• Title/Summary/Keyword: Fragile Watermarking

Search Result 59, Processing Time 0.028 seconds

Block Fragile Watermarking Based on LUT (LUT 기반의 블록 연성 워터마킹)

  • Joo Eun-Kyong;Kang Hyun-Ho;Park Ji-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.9
    • /
    • pp.1294-1303
    • /
    • 2004
  • This paper proposes new block fragile watermarking for image authentication and integrity by using the existing pixel-based scheme and block-based scheme. The proposed scheme is performed as fellows. First, we choose LUT(Look Up Table) from each pixel of original image and information of the corresponding block. Next, we insert a watermark, modifying original image with values to compare binary original image with the watermark to be embedded. As a result, we provide the means to overcome some weakness of the existing scheme. Binary logo as watermark can be detected from watermarked image and altered location can also be detected by the unit of pixel or that of block in our scheme.

  • PDF

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images

  • Zhang, Heng;Wang, Chengyou;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.13 no.2
    • /
    • pp.385-399
    • /
    • 2017
  • Nowadays, with the development of signal processing technique, the protection to the integrity and authenticity of images has become a topic of great concern. A blind image authentication technology with high tamper detection accuracy for different common attacks is urgently needed. In this paper, an improved fragile watermarking method based on local binary pattern (LBP) is presented for blind tamper location in images. In this method, a binary watermark is generated by LBP operator which is often utilized in face identification and texture analysis. In order to guarantee the safety of the proposed algorithm, Arnold transform and logistic map are used to scramble the authentication watermark. Then, the least significant bits (LSBs) of original pixels are substituted by the encrypted watermark. Since the authentication data is constructed from the image itself, no original image is needed in tamper detection. The LBP map of watermarked image is compared to the extracted authentication data to determine whether it is tampered or not. In comparison with other state-of-the-art schemes, various experiments prove that the proposed algorithm achieves better performance in forgery detection and location for baleful attacks.

Fragile Watermarking for Image Tamper-Proofing and Authentication (영상 위.변조 검출과 인증을 위한 Fragile 워터마킹)

  • Kim, Mi-Ae;Song, Geun-Sil;Lee, Won-Hyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1823-1826
    • /
    • 2003
  • 본 논문에서는 디지털 영상의 인증 및 무결성을 위한 Fragile Watermarking 기법을 제안한다. 이 기법은 원 영상과 워터마크 영상을 각각 랜덤하게 섞고, 랜덤수와 LUT를 이용하여 워터마크를 LSB에 삽입하므로 보안성을 갖는다. 또한, 워터마크 삽입 추출과정에서 두 개의 비밀키와 XOR를 이용하여 간단히 처리할 수 있다. 실험을 통하여 영상의 변형 여부 및 조작 위치를 검출하였다.

  • PDF

An Efficient Authentication Scheme based on Fragile Watermarking for H.264/AVC and SVC (H.264/AVC와 SVC를 위한 Fragile watermarking 기반의 효율적인 인증 기법)

  • Park, Su-Wan;Shin, Sang-Uk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1486-1488
    • /
    • 2009
  • 본 논문은 비디오 압축 기술인 H.264/AVC와 H.264/SVC에 적용할 수 있는 인증 목적의 효율적인 프레자일(fragile) 워터마킹 기법을 제안한다. 제안된 워터마킹 기법은 H.264/AVC 비디오 부호화기에서 압축률을 높이기 위해 사용하는 매크로블록(MB) 예측 모드들을 특징 값으로 추출하여 콘텐츠 제공자의 비밀키로 암호화 후 워터마크로 사용하는 인증 기법으로, 이는 공간적, 시간적 그리고 SNR 확장성을 가지는 H.264/SVC에도 확장하여 적용할 수 있다. 워터마크 삽입은 최적의 예측 모드를 찾기 위한 모드 결정과정에서 수행되어 워터마크 후에도 최적화 된 콘텐츠를 얻을 수 있으며, 간단한 연산을 엔코더와 결합시켜 낮은 시간 증가율을 가진다.

An Efficient Watermarking for Tamper Localization Proofing (국부적인 변형 검출을 위한 효율적인 워터마킹)

  • Woo, Chan-Il;Jeon, Se-Gil
    • 전자공학회논문지 IE
    • /
    • v.43 no.2
    • /
    • pp.87-92
    • /
    • 2006
  • Many watermarking methods for protecting the intellectual property right and authentication multimedia data have been proposed in recent years. In image authentication watermarking, watermark is inserted into an image to detect any malicious alteration. So, watermark for authentication and integrity should be erased easily when the image is changed by scaling or cropping etc. We propose in this paper a fragile watermarking algorithm for image integrity verification and tamper localization proofing using special hierarchical structure. In the proposed method, the image to be watermarked is divided into blocks in a multi-level hierarchy and calculating block digital signatures in thus hierarchy. At each level of the hierarchy, a digital signature for each block is calculated using the seven most significant bit(MSBs)-plane values of all pixels within the block. And the resulting signature is incorporated into the LSBs of selected pixels within the block. We provide experimental results to demonstrate the effectiveness of the proposed method.

