• 제목/요약/키워드: Pattern Watermark

검색결과 39건 처리시간 0.025초

트리플릿을 이용한 바코드 패턴 이미지 워터마크 (Barcode Pattern Image Watermark Using Triplet)

  • 박병수;추형석;안종구
    • 전기학회논문지
    • /
    • 제57권12호
    • /
    • pp.2330-2335
    • /
    • 2008
  • In this paper, we proposed a robust watermark scheme for image based on the discrete wavelet transform. In the first, we use the triplet method for embedding and extraction of watermark. Triplet method uses relationship among the discrete wavelet coefficients at the same position in the three detail subband of image. In the second, we use barcode Pattern Image for watermark scheme. By using barcode Pattern Images, a user is able to make many kinds of own watermark. In the third, the proposed method for image watermark provides the invisiblility which the other user can not discriminate watermark from watermarked image. The advantage of the proposed method is visibility when we extracted watermark from the image. The corresponding experimental results show that the proposed method has performance of a robustness from the noise attack.

An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform

  • Zhang, Heng;Wang, Chengyou;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • 제13권5호
    • /
    • pp.1382-1396
    • /
    • 2017
  • In this paper, we analyze a recently proposed semi-fragile watermarking scheme based on local binary pattern (LBP) operators, and note that it has a fundamental flaw in the design. In this work, a binary watermark is embedded into image blocks by modifying the neighborhood pixels according to the LBP pattern. However, different image blocks might have the same LBP pattern, which can lead to false detection in watermark extraction process. In other words, one can modify the host image intentionally without affecting its watermark message. In addition, there is no encryption process before watermark embedding, which brings another potential security problem. To illustrate its weakness, two special copy-paste attacks are proposed in this paper, and several experiments are conducted to prove the effectiveness of these attacks. To solve these problems, an improved semi-fragile watermarking based on LBP operators is presented. In watermark embedding process, the central pixel value of each block is taken into account and Arnold transform is adopted to guarantee the security of watermark. Experimental results show that the improved watermarking scheme can overcome the above defects and locate the tampered region effectively.

새로운 도트형 프린트 워터마크 패턴의 생성 및 부호화 기법 (Technique for production and encoding of New dot-type Print Watermark Pattern)

  • 이부형
    • 한국산학기술학회논문지
    • /
    • 제10권5호
    • /
    • pp.979-984
    • /
    • 2009
  • 본 논문에서는 2차원 인쇄물의 고유정보 즉, 텍스트, 도형 및 기호 등에 대응하는 음성, 영상 및 기타정보를 출력시킬 수 있도록 하기 위한 새로운 방법의 도트형 프린트 워터마크 생성 방법 및 부호화 기법을 제안하였다. 프린트 워터마크는 인쇄물의 고유정보에 대응하여 고유정보위에 다시 인쇄되는 특정마크로서 고유정보의 특성을 훼손하지 않으면서 음성, 또는 영상정보와 연결시키는 중간 매개 역할을 한다. 제안한 도트형 프린트 워터마크 패턴은 $0.4mm^2$의 면적 내에 $16{\times}16$의 행렬구조를 가지며, 256개의 원소(element) 중 23개의 위치에 도트가 인쇄된다. 인쇄되는 도트의 크기는 0.02mm고 매우 작아 가시화되지 않는다. 23개의 위치는 2진수 비트 위치와 매핑 되어 800만개 정도의 인쇄물 고유정보를 표현할 수 있으며, 도트가 인쇄되는 위치에 따라 쉽게 2진수로 부호화할 수 있다는 특징을 갖는다. 또한 실험을 통해 제안한 프린트 워터마크 패턴이 자체 제작된 인식장치에 의해 쉽게 인식됨을 보였다.

블록 정보를 이용한 칼라 정지영상 워터마킹 (Color Image Digital Watermarking Using Block Information)

  • 김희수;이호영;이호근;하영호
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2001년도 하계종합학술대회 논문집(4)
    • /
    • pp.81-84
    • /
    • 2001
  • In this paper, we proposed a digital watermarking for color still image using the characteristics of human visual system and the achromatic block information. We use a binary watermark signal and insert watermark signal in the chromatic component region of YCrCb color space. In order to extract the watermark signal, we extracted the watermark signal by presuming that modified pattern of chromatic saturation without using original an image. Experimental results show that the proposed watermarking method has a good performance to embed watermark signal and extract one.

  • PDF

SVD 및 트리플릿 기반의 디지털 워터마킹 기법 (Digital Watermarking Scheme based on SVD and Triplet)

  • 박병수;추형석;안종구
    • 전기학회논문지
    • /
    • 제58권5호
    • /
    • pp.1041-1046
    • /
    • 2009
  • In this paper, we proposed a robust watermark scheme for image based on SVD(Singular Value Transform) and Triplet. First, the original image is decomposed by using 3-level DWT, and then used the singular values changed for embedding and extracting of the watermark sequence in LL3 band. Since the matrix of singular values is not easily altered with various signal processing noises, the embedded watermark sequence has the ability to withstand various signal processing noise attacks. Nevertheless, this method does not guarantee geometric transformation(such as rotation, cropping, etc.) because the geometric transformation changes the matrix size. In this case, the watermark sequence cannot be extracted. To compensate for the above weaknesses, a method which uses the triplet for embedding a barcode image watermark in the middle of frequency band is proposed. In order to generate the barcode image watermark, the pattern of the watermark sequence embedded in a LL3 band is used. According to this method, the watermark information can be extracted from attacked images.

