RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 음성지원유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Survey on Digital Image Watermarking and Its Techniques

        Manjinder Kaur,Varinder Kaur Attri 보안공학연구지원센터 2015 International Journal of Signal Processing, Image Vol.8 No.5

        Watermarking is an art in which we hide some secret information in another file like image, audio, video, text etc. Watermarking is a concept closely related to steganography. In these, both hide information in a digital image. The information hide in this is in different forms like an image, song, video within the signal itself. In this paper, we present survey on image watermarking. In this paper, we also explain the types of watermarking and various techniques of watermarking and requirements of digital watermarking. We survey on some papers of image watermarking.

      • A Review on Different Digital Watermarking Techniques

        보안공학연구지원센터(IJSIP) 보안공학연구지원센터 2015 International Journal of Signal Processing, Image Vol.8 No.10

        A digital watermark is a type of indicator covertly embedded in the noise tolerant signal such as an image or audio data. Digital watermarking is the method that embeds information known as a watermark into the multimedia object such that the watermark can be extracted or detected later to create an assertion about the object. Embedded watermark will permit recognizing the owner of the work hardware implementation. This idea is applicable for the digital video and audio also. Embedding a digital signal (image, video or video) with data which cannot be easily eliminated is called digital watermarking. Digital watermarks may be used to the authenticate the integrity or authenticity of the carrier signal or to display the identity of its owners Digital watermarking is used as a key result to create the document transferring protected from unlawful interferences. Digital watermark methods are used in numerous areas such as copyright owner identification, protection and broadcast monitoring. Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image, which is overlaid on the host image, and provides a means of protecting the image. In this paper, aim is to present a survey of numerous methods on the basis of digital image watermarking. The digital watermarking method is becoming more important in this developing society of internet. The goal of this implementation is to survey the different techniques for Digital Watermarking.

      • Embedding Binary Image Watermark in DC Components of All Phase Discrete Cosine Biorthogonal Transform

        보안공학연구지원센터(IJSIA) 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.10

        Watermarking technique provides the possibility for copyright protection. Discrete cosine transform (DCT) is the most popular tool used in watermarking algorithm. But the watermarking algorithm based on DCT is not the most ideal choice in terms of the complexity and robustness. All phase discrete cosine biorthogonal transform (APDCBT) owns the characteristics of high frequency attenuation and good applications in image coding, image denoising and other fields of digital image processing, which provides an efficient method for watermarking. In this paper, a new watermarking algorithm based on APDCBT is proposed. Besides, the binary image watermark is scrambled by Arnold transform to enhance its privacy and robustness greatly in our algorithm. The watermark information is embedded in direct-current (DC) components considering DC components have much larger perceptual capacity. Compared with the DCT algorithm, the proposed algorithm has stronger robustness in embedding and extracting the watermark. Experimental results show that our algorithm can satisfy the imperceptibility and robustness very well. Furthermore, our algorithm is tested against four kinds of attacks: JPEG compression, Gaussian noise, salt & pepper noise and rotation.

      • SCISCIESCOPUS

        The problems in digital watermarking into intra-frames of H.264/AVC

        Kim, D.W.,Choi, Y.G.,Kim, H.S.,Yoo, J.S.,Choi, H.J.,Seo, Y.H. Butterworths ; Elsevier Science Ltd 2010 Image and vision computing Vol.28 No.8

