• Title/Summary/Keyword: robust watermark

Search Result 263, Processing Time 0.022 seconds

An LBX Interleaving Watermarking Method with Robustness against Image Removing Attack (영상제거 공격에 강인한 LBX 인터리빙 워터마킹 방법)

  • 고성식;김정화
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.6
    • /
    • pp.1-7
    • /
    • 2004
  • The rapid growth of digital media and communication networks has created an urgent need for self-contained data identification methods to create adequate intellectual property right(IPR) protection technology. In this paper we propose a new watermarking method that could embed the gray-scale watermark logo in low frequency coefficients of discrete wavelet transform(DWT) domain as the marking space by using our Linear Bit-eXpansion(LBX) interleaving of gray-scale watermark, to use lots of watermark information without distortion of watermarked image quality and particularly to be robust against attack which could remove a part of image. Experimental results demonstrated the high robustness in particular against attacks such as image cropping and rotation which could remove a part of image.

Digital Watermarking based on Wavelet Transform and Singular Value Decomposition(SVD) (웨이블릿 변환과 특이치 분해에 기반한 디지털 워터마킹)

  • 김철기;차의영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6A
    • /
    • pp.602-609
    • /
    • 2002
  • In this paper, we propose an robust invisible watermarking method using wavelet transform and singular value decomposition for the ownership protection. of images. For this method, after we decompose the original image in three level using wavelet transform, we use singular value decomposition based key depended watermark insertion method in the lowest band $LL_3.$ And we also watermark using DCT for extraction of watermark and verification of robustness. In the experiments, we found that it had a good quality and robustness in attack such as compression, image processing, geometric transformation and noises. Especially, we know that this method have very high extraction ratio against nose and JPEG compression. And Digimarc's method can not extract watermark in 80 percent compression ratio of JPEG, but the proposed method can extract well.

Blind Color Image Watermarking Based on DWT and LU Decomposition

  • Wang, Dongyan;Yang, Fanfan;Zhang, Heng
    • Journal of Information Processing Systems
    • /
    • v.12 no.4
    • /
    • pp.765-778
    • /
    • 2016
  • In watermarking schemes, the discrete wavelet transform (DWT) is broadly used because its frequency component separation is very useful. Moreover, LU decomposition has little influence on the visual quality of the watermark. Hence, in this paper, a novel blind watermark algorithm is presented based on LU transform and DWT for the copyright protection of digital images. In this algorithm, the color host image is first performed with DWT. Then, the horizontal and vertical diagonal high frequency components are extracted from the wavelet domain, and the sub-images are divided into $4{\times}4$ non-overlapping image blocks. Next, each sub-block is performed with LU decomposition. Finally, the color image watermark is transformed by Arnold permutation, and then it is inserted into the upper triangular matrix. The experimental results imply that this algorithm has good features of invisibility and it is robust against different attacks to a certain degree, such as contrast adjustment, JPEG compression, salt and pepper noise, cropping, and Gaussian noise.

Genetic Algorithm-Based Watermarking in Discrete Wavelet Transform Domain (유전자 알고리듬을 사용한 웨이블릿 기반 워터마킹)

  • Lee Dong-Eun;Kim Tae-Kyung;Lee Seong-Won;Paik Joon-Ki
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.4 s.310
    • /
    • pp.108-115
    • /
    • 2006
  • This paper presents a watermarking algorithm in the discrete wavelet transform domain using evolutionary algorithm. The proposed algorithm consists of wavelet-domain watermark insertion and genetic algorithm-based watermark extraction. More specifically watermark is inserted to the low-frequency region of wavelet transform domain, and watermark extraction is efficiently performed by using the evolutionary algorithm. The proposed watermarking algorithm is robust against various attacks such as JPEG and JPEG2000 image compression and geometric transformations.

3D Mesh Watermarking Using CEGI (CEGI를 이용한 3D 메쉬 워터마킹)

  • 이석환;김태수;김승진;권기룡;이건일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.472-484
    • /
    • 2004
  • We proposed 3D mesh watermarking algorithm using CEGI distribution. In the proposed algorithm, we divide a 3D mesh of VRML data into 6 patches using distance measure and embed the same watermark bits into the normal vector direction of meshes that mapped into the cells of each patch that have the large magnitude of complex weight of CEGI. The watermark can be extracted based on the known center point of each patch and order information of cell. In an attacked model by affine transformation, we accomplish the realignment process before the extraction of the watermark. Experiment results exhibited the proposed algorithm is robust by extracting watermark bit for geometrical and topological deformed models.

