DOI QR코드

DOI QR Code

Image Watermark Method Using Multiple Decoding Keys

다중 복호화 키들을 이용한 영상 워터마크 방법

  • Lee, Hyung-Seok (Division of Electrical & Electronics Engineering, Korea Maritime Univerity) ;
  • Seo, Dong-Hoan (Division of Electrical & Electronics Engineering, Korea Maritime Univerity) ;
  • Cho, Kyu-Bo (School of Electrical Engineering & Computer Science, Kyungpook National University)
  • 이형석 (한국해양대학교 전기전자공학부) ;
  • 서동환 (한국해양대학교 전기전자공학부) ;
  • 조규보 (경북대학교 전자전기컴퓨터학부)
  • Published : 2008.08.25

Abstract

In this paper, we propose an image watermark method using multiple decoding keys. The advantages of this method are that the multiple original images are reconstructed by using multiple decoding keys in the same watermark image, and that the quality of reconstructed images is clearly enhanced based on the idea of Walsh code without any side lobe components in the decoding process. The zero-padded original images, multiplied with random-phase pattern to each other, are Fourier transformed. Encoded images are then obtained by taking the real-valued data from these Fourier transformed images. The embedding images are obtained by the product of independent Walsh codes, and these spreaded phase-encoded images which are multiplied with new random-phase images. Also we obtain the decoding keys by multiplying these random-phase images with the same Walsh code images used in the embedding images. A watermark image is then made from the linear superposition of the weighted embedding images and a cover image, which is multiplied with a new independent Walsh code. The original image is simply reconstructed by the inverse-Fourier transform of the despreaded image of the multiplication between the watermark image and the decoding key. Computer simulations demonstrate the efficiency of the proposed watermark method with multiple decoding keys and a good robustness to the external attacks such as cropping and compression.

본 논문에서는 다중 복호화 키들을 이용한 영상 워터마크 방법을 제안하였다. 하나의 워터마크 영상에서 다중 복호화 키들을 이용하여 여러 개의 원 영상을 복원 할 수 있고 왈시 코드를 이용하여 복호화 과정에서 간단하게 사이드 로브를 제거한 복원 영상을 얻을 수 있는 장점을 갖고 있다. 삽입 과정에서 제로 패딩(zero-padding)된 원 영상들을 무작위 위상 영상들과 곱하여 푸리에 변환후 실수부를 취하여 부호화된 영상을 생성한다. 삽입 영상들은 확장된 부호화 위상 영상들을 새롭게 생성된 무작위 위상영상들과 곱한 후 이 영상들의 개수만큼 독립적으로 생성한 왈시 코드 영상들을 곱하여 생성하고 이 때 사용된 무작위 위상영상들에 동일한 왈시 코드 영상들을 곱하여 복호화 키 영상들로 사용한다. 스테고(stego) 영상은 삽입 영상들과 새로운 왈시 코드 영상이 곱하여진 커버(cover) 영상의 중첩에 의해 생성한다. 원 영상은 스테고 영상과 다중 복호화 키를 곱하여 비확산을 취한 후 역-푸리에 변환하여 복원할 수 있다. 컴퓨터 모의실험을 통하여 제안한 워터마크 방법의 적합성과 다중 복호화 키로 복원이 가능하고 영상에 잡음이 발생하더라도 원 영상의 복원이 가능함을 확인하였다.

