• Title/Summary/Keyword: QSWT.

Search Result 3, Processing Time 0.014 seconds

Multi-Watermarking Method for Image Ownership Protection and Tamper Proofing (영상의 소유권 보호와 변질검증을 위한 다중 워터마킹 방식)

  • 김창훈;박경준;고형화
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8C
    • /
    • pp.811-820
    • /
    • 2003
  • In this paper, multi-watermarking algorithm is proposed to satisfy two purpose of ownership protection and tamper proofing simultaneously. At first, for robust watermarking, the location of the embedding wavelet coefficient is selected by using existing QSWT algorithm. And then, we propose the method inserting discrete cosine transformed watermark. The watermarked image is watermarked again for the tamper proofing. The tamper proofing algorithm is also proposed. According to the experimental results, the proposed multi-watermarking algorithm is robust to the attack, such as blurring, sharpening, JPEG compression. And also, the tampered area are detected in blocks, making it simple to judge which pixels are changed.

Invisible Watermarking Algorithm based on Zerotree Structure (제로트리 구조를 이용한 비가시적인 워티마킹 알고리즘)

  • 박병선;유지상
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.97-100
    • /
    • 2002
  • In this paper, we propose a watermarking technique that embeds a digital watermark into digital images for the proof of owner or copyright protection. Proposed algorithm is based on discrete wavelet transform. Zerotree structure defined by Shapiro's embedded zerotree wavelet(EZW) algorithm is used. In the proposed algorithm, a digital watermark is embedded on only significant wavelet coefficients chosen by QSWT for the robustness of the algorithm. In other words, only the values of significant wavelet coefficients are modified in accordance with the given watermark pattern. We use the relationship among neighboring coefficients when modifying chosen coefficients to keep good image quality. Visual recognizable patterns such as binary images are used as a watermark. The experimental results show that the proposed algorithm has robustness under a variety of attacks such as JPEG compression, sharpening and blurring and also show that it has a better performance in PSNR comparing with other algorithms.

  • PDF

Real-time Watermarking Algorithm using Multiresolution Statistics for DWT Image Compressor (DWT기반 영상 압축기의 다해상도의 통계적 특성을 이용한 실시간 워터마킹 알고리즘)

  • 최순영;서영호;유지상;김대경;김동욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.33-43
    • /
    • 2003
  • In this paper, we proposed a real-time watermarking algorithm to be combined and to work with a DWT(Discrete Wavelet Transform)-based image compressor. To reduce the amount of computation in selecting the watermarking positions, the proposed algorithm uses a pre-established look-up table for critical values, which was established statistically by computing the correlation according to the energy values of the corresponding wavelet coefficients. That is, watermark is embedded into the coefficients whose values are greater than the critical value in the look-up table which is searched on the basis of the energy values of the corresponding level-1 subband coefficients. Therefore, the proposed algorithm can operate in a real-time because the watermarking process operates in parallel with the compression procession without affecting the operation of the image compression. Also it improved the property of losing the watermark and the efficiency of image compression by watermark inserting, which results from the quantization and Huffman-Coding during the image compression. Visual recognizable patterns such as binary image were used as a watermark The experimental results showed that the proposed algorithm satisfied the properties of robustness and imperceptibility that are the major conditions of watermarking.