• 제목/요약/키워드: watermark detection

검색결과 123건 처리시간 0.024초

Multimedia Watermark Detection Algorithm Based on Bayes Decision Theorys

  • Kwon, Seong-Geun;Lee, Suk-Hwan;Kwon, Kee-Koo;Kwon, Ki-Ryong;Lee, Kuhn-Il
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -2
    • /
    • pp.1272-1275
    • /
    • 2002
  • Watermark detection plays a crucial role in multimedia copyright protection and has traditionally been tackled using correlation-based algorithms. However, correlation-based detection is not actually the best choice, as it does not utilize the distributional characteristics of the image being marked. Accordingly, an efficient watermark detection scheme for DWT coefficients is proposed as optimal for non-additive schemes. Based on the statistical decision theory, the proposed method is derived according to Bayes' decision theory, the Neyman-Pearson criterion, and the distribution of the DWT coefficients, thereby minimizing the missed detection probability subject to a given false alarm probability. The proposed method was tested in the context of robustness, and the results confirmed the superiority of the proposed technique over conventional correlation-based detection method.

  • PDF

An Efficient Audio Watermark Extraction in Time Domain

  • Kang, Hae-Won;Jung, Sung-Hwan
    • Journal of Information Processing Systems
    • /
    • 제2권1호
    • /
    • pp.13-17
    • /
    • 2006
  • In this paper, we propose an audio extraction method to decrease the influence of the original signal by modifying the watermarking detection system proposed by P. Bassia et al. In the extraction of the watermark, we employ a simple mean filter to remove the influence of the original signal as a preprocessing of extraction and the repetitive insertion of the watermark. As the result of the experiment, for which we used about 20 kinds of actual audio data, we obtain a watermark detection rate of about 95% and a good performance even after the various signal processing attacks.

파워 스펙트럼 도메인 비대칭 워터마크의 성능 분석 (Performance analysis on the asymmetric watermark using power spectrum domain)

  • 서진수;유창동
    • 전자공학회논문지CI
    • /
    • 제40권3호
    • /
    • pp.164-170
    • /
    • 2003
  • 대표적인 비대칭 워터마킹 방법의 하나의 파워스펙트럼을 이용한 비대칭 워터마킹 방법의 성능을 분석하였다. 파워스펙트럼 도메인의 특성 분석을 통해 간단하면서도 성능 분석에 용이한 상관 검출기를 활용할 수 있음을 보였다. 제안된 상관 검출기를 이용하여 정보량을 늘려가면서 비트 검출 오류율 (bit error rate)을 구하였다. 실험 및 이론 분석 결과는 거의 일치하였으며, 파워스펙트럼 도메인 비대칭 워터마킹 방법은 삽입되는 데이터양이 증가할수록 급격히 그 성능이 나빠지는 것을 확인할 수 있었다.

Fake Iris Image Detection based on Watermark

  • Kim, Man-Ki;Lee, Samuel;Kim, Gye-Young
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권4호
    • /
    • pp.33-39
    • /
    • 2018
  • In this paper, we propose a describes how to detect a false iris image by inserting watermark into a iris image. The existing method, which inserts the watermark into the entire iris image to detect a fake iris, has a problem that can evade it by segmenting iris region of an iris image. The purpose of overcoming the problem, this paper proposes a new fake iris detection technique based on digital watermark. It first searches a central point of an iris image, divide the image into blocks with respect to the point. executes Discrete Cosine Transform, inserts watermark into the blocks, and then verifies an iris image using NC(Normalized Correlation). In the experiments, we confirm the robustness for attacks - crop and JPEG.

Digital Watermarking Technique for Images with Perspective Distortion

  • Chotikakamthorn, Nopporn;Yawai, Wiyada
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.1090-1093
    • /
    • 2004
  • In this paper, a problem of geometrically distorted images is considered. In particular, the paper discusses the detection of a watermark from a photographed image of the watermarked picture. The image is possibly obtained by using a digital camera. This watermark detection problem is made difficult by various geometric distortions added to the original picture through the printing and photographing processes. In particular, the paper focuses on the geometric distortion due to a projective transformation, as part of a camera 3D-to-2D imaging process. It is well-known that a cross ratio of collinear points is invariant under a perspective projection. By exploiting this fact, a projective-invariant digital watermarking technique is developed. By detecting the picture's corners, and the image center point at the intersection of two main diagonal lines, predefined cross ratios are used to compute the watermark embedded locations. From those identified embedding pixel locations, a watermark can be detected by performing a correlation between a watermark pattern and the image over those pixels. The proposed method does not require an inverse transformation on the distorted image, thus simplifying the detection process. Performance of the proposed method has been analyzed through computer experiments

  • PDF

Digital Watermark Based Error Detection for MPEG-4 Bitstream Error

  • Hiroyuki Okada;Shiitev, Altan-Erdene;Song, Hak-Sop;Gen Fujita;Takao Onoye;Isao Shirakawa
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -1
    • /
    • pp.152-155
    • /
    • 2002
  • In this paper, a new approach is proposed for the error detection dedicated to MPEG-4 video coding by using the digital watermarking. In the process of encoding, the proposed scheme abstracts the macroblock features of headers, motion vectors, and Discrete Cosine Transform (DCT) coefficients, which are embedded in the quantized DCT coefficients as the digital watermarks. The decoder performs the accurate error detection through the watermark extraction. Simulation results demonstrate that the error detection ability of the proposed approach can be significantly enhanced, and that digital watermark embedding incurs little degradation to the picture quality.