Keywords

References

  1. B. Schneier, Applied cryptography-protocol, algorithms, and source code in C, 2nd ed., John Wiley & Sons, New York, 1995
  2. A. Shamir, “How to share secret,” Communications of ACM, vol. 22, pp. 612-613, 1979 https://doi.org/10.1145/359168.359176
  3. B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng., vol. 33, no. 6, pp. 1752-1756, 1994 https://doi.org/10.1117/12.170736
  4. R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Opt. Eng., vol. 35, no. 9, pp. 2464-2469, 1996 https://doi.org/10.1117/1.600849
  5. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett., vol. 20, no. 7, pp. 767-769, 1995 https://doi.org/10.1364/OL.20.000767
  6. B. Javidi and E. Ahouzi, “Optical security system with Fourier plane encoding,” Appl. Opt., vol. 37, no. 26, pp. 6247-6255, 1998 https://doi.org/10.1364/AO.37.006247
  7. T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng., vol. 39, no. 8, pp. 2031-2035, 2000 https://doi.org/10.1117/1.1304844
  8. M. Yamazaki and J. Ohtsubo, “Optimization of encrypted holograms in optical security systems,” Opt. Eng., vol. 40, no. 1, pp. 132-137, 2001 https://doi.org/10.1117/1.1334947
  9. B. Javidi, A. Sergent, G. Zhang, and L. Guibert, “Fault tolerance properties of a double phase encoding encryption technique,” Opt. Eng., vol. 36, no. 4, pp. 992-998, 1997 https://doi.org/10.1117/1.601144
  10. B. Wang, C. C. Sun, W. C. Su, and A. E. T. Chiou, “Shifttolerance property of an optical double-random phase-encoding encryption system,” Appl. Opt., vol. 39, no. 26, pp. 4788-4793, 2000 https://doi.org/10.1364/AO.39.004788
  11. C. H. Yeh, H. T. Cahng, H. C. Chien, and C. J. Kuo, “Design of cascaded phase Keys for a hierarchical security system,” Appl. Opt., vol. 41, no. 29, pp. 6128-6314, Oct. 2002 https://doi.org/10.1364/AO.41.006128
  12. N-J Kim, D-H Seo, and S-G Lee, C-M Shin, K-B Cho, and S-J Kim, “Hierarchical Image Encryption System Using Orthogonal Method,” Journal of OSK, vol. 17, no. 3, 2006 https://doi.org/10.3807/KJOP.2006.17.3.231
  13. K-T Kim, J-H Kim, and E-S Kim, “Multiple information hiding technique using random sequence and Hadamard matrix,” Opt. Eng., vol. 40, no. 11, pp. 2489-2494, 2001 https://doi.org/10.1117/1.1410104
  14. D. Abookasis, O. Montal, O. Abramson, and J. Rosen, “Watermarks encrypted in a concealogram and deciphered by a modified joint-transform correlator,” Appl Opt., vol. 44, no. 15, pp. 3019-3023, 2005 https://doi.org/10.1364/AO.44.003019
  15. G. Situ, J. Zhang, “Image hiding with computer-generated phase codes for optical authentication,” Opt. Commun. 245 pp. 55-65, 2005 https://doi.org/10.1016/j.optcom.2004.09.076
  16. M. Z. He, L. Z. Cai, Q. Liu, X. C. Wang, X. F. Meng, “Multiple image encryption and watermarking by random phase matching,” Opt. Commun. 247, pp. 29-37, 2005 https://doi.org/10.1016/j.optcom.2004.11.034
  17. Hsuan T. Chang and Chung L. Tsan, “Image watermarking by use of digital holography embedded in the discretecosine-transform domain,” Appl. Opt., vol. 44, no. 29, pp. 6211-6219, 2005 https://doi.org/10.1364/AO.44.006211
  18. D. P, J. W, S. Y, S. W, and A. L, “CDMA based Multipleuser digital watermarking,” Proceedings of the 2006 inter national conference on intelligent information hiding and multimedia signal processing, 2006
  19. K-B. Cho, D-H. Seo, and S-J. Kim, “Practical Image Hiding Method Using a Phase Wrapping Rule and Real-Valued Decoding Key,” Opt. rev., Vol. 14, No. 3, 2007 https://doi.org/10.1007/BF02919409
  20. S. Huang and J. K. Wu, “Optical Watermarking for Printed Document Authentication,” IEEE Trans. on Information Forensics and Security, vol. 2, no. 2, pp. 164-173, 2007 https://doi.org/10.1109/TIFS.2007.897255