• Title/Summary/Keyword: Watermark Embedding

Search Result 256, Processing Time 0.019 seconds

Robust Watermarking against Lossy Compression in Hadamard Domain (하다마드 도메인에서의 손실압축에 강인한 워터마킹)

  • Cui, Xue-Nan;Kim, Jong-Weon;Li, De;Choi, Jong-Uk
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.33-43
    • /
    • 2007
  • In this proper, we proposes a robust watermarking against the lossy compression in the Hadamard domain. The Hadamard matrix consists of only 1 or -1 and can be computed veru fast. The Hadamrd transform has the inverse transform therefore it is able to be applied into the watermarking technology. In embedding process, we select 10 coefficients from intermediate frequency domain and create two watermark patterns. In extraction process, we use the watermark patterns and compare them to detect the watermark information. When we use the standard image ($512{\times}512$) and binary watermark image ($64{\times}64$), the results of these examines are PSNR for $38{\sim}42dB$ and BER for $3.9{\sim}12.5%$. The JPEG QF between 30 and100, naked human eyes can detect to watermark image easily. The experimental results show that performance of Hadamard domain is better than those of DCT, FFT, and DWT.

  • PDF

A GCST-based Digital Image Watermarking Scheme (GCST 기반 디지털 영상 워터마킹 방법)

  • Lee, Juck-Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.13 no.3
    • /
    • pp.142-149
    • /
    • 2012
  • Various image transformations can be used to compress images, to reduce noises in images and to extract useful features. Watermarking techniques using DCT and DWT have been a lot of research interest in the spread of multimedia contents. In this paper, Gabor cosine and sine transform considered as human visual filter is applied to embedding and extraction of watermarks for digital images. The proposed transform is used for watermarking with fifteen attacks. Randomly normal distributed noises are used as an embedded watermark. To measure the similarity between the embedded watermark and extracted one, a correlation value is computed and furthermore is compared with that of existing DCT method. Correlation values of extracted watermark are computed with randomly normal distributed noise sequences, and the sequence with the largest correlation value is declared as the embedded watermark. Frequency components are divided into various bands. Experimental results for low frequency and mid-frequency bands have shown that the proposed GCST provides a good watermarking algorithm and its performance is better than DCT.

Screen Mark Attack : A New Image Watermarking Attack (스크린 마크 공격 : 새로운 정지영상 워터마킹 공격 기법)

  • 박현중;이충훈;이흥규
    • Journal of Broadcast Engineering
    • /
    • v.6 no.1
    • /
    • pp.58-65
    • /
    • 2001
  • This paper describes a new watermarking attach algorithm, a screen mark attack. The screen mark attack is a modified overmarking attach, which attacks a watermarking system by Inserting another watermark into a marked Image. Overmarking attack has a problem that it cannot be applied to a public watermarking software that prohibits the watermark embedder from embedding another watermark Into an already marked image. However, the proposed attack algorithm can be applied to such a pub1ic watermarking scheme. Test results show that the proposed watermarking attack algorithm is successful for commercial watermarking softwares and attacked images show better quality than Images attached by 07her attack tools.

  • PDF

3D Printing Watermarking Method Based on Radius Curvature of 3D Triangle

  • Pham, Ngoc-Giao;Song, Ha-Joo;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1951-1959
    • /
    • 2017
  • Due to the fact that 3D printing is applied to many areas of life, 3D printing models are often used illegally without any permission from the original providers. This paper presents a novel watermarking algorithm for the copyright protection and ownership identification for 3D printing based on the radius curvature of 3D triangle. 3D triangles are extracted and classified into groups based on radius curvature by the clustering algorithm, and then the mean radius curvature of each group will be computed for watermark embedding. The watermark data is embedded to the groups of 3D triangle by changing the mean radius curvature of each group. In each group, we select a 3D triangle which has the nearest radius curvature with the changed mean radius curvature. Finally, we change the vertices of the selected facet according to the changed radius curvature has been embedded watermark. In experiments, the distance error between the original 3D printing model and the watermarked 3D printing model is approximate zero, and the Bit Error Rate is also very low. From experimental results, we verify that the proposed algorithm is invisible and robustness with geometric attacks rotation, scaling and translation.

A Digital Watermarking Algorithm Using PIM and 2D Barcode (PIM과 2D 바코드를 이용한 워터마킹 알고리즘)

  • Han Su-Young;Kim Hong-Ryul;Lee Kee-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.103-108
    • /
    • 2005
  • In this Paper, we proposed a novel robust watermarking technique using PIM and 2D barcode for the copyright of the digital images. Because human is impervious to the change in the complex area, the embedding watermark to the selected coefficients using PIM enhances invisibility. A 2D barcode image is used for watermark in this research. The 2D barcode contains more information than conventional ID barcode and includes the error correction algorithm. Therefore the watermarking algorithm using 2D barcode enhances the robustness of watermark. From the experimental results , the proposed algorithm shows better invisibility and robustness performance in a general signal Processing such as JPEG and SPIHT lossy compression.

