• Title/Summary/Keyword: watermarking robustness

Search Result 303, Processing Time 0.024 seconds

A Direction-Adaptive Watermarking Technique Based on 2DCT in the Buyer-Seller Watermarking Protocol (구매자-판매자 워터마킹 프로토콜상에서 DCT 기반의 방향성 적응 워터마킹)

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Kwon, Ki-Ryong;Woo, Chong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.7
    • /
    • pp.778-786
    • /
    • 2014
  • Buyer-seller watermarking protocol is one of the copyright protection techniques which combine a cryptographic protocol used in electronic commerce with a digital wetermarking scheme aiming at proving the ownership of multimedia contents and preventing the illegal reproduction and redistribution of digital contents. In this paper, it is proposed a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework. In order to implement watermarking scheme in a public-key cryptosystem, it is divided that frequency coefficients exist as real number into integer and decimal layer. And the decimal layer is modified integer type through integral-processing. Also, for robustness and invisibility required in watermarking scheme, it is designed a direction-adaptive watermarking scheme based on locally edge-properties of each block in an image through analyzing distribution property of the frequency coefficients in a block using JND threshold.

Video Watermarking Using Human Visual System and Wavelet Transform (인간 시각 시스템 및 웨이블릿 변환을 이용한 비디오 워터마킹)

  • 권성근;김병주;김태수;이석환;권기룡;이건일
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.3
    • /
    • pp.436-443
    • /
    • 2003
  • A digital video watermarking algorithm is proposed that uses HVS and DWT. In this algorithm, each video frame is decomposed into four-level by DWT which reveals the characteristics of the human eyes and watermark is embedded into DWT coefficients using HVS. For robustness, the lowest level subbands which represent the highest frequency component are excluded in watermark embedding step and watermark is embedded into the perceptually significant coefficients (PSCs) of the rest subbands. PSCs of the baseband are selected according to the amplitude of the coefficients and PSCs of the high frequency subbands are selected by successive subband quantization (SSQ). Watermark is embedded into the PSCs of the baseband and high frequency subbands by Weber's law and spatial masking effect, respectively, for the invisibility and robustness. We tested the performance of the proposed algorithm compared with the conventional watermarking algorithm by computer simulation. Experimental results show that the proposed watermarking algorithm produces a better invisibility and robustness than the conventional algorithm.

  • PDF

Digital Image Watermarking using Subband Correlation Wavelet Domain (웨이블릿 영역의 부대역 상관도를 이용한 디지털 영상 워터마킹)

  • 서영호;박진영;김동욱
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.6
    • /
    • pp.51-60
    • /
    • 2003
  • The watermarking is the technique that embeds or extracts the certain data without the change of the original data for the copyright protection of the multimedia contents. Watermark-embedded contents must not be distinguished by human's eye and must be robust to the various image processing and the intentional distortions. In this paper, we propose a new watermarking technique applied in the wavelet domain which has both the spatial and frequency information of a image. For both the robustness and the invisibility, the positions for embedding the watermark is selected with the multi-threshold. We search the similarity between highly correlated coefficients in the each subband and decide the mark space after verifying the significance in the specified subband. The similarity is represented by the coefficient difference between the subbands and its distribution is used in the watermark embedding and extracting. The embedded watermark can be extracted without the original image using the relationship of the subbands. By these properties the proposed watermarking algorithm has the invisibility and the robustness to the attacks such as JPEG compression and the general image processing.

A public key audio watermarking using patchwork algorithm

  • Hong, Doo-Gun;Park, Se-Hyoung;Jaeho Shin
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.160-163
    • /
    • 2002
  • This paper presents a statistical technique for audio watermarking. We describe the application of the promising public key watermarking method to the patchwork algorithm. Its detection process does not need the original content nor the secret key used in the embedding process. Special attention is given to statistical method working in the frequency domain. We will present a solution of robust watermarking of audio data. In this scheme, an extension of patchwork audio watermarking is presented which enables public detection of the watermark. Experimental results show good robustness of the approach against MP3 compression and other common signal processing manipulations.

  • PDF

Adaptive Digital Watermarking for Copyright Protection of CAD Data

  • Kwon Ki-Ryong;Koo Bon-Ho;Kim Ji-Hong
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.6
    • /
    • pp.709-719
    • /
    • 2006
  • To protect against unlawful reproductions and distribution, the current paper proposes a digital watermarking technique for architectural drawings produced using a CAD system. First, the POLYLINEs are extracted from the drawing; then, an adaptive algorithm is used to embed a watermark in the characteristics of each POLYLINE. Next, the CIRCLEs are embedded using an adaptive watermarking algorithm related to the radius of circle from drawing. The proposed watermarking scheme is robust to various attacks, such as the geometrical transformation. Additionally, the proposed method satisfies the requirement of transparency for CAD program. It used AutoCAD 2002, which is commonly used as a CAD program for experiments. Experimental results confirmed the robustness and invisibility of the embedded watermarks in several conversions of an architectural drawing.