        Differently from other image/video compression techniques, it is not easy to find a successful watermarking scheme for H.264/AVC. Thus we, as the researchers on digital watermarking, intend to find the reason(s) of the hardness in this paper. Among the various techniques in H.264/AVC we only concern the intra-prediction in this paper, which is the main technique to form an intra picture. We closely examine the properties of intra-prediction in the aspect of digital watermarking. We consider three watermarking schemes: (1) a blind scheme by fixing the watermark positions without using any information from encoding process, (2) a semi-blind scheme which selects watermark positions with a threshold value of the cost function to determine the prediction mode, and (3) a blind scheme selecting only the blocks predicted by 16x16 mode as the one to be watermarked. These three schemes are getting more restricted in selecting the watermarking positions. The experiments showed that none of the three schemes were satisfactory. Even the error rates of the extracted watermark data were getting lower. After examining the data, we found the followings. The intra-prediction of H.264/AVC itself is not reversible. That is, the re-engineering of the intra pictures, which is necessary to extract the embedded watermark, does not guarantee the same results as before re-engineering. The intra-prediction modes in many blocks and the coefficient values are changed in re-engineering. In addition, watermarking and attacks further change the prediction modes and coefficient values, which make the watermarking useless. The reason of changing the prediction modes and the coefficient values, we concluded, is heuristics of the technique. That means the intra-prediction includes many heuristic schemes that cannot recover the data exactly. Consequently a new watermarking method rather than the conventional ones is necessary to find.

      • SCOPUSKCI등재

        Biological Infectious Watermarking Model for Video Copyright Protection

        Jang, Bong-Joo,Lee, Suk-Hwan,Lim, SangHun,Kwon, Ki-Ryong Korea Information Processing Society 2015 Journal of information processing systems Vol.11 No.2

        This paper presents the infectious watermarking model (IWM) for the protection of video contents that are based on biological virus modeling by the infectious route and procedure. Our infectious watermarking is designed as a new paradigm protection for video contents, regarding the hidden watermark for video protection as an infectious virus, video content as host, and codec as contagion medium. We used pathogen, mutant, and contagion as the infectious watermark and defined the techniques of infectious watermark generation and authentication, kernel-based infectious watermarking, and content-based infectious watermarking. We experimented with our watermarking model by using existing watermarking methods as kernel-based infectious watermarking and content-based infectious watermarking medium, and verified the practical applications of our model based on these experiments.

      • SCOPUSKCI등재

        Biological Infectious Watermarking Model for Video Copyright Protection

        ( Bong Joo Jang ),( Suk Hwan Lee ),( Sanghun Lim ),( Ki Ryong Kwon ) 한국정보처리학회 2015 Journal of information processing systems Vol.11 No.2

        This paper presents the infectious watermarking model (IWM) for the protection of video contents that are based on biological virus modeling by the infectious route and procedure. Our infectious watermarking is designed as a new paradigm protection for video contents, regarding the hidden watermark for video protection as an infectious virus, video content as host, and codec as contagion medium. We used pathogen, mutant, and contagion as the infectious watermark and defined the techniques of infectious watermark generation and authentication, kernel-based infectious watermarking, and content-based infectious watermarking. We experimented with our watermarking model by using existing watermarking methods as kernel-based infectious watermarking and content-based infectious watermarking medium, and verified the practical applications of our model based on these experiments.

      • KCI등재

        Biological Infectious Watermarking Model for Video Copyright Protection

        장봉주,이석환,임상훈,권기룡 한국정보처리학회 2015 Journal of information processing systems Vol.11 No.2

        This paper presents the infectious watermarking model (IWM) for the protection of video contents that are based on biological virus modeling by the infectious route and procedure. Our infectious watermarking is designed as a new paradigm protection for video contents, regarding the hidden watermark for video protection as an infectious virus, video content as host, and codec as contagion medium. We used pathogen, mutant, and contagion as the infectious watermark and defined the techniques of infectious watermark generation and authentication, kernel-based infectious watermarking, and content-based infectious watermarking. We experimented with our watermarking model by using existing watermarking methods as kernel-based infectious watermarking and content-based infectious watermarking medium, and verified the practical applications of our model based on these experiments.

