarking methods for protecting the intellectual property right and authentication multimedia data have been proposed in recent years. In image authentication watermarking, watermark is inserted into an image to detect any malicious alteration. So, watermark for authentication and integrity should be erased easily when the image is changed by scaling or cropping etc. We propose in this paper a fragile watermarking algorithm for image integrity verification and tamper localization proofing using special hierarchical structure. In the proposed method, the image to be watermarked is divided into blocks in a multi-level hierarchy and calculating block digital signatures in thus hierarchy. At each level of the hierarchy, a digital signature for each block is calculated using the seven most significant bit(MSBs)-plane values of all pixels within the block. And the resulting signature is incorporated into the LSBs of selected pixels within the block. We provide experimental results to demonstrate the effectiveness of the proposed method.