RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Review on Different Digital Watermarking Techniques

        보안공학연구지원센터(IJSIP) 보안공학연구지원센터 2015 International Journal of Signal Processing, Image Vol.8 No.10

        A digital watermark is a type of indicator covertly embedded in the noise tolerant signal such as an image or audio data. Digital watermarking is the method that embeds information known as a watermark into the multimedia object such that the watermark can be extracted or detected later to create an assertion about the object. Embedded watermark will permit recognizing the owner of the work hardware implementation. This idea is applicable for the digital video and audio also. Embedding a digital signal (image, video or video) with data which cannot be easily eliminated is called digital watermarking. Digital watermarks may be used to the authenticate the integrity or authenticity of the carrier signal or to display the identity of its owners Digital watermarking is used as a key result to create the document transferring protected from unlawful interferences. Digital watermark methods are used in numerous areas such as copyright owner identification, protection and broadcast monitoring. Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image, which is overlaid on the host image, and provides a means of protecting the image. In this paper, aim is to present a survey of numerous methods on the basis of digital image watermarking. The digital watermarking method is becoming more important in this developing society of internet. The goal of this implementation is to survey the different techniques for Digital Watermarking.

      • A Survey on Digital Image Watermarking and Its Techniques

        Manjinder Kaur,Varinder Kaur Attri 보안공학연구지원센터 2015 International Journal of Signal Processing, Image Vol.8 No.5

        Watermarking is an art in which we hide some secret information in another file like image, audio, video, text etc. Watermarking is a concept closely related to steganography. In these, both hide information in a digital image. The information hide in this is in different forms like an image, song, video within the signal itself. In this paper, we present survey on image watermarking. In this paper, we also explain the types of watermarking and various techniques of watermarking and requirements of digital watermarking. We survey on some papers of image watermarking.

      • KCI등재

        Development of Digital Watermarking Technology to Protect Cadastral Map Information

        Kim Jung Yeop,Lee Hyun Joon,Hong Sung Eon 대한공간정보학회 2010 대한공간정보학회지 Vol.18 No.3

        본 연구에서는 디지털워터마킹 방법을 이용하여 디지털 지적도면의 불법유통과 불법복제 등을 방지할 수 있는 대책을 마련하여 보고자 하였다. 이를 위해 기존 연구의 워터마킹 방법을 토대로 지적도면의 특성에 적합하도록 디지털 워터마킹 방법을 개발하고, 이에 대한 성능을 평가하여 보았다. 연구결과, 기존 연구성과를 토대로 워터마크키와 일방함수를 이용하여 알고리즘을 보완함으로써 워터마킹의 보안성을 강화하였다. 또한 충실도, 강인성, 긍정적 오류율을 모두 만족시키는 동시에 위상 관계 역시 변화가 없는 것으로 나타났다. 본 연구에서 제시하는 방법은 지적도면 뿐만 아니라 GIS, 네비게이션 데이터와 같은 벡터데이터에도 이용 가능하도록 개선하였기 때문에 향후 방법론에 대한 추가적인 보완을 통한다면 보다 광범위하게 이용될 수 있을 것으로 기대한다. This research aimed to prevent illegal distribution and reproduction of digital cadastral map information using digital watermarking. To this end, a digital watermarking was developed in consideration of the properties of cadastral maps and based on watermarking methods, after which its performance was evaluated. A watermark key and a one-way function was used to compensate for the algorithm and, therefore, watermarking security, based on the existing research results. In these ways, the present method meets the requirements for fidelity, robustness, false positive rate and the maintenance of consistent topology. The advanced techniques suggested in this paper were devised so as to be suitable for vector data such as GIS and navigation data as well as cadastral maps. Moreover, if the existing methodology is further improved, it could be expected to be used even more widely.

      • Survey on Digital Watermarking Techniques

        Deepti Shukla,Nirupama Tiwari 보안공학연구지원센터 2015 International Journal of Signal Processing, Image Vol.8 No.9

        This paper presents a literature survey on Digital Watermarking within an image. It describes the early work carried out on digital watermarks, including the brief analysis of various watermarking schemes and its applications. This paper also makes a comparison between various watermarking schemes .This paper also gives us a brief introduction about the procedure of digital watermarking.