      • A Hybrid Novel Approach of Video Watermarking

        Manoj Kumar,Sangeet Sriastava,Arnold Hensman 보안공학연구지원센터 2016 International Journal of Signal Processing, Image Vol.9 No.10

        The rapid evaluation of image manipulation and tampering has evoked the need for protecting digital data. Therefore a copyright protection method is used to protect the user information known as watermarking. Watermarking is the major image processing technique used to authenticate digital data. In this paper a hybrid approach is proposed to protect the digital data and also authenticates the user information. The proposed approach is an improvement over traditional video watermarking approaches. It uses fractions from the watermarked image to embed into the unique frames of the original video. The whole approach is divided into three steps which are described in the next sections of this paper. To check the resilience and robustness of this approach, various attacks are implemented over the watermarked video. After attacks, watermark image is extracted from the watermarked video to check the robustness of this approach. The quality of the recovered watermarked image is analysed using bit error rate. Experimental results show that this approach is very robust compared to other approaches.

      • KCI등재

        영상 밝기와 대비가 워터마크 세기에 미치는 영향 분석

        문호석,박석봉,배현웅 한국자료분석학회 2008 Journal of the Korean Data Analysis Society Vol.10 No.3

        Watermarking technique has been widespreadly used for copyright protection of digital media. One of main issues in watermarking is to solve the problem of trade-off between fidelity(watermarked image that watermark was embedded into should be similar to original image) and robustness(it should resist to image distortions caused by attacks). In general, the problem has been solved through resolving strength of watermark reasonably. This paper proposes a new model to predict strength of watermark for digital wavelet transform(DWT)-based image watermarking. Psychological experiments on human image perception were fulfilled. We used regression analysis to determine strength of watermark. The analysis of the proposed model was statistically significant at the = .01 level of significance. The effects of image brightness and contrast to strength of watermark was almost same according to the proposed model. Also regression analysis reveals that edge information of image has proportion to strength of watermark. 디지털 콘텐츠의 저작권을 보호하기 위해서 워터마킹 기술이 널리 사용되고 있다. 워터마킹 기술에서 주요한 관심 가운데 하나는 워터마크가 삽입된 영상이 원본영상과 유사해야 하는 충실도와 워터마크를 제거하려는 악의적인 공격으로부터 강인해야 하는 강인성을 적절히 유지하는데 있다. 충실도와 강인성을 잘 유지하기 위해서는 워터마크 세기를 적절하게 결정해야 한다. 기존 연구에서는 워터마크 세기 결정 시에 개별 영상별로 갖고 있는 영상 특성이 반영되지 않았다. 본 논문에서는 영상 밝기와 대비에 따라서 인간이 지각하는 잡음(화질차이) 세기는 다르다는 연구 결과를 기초로 인간이 영상에 삽입되는 잡음을 어느 정도로 지각하는 지에 대한 심리학적인 실험과 회귀분석을 통해 영상에 적응적인 워터마크 세기 결정 모델을 제시하였다. 모델 적용 결과 유의수준 1%에서 통계적으로 유의하였으며 결정계수는 .51로 약 50% 설명력이 있었다. 또한 영상 밝기와 대비가 워터마크 세기에 비슷한 수준으로 영향을 준다는 것을 회귀분석 결과를 통해서 정량적으로 분석할 수 있었고, 영상의 윤곽선 정도가 워터마크 세기와 정의 상관이 있음을 실험결과를 통해 알 수 있었다.

      • KCI등재

        The Performance Analysis of Digital Watermarking based on Merging Techniques

        Batgerel Ariunzay,추형석,안종구 한국융합신호처리학회 2011 융합신호처리학회 논문지 (JISPS) Vol.12 No.3

        Even though algorithms for watermark embedding and extraction step are important issue for digital watermarking, watermark selection and post-processing can give us an opportunity to improve our algorithms and achieve higher performance. For this reason, we summarized the possibilities of improvements for digital watermarking by referring to the watermark merging techniques rather than embedding and extraction algorithms in this paper. We chose Cox's function as main embedding and extraction algorithm, and multiple barcode watermarks as a watermark. Each bit of the multiple copies of barcode watermark was embedded into a gray-scale image with Cox's embedding function. After extracting the numbers of watermark, we applied the watermark merging techniques; including the simple merging, N-step iterated merging, recover merging and combination of iterated-recover merging. Main consequence of our paper was the fact of finding out how multiple barcode watermarks and merging techniques can give us opportunities to improve the performance of algorithm.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