• Title/Summary/Keyword: watermarking robustness

Search Result 303, Processing Time 0.024 seconds

New Echo Embedding Technique for Robust Audio Watermarking (강인한 오디오 워터마킹을 위한 새로운 반향 커널 설계)

  • 오현오;김현욱;윤대희;석종원;홍진우
    • The Journal of the Acoustical Society of Korea
    • /
    • v.20 no.2
    • /
    • pp.66-76
    • /
    • 2001
  • Conventional echo watermarking techniques often exhibit inherent trade-offs between imperceptibility and robustness. In this paper, a new echo embedding technique is proposed. The proposed method enables one to embed high energy echoes while the host audio quality is not deteriorated, so that it is robust to common signal processing modifications and resistant to tampering. It is possible due to echo kernels that are designed based on psychoacoustic analyses. In addition, we propose some novel techniques to improve robustness against signal processing attacks. Subjective and objective evaluations confirmed that the proposed method could improve the robustness without perceptible distortion.

  • PDF

A Low Frequency Band Watermarking with Weighted Correction in the Combined Cosine and Wavelet Transform Domain

  • Deb, Kaushik;Al-Seraj, Md. Sajib;Chong, Ui-Pil
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.14 no.1
    • /
    • pp.13-20
    • /
    • 2013
  • A combined DWT and DCT based watermarking technique of low frequency watermarking with weighted correction is proposed. The DWT has excellent spatial localization, frequency spread and multi-resolution characteristics, which are similar to the theoretical models of the human visual system (HVS). The DCT based watermarking techniques offer compression while DWT based watermarking techniques offer scalability. These desirable properties are used in this combined watermarking technique. In the proposed method watermark bits are embedded in the low frequency band of each DCT block of selected DWT sub-band. The weighted correction is also used to improve the imperceptibility. The extracting procedure reverses the embedding operations without the reference of the original image. Compared with the similar approach by DCT based approach and DWT based approach, the experimental results show that the proposed algorithm apparently preserves superiori mage quality and robustness under various attacks such as JPEG compression, cropping, sharping, contrast adjustments and so on.

A Study on the Image Watermarking Method (이미지 워터마킹 기법에 관한 연구)

  • Lee, Doo Sung;Kim, Sun Hyung;Kim, Ki Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.161-168
    • /
    • 2009
  • There are many research for efficient, robust and invisible watermarking system that protects the digital contents like a image and animation according to growth of IT industry. First of all, frequency domain watermarking system like DWT(Descrete Wavelet Transform) is excellent because of minimum loss of original image and robustness of external attack. But, if we raise the insertion strength of watermark, then blazing of image occurs on existing DWT watermarking system and we should have a regular square image. In this study, we research the overflow check for preventing image from blazing and a robust and invisible watermarking algorithm. And we research a free-size DWT watermarking system using padding bytes, without a dependency of size.

DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1402-1411
    • /
    • 2014
  • Buyer-seller watermarking protocol is defined as the practice of imperceptible altering a digital content to embed a message using watermarking in the encryption domain. This protocol is acknowledged as one kind of copyright protection techniques in electronic commerce. Buyer-seller watermarking protocol is fundamentally based on public-key cryptosystem that is operating using the algebraic property of an integer. However, in general usage, digital contents which are handled in watermarking scheme mostly exist as real numbers in frequency domain through DCT, DFT, DWT, etc. Therefore, in order to use the watermarking scheme in a cryptographic protocol, digital contents that exist as real number must be transformed into integer type through preprocessing beforehand. In this paper, we presented a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework and homomorphic encryption method for buyer-seller watermarking protocol. We applied integral-processing in order to modify the decimal layer. And we designed a direction-adaptive watermarking scheme by analyzing distribution property of the frequency coefficients in a block using JND threshold. From the experimental results, the proposed scheme was confirmed to have a good robustness and invisibility.

Text Watermarking using Space Coding (Space Coding을 이용한 Text watermarking)

  • 황미란;추현곤;최종욱;김회율
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.117-120
    • /
    • 2002
  • In this paper, we propose a new text watermarking method using space coding and PN sequence. A PN sequence generated from user message modifies the space between words in each line. The detection can be done without original text image using the average space with in the text. Experimental results show that proposed method has the invisible property and robustness to the attack such as the elimination of words in the text.