      • KCI등재

        디지털 동영상 어플리케이션의 향상된 보안성을 위한 비시각적인 워터마킹

        서정희(Jung-Hee Seo),박흥복(Hung-Bog Park) 한국컴퓨터정보학회 2011 韓國컴퓨터情報學會論文誌 Vol.16 No.10

        디지털 비디오 워터마킹의 성능은 디지털 비디오에서 많은 정보를 은닉하는 방법에 대한 평가이다. 그러므로 디지털 컨텐츠에 대한 주파수 영역의 고화질의 동영상에 많은 비트의 데이터를 저장하는 방법이 요구되고 있다. 따라서 본 논문은 워터마크 요소 중 강인성과 비시각성 사이의 절충을 통해서 동영상의 프레임에 대해 휘도 성분을 추출한 후 웨이블릿 변환을 수행하여 LH와 HL 부대역에 워터마크를 내장하고 비시각적인 워터마크 기반의 강인한 워터마크를 통해 향상된 워터마크의 보안성을 위한 워터마크 시스템을 설계한다. 워터마크의 보안성에 대한 성능의 분석은 통계적인 방법을 사용하여 비시각적인 워터마킹에서의 다양한 공격에 대한 강인성을 평가한다. 실험 결과에 따르면 노이즈 추가, 손실 압축, Low-Pass 필터링과 같은 일반적인 신호 처리를 수행하여 워터마크 강인성과 비시 각성을 평가하였고, 다양한 공격에 대한 워터마크의 보안성을 검증할 수 있었다. Performance of digital video watermarking is an assessment that hides a lot of information in digital videos. Therefore, it is required to find a way that enables to store lots of bits of data into a high quality video of the frequency area of digital contents. Hence, this paper designs a watermarking system improving security with an enhancing watermarking based on invisible watermarking and embedding an watermarking on LH and HL subband and its subband by transforming wavelet after the extraction of luminance component from the frames of video by compromising robustness and invisible of watermarking elements. The performance analysis of security of watermarking is carried out with a statistic method, and makes an assessment of robustness against variety of attacks to invisible watermarking. We can verify the security of watermarking against variety of attacks by testing robustness and invisible through carrying out general signal processing like noise addition, lossy compression, and Low-Pass filtering.

      • Survey on Digital Watermarking Techniques

        보안공학연구지원센터(IJSIP) 보안공학연구지원센터 2015 International Journal of Signal Processing, Image Vol.8 No.8

        This paper presents a literature survey on Digital Watermarking within an image. It describes the early work carried out on digital watermarks, including the brief analysis of various watermarking schemes and its applications. This paper also makes a comparison between various watermarking schemes .This paper also gives us a brief introduction about the procedure of digital watermarking.

      • Sliding Window used for Robustness Optimization Employing Neighborhood Concept and Genetic Algorithm

        Sachin Goyal,Roopam Gupta 보안공학연구지원센터 2016 International Journal of Database Theory and Appli Vol.9 No.1

        Fast distribution of digital contents through open networks is not posing a significant problem due to digital media revolution. Modern technologies have also reduced the reproduction time of digital media and its fast distribution. However, this facility has also the darker side where unauthorized users can tamper its contents and manipulate the digital data thus giving rise to serious security concerns. This problem has to be addressed very seriously. Digital watermarking techniques have recently evolved to address the above problems. The usage of these digital watermarks prevent illegal reproduction and usage of digital data as well as help in identifying the origin, author, owner etc even after various manipulations or attack on the digital data. A number of watermarking techniques in spatial and frequency domain were given by various researchers which suffered from problems robustness. Genetic algorithm provides an alternative way of creating watermarks with Promising values of robustness aspect of watermarking. This paper deals with design and development of a new watermarking technique which uses genetic algorithm to identify locations within the cover image for watermark insertion in spatial domain and then apply the average neighborhood concept for the purpose of watermark insertion and extraction ensuring higher robustness and resilience to several possible image attacks. Genetic search often produces same watermark locations in different populations for watermark insertion resulting in poor value of robustness, which need to be checked. Sliding window concept introduced in this paper uses a set of a few genes which are serially shuffled to get new set of locations for watermarking during each population generation and helps in enhancing robustness aspect of watermarking. Roulette-wheel selection has been used while using the genetic algorithms developed in the paper.

