• Title/Summary/Keyword: Digital Watermark

Search Result 453, Processing Time 0.028 seconds

Multiple Barcode Watermarking Technique for Improve Robustness and Imperceptibility (강인성과 비지각성 향상을 위한 다중 바코드 워터마킹 기법)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1723-1729
    • /
    • 2016
  • Digital watermarking is tried to get an optimum tradeoffs between its performance characteristics, robustness, transparency and capacity. This paper is, therefore, suggesting a watermarking technique that builds multiple barcodes in various frequency bands to implement embedded watermarks that is imperceptible and robust against various attacks. Even though a watermark technique with duplicated barcode watermarks embedded in various frequency bands can satisfy robustness as there is high possibility that watermarks embedded in an image remains after various attacks, the duplicated barcode data can weaken imperceptibility. Thus, to satisfy the conflicting characteristic requirements of watermarks, robustness and imperceptibility, different barcode data is embedded in each frequency band. The test shows that ownership authentication with the technique suggested in this thesis does not require specialized hardware, and extracted watermarks can be easily identified through a mobile barcode scanner app, which allows low complexity, low cost and swift identification.

A Study on the Watermarketing of Keyframe-Based for copyright Protection of video (동영상의 저작권 보호를 위한 키 프레임 기반의 워터마킹에 관한 연구)

  • Kim, Dan-Hwan;Oh, Moo-Song
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.102-107
    • /
    • 2005
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. the copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data which is a multimedia contents not to be, it inserts copyright information and it protects the right of ownership. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

The effect of mean brightness and contrast of digital image on detection of watermark noise (디지털 영상의 밝기와 대비에 따른 워터 마크 잡음 강도의 차이)

  • Kham, Kee-Taek;Moon, Ho-Seok;Yoo, Hun-Woo;Chung, Chan-Sup
    • Proceedings of the Korean Society for Cognitive Science Conference
    • /
    • 2005.05a
    • /
    • pp.125-129
    • /
    • 2005
  • 디지털 영상물에 대한 저작권을 보호하기 위해 저작권자의 고유한 영상을 기존 디지털 영상에 삽입하는 것을 워터 마킹이라고 부른다. 삽입된 워터 마크가 효과적으로 사용되기 위해서는 영상의 다양한 왜곡이나 변형에도 강건할 수 있게 그 강도가 강해야 하며, 동시에 워터 마크가 삽입된 영상의 왜곡을 식별할 수 없게 그 강도를 약하게 하여야 한다. 비가시성을 유지한 채 가능한 한 강한 워터마크를 삽입하는 것은 워터마크를 적용 하는 데 매우 중요한 문제이다. 대부분의 워터 마크 알고리듬에서 삽입될 워터 마크의 강도는 원영상과 워터마크 영상간의 물리적인 차이에 근거하여 계산된 특정 값으로 고정한 채, 이 값을 모든 영상에 동일하게 적용하고 있다. 인간의 경우 자극의 탐지는 주변 영상의 밝기나 대비 등 여러 요소에 의해 변화되므로 디지털 영상에 삽입된 워터 마크의 탐지도 영상의 특징에 따라서 변화될 수 있다. 본 연구에서는 원영상으로부터 세 수준의 밝기와 세 수준의 대비를 갖는 기본 영상들을 만든 후, 기본 영상에서 탐지될 수 있는 워터 마크의 강도가 변화되는 지를 살펴보았다. 연구 결과 영상의 밝기가 밝아질수록, 대비가 커질수록 지각될 수 있는 워터 마크의 강도는 더 커지는 것으로 나타났다. 또한 회귀분석을 통해 영상의 밝기와 대비에 근거하여 삽입될 워터 마크의 강도를 결정할 수 있는 회귀 식을 만들어 내었다. 이러한 회귀 식은 주어진 영상의 통계 치에 근거하여 워터 마크 강도를 적응적으로 변화시킬 수 있는 알고리듬을 개발하는 데 유용하게 사용될 수 있을 것이다.

  • PDF

Digital Watermarking for Three-Dimensional Polygonal Mesh Models in the DCT Framework (DCT영역에서 3차원 다각형 메쉬 모델의 디지헐 워터마킹 방법)

  • Jeon, Jeong-Hee;Ho, Yo-Sung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.3
    • /
    • pp.156-163
    • /
    • 2003
  • Most watermarking techniques insert watermarks into transform coefficients in the frequency domain because we can consider robust or imperceptible frequency bands against malicious attacks to remove them. However, parameterization of 3-D data is not easy because of irregular attribution of connectivity information, while 1-I) or 2-D data is regular. In this paper we propose a new watermarking scheme for 3-D polygonal mesh models in the DCT domain. After we generate triangle strips by traversing the 3-D model and transform its vertex coordinates into the DCT domain, watermark signals are inserted into mid-frequency bands of AC coefficients for robustness and imperceptibility. We demonstrate that our scheme is robust against additive random noise, the affine transformation, and geometry compression by the MPEG-4 SNHC standard.