A Watermarking System using Adaptive Thresholds (적응 임계값을 사용한 워터마킹 시스템)

  • Sang-Heun Oh;Sung-Wook Park;Bvyung-Jun Kim
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.30-37
    • /
    • 2003
  • In this paper, a discrete wavelet transform (DWT)-based watermarking system is proposed. The main feature of proposed system is that the embedding system uses adaptive thresholds to control the trade-off between the qualify of the watermarked image and the capacity of the watermark, and the trade-off between the quality and robustness of the watermarked image. Also, the extracting system rebuilds threshold according to various attacks and decides a watermark bit from the least distorted coefficient after measuring the distortion of coefficient. Finally, a new measure to detect the uniqueness of watermark is proposed. The experimental result shows that the proposed watermarking system is robust against conventional signal processing and intentional attacks.

Digital Watermarking Using Watermark Reordering Based on Discrete Cosine Transform (DCT 기반의 워터마크 재정렬을 이용한 디지털 워터마킹)

  • Bae, Sung-Ho
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.609-614
    • /
    • 2002
  • Watermarking is embedding a digital signal called as watermark into images to claim the ownership. In this paper, a new digital watermarking algorithm based on DCT (Discrete Cosine Transform) which enhances invisibility and robustness is proposed to improve contentional digital watermarking method using DCT. In the proposed method, it is possible to enhance invisibility and robustness using watermark reordering in which the relative significance of original DCT coefficients can be preserved in watermarked DCT coefficients, and the distortions of original DCT coefficients can be minimized. The experimental results show that the proposed method improves invisibility approximately 9~12[dB] and is more robust to various attacks than the conventional method.

H.265/HEVC Video Watermarking Method with High Image Quality (HEVC기반의 비디오를 위한 워터마킹 알고리즘)

  • Seo, Young-Ho;Lee, Yong-Seok;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.24 no.1
    • /
    • pp.97-104
    • /
    • 2019
  • In the field of video watermarking, which adds a time axis to the watermarking of the existing still image, it is important to embed a watermark at a level that can claim copyright while minimizing the overall video quality. In this paper, we focus on the fact that B slices refer to blocks of I and P slices in the Random Access compression method of HEVC. Therefore, We propose that watermark is embedded only in I and P slices and extracted in I, P, and B slices. This can minimize the decreases of the overall image quality of the image and protect the copyright of the B slice without directly embedding the watermark.

Watermarking Technique Using Exchanging Wavelet Coefficients (웨이블릿 계수 교환을 이용한 워터마킹 기법)

  • 주낙근;이재현;김동서
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.49-56
    • /
    • 2003
  • In this paper, we propose an efficient blind watermarking algorithm using wavelet transform. The proposed algorithm inserts watermark into the high frequency subbands that were transformed by 1-level wavelet transform of original image. Watermark insertion is achieved by exchanging each of the corresponding coefficients in the HL, LH, and HH, subbands according to the inserted watermark value. And watermark is extracted by the relation of wavelet coefficients without original image. Experimental results demonstrate that watermarked image has a good quality in terms of imperceptibility and is robust against various attacks.

A Synchronization Scheme Based on Moving Average for Robust Audio Watermarking

  • Zhang, Jinquan;Han, Bin
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.271-287
    • /
    • 2019
  • The synchronization scheme based on moving average is robust and suitable for the same rule to be adopted in embedding watermark and synchronization code, but the imperceptibility and search efficiency is seldom reported. The study aims to improve the original scheme for robust audio watermarking. Firstly, the survival of the algorithm from desynchronization attacks is improved. Secondly, the scheme is improved in inaudibility. Objective difference grade (ODG) of the marked audio is significantly changed. Thirdly, the imperceptibility of the scheme is analyzed and the derived result is close to experimental result. Fourthly, the selection of parameters is optimized based on experimental data. Fifthly, the search efficiency of the scheme is compared with those of other synchronization code schemes. The experimental results show that the proposed watermarking scheme allows the high audio quality and is robust to common attacks such as additive white Gaussian noise, requantization, resampling, low-pass filtering, random cropping, MP3 compression, jitter attack, and time scale modification. Moreover, the algorithm has the high search efficiency and low false alarm rate.