      • Survey on Digital Watermarking Techniques

        Deepti Shukla,Nirupama Tiwari,Deepika Dubey 보안공학연구지원센터 2016 International Journal of Signal Processing, Image Vol.9 No.1

        This paper presents a literature survey on Digital Watermarking within an image. It describes the early work carried out on digital watermarks, including the brief analysis of various watermarking schemes and its applications. This paper also makes a comparison between various watermarking schemes .This paper also gives us a brief introduction about the procedure of digital watermarking.

      • SCISCIESCOPUS

        The problems in digital watermarking into intra-frames of H.264/AVC

        Kim, D.W.,Choi, Y.G.,Kim, H.S.,Yoo, J.S.,Choi, H.J.,Seo, Y.H. Butterworths ; Elsevier Science Ltd 2010 Image and vision computing Vol.28 No.8

        Differently from other image/video compression techniques, it is not easy to find a successful watermarking scheme for H.264/AVC. Thus we, as the researchers on digital watermarking, intend to find the reason(s) of the hardness in this paper. Among the various techniques in H.264/AVC we only concern the intra-prediction in this paper, which is the main technique to form an intra picture. We closely examine the properties of intra-prediction in the aspect of digital watermarking. We consider three watermarking schemes: (1) a blind scheme by fixing the watermark positions without using any information from encoding process, (2) a semi-blind scheme which selects watermark positions with a threshold value of the cost function to determine the prediction mode, and (3) a blind scheme selecting only the blocks predicted by 16x16 mode as the one to be watermarked. These three schemes are getting more restricted in selecting the watermarking positions. The experiments showed that none of the three schemes were satisfactory. Even the error rates of the extracted watermark data were getting lower. After examining the data, we found the followings. The intra-prediction of H.264/AVC itself is not reversible. That is, the re-engineering of the intra pictures, which is necessary to extract the embedded watermark, does not guarantee the same results as before re-engineering. The intra-prediction modes in many blocks and the coefficient values are changed in re-engineering. In addition, watermarking and attacks further change the prediction modes and coefficient values, which make the watermarking useless. The reason of changing the prediction modes and the coefficient values, we concluded, is heuristics of the technique. That means the intra-prediction includes many heuristic schemes that cannot recover the data exactly. Consequently a new watermarking method rather than the conventional ones is necessary to find.

      • KCI등재

        A Research on Information Security Based on Digital Watermarking

        김혜진,백남균 사단법인 한국융합기술연구학회 2023 아시아태평양융합연구교류논문지 Vol.9 No.4

        Researchers in the fields of information security and computer image processing are deeply concerned about digital watermarking technology as piracy of digital products like images, audio, video, and files, which are becoming increasingly serious due to the Internet's rapid development and the media resources' digitalization. By detecting the watermark information embedded in the digital media to identify the media copyright, the copyright of the digital media can be effectively protected. In fact, digital watermarking has important application value in covert communication, bill anti-counterfeiting, digital signature, fingerprint identification, logo implicit authentication, and so on. In this paper, an algorithm- and algorithm-combination-based dual digital watermarking design technique is proposed. Based on a careful examination of the algorithms and algorithms one at a time, this creative proposal combines the two algorithms to achieve efficient embedding and extraction of digital watermarks and to take advantage of the double watermark's security benefits to encrypt the transmission of digital maps, thereby enhancing the security of image transmission. Then, the scheme is tested to prove its feasibility. At the same time, in order to verify the advantages of the scheme, a variety of attack experiments are carried out on the scheme, and the experimental data in the same environment are compared with other dual digital watermarking schemes. Finally, the superiority and robustness of the scheme are obtained, and it is applied and popularized in the military. The emphasis of this paper is to realize the information security of armored mechanized troops. During the battle, armored mechanized units use the positioning system equipped by armored vehicles to snap the geographical environment of the battlefield instantly, and upload the image to the rear combat command center in time through the network, military network, and people's network. In this long-distance transmission process, in order to ensure the security and timeliness of the transmitted images, it is necessary to use encryption technology to protect and verify the military images.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