  • PDF

DIGITAL WATERMARKING OF SATELLITE IMAGERY USING THE ALGORITHM BASED ON A LOOK-UP TABLE METHOD

  • Bang, Yoon-Sik;Lee, Jae-Bin;Yu, Ki-Yun;Kim, Yong-Il
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.18-21
    • /
    • 2007
  • Digital image watermarking is a technology used in copyrighting of digital images by embedding unremovable informations. In this paper, a pixel-domain look-up-table-based watermarking algorithm is presented. With this methodology, the watermark was embedded in the host image, but we did not observe any distortion at certain specific region of interest. This means the proposed method is preferred in case of satellite images. Then, the image manipulation tool which is called 'StirMark' will be used to perform many kinds of attacks such as rotation, scaling, filtering and compression on the watermarked image. Finally, the effectiveness of a watermarking technique in terms of 'robustness' and 'data integrity' criteria will be measured by calculating PSNR of watermark and watermarked image.

  • PDF

Digital Watermarking for Copyright Protection of 3-D CAD Design Drawing Based on Vector Data Using Digital Watermarking

  • Kwon, Ki-Ryong;Lee, Suk-Hwan;Park, Seung-Seob;Jeong, Tai-Il
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.12
    • /
    • pp.1596-1606
    • /
    • 2006
  • There has been more increased the development of 3D technique since many 3D contents of 3D graphic model, 3D mobile/computer game, and 3D CAD have been serviced in Web or industry fields. Therefore, the watermarking system is more required to protect the copyright for 3D contents. Currently there has been researched about the watermarking for 3D graphic model of mesh or NURBS. However, watermarking technique based on CAD design drawing leaves something to be desired yet. This paper proposed the watermarking technique for 3D CAD design drawing using Line and Arc components. After drawing out Line and Arc components from designed drawing, we embed the watermark into both the length of Line component and the radius of Arc component. Experimental results verified that the proposed algorithm satisfies the transparency about watermarked drawing and also has the robustness against several attacks by using public CAD tool.

  • PDF

Implementation of a Real Time Watermarking Hardware System for Copyright Protection of a Contents in Digital Broadcasting (디지털 방송에서 콘텐츠의 저작권 보호를 위한 실시간 워터마킹 하드웨어 시스템 구현)

  • Jeong, Yong-Jae;Kim, Jong-Nam;Moon, Kwang-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.51-59
    • /
    • 2009
  • A watermarking for copyright protection of digital contents for broadcasting have to be made for a real-time system. In this paper, we propose a real-time video watermarking system which is hardware-based watermarking system of SD/HD (standard definition/high definition) video with the STRATIX FPGA device from ALTERA. There was little visual artifact due to watermarking in subjective quality evaluation between the original video and the watermarked one in our experiment. Embedded watermark was extracted after robustness testscalled natural video attacks such as A/D (analog/digital) conversion. Our implemented watermarking hardware system can be useful in movie production and broadcasting companies that requires real-time contents protection systems.

Comparing of Blind Watermarking Method using DWT and CAT (DWT와 셀룰라 오토마타 변환을 이용한 블라인드 워터마킹 비교)

  • Gong, Hui;Shin, Jin-Wook;Yoon, Sook;Park, Dong-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.92-100
    • /
    • 2011
  • In this paper, we propose a novel blind digital watermarking method based on a cellular automata transform (CAT). CAT is based on dynamic systems known as cellular automata(CA) and uses transform bases which are differently defined by a rule number, the number of neighbors, the number of cells, and an initial state, etc. The proposed CAT based method is compared with a blind watermarking method based on DWT which is commonly used for a domain transform in signal processing. We analyse properties on changes of DWT coefficients and CAT coefficients under various attacks and determine optimal parameters for a watermarking method robust to attacks. The simulations show that the watermarked images with high PSNR and MSSIM look visually identical to originals and are robust against most of typical image processing attacks. Moreover, the proposed CAT based watermarking method is superior to the DWT based one in robustness to most of typical image processing attacks including JPEG compression, median and average filtering, scaling, cropping, and histogram equalization.

Robust Watermarking Scheme Against Geometrical Attacks Using Alignment of Image Features (영상특징 정렬을 이용한 기하학적 공격에 강인한 워터마킹 기법)

  • Ko Yun-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.5
    • /
    • pp.624-634
    • /
    • 2006
  • This paper presents a new watermarking scheme that is robust against geometrical attacks such as translation and rotation. The proposed method is based on the conventional PSADT(Polar Coordinates Shape Adaptive Discrete Transform) method which is an robust watermarking scheme for an arbitrarily-shaped image such as character images. The PSADT method shows perfect robustness against geometrical attack if there is no change in the shape of the image object. However, it cannot be utilized to watermark general rectangular images because of the missing alignment between the watermarked signals in the embedding and extracting side. To overcome this problem we propose a new watermarking scheme that aligns the watermark signal using the image inherent feature, especially corner. Namely the proposed method decides a consistent target region whose shape and position isn't changed by any malicious attack and then embeds the watermark in it using the PSADT method. Experimental results show the robustness of the proposed method against geometrical attacks as well as image compression.

  • PDF