• Title/Summary/Keyword: 퍼블릭 워터마킹

Search Result 3, Processing Time 0.018 seconds

A Study on the Validity of Image Block in a Public Watermarking (퍼블릭 워터마킹에서 영상 블록의 유효성에 대한 연구)

  • Kim, Hyo Cheol;Kim, Hyeon Cheol;Yu, Gi Yeong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.4
    • /
    • pp.20-20
    • /
    • 2001
  • 본 논문에서는 퍼블릭 워터마킹(public watermarking)에서 영상 블록의 유효성에 기반을 둔 상호연관성(cross-correlation property)과 관련기법을 제안하였다. 이 과정에서 워터마크의 비인식성(imperceptibility)과 깨지기 쉬운 워터마크(fragile watermark)를 보장하기 위하여 DCT(Discrete Cosine Transformation) 도메인의 고주파 영역을 사용하였다. 여러 가지 실험을 통하여 에러가 보정된 원본 영상(original image)들과 워터마크된 이미지(watermarked image)들 사이에 유효한 블록들이 동일함을 확인하였다. 그리고 이러한 상호연관성이 추후의 퍼블릭 워터마킹을 위한 응용들에 적용될 수 있음을 입증하였다.

A Study on the Validity of Image Block in a Public Watermarking (퍼블릭 워터마킹에서 영상 블록의 유효성에 대한 연구)

  • Kim, Hyo-Cheol;Kim, Hyeon-Cheol;Yu, Gi-Yeong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.4
    • /
    • pp.344-352
    • /
    • 2001
  • In this paper, we propose a cross-correlation property and a related technique based on the validity of image block in a public watermarking and we embed messages into the high frequency band in the DCT domain because of its imperceptibility and fragility. As a result, we were able to inspect the identity of valid block between error corrected original images and watermarked images through experiments. And we confirmed the viability of this cross-correlation as an application for future public watermarking.

  • PDF

A New Image Authentication Method through Isolation of Invalid Blocks (무효 블록의 격리를 이용한 새로운 이미지 인증 방법)

  • Kim, Hyo-Chul;Kim, Hyun-Chul;Yoo, Ki-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.17-24
    • /
    • 2002
  • In this paper, we propose a new watermarking method using isolation of invalid blocks for image authentication. We embed messages into the high frequency band in the DCT domain because of its imperceptibility and fragility. And we were able to inspect the identity of valid blocks between error corrected original images and watermarked images through experiments. As a result, we found that the watermarked image is enough to extract binary messages. Therefore, the extra information such as the original image or watermark was not necessary in our extracting process. Experiment results show that the proposed method can be used successfully for image authentication.