키와 로고 방식을 혼합한 이미지 워터마킹의 비가시성과 강인성 평가

Nonvisibility and robustness evaluation of image watermarking mixed Key and Logo method

  • 발행 : 2002.05.01

초록

본 연구에서는 키와 로고 방식을 혼합한 이미지 워터마킹의 비가시성과 강인성을 평가하였다. 키(Key)의 역할은 저작권자의 개인 ID(IDentification)가 하며 워터마크로는 로고영상(Logo Image)을 사용하였다. 실험영상으로는 Lena 표준영상을 선택하였고, 워터마크로는 32${\times}$32와 64${\times}$64 크기의 `Park'이라는2진 영상을 사용하였다. 제안한 워터마킹 기법의 비가시성을 평가하기 위해서 워터마크가 삽입된 영상의PSNR(Peak Signal to Noise Ratio)을 구하였으며, 강인성을 평가하기 위해서는 워터마크가 삽입된 영상에 영상변형 빛 JPEG 손실 압축이 가한 다음, 복원된 워터마크의 복원율(reconstructive rate)을 구하였다. 실험 결과, 표준 영상에 대하여 워터마크가 삽입된 영상의 PSNR은 93.75dB로 비가시성이 우수하였고, 64${\times}$64 크기의 워터마크를 삽입한 경우에 비하여 32${\times}$32 크기의 워터마크 영상을 삽입한 경우의 복원율이 영상축소에서는 평균 5.9%, 회전에서는 평균 13.9%, 잡음에서는 평균 6.5%, JPEG손실 압축에서는 평균 4.2%로 더 우수하다는 것을 알 수 있었다.

In this research, nonvisibility and robustness of image watermarking mixed Key and Logo method were evaluated. The role of the Key was performed by a personal ID of a copyrighter and the logo images were used as the watermark. The standard image of Lena was used for experimental image and binary images of `Park'with size 32${\times}$32 and 64${\times}$64 were used for the watermark, respectively In order to evaluate nonvisibility of the proposed watermarking scheme, PSNR(Peak Signal to Noise Ratio) of the watermarked image was obtained and for robustness reconstructive rates of the reconstructed watermark were obtained from the watermarked image with image transformation of JPEG lossy compression. The experimental results show that nonvisibility is excellent as PSNR of the watermarked image is 93.75dB and the reconstructive rates of the case of 322${\times}$32 watermark was better than the case of the 64${\times}$64 watermark; average 5.9%, 13.9%, 6.5%, and 4.2% in the case of scale-down rates, rotational rates, impulse noise power density, and JPEG lossy compression rates, respectively.

키워드

참고문헌

  1. G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, 'Watermarking digital image and video data,' IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20-46, Sep. 2000 https://doi.org/10.1109/79.879337
  2. M. Maes, T. Kalker, J. M. G. Linnartz, J. Talstra, G. F. G. Depovere, and J. Haitsma, 'Digital watermarking for DVD video copy protection,' IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 47-57, Sep. 2000 https://doi.org/10.1109/79.879338
  3. F. A. P. Perircolas, ‘Watermarking schemes evalution,’ IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 58-64, Sep. 2000 https://doi.org/10.1109/79.879339
  4. C. I. Podilchuk and E. J. Delp, ‘Digital watermarking: algorithms and applications,’ IEEE Signal Processing Magazine, vol. 18, no. 4, pp. 33-46, July 2001 https://doi.org/10.1109/79.939835
  5. W. Bender, D. Gruhl, N. Morimoto and A. Lu, 'Techniques for data hiding,' IBM Systems Journal, vol. 35(3/4), pp. 313-336, 1996 https://doi.org/10.1147/sj.353.0313
  6. I. Pitas, 'A method for signature casting on digital images,' In Proc. of IEEE ICIP'96, vol. 3, pp. 215-218, 1996 https://doi.org/10.1109/ICIP.1996.560422
  7. E. Koch and J. Zhao, 'Towards robust and hidden image copyright labeling,' Nonliner Singnal Porcessing Workshop, pp. 460-463, 1995
  8. C. T. Hsu and J. L. Wu, 'Multiresolution watermarking for digital images,' IEEE Trans. Circuits Syst., vol. 45, no. 8, pp. 1097-1101, Aug. 1998 https://doi.org/10.1109/82.718818
  9. I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, ‘secure spread spectrum watermarking for multimedia,’ IEEE Trans. on Image Processing, vol. 6, no. 12, pp. 1673-1687, Dec. 1997 https://doi.org/10.1109/83.650120
  10. C. T. Hsu and J. L. Wu, ‘Hidden digital watermarks in images,‘ IEEE Trans. on Image processing, vol. 8, no. 1, pp. 58-68, Jan. 1999 https://doi.org/10.1109/83.736686
  11. X. G. Xia, C. G. Boncelet and G. R. Arce, 'Multiresolution watermark for digital images,' In Proc. of IEEE ICIP'97, pp. 548-551, 1997
  12. C. T. Hsu and J. L. Wu, 'Digital watermarks in images,' IEEE Trans. Image Processing, vol. 8, no. 1, pp.58-68, Jan. 1999 https://doi.org/10.1109/83.736686
  13. Y. Park, H. R. Kim and J. S. Lee, 'Hybrid digital watermarking scheme using direct sequence-spread spectrum method,' In Proc. of IEEE ICT'2001, vol. 3, pp. 500-503, June 2001