Mobile 3D Contents Watermarking Technique Based on Buyer-Seller Watermarking Protocol (Buyer-Seller 워터마킹 프로토콜 기반의 모바일 3D 콘텐츠 워터마킹 기법)

  • Kwon, Seong-Geun;Lee, Suk-Hwan;Bae, Sung-Ho;Park, Jae-Bum;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8C
    • /
    • pp.788-799
    • /
    • 2007
  • This paper presents a watermarking method for copyright protection and illegal copy prevention of mobile 3D contents. The proposed method embeds copyright information and user's phone number into spatial domain and encryption domain of mobile animation data based on Buyer-Seller watermarking protocol. Furthermore, we insert user's operation key so that only authorized user can play 3D animation game in mobile device. We implemented the proposed method by using mobile animation tool, G3-SDK. From experimental results, we verified that the proposed method is capable of copyright protection and illegal copy prevention since the watermark can be well extracted against geometrical attacks, such as noise addition, data accuracy variableness and data up/down scaling.

Web Services-Adaptable Privacy-Aware Digital Rights Management Architecture (웹서비스 환경에서의 프라이버시를 보호하는 디지털 저작권 관리 아키텍쳐)

  • Song, You-Jin;Lee, Dong-Hyeok
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.4
    • /
    • pp.53-81
    • /
    • 2005
  • Current DRM system has limitation in protection of user's privacy Therefore, many troubles are expected in service providing if it comes into the ubiquitous times of context-aware environment. HKUST Proposed a watermark-based web service DRM system. However, the relevant study does not consider ubiquitous environment and cannot provide service that considered a context. And privacy protection of a user is impossible. On the other hand, Netherlands Phillips laboratory indicated a privacy problem of a DRM system and they proposed an alternative method about this. However, in relevant study, a Sniffing/Replay attack is possible if communicated authentication information are exposed between a user and device. We designed web services adaptable privacy-aware DRM architecture which supplements these disadvantages. Our architecture can secure user authentication mechanism for sniffing/Replay attack and keep anonymity and protect privacy Therefore , we can implement the privacy-aware considered web service DRM system in Context-Aware environment.

  • PDF

A Video Watermarking Using 3D DWT and Binary Image Watermark (3차원 웨이블릿 변환과 이진 영상 워터마크를 이용한 비디오 워터마킹)

  • Kim Seung-Jin;Kim Tae-Su;Kwon Ki-Ryong;Lee Kuhn-Il
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.6
    • /
    • pp.27-32
    • /
    • 2005
  • An effective video watermarking algorithm is proposed to protect the copyright. The watermarking procedure is based on a three-dimensional discrete wavelet transform (3D DWT) and spread spectrum sequences. Two perceptual binary watermarks are preprocessed using mixing and pseudorandom permutation. After dividing the video sequence into video shots, the 3D DWT is performed, then the preprocessed watermarks are embedded into the 3D DWT coefficients, while considering robustness and invisibility, using two spread spectrum sequences defined as the user key. Experimental results show that the watermarked frames are subjectively indistinguishable from the original frames, plus the proposed video watermarking algorithm is sufficiently robust against such attacks as low pass filtering, frame dropping, frame average, and MPEG coding.

Study on the Amplitude Modification Audio Watermarking Technique for Mixed Music with High Inaudibility (높은 비가청성을 갖는 믹스 음악의 크기 변조 오디오 워터마킹 기술에 관한 연구)

  • Kang, Se-Koo;Lee, Young-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.67-74
    • /
    • 2016
  • In this paper, we propose a watermarking technology for a mixed music. The mixed music means recreated music that contained a number of musics in one audio clip. Royalty associated with the audio content is typically imposed by the full audio content. However, the calculation of royalties gives rise to conflict between copyright holders and users in the mixed music because it uses not full audio content but a fraction of that. To solve the conflict related with the mixed music, we propose a audio watermarking technique that inserts different watermarks for each audio in the audio that make up the mixed music. The proposed watermarking scheme might have poor SNR (signal to noise ratio) to embed to each audio clip. To overcome poor SNR problem, we used inaudible pseudo random sequence which modifies typical pseudo random sequence to canonical signed digit (CSD) form. The proposed method verifies the performance by each watermark extraction and the time internal estimation valies from the mixed music.

Blind Watermarking Using by Multi-wavelet Transform and Binary Image (다중 웨이블릿 변환과 이진영상을 이용한 Blind 워터마킹)

  • Kim, Tae-Ho;Park, Mu-Hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.413-416
    • /
    • 2005
  • Developement of computer and digitalizing of medical implement are being caused digitalizing of medical image. Medical Images are being managed more by PACS. In this situation comes out many problem about ownership, the right of properity of the medical images and notice wheather the data are modified. Digital watermarking can solve this problem. The proposed schemes have a two weak point that Non-blind method need a original image and Blind method use gaussian watermarking. In this paper, we propose a blind watermarking using binary image in order to easily recognize result of watermark This proposed scheme using wavelet transform and Circular Input method that input in medium-band of frequency domain.

  • PDF

Design of robust Watermarking Algorithm against the Geometric Transformation for Medical Image Security (의료 영상보안을 위한 기하학적 변형에 견고한 워터마킹 알고리즘 설계)

  • Lee, Yun-Bae;Oh, Guan-Tack
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2586-2594
    • /
    • 2009
  • A digital watermarking technique used as a protection and certifying mechanism of copyrighted creations including music, still images, and videos in terms of finding any loss in data, reproduction and pursuit. This study suggests using a selected geometric invariant point through the whole processing procedure of an image and inserting and extracting based on the invariant point so that it will be robust in a geometric transformation attack. The introduced algorithm here is based on a watershed splitting method in order to make medical images strong against RST(Rotation Scale, Translation) transformation and other processing. It also helps to maintain the watermark in images that are compressed and stored for a period of time. This algorithm also proved that is has robustness against not only JPEG compression attack, but also RST attack and filtering attack.