  • PDF

An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform

  • Zhang, Heng;Wang, Chengyou;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • 제13권5호
    • /
    • pp.1382-1396
    • /
    • 2017
  • In this paper, we analyze a recently proposed semi-fragile watermarking scheme based on local binary pattern (LBP) operators, and note that it has a fundamental flaw in the design. In this work, a binary watermark is embedded into image blocks by modifying the neighborhood pixels according to the LBP pattern. However, different image blocks might have the same LBP pattern, which can lead to false detection in watermark extraction process. In other words, one can modify the host image intentionally without affecting its watermark message. In addition, there is no encryption process before watermark embedding, which brings another potential security problem. To illustrate its weakness, two special copy-paste attacks are proposed in this paper, and several experiments are conducted to prove the effectiveness of these attacks. To solve these problems, an improved semi-fragile watermarking based on LBP operators is presented. In watermark embedding process, the central pixel value of each block is taken into account and Arnold transform is adopted to guarantee the security of watermark. Experimental results show that the improved watermarking scheme can overcome the above defects and locate the tampered region effectively.

Watermarking of Compressed Video in the Bitstream Domain: An Efficient Algorithm and its Implementation

  • ;임성준;한병완;장항배;김경규
    • 한국통신학회논문지
    • /
    • 제31권4C호
    • /
    • pp.458-471
    • /
    • 2006
  • Digital watermarking of multimedia data is a very active research area that has enjoyed a considerable amount of attention in recent years. In this paper, we propose an algorithm for embedding/detecting a fragile watermark in MPEG-4 compressed video domain (Simple and Advance Simple Profiles). The watermark bits are put directly into Huffman VLC-codespace of quantized DCT domain. The advantage of watermark embedding into the compressed domain is the significant savings for a real-time implementation as it does not require a full decoding operation. The watermark embedding does not change the video file size. The algorithm demonstrates high watermarking capacity, thereby providing reliable foolproof authentication. The results of experimental testing demonstrate that watermark embedding preserves the video quality. Watermark detection is performed without using the original video.

Bayes 판단 이론 기반 멀티미디어 워터마크 검출 알고리즘 (Multimedia Watermark Detection Algorithm Based on Bayes Decision Theory)

  • 권성근;이석환;김병주;권기구;하인성;권기룡;이건일
    • 한국통신학회논문지
    • /
    • 제27권7A호
    • /
    • pp.695-704
    • /
    • 2002
  • 멀티미디어에 삽입된 워터마크의 검출은 저작권 보호 및 인증 분야에서 매우 중요한 역할을 한다. 최근 워터마크의 검출에 많이 사용되는 유사도 기반 알고리즘은 대상 영상의 분포 특성을 이용하지 않기 때문에 검출 성능이 떨어지는 단점을 가진다. 따라서 본 논문에서는 웨이블릿 변환 영역에서 상승적 방법에 의하여 삽입된 워터마크에 대한 효율적인 검출 알고리즘을 제안하였다. 제안한 워터마크 검출 알고리즘은 통계적 판단 이론에 따라 Bayes 판단 이론, 웨이블릿 계수들의 확률 분포 모델, 및 Neyman-Pearson 정의에 기반을 둔다. 따라서 제안한 검출 알고리즘에서는 주어진 오류 검출 확률에 대하여 간과 검출 확률을 최소화할 수 있는 장점이 있다. 제안한 검출 알고리즘의 성능 평가는 견고성 측면에서 수행되었고, 실험 결과로부터 제안한 알고리즘이 유사도 기반 알고리즘에 비하여 우수한 성능을 나타냄을 확인하였다.

High Embedding Capacity and Robust Audio Watermarking for Secure Transmission Using Tamper Detection

  • Kaur, Arashdeep;Dutta, Malay Kishore
    • ETRI Journal
    • /
    • 제40권1호
    • /
    • pp.133-145
    • /
    • 2018
  • Robustness, payload, and imperceptibility of audio watermarking algorithms are contradictory design issues with high-level security of the watermark. In this study, the major issue in achieving high payload along with adequate robustness against challenging signal-processing attacks is addressed. Moreover, a security code has been strategically used for secure transmission of data, providing tamper detection at the receiver end. The high watermark payload in this work has been achieved by using the complementary features of third-level detailed coefficients of discrete wavelet transform where the human auditory system is not sensitive to alterations in the audio signal. To counter the watermark loss under challenging attacks at high payload, Daubechies wavelets that have an orthogonal property and provide smoother frequencies have been used, which can protect the data from loss under signal-processing attacks. Experimental results indicate that the proposed algorithm has demonstrated adequate robustness against signal processing attacks at 4,884.1 bps. Among the evaluators, 87% have rated the proposed algorithm to be remarkable in terms of transparency.