• Title/Summary/Keyword: Watermark image

Search Result 512, Processing Time 0.03 seconds

Incremental Watermarking using Complex Wavelet Transform (콤플렉스 웨이블릿 변환을 이용한 점진적 워터마킹)

  • Lee Na-Young;Kim Won;Kim Kwan-Jung;Kim Gye-Young
    • Journal of Internet Computing and Services
    • /
    • v.4 no.3
    • /
    • pp.39-46
    • /
    • 2003
  • Generally, the existing watermarking techniques for copyright protection of a digital image are fragile in geometric distortion and all watermark extractions need the same time regardless of degree of distortion. In this paper, we propose the incremental watermarking technique that used a Complex Wavelet Transform(CWT) in order to solve these problems. The proposed incremental watermarking technique embeds a watermark in a phase component after a CWT with an original image, and a watermark is extracted from an watermarked image by stages. A watermark owner can insist on copyright of an image after comparing a correlation between the extracted watermark and the original watermark if it is larger than the threshold. Also, the incremental watermark extraction determines the extraction time of a watermark by the level of distortion. The proposed technique through performance evaluation displayed that it was robust in geometric distortion than the existing watermarking technique.

  • PDF

A New Wavelet Watermarking Based on Linear Bit Expansion (선형계수확장 기반의 새로운 웨이블릿 워터마킹)

  • Piao Yong-Ri;Kim Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.167-170
    • /
    • 2006
  • This study proposes a new wavelet watermark technique based on the Linear Bit Expansion. To ensure the security of the watermark, it is Amold Transformed before embedding. Then the wavelet transformation of watermark and original images is processed. Since the size of the watermark image is a quarter of the original site, it uses linear bit-expansion to enlarge the watermark image. Lastly, watermark is inserted in a given intensity to the corresponding low frequency subbands of the wavelet-transformed images proposed in this paper. When detecting the presence of watermark, the similarity between extracted watermark and the original watermark is compared applying the F norm function.

  • PDF

Study on Preventing Bit Error of Digital Watermark Using Orthogonal Transform

  • Watanabe, Jun;Hasegawa, Madoka;Kato, Shigeo
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.277-280
    • /
    • 2002
  • Many digital watermarking methods have been proposed for copyright protection. Especially, methods to add a watermark in the frequency domain are often used. In those methods, only a few components of frequencies are changed according to watermark information, so that the pixel values of the image obtained by the inverse transform sometimes exceed the dynamic range and owing to the clipping process at this time watermark information is changed. This phenomenon even occurs without attacks like image processing. In this paper, we propose two methods to prevent loss of watermark information, applicable to such cases, it is said that one is the method called "inversion of increase and decrease" and another is "conservation of amounts of changes." We can extract the watermark information correctly under the condition of no attacks by using these proposed methods.

  • PDF

Wavelet-Based Watermarking using Threshold Values and PN-Code for Copyright Protection (저작권 보호를 위한 임계값과 PN-Code를 이용한 웨이블릿 영역에서의 워터마킹)

  • 정용훈;오휘빈;최영규;이준환;이상범
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.561-568
    • /
    • 2003
  • This paper suggests that watermarking technique make use of Threshold Values and PN code for preservation of copyright. To protect copyright, six binary images that are generated by a Dynamic Threshold Value to LSB(least significant bit) of wavelet coefficient through wavelet conversion and watermark image use PN code to each frequency sphere-HL1, LH1, HL2, LH2, HL3, LH3, decide coordinates, operate XOR, and insert watermark. They put the sphere except from low frequency which has much image deterioration and high frequency which has weak loss compression in watermark. As an experimental result, we acquired watermark inserting image that has little image deterioration and extract watermark strongly.

  • PDF

A Color Image Watermarking Method for Embedding Audio Signal

  • Kim Sang Jin;Kim Chung Hwa
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.631-635
    • /
    • 2004
  • The rapid development of digital media and communication network urgently brings about the need of data certification technology to protect IPR (Intellectual property right). This paper proposed a new watermarking method for embedding contents owner's audio signal in order to protect color image IPR. Since this method evolves the existing static model and embeds audio signal of big data, it has the advantage of restoring signal transformed due to attacks. Three basic stages of watermarking include: 1) Encode analogue ID owner's audio signal using PCM and create new 3D audio watermark; 2) Interleave 3D audio watermark by linear bit expansion and 3) Transform Y signal of color image into wavelet and embed interleaved audio watermark in the low frequency band on the transform domain. The results demonstrated that the audio signal embedding in color image proposed in this paper enhanced robustness against lossy JPEG compression, standard image compression and image cropping and rotation which remove a part of image.

