• Title/Summary/Keyword: Imperceptibility

Search Result 58, Processing Time 0.023 seconds

A Watermarking for Text Document Images using Edge Direction Histograms (에지 방향 히스토그램을 이용한 텍스트 문서 영상의 워터마킹)

  • 김영원;오일석
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.2
    • /
    • pp.203-212
    • /
    • 2004
  • The watermarking is a method to achieve the copyright protection of multimedia contents. Among several media, the left documents show very peculiar properties: block/line/word patterning, clear separation between foreground and background areas. So algorithms specific to the text documents are required that meet those properties. This paper proposes a novel watermarking algorithm for the grayscale text document images. The algorithm inserts the watermark signals through the edge direction histograms. A concept of sub-image consistency is developed that the sub-images have similar shapes in terms of edge direction histograms. Using Korean, Chinese, and English document images, the concept is evaluated and proven to be valid over a wide range of document images. To insert watermark signals, the edge direction histogram is modified slightly. The experiments were performed on various document images and the algorithm was evaluated in terms of imperceptibility and robustness.

Robust Digital Image Watermarking Algorithm Using RBF Neural Networks in DWT domain

  • Piao, Cheng-Ri;Guan, Qiang;Choi, Jun-Rim;Han, Seung-Soo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.2
    • /
    • pp.143-147
    • /
    • 2007
  • This paper proposes a new watermarking scheme in which a logo watermark is embedded into the discrete wavelet transform (DWT) domain of the original image using exact radial basis function neural networks (RBF). RBF will learn the characteristics of the image, and then watermark is embedded and extracted by the trained RBF. A watermark is added to the coefficients at the low frequency band of the DWT of an image and a watermark is embedded into the DWT domain using the trained RBF. The trained RBF also used in watermark extracting process. Experimental results show that the proposed method has good imperceptibility and high robustness to common image processing attacks.

Cellular Automata Transform based Invisible Digital Watermarking in Middle Domain for Gray Images

  • Li, Xiao-Wei;Kim, Seok-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.689-694
    • /
    • 2011
  • Cellular automata are discrete dynamical systems, which provide the basis for the synthesis of complex emergent behavior. This paper proposes a new algorithm of digital watermarking based on cellular automata transform (CAT). The idea of two-dimensional CAT is introduced into the algorithm. After the original image is disassembled with 2D CAT, the watermark information is embedded into the Middle-frequency of the carrier picture. Cellular automata have a huge number of combinations, such as gateway values, rule numbers, initial configuration, boundary condition, etc. Using CAT, the robustness of the watermark will be tremendous strengthened as well as its imperceptibility. Experimental results show that this algorithm can resist some usual attacks such as compression, sharpening and so on. The proposed method is robust to different attacks and is more security.

Adaptive Blind Watermarking Algorithm Using Biased-Shift of Quantization Coefficient

  • Seo Young Ho;Cho Hyun Jun;Kim Dong Wook
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.832-835
    • /
    • 2004
  • In this paper, we proposed a blind watermarking algorithm to use characteristics of a scalar quantizer which is similar with the recommended in the JPEG2000 and JPEG. This algorithm shifts a quantization index according to the value of each watermark bit to prevent losing the watermark information during the compression by quantization. Therefore, the watermark is embedded during the process of quantization, not an additional process for watermarking, and adaptively applied as an assigned quantizer according to application area. In the embedding process, a LFSR(Linear feedback shift register) is used to hide the watermarking positions. Therefore the embedded watermark can be extracted by only the owner who knows the initial value of LFSR without the original image. The experimental results showed that the proposed algorithm satisfies the robustness and imperceptibility corresponding to the major requirement of watermarking.

  • PDF

Construction of Watermarking Region Using Feature of Adjacent Frames and Video Watermarking (인접 프레임의 특징을 이용한 워터마팅 영역의 구성 및 비디오 워터마킹)

  • 이혜주;홍진우
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.11b
    • /
    • pp.291-294
    • /
    • 2002
  • 강인성을 포함한 비인지성(imperceptibility)과 계산량(complexity)은 비디오 워터마킹 시스템에 있어서 중요한 항목으로, 이러한 항목은 워터마킹 시스템의 설계시 고려하여야 한다. 본 논문에서는 적절한 비인지성과 계산량을 제공하기 위해 3개의 연속된 프레임을 이용하는 비디오 워터마킹 시스템을 제안한다. 특히, 워터마크를 삽입할 영역 R을 3개의 프레임 f(t), f(t+1), f(t+2)로부터 구성하고, 워터마크를 구성된 영역 R의 DCT 계수들에 삽입한다. 제안 방식은 프레임 간의 특징을 이용 워터마킹 삽입 영역 R을 구성함으로써, 좋은 화질을 제공함과 동시에 MPEG-2 압축 및 프레임 공격에 대한 강인성을 제공함을 실험에 의해 확인한다.

