• Title/Summary/Keyword: Removable watermarking

Search Result 6, Processing Time 0.024 seconds

A Robust and Removable Watermarking Scheme Using Singular Value Decomposition

  • Di, Ya-Feng;Lee, Chin-Feng;Wang, Zhi-Hui;Chang, Chin-Chen;Li, Jianjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5268-5285
    • /
    • 2016
  • Digital watermarking techniques are widely applied to protect the integrity and copyright of digital content. In a majority of the literature for watermarking techniques, the watermarked image often causes some distortions after embedding a watermark. For image-quality-concerned users, the distortions from a watermarked image are unacceptable. In this article, we propose a removable watermarking scheme that can restore an original-like image and resist signal-processing attacks to protect the ownership of an image by utilizing the property of singular value decomposition (SVD). The experimental results reveal that the proposed scheme meets the requirements of watermarking robustness, and also reestablishes an image like the original with average PSNR values of 59.07 dB for reconstructed images.

Removable Logo Watermarking Technique (제거 가능한 로고 워터마킹 기법)

  • Cho, Dong-Joon;Choi, Hyuk
    • The KIPS Transactions:PartD
    • /
    • v.15D no.6
    • /
    • pp.857-860
    • /
    • 2008
  • In this paper, we propose a removable logo watermarking technique for copyright protection of digital image. Then, visible logo is inserted into digital image to protect copyright, and the information removed by the logo is embedded by a new quantization watermarking. In a legal usage, the image can be reconstructed without logo after watermarking detection process. Experiment results show that the proposed method maintains high image quality in both watermarked images and reconstructed images, and is practical and effective in protection of image copyright.

Reversible Multipurpose Watermarking Algorithm Using ResNet and Perceptual Hashing

  • Mingfang Jiang;Hengfu Yang
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.756-766
    • /
    • 2023
  • To effectively track the illegal use of digital images and maintain the security of digital image communication on the Internet, this paper proposes a reversible multipurpose image watermarking algorithm based on a deep residual network (ResNet) and perceptual hashing (also called MWR). The algorithm first combines perceptual image hashing to generate a digital fingerprint that depends on the user's identity information and image characteristics. Then it embeds the removable visible watermark and digital fingerprint in two different regions of the orthogonal separation of the image. The embedding strength of the digital fingerprint is computed using ResNet. Because of the embedding of the removable visible watermark, the conflict between the copyright notice and the user's browsing is balanced. Moreover, image authentication and traitor tracking are realized through digital fingerprint insertion. The experiments show that the scheme has good visual transparency and watermark visibility. The use of chaotic mapping in the visible watermark insertion process enhances the security of the multipurpose watermark scheme, and unauthorized users without correct keys cannot effectively remove the visible watermark.

Robust Digital Watermarking to JPEG Compression (JPEG 압축에 견고한 디지털 워터마킹)

  • 이혜주;박지환
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.1
    • /
    • pp.53-62
    • /
    • 2000
  • Digital watermarking has been considered as an important technique to protect the copyright of digital content. It is essential that a watermark embedded in a still or moving image resists against various attacks ranging from compression, filtering to cropping. In particular, as JPEG is a dominant still image compression standard for Internet applications, digital watermarking methods that are robust against the JPEG compression are especially required. Most digital watermarking methods proposed so far work by modulating pixels/coefficients without considering the quality level of JPEG, which renders watermarks readily removable. In this paper, we proposed a new digital watermarking method as follows. For providing the robustness against JPEG, the quality level of JPEG is used as parameter on watermarking so as to compute the loss of image caused by JPEG compression and we compute the difference of an original image resulted from JPEG compression. Also in proposed method, we compute the visual components that are derived from the information of edge within image and consideration of brightness discrimination which is one of human visual system's properties. Thus, we proposed new watermarking scheme that after constructing a watermark by considering the loss of image resulted from JPEG compression and visual components derived from the human visual system, the watermark is embedded into the image.

  • PDF

Removable Logo Technique using Quantization Image Watermarking (양자화 영상 워터마킹을 이용한 제거 가능한 로고 기법)

  • Cho, Dong-Joon;Choi, Hyuk
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.184-186
    • /
    • 2005
  • 디지털 콘텐츠의 무분별한 복제와 유포로 인한 저작권 및 소유권에 대한 침해가 날로 급증하고 있다. 특히, 네트워크의 발달과 디지털 카메라의 손쉬운 이용으로 온라인 상에서 개인의 디지털 영상이 넘쳐나고 있지만 이에 대한 정보 보호 기술은 전무한 상황이다. 본 논문에서는 이와 같은 디지털 영상의 저작권을 보호하기 위한 기술로 양자화 영상 워터마킹을 이용한 제거 가능한 로고 기법을 제안한다. 즉, 디지털 영상에 인지 가능한 로고를 삽입하여 저작권을 보호하며, 로고에 의해 제거된 부분의 정보를 워터마킹으로 영상에 삽입하여 정당한 사용 시에는 로고를 제거하고 원영상을 복원할 수 있다. 제안된 방법을 실제 영상에 적용하여 실험해 본 결과, 워터마크가 삽입된 영상이나 로고에 의해 제거된 부분을 복원한 영상 모두 원영상과 차이를 느낄 수 없는 우수한 화질을 보였으며, 저작권 보호 측면에서도 삽입된 로고에 의한 저작권 인지력이 뛰어나 실용적으로 매우 우수한 방법임을 확인하였다.

  • PDF

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.