• Title/Summary/Keyword: robust watermark

Search Result 262, Processing Time 0.018 seconds

Audio Watermarking Using Specific Frequency Coefficients (특정 주파수계수를 이용한 오디오 워터마킹)

  • 우동훈;정의필
    • The Journal of the Acoustical Society of Korea
    • /
    • v.22 no.4
    • /
    • pp.269-275
    • /
    • 2003
  • In this paper, we proposed the robust watermark diminishing distortion of the original data inserting the watermark in specific coefficients of the frequency domain. In case the alpha is more than 0.5. we found that proposed watermark is detected by experiment of MP3, FFT, Cropping and Echo attack. Our proposed method improved the Cox's method in the SNR aspect.

Embedding DC Digital Watermarking in the DCT (DCT의 DC 계수에 워터마크 삽입하는 디지털 워터마킹)

  • 신용달;권성근
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.6
    • /
    • pp.962-967
    • /
    • 2003
  • In this paper, we proposed DC term embedding digital watermarking in the DCT domain. We computed a 8${\times}$8 block DCT The watermark signal is composed of a random number sequence of length 1000, which obeys normal distribution with zero mean and unit variance N(0,1). We embedded watermark signal in DC term for small watermark signal, the other watermark signal embedded in the largest AC coefficients. Experiment show that the invisibility and robust of the proposed method better than those of the conventional methods.

  • PDF

오디오 워터마킹 프로세서 구조 설계에 관한 연구

  • Kim Gi-Yeong;Kim Yeong-Seop;Lee Sang-Beom
    • Proceedings of the Korean Society Of Semiconductor Equipment Technology
    • /
    • 2005.05a
    • /
    • pp.208-214
    • /
    • 2005
  • A number of watermark insertion method is proposed for the protection of audio contents such as MP3 music. In this paper, we propose a VLSI architecture that performs embedding watermark to the audio signal based on the scheme that proposed by XUEYAO LI[1]. This architecture is implemented and simulated in Verilog HDL. This watermark embedding method used a visually recognizable binary image. Despite a unit that determines the watermark embedded intensity is removed to archive low complexity of H/W, our experimental results show that watermarked signal is perceptually transparency and robust to several known attacks.

  • PDF

Video Watermarking Scheme for Scalable Video Coding using ROI

  • Yoon, Ji-Sun;Kwon, Seong-Geun;Lee, Suk-Hwan;Song, Yoon-Chul;Kim, Min-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.6
    • /
    • pp.796-806
    • /
    • 2008
  • This paper presents a blind video watermarking algorithm that has the robustness against spatial, temporal, and SNR scalability and transcoding for the copyright protection of video contents in heterogeneous multimedia service. The proposed process of watermark embedding and detecting is accomplished on base layer for considering spatial scalability. The watermark consists of the string and the ordering number of string for considering temporal scalability. Thus, each of frames has the bitstream of one character and a ordering number of its character. To robust against FGS, the proposed algorithm quantizes low and middle frequency coefficients in ROI region of each of frames and embeds its watermark bitstream into the specific bits of the quantized coefficients. Experimental results verified that the proposed algorithm satisfies the invisibility of watermark and also has the robustness against spatial scalability, temporal scalability and FGS.

  • PDF

Digital Audio Watermarking in The Cepstrum Domain (켑스트럼 영역에서의 오디오 워터마킹 방법)

  • 이상광;호요성
    • Journal of Broadcast Engineering
    • /
    • v.6 no.1
    • /
    • pp.13-20
    • /
    • 2001
  • In this paper, we propose a new digital audio watermarking scheme In the cepstrum domain. We insert a digital watermark signal Into the cepstral components of the audio signal using a technique analogous to spread spectrum Communications, hiding a narrow band signal in a wade band channel. In our proposed method, we use pseudo-random sequences to watermark the audio signal. The watermark Is then weighted in the cepstrum domain according to the distribution of cepstral coefficients and the frequency masking characteristics of the human auditory system. The proposed watermark embedding scheme minimizes audibility of the watermark signal. and the embedded watermark is robust to mu1tip1e watermarks, MPEG audio ceding and additive noose.

  • PDF

A Robust Watermarking Method against Partial Damage and Geometric Attack (부분 손상과 기하학적 공격에 강인한 워터마킹 방법)

  • Kim, Hak-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.9
    • /
    • pp.1102-1111
    • /
    • 2012
  • In this paper, we propose a robust watermarking method against geometric attack even though the watermarked image is partially damaged. This method consists of standard image normalization which transforms any image into a predefined standard image and embedding watermark in DCT domain of standard normalized image using spread spectrum technique. The proposed standard image normalization method has an improvement over existing image normalization method, so it is robust to partial damage and geometric attack. The watermark embedding method using spread spectrum technique also has a robustness to image losses such as blurring, sharpening and compressions. In addition, the proposed watermarking method does not need an original image to detect watermark, so it is useful to public watermarking applications. Several experimental results show that the proposed watermarking method is robust to partial damage and various attacks including geometric deformation.