Robust Watermarking for Compressed Video Using Fingerprints and Its Applications

  • Jung, Soo-Yeun;Lee, Dong-Eun;Lee, Seong-Won;Paik, Joon-Ki
    • International Journal of Control, Automation, and Systems
    • /
    • 제6권6호
    • /
    • pp.794-799
    • /
    • 2008
  • This paper presents a user identification method at H.264 streaming using watermarking with fingerprints. The watermark can efficiently reduce the potential danger of forgery or alteration. Especially a biometric watermark has convenient, economical advantages. The fingerprint watermark can also improve reliability of verification using automated fingerprint identification systems. These algorithms, however, are not robust against common video compression. To overcome this problem, we analyze H.264 compression pattern and extract watermark after restoring damaged watermark using various filters. The proposed algorithm consists of enhancement of a fingerprint image, watermark insertion using discrete wavelet transform and extraction after restoring. The proposed algorithm can achieve robust watermark extraction against H.264 compressed videos.

LBP and DWT Based Fragile Watermarking for Image Authentication

  • Wang, Chengyou;Zhang, Heng;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • 제14권3호
    • /
    • pp.666-679
    • /
    • 2018
  • The discrete wavelet transform (DWT) has good multi-resolution decomposition characteristic and its low frequency component contains the basic information of an image. Based on this, a fragile watermarking using the local binary pattern (LBP) and DWT is proposed for image authentication. In this method, the LBP pattern of low frequency wavelet coefficients is adopted as a feature watermark, and it is inserted into the least significant bit (LSB) of the maximum pixel value in each block of host image. To guarantee the safety of the proposed algorithm, the logistic map is applied to encrypt the watermark. In addition, the locations of the maximum pixel values are stored in advance, which will be used to extract watermark on the receiving side. Due to the use of DWT, the watermarked image generated by the proposed scheme has high visual quality. Compared with other state-of-the-art watermarking methods, experimental results manifest that the proposed algorithm not only has lower watermark payloads, but also achieves good performance in tamper identification and localization for various attacks.

비가시성과 유사도 증가를 통한 강인한 패턴 워터마킹 방법 (A Robust Pattern Watermarking Method by Invisibility and Similarity Improvement)

  • 이경훈;김용훈;이태홍
    • 한국정보과학회논문지:소프트웨어및응용
    • /
    • 제30권10호
    • /
    • pp.938-943
    • /
    • 2003
  • 본 논문에서는 Tikhonov-Miller 처리를 이용하여 다양한 공격에 대해서 워터마킹의 강인성을 향상시키는 방법을 제안한다. 시각적으로 판별할 수 있는 패턴 워터마크를 웨이브릿 변환 영역에서 수평(LH2), 수직(HL2), 대각(HH2) 성분의 부대역에 임계치를 기준으로 가중치를 달리 부여하여 삽입한다. 또한 인간 시각 시스템의 특징을 이용하여 워터마크를 삽입한다. 삽입한 워터마크는 보안성과 높은 추출율을 위해 무작위로 섞었다. 그런 다음 섞어 짜 맞추기(Interlace)를 했다. 제안한 방법의 강인성과 유사성 향상을 입증하기 위해 명암, 크기 변화, 필터링, 잘라내기, 히스토그램 평활화, 손실압축(JPEG, gif)과 같은 영상처리를 하였다. 실험 결과 제안한 방법은 비가시성을 고려하여 강인하게 워터마크를 삽입할 수 있고 여러 공격에 대해서 더욱 높은 상관 계수로 추출할 수 있었다.

DCT 계수의 통계적 분석을 통한 최적의 워터마크 계수 추출 (Optimal Watermark Coefficient Extraction by Statistical Analysis of DCT Coefficients)

  • 최병철;김용철
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 추계종합학술대회 논문집(3)
    • /
    • pp.69-72
    • /
    • 2000
  • In this paper, a novel algorithm for digital watermarking is proposed. We use two pattern keys from BCH (15, 7) code and one randomizing key. In the embedding process, optimal watermark coefficients are determined by statistical analysis of the DCT coefficients from the standpoint of HVS. In the detection, watermark coefficients are restored by correlation matching of the possible pattern keys and minimizing the estimation errors. Attacks tested in the experiments ate image enhancement and image compression (JPEG). Performance is evaluated by BER of the logo images and SNR/PSNR of the restored images. Our method has higher performance against JPEG attacks. Analysis for the performance is included.

  • PDF

데이터 매트릭스와 비밀 키를 이용한 하이브리드 워터마킹 방법 (Hybrid Watermarking Scheme using a Data Matrix and Secret Key)

  • 전성구;김일환
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2006년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.144-146
    • /
    • 2006
  • The Data Matrix of two-dimensional bar codes is a new technology capable of holding relatively large amounts of data compared to the conventional one-dimensional bar code which is just a key that can access detailed information to the host computer database. A secret key is used to prevent a watermark from malicious attacks. We encoded copyright information into a Data Matrix bar code for encoding process and it was spread a pseudo random pattern using owner key. We embedded a randomized watermark into the image using watermark's embedding position, pattern generated with a secret key. The experimental results have shown that the proposed scheme has good quality and is very robust to various attacks, such as JPEG compression and noise. Also the performance of the proposed scheme is verified by comparing the copyright information with the information which is extracted from a bar code scantier.

  • PDF