DOI QR코드

DOI QR Code

A Robust Image Watermarking Algorithm and System Architecture for Semi-fingerprinting

Semi-fingerprinting을 위한 강인한 이미지 워터마킹 알고리즘 및 시스템 구조

  • 정길호 (성균관대학교 대학원 전기전자 및 컴퓨터공학과) ;
  • 이한호 (㈜마크애니연구소) ;
  • 엄영익 (성균관대학교 정보통신공학부)
  • Published : 2003.04.01

Abstract

In this paper, we propose a new watermarking method based on spread spectrum and a semi-fingerprinting system architecture that can be built using our robust watermarking method. Especially, we describe a method that extends the application area of watermarking technology to more practical application domains by applying the watermarking technology that has been focused mainly on copyright protection to fingerprinting area. Our proposed watermarking scheme uses the method that inserts more data by using random number shifting method. We improved the reliability of acquired data with 20-bits CRC code and 60-bits inserted information. In addition, we designed the system architecture based on the recommendation of cIDf (content ID forum) in order to apply the system on the semi-fingerprinting area.

본 논문에서는 대역확산 방식을 응용한 새로운 워터마킹 기법과 이를 이용한 semi-fingerprinting 시스템 구조를 제시하며, 특히, 저작권 보호에 주초점이 맞추어져 있는 워터마크 기술을 fingerprinting 분야에 적용함으로써 그 동안 학문연구에 그치고 있었던 워터마크 기술을 보다 현실적인 응용에까지 확대시키기 위한 방법을 제시한다. 본 논문에서 제안하는 워터마킹 기법은 대역확산 방식중 random number shift 방법을 이용하여 데이터 삽입량을 증가시키는 방법의 일종이며, 삽입되는 데이터량이 60-bits이고, 20-bits CRC코드를 이용하여 추출된 정보의 신뢰도를 높였다. 또한, semi-fingerprinting에 적용하기 위해서 cIDf(content ID forum)의 지침을 기반으로 워터마크를 구성하였다.

Keywords

References

  1. I. J. Cox, M. L. Miller and J. A. Bloom, 'Watermarking applications and their properties,' International Conference Information technology, '2000, Las Vegas, 2000 https://doi.org/10.1109/ITCC.2000.844175
  2. D. F. Josep and H. J. Jordi, 'Simple Collusion-Secure Fingerprinting Schemes for Images,' IEEE ITCC '2000, pp. 128-132, 2000 https://doi.org/10.1109/ITCC.2000.844195
  3. A. E. Caldwell, H. J. Choi and A. B. Kahng, 'Effective Iterative Technique for Fingerprinting Design IP,' 36th ACM/IEEE Design Automation Conference Proceedings, pp. 843-848, Jun., 1999 https://doi.org/10.1145/309847.310083
  4. J. J. K. O'Ruanaidh and T. Pun, 'Rotation, Scale and Translation Invariant Digital Image Watermarking,' Signal Processing Journal, 1998 https://doi.org/10.1016/S0165-1684(98)00012-7
  5. C. Y. Lin, 'Public Watermarking Surviving General Scaling and Cropping : An Application for Print-and-Scan Process,' ACM Multimedia '99, Orlando, FL, USA, Oct., 1999
  6. C. Y. Lin and S. F. Chang, 'Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process,' ISMIP '99, Taipei, Taiwan, Dec., 1999
  7. R. Caldelli, M. Barni, F. Bartolini and A. Piva, 'GEOMETRIC-INVARIANT ROBUST WATERMARKING THROUGH CONSTELLATION MATCHING IN THE REQUQENCY DOMAIN,' Proceedings of 7th IEEE ICIP 2000, Vol.II, pp.65-68, Vancouver, Canada, Sep., 2000 https://doi.org/10.1109/ICIP.2000.899227
  8. C. R. Choi and J. Jeong, 'Robust Image Watermarking Scheme Resilient to Desynchronization Attacks,' SPIE 2002 Security and Watermarking of Multimedia Contents IV, San Jose, USA, Jan., 2002 https://doi.org/10.1117/12.465290
  9. J. Dittmann, A. Behr, M. Stabenau, P. Schmitt, J. Schwenk and J. Ueberberg, 'Combining digital Watermarks and collusion secure Fingerprints for digital Images,' IS&T/SPIE Conference on Security and Watermarking of Multimedia Contents, SPIE, San Jose, California, Vol.3675, Jan., 1999
  10. J. K. Su and B. Girod, 'On the Robustness and Imperceptibility of Digital Fingerprints,' ICMCS'99, Florence, Italy, Vol.2, pp.530-535, Jun., 1999 https://doi.org/10.1109/MMCS.1999.778540
  11. T. Kalker, G. Depovere, J. Haitsma and M. Maes, 'A Video Wartermarking System for Broadcast Monitoring,' IS&T/SPIE Conference on Security and Watermarking of Multimedia Contents, SPIE, San Jose, California, Vol.3675, Jan., 1999
  12. F. A. P. Petitcolas and R. J. Anderson, 'Evaluation of copyright marking systems,' In proceedings of IEEE Multimedia Systems '99, Florene, Italy, Vol.1, pp.574-579, June, 1999 https://doi.org/10.1109/MMCS.1999.779264
  13. I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, 'Secure spread spectrum watermarking for multimedia,' NEC Res. Insti., Princeton, NJ, Tech. Rep.95-10, 1995