  • PDF

A Robust Wavelet-Based Digital Watermarking Using Statistical Characteristic of Image and Human Visual System

  • Kim, Bong-Seok;Kwon, Kee-Koo;Kwon, Seong-Geun;Park, Kyung-Nam
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1019-1022
    • /
    • 2002
  • The current paper proposes a wavelet-based digital watermarking algorithm using statistical characteristic of image and human visual system (HVS). The original image is decomposed into 4-level using a discrete wavelet transform (DWT), then the watermark is embedded into the perceptually significant coefficients (PSCs) of the image. In general, the baseband of a wavelet-decomposed image includes most of the energy of the original image, thereby having a crucial effect on the image quality. As such, to retain invisibility, the proposed algorithm does not utilize the baseband. Plus, the wavelet coefficients on the lowest level are also excluded in the watermark-embedding step, because these coefficients call be easily eliminated and modified by lossy compression and common signal processing. As such, the PSCs are selected from all subbands, except for the baseband and subbands on the lowest level. Finally, using the selected PSCs, the watermark is then embedded based on spatial masking of the wavelet coefficients so as to provide invisibility and robustness. Computer simulation results confirmed that the proposed watermarking algorithm was more invisible and robust than conventional algorithms.

  • PDF

Reversible DNA Watermarking Technique Using Histogram Shifting for Bio-Security (바이오 정보보호 위한 히스토그램 쉬프팅 기반 가역성 DNA 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Lee, Eung-Joo;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.244-253
    • /
    • 2017
  • Reversible DNA watermarking is capable of continuous DNA storage and forgery prevention, and has the advantage of being able to analyze biological mutation processes by external watermarking by iterative process of concealment and restoration. In this paper, we propose a reversible DNA watermarking method based on histogram multiple shifting of noncoding DNA sequence that can prevent false start codon, maintain original sequence length, maintain high watermark capacity without biologic mutation. The proposed method transforms the non-coding region DNA sequence to the n-th code coefficients and embeds the multiple bits of the n-th code coefficients by the non-recursive histogram multiple shifting method. The multi-bit embedding process prevents the false start codon generation through comparison search between adjacent concealed nucleotide sequences. From the experimental results, it was confirmed that the proposed method has higher watermark capacity of 0.004-0.382 bpn than the conventional method and has higher watermark capacity than the additional data. Also, it was confirmed that false start codon was not generated unlike the conventional method.

A Robust Pattern Digital Watermarking Method using Wavelet Transform (웨이브릿 기반의 강인한 패턴 디지털 워터마킹 방법)

  • 이경훈;김용훈;이태홍
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.1
    • /
    • pp.98-105
    • /
    • 2004
  • In this paper, we proposed a watermarking algorithm for embedding visually recognizable pattern into the middle-frequency part:; of image. Binary image as watermark is embedded in the LH2, HL2 and HH2 band of wavelet transformed domain for copyright protection of image data. To evaluate robustness of the proposed method, we applied some basic algorithm of image processing such as scaling, filtering, cropping, histogram equalizing and lossy compression(JPEG, gif). As a result of experiment, the proposed method has the good image quality and the high perceptibility of watermark. It was demonstrated by experiments that the proposed algorithm can provide an excellent protection under various attacks.

  • PDF

Incorporating Fuzzy Inference into Watermarking in the Transform Domain (변환영역에서의 퍼지추론을 적용한 워터마킹)

  • Kim, Yoon-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.4
    • /
    • pp.364-370
    • /
    • 2006
  • In this paper, the decision method of optimal sub-band which is supposed to embedded watermark incorporating fuzzy inference into transform-based watermarking is proposed. After performing the DCT, maximum variation of human visual properties, such as text degree, contrast sensitivity function is calculated, and by using these, membership function is generated. After embedding the watermark to the selected bands obtained from fuzzy inference, performance of imperceptibility and robustness are evaluated. In order to testify the proposed scheme, such attacks as JPEG, filtering, cropping are utilized. and in addition, by using an AWGN channel of OFDM/QPSK system, PSNR as well as correlation are calculated, and finally evaluated the performance.

  • PDF

An Energy-Based Watermarking Algorithm for Digital Images (디지털 영상을 위한 에너지 기반 워터마킹 알고리즘)

  • Choi Dong-Jin;Hwang Dong-Guk;Lee Sang-Ju;Lee Woo-Ram;Jun Byoung-Min
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.2
    • /
    • pp.87-94
    • /
    • 2005
  • In this paper, we present a new watermarking algorithm in which a watermark is created based on the energy of the original image and embedded into the image by replacement. The watermark is adjusted to have a certain proportional amount of energy based on one of the original image and embedded into the DFT magnitude component replacing original coefficients. This scheme reduces degree of quality degradation in a watermarked image by maintaining energy and strengthen robustness against attacks by embedding a strong watermark. From the result of experiment, we confirmed that the proposed algorithm had high invisibility of 47.6dB of PSNR and could reconstruct 98.9% of message on average.

  • PDF