• Title/Summary/Keyword: S마크

Search Result 537, Processing Time 0.022 seconds

Digital Watermarking based on Wavelet Transform and Singular Value Decomposition(SVD) (웨이블릿 변환과 특이치 분해에 기반한 디지털 워터마킹)

  • 김철기;차의영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6A
    • /
    • pp.602-609
    • /
    • 2002
  • In this paper, we propose an robust invisible watermarking method using wavelet transform and singular value decomposition for the ownership protection. of images. For this method, after we decompose the original image in three level using wavelet transform, we use singular value decomposition based key depended watermark insertion method in the lowest band $LL_3.$ And we also watermark using DCT for extraction of watermark and verification of robustness. In the experiments, we found that it had a good quality and robustness in attack such as compression, image processing, geometric transformation and noises. Especially, we know that this method have very high extraction ratio against nose and JPEG compression. And Digimarc's method can not extract watermark in 80 percent compression ratio of JPEG, but the proposed method can extract well.

A Digital Image Watermarking Using A Bottom-up Attention Module (상향식 주의 모듈을 사용한 디지털 워터마킹 기법)

  • Cheoi, Kyung-Joo
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.293-300
    • /
    • 2008
  • This paper takes a bottom-up attention module into consideration for digital image watermarking. A bottom-up attention module is employed to obtain the region of interest, and watermark information is embedded into the obtained region. Previous studies in digital image watermarking have been focused on the signal processing techniques, especially in waveform coding spreading watermarks over the entire target image. However, we notice that the third party's visual attention is usually concentrated on a few regions in an image but not on all of them. These regions are easy to be the target of attacks. If watermark information is inserted into these regions from the beginning, it can be detected with high correlation. Various kinds of images are tested, and the results showed good quality.

Active Video Watermarking Technique for Infectious Information Hiding System (전염성 정보은닉 시스템을 위한 능동형 비디오 워터마킹 기법)

  • Jang, Bong-Joo;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1017-1030
    • /
    • 2012
  • Most watermarking schemes for video contents protection have been studied to increase watermark's robustness and invisibility against such compressions and many kinds of signal processing after embedding copyright information to the original contents. This paper proposes an active watermarking that infect watermark to contents in the video decoding process using embedded infectious watermark and control signals from a video encoder side. To achieve this algorithm, we design a kernel based watermarking in video encoder side that is possible to recover the original contents and watermark in watermark detection procedure perfectly. And then, by reversible de-watermarking in video decoder side, we design the active watermark infection method using detected watermark and control signal. This means that our system can provide secure re-distributions of video contents without any quality degration and watermark bit error against transcoding or re-encoding processing. By experimental results, we confirmed that the embedded watermark was infected by video contents and codec perfectly without any declines of compression ratio and video quality.

Reversible Watermarking based Video Contents Management and Control technique using Biological Organism Model (생물학적 유기체 모델을 이용한 가역 워터마킹 기반 비디오 콘텐츠 관리 및 제어 기법)

  • Jang, Bong-Joo;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.7
    • /
    • pp.841-851
    • /
    • 2013
  • The infectious information hiding system(IIHS) is proposed for secure distribution of high quality video contents by applying optimized watermark embedding and detection algorithms to video codecs. And the watermark as infectious information is transmitted while target video is displayed or edited by codecs. This paper proposes a fast and effective reversible watermarking and infectious information generation for IIHS. Our reversible watermarking scheme enables video decoder to control video quality and watermark strength actively for by adding control code and expiration date with the watermark. Also, we designed our scheme with low computational complexity to satisfy it's real-time processing in a video codec, and to prevent time or frame delay during watermark detection and video restoration, we embedded one watermark and one side information within a macro-block. Experimental results verify that our scheme satisfy real-time watermark embedding and detection and watermark error is 0% after reversible watermark detection. Finally, we conform that the quality of restored video contens is almost same with compressed video without watermarking algorithm.