  • PDF

LBP and DWT Based Fragile Watermarking for Image Authentication

  • Wang, Chengyou;Zhang, Heng;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.14 no.3
    • /
    • pp.666-679
    • /
    • 2018
  • The discrete wavelet transform (DWT) has good multi-resolution decomposition characteristic and its low frequency component contains the basic information of an image. Based on this, a fragile watermarking using the local binary pattern (LBP) and DWT is proposed for image authentication. In this method, the LBP pattern of low frequency wavelet coefficients is adopted as a feature watermark, and it is inserted into the least significant bit (LSB) of the maximum pixel value in each block of host image. To guarantee the safety of the proposed algorithm, the logistic map is applied to encrypt the watermark. In addition, the locations of the maximum pixel values are stored in advance, which will be used to extract watermark on the receiving side. Due to the use of DWT, the watermarked image generated by the proposed scheme has high visual quality. Compared with other state-of-the-art watermarking methods, experimental results manifest that the proposed algorithm not only has lower watermark payloads, but also achieves good performance in tamper identification and localization for various attacks.

Optimization-based Image Watermarking Algorithm Using a Maximum-Likelihood Decoding Scheme in the Complex Wavelet Domain

  • Liu, Jinhua;Rao, Yunbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.452-472
    • /
    • 2019
  • Most existing wavelet-based multiplicative watermarking methods are affected by geometric attacks to a certain extent. A serious limitation of wavelet-based multiplicative watermarking is its sensitivity to rotation, scaling, and translation. In this study, we propose an image watermarking method by using dual-tree complex wavelet transform with a multi-objective optimization approach. We embed the watermark information into an image region with a high entropy value via a multiplicative strategy. The major contribution of this work is that the trade-off between imperceptibility and robustness is simply solved by using the multi-objective optimization approach, which applies the watermark error probability and an image quality metric to establish a multi-objective optimization function. In this manner, the optimal embedding factor obtained by solving the multi-objective function effectively controls watermark strength. For watermark decoding, we adopt a maximum likelihood decision criterion. Finally, we evaluate the performance of the proposed method by conducting simulations on benchmark test images. Experiment results demonstrate the imperceptibility of the proposed method and its robustness against various attacks, including additive white Gaussian noise, JPEG compression, scaling, rotation, and combined attacks.

Digital Watermarking Technique using self-similarity (자기유사성을 이용한 디지털 워터마킹 기법)

  • Lee, Mun-Hee;Lee, Young-hee
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.4
    • /
    • pp.37-47
    • /
    • 2003
  • In this paper. we propose a new digital watermarking technique which uses the self-similarity of OCT(Discrete Cosine Transform) coefficients for the ownership protection of an image, similar coefficients are classified by SOM(Self-Organizing Map) out of Neural Network. The watermark is inserted into the selected cluster among clusters which consist of coefficients. Generally, the inserted watermark in high frequency regions of an image is eliminated by the compression process such as JPEG compressions, and the inserted watermark in low frequency regions of an image causes the distortion of an image quality. Therefore, the watermark is inserted into the cluster that has many coefficients in the middle frequency regions. This algorithm reduces the distortion of an image quality because of inserting the watermark into an image according to the number of coefficients in selected cluster. To extract watermarks from the watermarked image, the selected cluster is used without an original image. In the experiment, the new proposed algorithm have a good quality and endure attacks(JPEG compressions, filtering. zoom in, zoom out, cropping, noises) very well.

  • PDF

Wavelet-Based Digital Watermarking Method (웨이브릿 기반 디지털 워터마킹 방법)

  • 이경훈
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.871-880
    • /
    • 2002
  • In this paper, I proposed the adaptive watermarking based on the discrete wavelet transform for the very robust watermarking against intentional distortion which attacks on image. A watermark is an binary image such as document(sign), and such watermark image is embedded in the LH and HL band of wavelet transformed domain for copyright protection of image data. To evaluate robustness of the proposed method, we applied some basic algorithm of image processing such as brightening, darkening, sharpening, blurring, cropping, histogram equalizing and lossy compression(JPEG, gif). As a result of experiment, the proposed method has the good image quality and the high perceptibility of watermark. It was demonstrated by experiments that the proposed algorithm can provide an excellent protection under various attacks.

  • PDF

Digital Watermarking Algorithm for Multiview Images Generated by Three-Dimensional Warping

  • Park, Scott;Kim, Bora;Kim, Dong-Wook;Seo, Youngho
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.1
    • /
    • pp.62-68
    • /
    • 2015
  • In this paper, we propose a watermarking method for protecting the ownership of three-dimensional (3D) content generated from depth and texture images. After selecting the target areas to preserve the watermark by depth-image-based rendering, the reference viewpoint image is moved right and left in the depth map until the maximum viewpoint change is obtained and the overlapped region is generated for marking space. The region is divided into four subparts and scanned. After applying discrete cosine transform, the watermarks are inserted. To extract the watermark, the viewpoint can be changed by referring to the viewpoint image and the corresponding depth image initially, before returning to the original viewpoint. The watermark embedding and extracting algorithm are based on quantization. The watermarked image is attacked by the methods of JPEG compression, blurring, sharpening, and salt-pepper noise.