  • PDF

A Study on the Validity of Image Block in a Public Watermarking (퍼블릭 워터마킹에서 영상 블록의 유효성에 대한 연구)

  • Kim, Hyo Cheol;Kim, Hyeon Cheol;Yu, Gi Yeong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.4
    • /
    • pp.20-20
    • /
    • 2001
  • 본 논문에서는 퍼블릭 워터마킹(public watermarking)에서 영상 블록의 유효성에 기반을 둔 상호연관성(cross-correlation property)과 관련기법을 제안하였다. 이 과정에서 워터마크의 비인식성(imperceptibility)과 깨지기 쉬운 워터마크(fragile watermark)를 보장하기 위하여 DCT(Discrete Cosine Transformation) 도메인의 고주파 영역을 사용하였다. 여러 가지 실험을 통하여 에러가 보정된 원본 영상(original image)들과 워터마크된 이미지(watermarked image)들 사이에 유효한 블록들이 동일함을 확인하였다. 그리고 이러한 상호연관성이 추후의 퍼블릭 워터마킹을 위한 응용들에 적용될 수 있음을 입증하였다.

Robust Watermarking toward Compression Attack in Color Image (압축공격에 강인한 칼라영상의 워터마킹)

  • Kim Yoon-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.3
    • /
    • pp.616-621
    • /
    • 2005
  • In this paper. digital watermarking algorithm based on human visual system and transform domain is presented. Firstly, original image is separated into RGB thannels, watermark is embedded into the coefficients of DCT so as to consider a contrast sensitivity and texture degrees. In preprocessing, DCT domain based transform is involved and binary image of visually recognizable patterns is utilized as a watermark. Consequently, experimental results showed that proposed algorithm is robust and imperceptibility such destruction attack as JPEG compression.

A Low Frequency Band Watermarking with Weighted Correction in the Combined Cosine and Wavelet Transform Domain

  • Deb, Kaushik;Al-Seraj, Md. Sajib;Chong, Ui-Pil
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.14 no.1
    • /
    • pp.13-20
    • /
    • 2013
  • A combined DWT and DCT based watermarking technique of low frequency watermarking with weighted correction is proposed. The DWT has excellent spatial localization, frequency spread and multi-resolution characteristics, which are similar to the theoretical models of the human visual system (HVS). The DCT based watermarking techniques offer compression while DWT based watermarking techniques offer scalability. These desirable properties are used in this combined watermarking technique. In the proposed method watermark bits are embedded in the low frequency band of each DCT block of selected DWT sub-band. The weighted correction is also used to improve the imperceptibility. The extracting procedure reverses the embedding operations without the reference of the original image. Compared with the similar approach by DCT based approach and DWT based approach, the experimental results show that the proposed algorithm apparently preserves superiori mage quality and robustness under various attacks such as JPEG compression, cropping, sharping, contrast adjustments and so on.

A Property Analysis of Parameters for Effective Watermarking based on Human Visual System (HVS 기반 효과적인 워터마킹을 위한 파라미터 성능분석)

  • Park Ki-Hong;Yoon Byung-Min;Kim YoonHo
    • Journal of Digital Contents Society
    • /
    • v.6 no.2
    • /
    • pp.119-123
    • /
    • 2005
  • We proposed a method of effective watermarking based m HVS. To speak generally, HVS parameters are contrast sensitivity, texture degree, entropy sensitivity and standard of deviation, etc. The aim of this paper is evaluated by the experiments of imperceptibility and correctness of watermark. According to some experimental results, contrast sensitivity function is superior in smooth image. On the other hand, standard of deviation provides good results in rough images. Consequently, how to select the parameters considering image attribute is key problem in effective watermarking.

  • PDF

High Embedding Capacity and Robust Audio Watermarking for Secure Transmission Using Tamper Detection

  • Kaur, Arashdeep;Dutta, Malay Kishore
    • ETRI Journal
    • /
    • v.40 no.1
    • /
    • pp.133-145
    • /
    • 2018
  • Robustness, payload, and imperceptibility of audio watermarking algorithms are contradictory design issues with high-level security of the watermark. In this study, the major issue in achieving high payload along with adequate robustness against challenging signal-processing attacks is addressed. Moreover, a security code has been strategically used for secure transmission of data, providing tamper detection at the receiver end. The high watermark payload in this work has been achieved by using the complementary features of third-level detailed coefficients of discrete wavelet transform where the human auditory system is not sensitive to alterations in the audio signal. To counter the watermark loss under challenging attacks at high payload, Daubechies wavelets that have an orthogonal property and provide smoother frequencies have been used, which can protect the data from loss under signal-processing attacks. Experimental results indicate that the proposed algorithm has demonstrated adequate robustness against signal processing attacks at 4,884.1 bps. Among the evaluators, 87% have rated the proposed algorithm to be remarkable in terms of transparency.