Performance Analysis for Digital watermarking using Quad Tree Algorithm (쿼드트리 알고리즘을 이용한 디지털 워터마킹의 성능 분석)

  • Kang, Jung-Sun;Chu, Hyung-Suk
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.1
    • /
    • pp.19-25
    • /
    • 2010
  • In this paper, digital watermarking method using quad-tree algorithm is proposed. The proposed algorithm searches the significant coefficient of the watermark by using quad-tree algorithm and inserts the watermark by the Cox's algorithm. The simulation for performance analysis of the proposed algorithm is implemented about the effect of quad-tree algorithm in wavelet domain and that of embedding watermark in each subband coefficient (HH, LH, HL) and each DWT level, and that of embedding in the lowest frequency band (LL). As a simulation result, digital watermarking using quad-tree algorithm improves the watermarking performance in comparison with inserting watermark in the significant coefficients of fixed frequency band. The watermarking performance of simultaneously embedding in HH, LH, and HL band of DWT(6 level) is better than that of different cases. In addition, insertion the watermark to the LL band about 30~60% of all watermarks improves the correlation value while PSNR performance decreases 1~3dB.

A Study on Digital Watermarking Technique Using Decomposition Perceptual Channel (Decomposition Perceptual Channel을 이용한 디지털 워터마킹 기법)

  • 김영민;이규대;박세준
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.11b
    • /
    • pp.238-241
    • /
    • 2002
  • 본 논문에서는 워터마크가 갖추어야 할 요소 중 하나인 비가시성과 강인성을 만족하기 위하여 변환된 DFT주파수 영역에 HVS의 DPC(Decomposition Perceptual Channel)를 사용하였다. 워터마크의 삽입 위치를 실험적으로 최적 Channel을 도출하였으며, 실험을 통하여 다양한 공격에 대한 강인성을 확인하였다.

  • PDF

Extraction of Landmarks Using Building Attribute Data for Pedestrian Navigation Service (보행자 내비게이션 서비스를 위한 건물 속성정보를 이용한 랜드마크 추출)

  • Kim, Jinhyeong;Kim, Jiyoung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.37 no.1
    • /
    • pp.203-215
    • /
    • 2017
  • Recently, interest in Pedestrian Navigation Service (PNS) is being increased due to the diffusion of smart phone and the improvement of location determination technology and it is efficient to use landmarks in route guidance for pedestrians due to the characteristics of pedestrians' movement and success rate of path finding. Accordingly, researches on extracting landmarks have been progressed. However, preceding researches have a limit that they only considered the difference between buildings and did not consider visual attention of maps in display of PNS. This study improves this problem by defining building attributes as local variable and global variable. Local variables reflect the saliency of buildings by representing the difference between buildings and global variables reflects the visual attention by representing the inherent characteristics of buildings. Also, this study considers the connectivity of network and solves the overlapping problem of landmark candidate groups by network voronoi diagram. To extract landmarks, we defined building attribute data based on preceding researches. Next, we selected a choice point for pedestrians in pedestrian network data, and determined landmark candidate groups at each choice point. Building attribute data were calculated in the extracted landmark candidate groups and finally landmarks were extracted by principal component analysis. We applied the proposed method to a part of Gwanak-gu, Seoul and this study evaluated the extracted landmarks by making a comparison with labels and landmarks used by portal sites such as the NAVER and the DAUM. In conclusion, 132 landmarks (60.3%) among 219 landmarks of the NAVER and the DAUM were extracted by the proposed method and we confirmed that 228 landmarks which there are not labels or landmarks in the NAVER and the DAUM were helpful to determine a change of direction in path finding of local level.

Development of a Software Benchmark Test Process (소프트웨어 벤치마크 테스트 프로세스 개발)

  • Oh, Young-Bae;Kim, Jae-Woong;Jung, Young-Eun;Shin, Seok-Kyu
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2002.11a
    • /
    • pp.401-405
    • /
    • 2002
  • 제품으로서의 소프트웨어가 급속히 보급되면서 소프트웨어 제품 품질 평가의 필요성이 증가하고 있다. 소프트웨어는 하드웨어와 다른 무형의 제품으로서 기술 및 품질에 대한 표준화와 시험 평가 방법의 도출이 어렵다. 최근에 개발된 소프트웨어 품질 모델과 도메인별 제품 표준화 노력으로 소프트웨어 제품 평가 방법이 개발되고 있다. 이와 더불어 제품을 비교 평가하여 소비자에게 제품을 선택할 수 있는 기준을 줄 수 있는 벤치마크 테스트의 필요성이 제기되고 있다. 본 연구에서는 하드웨어와 비교되는 소프트웨어 벤치마크 테스트의 특성을 살펴보고 본 연구에서 개발한 벤치마크 테스트를 위한 표준 프로세스 개발 결과를 제시하고 개발된 프로세스의 각 단계별 활동에 대하여 논한다.

  • PDF