A Watermarking Scheme to Extract the Seal Image without the Original Image

원본정보 없이 씰영상의 추출이 가능한 이미지 워터마킹 기법

  • 김원겸 (충남대학교 대학원 컴퓨터과학과) ;
  • 이종찬 (충남 청운대학교 인터넷컴퓨터과학과) ;
  • 이원돈 (충남대학교 컴퓨터과학과)
  • Published : 2000.12.01

Abstract

The emergence of digital imaging and digital networks has made duplication of original artwork easier. In order to protect these creations, new methods for signing and copyrighting visual data are needed. In the last few years, a large number of schemes have heen proposed for hiding copyright marks and other information in digital image, video, audio and other multimedia objects. In this paper, we propose a technique for embedding the watermark of visually recognizable patterns into the frequency domain of images. The embedded watermark can be retrieved from the decoded sequence witbout knowledge of the original. Because the source image is not required to extract the watermark, one cannot make the fake original that is invertible to watermarking scheme from the waternlarked image. In order to recover the embedded signature data without knowledge of the original, a prediction of the original value of the pixel containing the information is needed. The prediction is based on a averaging of amplitude values in a neighborhood around the pixel itself. Additionally the projxJsed technique could survive several kinds of image processings including JPEG lossy compression.

디지털 이미지 기법과 디지털 네트웍의 출현으로 예술적 작품의 복사가 더욱 쉬워지고 있다. 이러한 창작품을 보호하기 위해 데이터 안에 저작권을 표시할 수 있는 표식이나 인식 가능한 데이터를 삽입하는 기술이 필요해지고 있고 지난 몇 년간 디지털 이미지나 오디오, 비디오 등의 멀티미디어 데이터에 저작권을 표시하기 위한 데이터나 기타 다른 정보를 삽입할 수 있는 많은 기법들이 제안되어 왔다. 본 논문에서는 이미지의 주파수 영역에 인식 가능한 패턴을 삽입하고 추출하는 워트마킹 기법을 제안한다. 또한 삽입된 워터마크를 원본이미지의 정보 없이 추출할 수 있도록 하여 임의의 사람이 워터마크 된 이미지로부터 가짜원본을 생성하는 것이 어렵도록 한다. 원본정보 없이 워터마크를 추출하기 위해서 화소의 원래 값을 예측하는 방법을 사용한다. 예측기법은 구하고자 하는 화소의 주위값을 평균한다는 것을 의미한다. 부가적으로 워터마크를 이미지 주파수 영역에 삽입함으로써 JPEG같은 손실압축바업에도 견딜 수 있도록 한다.

Keywords

References

  1. I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, 'Secure spread spectrum watermarking for multimedia,' Tech. Rep. 95-10, NEC Research Institute, 1995
  2. W. Bender, D. Gruhl, and N. Morimoto. 'Techniques for data hiding,' Proc. of SPIE, Vol.2420, pp.40, FEB. 1995 https://doi.org/10.1117/12.205315
  3. E. Koch, J. Rindfrey, and J. Zhao. 'Copyright protection for multimedia data,' Proc. of the Int. Conf. on Digital Media and Electronic Publishing, 1994
  4. V. Solachidis, I. Pitas, Circularly Symmetric Watermark Embedding in 2-D DFT domain, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'99), Vol.VI, pp.3469-3472, Phoenix, USA, March, 1999 https://doi.org/10.1109/ICASSP.1999.757589
  5. Scott Craver, Nasir Memon, Boon-Lock Yeo and Minerva Yeung. 'Can invisible watermarks resolve rightful ownerships?,' Proc. of the IS&T/SPIE Conference on Storage and Retrieval for Image and Video Databases V, Vol.3022, pp.310-321, San Jose, CA, USA, FEB. pp.13-14, 1997 https://doi.org/10.1117/12.263419
  6. M. Swanson, B. Zhu and A. Tewfik, Robust Data Hiding for Images, IEEE Digital Signal Processing Workshop (DSP'96), pp.37-40, Sep., 1996 https://doi.org/10.1109/DSPWS.1996.555454
  7. H. Kii, J. Onishi, and S. Ozawa, The Digital Watermarking Method by Using both Patchwork and DCT, Proceedings of the International Conference on Multimedia Computing and Systems, Vol.1, pp.895-899, Florence, Italy, June, 1999 https://doi.org/10.1109/MMCS.1999.779321
  8. J. Fridrich, A Hybrid Watermark for Tamper Detection in Digital Images, Proceedings of the Fifth International Symposium on Signal Processing and its Applications(ISSPA'99), Vol.1, pp.301-30 4, Australia, Aug., 1999 https://doi.org/10.1109/ISSPA.1999.818172
  9. F. Hartung and B. Girod. 'Digital watermarking of raw and compressed video,' In N. Ohta, editor, Digital Compression Technologies and Systems. For Video communications, volume 2952 of SPIE Processings Series, pp.205-213, Oct., 1996 https://doi.org/10.1117/12.251278
  10. V. Basia and I. Pitas, Robust Audio Watermarking in the time-domain, Proc. of EUSIPCO'98, Sep., Rhodes, Greece, 1998
  11. N. Nikolaidis, I. Pitas, Digital Image Watermarking : an Overview, Proceedings of the International Conference on Multimedia Computing and Systems, Vol.1, pp.1-6, Florence, Italy, June, 1999 https://doi.org/10.1109/MMCS.1999.779111
  12. S. Kang and Y. Aoki, Image Data Embedding System for Watermarking Using Frensnel Transform, Proceedings of the International Conference on Multimedia Computing and Systems, Vol.1, pp.885-889, Florence, Italy, June, 1999 https://doi.org/10.1109/MMCS.1999.779319
  13. L. Qiao and K. Nahrstedt, Watermarking Methods For MPEG Encoded Video : Towards Resolving Rightful Ownership, Technical Report UIUCDCS-R-97-2032, Dec., 1997
  14. E. Kock and J. Zhao. 'Towards robust and hidden image copyright labeling,' In Proc. of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, JUNE 1995
  15. A.G. Bors and I. Pitas, 'Image watermarking using DCT domain constraints,' Proc. IEEE Int. Conference on Multimedia Computing and Systems, pp.86-90, 1994
  16. Ju Han Kim, Won Don Lee and Jin Hyeong Park, 'A Watermarking Scheme Robust to IBM Attack,' Proc. of The International Conference on Multimedia and Telecommunications Management (ICMTM), Hong Kong, Dec., 1998
  17. Ju Han Kim, Won Don Lee and Jin Hyeong Park, 'A Watermarking with Two Signatures,' Proc. of IEEE Second Workshop on Multimedia Signal Processing, pp.394-399 LA, Dec., 1998 https://doi.org/10.1109/MMSP.1998.738968
  18. M. Kutter, F. Jordan, F. Bossen, 'Digital signature of color images using amplitude modulation,' Journal of Electronic Imaging, Vol.7, No.2, pp.326-332, April, 1998 https://doi.org/10.1117/1.482648