Robust Watermarking in Medical Images Using by Polar Transformation (의료영상에서 Polar 변환을 적용한 강인한 워터마킹 기법)

  • 남기철;박무훈
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.379-385
    • /
    • 2004
  • Medical images are being managed more by PACS in general medical institutions. It is important to protect patients from being invaded their privacy related to the images. It is also necessary to confirm the ownership, the right of property of the medical images and notice whether the data are modified. In this paper, we propose a robust watermarking against RST attacks in medical images on the PACS. The proposed scheme modifies and improves Log-Polar Mapping and Fourier Mellin Transform in order to realize and recover serious image degradation and watermark data loss caused by the conversion between cartesian coordinate and log-polar coordinate. We used the radius and theta Look Up Table to solve the realization of the Fourier Mellin Transform, and inserted a watermark into 2D-DFT magnitudes using Spread Spectrum. Experimental results shows that this method are robust to rotation attack.

Digital Hologram Watermarking using Quad-tree Fresnelet Transform (Quad-tree Fresnelet 변환을 이용한 디지털 홀로그램 워터마킹)

  • Seo, Young Ho;Koo, Ja Myung;Lee, Yoon Hyuk;Kim, Dong Wook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.79-89
    • /
    • 2013
  • This paper proposes a watermarking scheme to protect ownership of a digital hologram, an ultra-high value-added content. It performs pre-defined levels of quad-tree Fresnelet transforms. The relationship among the same-positional-blocks is extracted as the digital pre-watermark. For the relationship, we use properties of a digital hologram that a hologram pixel retains all the information of the object and that the same size of partial holograms reconstructs the same size of object but different in their view points. Also we mix a set of private data with the pre-watermark and the result is encrypted by a block cipher algorithm with a private key. Experimental results showed that the proposed scheme is very robust for the various malicious and non-malicious attacks. Also because it extracts the watermarking data instead of inserting, the watermarking process does not harm the original hologram data. So, it is expected to be used effectively for invisible and robust watermark for digital holograms.

Fragile Image Watermarking Using Bit Planes (비트 플레인을 이용한 영상의 연성 워터마킹)

  • 이혜주
    • Journal of Broadcast Engineering
    • /
    • v.6 no.1
    • /
    • pp.41-49
    • /
    • 2001
  • Digital watermarking has been proposed for copyright protection of digital data. According to the property of an embedded watermark, it is classified into two categories, robust watermarking and fragile watermarking. The former is used for copyright protection, and the latter applies to the authentication/integrity to verify the authenticity of data, If an Image has been modified or forged. the embedded watermark cannot be extracted from the Image. As a results, it is possible to defect the modification of the image. As pixels are represented by tilts, the modification of bits corresponds to the alteration of the image. In this paper, a new fragile watermarking is proposed In which two watermarks are embedded in order to detect some modification occurred In high and low bit Planes. From simulation results, the embedded watermark is Invisible in a watermarked image and we can locale some Places where the modification occurring

  • PDF

A Robust Wavelet-Based Digital Watermarking Using Statistical Characteristic of Image and Human Visual System

  • Kim, Bong-Seok;Kwon, Kee-Koo;Kwon, Seong-Geun;Park, Kyung-Nam
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1019-1022
    • /
    • 2002
  • The current paper proposes a wavelet-based digital watermarking algorithm using statistical characteristic of image and human visual system (HVS). The original image is decomposed into 4-level using a discrete wavelet transform (DWT), then the watermark is embedded into the perceptually significant coefficients (PSCs) of the image. In general, the baseband of a wavelet-decomposed image includes most of the energy of the original image, thereby having a crucial effect on the image quality. As such, to retain invisibility, the proposed algorithm does not utilize the baseband. Plus, the wavelet coefficients on the lowest level are also excluded in the watermark-embedding step, because these coefficients call be easily eliminated and modified by lossy compression and common signal processing. As such, the PSCs are selected from all subbands, except for the baseband and subbands on the lowest level. Finally, using the selected PSCs, the watermark is then embedded based on spatial masking of the wavelet coefficients so as to provide invisibility and robustness. Computer simulation results confirmed that the proposed watermarking algorithm was more invisible and robust than conventional algorithms.

  • PDF