Fragile Watermarking Scheme Based on Wavelet Edge Features

  • Vaishnavi, D.;Subashini, T.S.
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.5
    • /
    • pp.2149-2154
    • /
    • 2015
  • This paper proposes a novel watermarking method to discover the tampers and localize it in digital image. The image which is to be used to generate a watermark is first wavelet decomposed and the edge feature from the sub bands of high frequency coefficients are retrieved to generate a watermark (Edge Feature Image) and which is to be embed on the cover image. Before embedding the watermark, the pixels of cover image are disordered through the Arnold Transform and this helps to upgrade the security of the watermark. The embedding of generated edge feature image is done only on the Least Significant Bit (LSB) of the cover image. The invisibleness and robustness of the proposed method is computed using Peak-Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) and it proves that the proposed method delivers good results and the proposed method also detects and localizes the tampers efficiently. The invisibleness of proposed method is compared with the existing method and it proves that the proposed method is better.

Watermarking of Compressed Video in the Bitstream Domain: An Efficient Algorithm and its Implementation

  • Drobouchevitvh Inna G.;Lim Sung-Jun;Han Byung-Wan;Chang Hang-Bae;Kim Kyung-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4C
    • /
    • pp.458-471
    • /
    • 2006
  • Digital watermarking of multimedia data is a very active research area that has enjoyed a considerable amount of attention in recent years. In this paper, we propose an algorithm for embedding/detecting a fragile watermark in MPEG-4 compressed video domain (Simple and Advance Simple Profiles). The watermark bits are put directly into Huffman VLC-codespace of quantized DCT domain. The advantage of watermark embedding into the compressed domain is the significant savings for a real-time implementation as it does not require a full decoding operation. The watermark embedding does not change the video file size. The algorithm demonstrates high watermarking capacity, thereby providing reliable foolproof authentication. The results of experimental testing demonstrate that watermark embedding preserves the video quality. Watermark detection is performed without using the original video.

User Key-based Fragile Watermarking for Detecting Image Modification (영상 변형 검출을 위한 사용자 Key기반 Fragile 워터마킹)

  • Im, Jae-Hyeon;Sim, Hyeok-Jae;Jeon, Byeong-U
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.5
    • /
    • pp.474-485
    • /
    • 2001
  • This paper proposes a user-key-based fragile watermarking for detecting image modification. The embedding data in a form of binary image for authentication are inserted to the DCT coefficients of each block of the given image. To minimize possible exposure of being watermarked and the location of insertion, it is proposed to utilize a user-specific key in randomizing those information. Each DCT block hides one bit of data, all of which represent the user-specific authentication data. Experiments with 5 real images demonstrate that the proposed method not only detects whether there is modification or not, but also the actual location of modification with minimal visual deterioration. However, the proposed method has room for improvement against its loss of watermark by an attack of compression by more than 50%.

  • PDF

A Fragile Watermarking based on the Bit Plane of Wavelet Coefficient for Protecting Digital Contents (디지털 컨텐츠 보호를 위한 웨이블릿 계수의 비트 플래인 기반 Fragile 워터마킹)

  • 배재민;이신주;정성환
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.799-801
    • /
    • 2001
  • Wong 은 디지털 영상의 인증과 무결성을 위해 해쉬 함수와 암호화 알고리즘을 공간 영역상에서 적용하였다. 본 논문에서는 웨이블릿 변환 영역 상에서 Wong 의 방법을 토대로 하여 fragile 워터마킹 방법을 제안한다. 즉, 삽입할 워터마크를 LSB 만 아니라 웨이블릿 계수의 비트 플래인을 고정시키지 않고 삽입함으로써, 워터마크의 삽입이 LSB에 고정되는 Wong 방법의 단점을 보완하였다. 실험결과 약간의 변형에도 영상의 변형 유무와 변형된 위치를 확인할 수 있었다.

  • PDF

A Semi-fragile Watermarking Algorithm of 3D Mesh Model for Rapid Prototyping System Application (쾌속조형 시스템의 무결성 인증을 위한 3차원 메쉬 모델의 Semi-fragile 워터마킹)

  • Chi, Ji-Zhe;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.131-142
    • /
    • 2007
  • In this paper, semi-fragile watermarking algorithm was proposed for the application to RP(Rapid Prototyping) system. In the case of the perceptual change or distortion of the original one, the prototype product will be affected from the process because the RP system requires the high precision measure. Therefore, the geometrical transformations like translation, rotation and scaling, the mesh order change and the file format change are used in the RP system because they do not change the basic shapes of the 3D models, but, the decimation and the smoothing are not used because they change the models. The proposed algorithm which is called semi-fragile watermarking is robust against to these kinds of manipulations which preserve the original shapes because it considers the limitations of the RP system, but fragile against to the other manipulations which change the original shapes. This algorithm does not change the model shapes after embedding the watermark information, that is, there is no shape difference between the original model and the watermarked model. so, it will be useful to authenticate the data integrity and hide the information in the field of mechanical engineering which requires the high precision measure.