  • PDF

Audio Watermarking Using Empirical Mode Decomposition (경험적 모드 분해법을 이용한 오디오 워터마킹)

  • Nguyen, Phuong;Kim, Jong-Myon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.01a
    • /
    • pp.89-92
    • /
    • 2014
  • This paper presents a secure and blind adaptive audio watermarking algorithm based on Empirical Mode Decomposition (EMD). The audio signal is divided into frames and each one is decomposed adaptively, by EMD, into several Intrinsic Mode Functions (IMFs). The watermark and the synchronization codes are then embedded into the extrema of the last IMF. The experimental results show that the proposed method has good imperceptibility and robustness against signal processing attacks.

  • PDF

Image Watermarking using holographic watermark (홀로그래픽 watermark를 이용한 영상 watermarking I I)

  • 김규태;김수길;김종원;최종욱
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2003.11a
    • /
    • pp.181-183
    • /
    • 2003
  • We propose a new watermarking scheme that can be used to embed multiple bits and also resilient to JPEG compression and geometrical transforms such as scaling, rotation, and cropping, based on off-axis holographic watermark that allows multiple watermark recovery without original content(cover image). The holographic watermark is that Fourier transformed digital hologram is embedded into cover image in the spatial domain. The proposed method has not only increased robustness with a stronger embedding but also imperceptibility of the watermark in the evaluation process.

  • PDF

Robust Digital Watermarking Using Chaotic Sequence (카오스 시퀀스를 이용한 견고한 디지털 워터마킹)

  • 김현환;정기룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.4
    • /
    • pp.630-637
    • /
    • 2003
  • This paper proposed a new watermarking algorithm using chaotic sequence instead of conventional M-sequence for protecting copyright to the author. Robustness and security is very important for watermarking process. We use multi-threshold value according to the human visual system for improving robustness of watermarking to each subband images coefficient differently after wavelet transform. And then, we embedded watermark image to original image by multi-watermark weights which are made by random sequence generator. We detect watermark image from the difference data which is made from each wavelet subband images. We also simulate the efficiency from the various possible attacks. Chaotic sequence is better than M-sequence, because the one is very easy to make sequence and the chaotic sequence is changed easy according to the initial value. So, the chaotic sequence has the better security than the conventional M-sequence.

A Digital Watermarking Algorithm Using PIM and 2D Barcode (PIM과 2D 바코드를 이용한 워터마킹 알고리즘)

  • Han Su-Young;Kim Hong-Ryul;Lee Kee-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.103-108
    • /
    • 2005
  • In this Paper, we proposed a novel robust watermarking technique using PIM and 2D barcode for the copyright of the digital images. Because human is impervious to the change in the complex area, the embedding watermark to the selected coefficients using PIM enhances invisibility. A 2D barcode image is used for watermark in this research. The 2D barcode contains more information than conventional ID barcode and includes the error correction algorithm. Therefore the watermarking algorithm using 2D barcode enhances the robustness of watermark. From the experimental results , the proposed algorithm shows better invisibility and robustness performance in a general signal Processing such as JPEG and SPIHT lossy compression.

  • PDF

Performance Comparison of Frequency-Based Watermarking Methods (주파수 기반 워터마킹 기법의 성능 비교)

  • Yim, Kyoung-Jin;Choi, Tae-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.38 no.5
    • /
    • pp.65-76
    • /
    • 2001
  • In this paper, performance of frequency-based watermarking methods is compared, which are used to protect copyright of image data. For performance comparison of each transform method, a test image is transformed into frequency domain by a full- and block-discrete cosine transforms and wavelet transform, and after general image processing, robustness of each transform is evaluated with using the same watermark signals. Simulation results show that the watermarking method based on DCTs are more robust than WT. Especially, $8{\times}8$ BDCT is most robust for JPEG lossy compression and sharpening, while $8{\times}8$ FDCT is best. for smoothing and scaling. In addition, watermarking based on BDCT shows decreasing robustness for a larger block size, compared with general image processing.

  • PDF