JOURNAL BROWSE
Search
Advanced SearchSearch Tips
New Watermarking Technique Using Data Matrix and Encryption Keys
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
New Watermarking Technique Using Data Matrix and Encryption Keys
Kim, Il-Hwan; Kwon, Chang-Hee; Lee, Wang-Heon;
  PDF(new window)
 Abstract
Meaningful logos or random sequences have been used in the current digital watermarking techniques of 2D bar code. The meaningful logos can not only be created by copyright holders based on their unique information, but are also very effective when representing their copyrights. The random sequences enhance the security of the watermark for verifying one`s copyrights against intentional or unintentional attacks. In this paper, we propose a new watermarking technique taking advantage of Data Matrix as well as encryption keys. The Data Matrix not only recovers the original data by an error checking and correction algorithm, even when its high-density data storage and barcode are damaged, but also encrypts the copyright verification information by randomization of the barcode, including ownership keys. Furthermore, the encryption keys and the patterns are used to localize the watermark, and make the watermark robust against attacks, respectively. Through the comparison experiments of the copyright information extracted from the watermark, we can verify that the proposed method has good quality and is robust to various attacks, such as JPEG compression, filtering and resizing.
 Keywords
Data matrix;Encryption keys;Copyright information;Watermarking;
 Language
English
 Cited by
1.
Secure Audio Forensic Marking Algorithm Using 2D Barcode in DWT-DFRNT Domain, International Journal of Distributed Sensor Networks, 2014, 2014, 1  crossref(new windwow)
 References
1.
I. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for images, audio and video," Proceeding of Int. Conf. Image Processing, pp.243-246, 1996.

2.
W. Zeng and B. Liu, "A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images," IEEE Transactions on Image Processing, pp.1534- 1548, 1999.

3.
N. Nikolaidis and I. Pitas, "Copyright protection of images using robust digital signatures," Proceeding of Int. Conf. Acoustics Speech and Signal Processing, pp.2168-2171, 1996.

4.
Ji-Hong Chang and Long-Wen Chang, "A new image copyright protection using digital signature of trading message and bar codewatermark," Proceeding of Image and Vision computing , pp.205-209, 2003.

5.
J. J. Chae and B. S. Manjunath, "A Robust Embedded Data from Wavelet Coefficients," Proceedings of the SPIE : Storage and Retrieval for Image and Video Databases VI 3312, pp.308-317, 1998 .

6.
M. Barni, F. Bartolini, A. De Rasa and A. Piva, "Capacity of full frame DCT image watermarks," IEEE Transactions on Image Processing, vol.9, pp.1450-1455, 2000. crossref(new window)

7.
J. O. Ruanaidh, H. Petersen, A. Herrigel, S. Pereira, and T. Pun, "Cryptographic copyright protection for digital images based on watermarking techniques," Theoretical Computer Science,vol.226, pp.117-142, 1999. crossref(new window)

8.
Tomokazu Onuki, Takeharu Adachi, Madoka Hasegawa, and Shigeo Kato, "A study on a digital watermarking method for still images," International Technical Conference on Circuits/Systems, Computers and Communications , pp.19-22, 2000.

9.
Yong C. Kim, Byeong C. Choi, "Two-Step Detection Algorithm in a HVS-Based Blind Watermarking of Still Images," Lecture Notes on Computer Science, vol. 2613, pp. 235-248, 2002.

10.
Jong-Eun Ha, "A New Method for Detecting Data Matrix under Similarity Transform for Machine Vision Application," IJCAS, vol. 9, no. 4, pp.737-741, 2011.

11.
Kyung-Hun Lee, "Wavelet-Based Digital Watermarking Method," Journal of The Korea Computer Industry Education Society, vol.3, no.7, pp. 871-880, 2002.