WO2002087251A1 - Method of inserting/detecting digital watermark and apparatus for using thereof - Google Patents

Method of inserting/detecting digital watermark and apparatus for using thereof Download PDF

Info

Publication number
WO2002087251A1
WO2002087251A1 PCT/KR2002/000728 KR0200728W WO02087251A1 WO 2002087251 A1 WO2002087251 A1 WO 2002087251A1 KR 0200728 W KR0200728 W KR 0200728W WO 02087251 A1 WO02087251 A1 WO 02087251A1
Authority
WO
WIPO (PCT)
Prior art keywords
watermark
image signal
image
format
embedded
Prior art date
Application number
PCT/KR2002/000728
Other languages
French (fr)
Inventor
Jung-Soo Lee
Jong-Uk Choi
Original Assignee
Markany Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Markany Inc. filed Critical Markany Inc.
Publication of WO2002087251A1 publication Critical patent/WO2002087251A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0064Geometric transfor invariant watermarking, e.g. affine transform invariant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0078Robust watermarking, e.g. average attack or collusion attack resistant using multiple thresholds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • H04N1/32208Spatial or amplitude domain methods involving changing the magnitude of selected pixels, e.g. overlay of information or super-imposition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • H04N1/32229Spatial or amplitude domain methods with selective or adaptive application of the additional information, e.g. in selected regions of the image
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32309Methods relating to embedding, encoding, decoding, detection or retrieval operations in colour image data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/3232Robust embedding or watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3269Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
    • H04N2201/327Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/328Processing of the additional information

Definitions

  • the present invention relates to a method for embedding and detecting a digital watermark in digital multimedia contents and an apparatus using the same. More particularly, the present invention relates to a digital watermark embedding/detection method and an embedding/detection apparatus using the same which can spatially form a watermark and embed and detect the watermark in an image, to thereby enhance robustness against image variations.
  • Watermarking technologies are ones that embed user information(watermark) in multimedia data to be unrecognizable by a user, to thereby prevent pirated copies and protect a copyright of a copyright owner.
  • the watermark means a mark developed in a step using a frame for pressing wet fibrous material to get rid of water in a process making paper from papyrus in ancient times.
  • Marks embedded in paper in order for paper manufacturers in the middle ages to prove their own goods are the watermarks in the middle ages, and, nowadays, an image is embedded which can be recognized only with light when, in a process of making banknotes, printing on both sides of a sheet of paper after drying the wet sheet on which printing has been done, and the image is referred to as a watermark.
  • the concept of a digital watermark has appeared. Like paper in an analog concept is substituted with the concept of digital paper, digitalizing all the analog media in which the past watermarks were embedded has brought about the concept of the digital watermark as a mark hidden in digital image, audio, video, and so on. That is, the watermarking refers to all technical methods hiding and extracting a watermark of a special form in multimedia contents in order to protect a series of multimedia contents. At the beginning, researches have been carried out for methods hiding original multimedia contents themselves, but, at present, it is a trend that strong watermarking technologies using lots of transform methods are developing.
  • the watermarking is classified into a visible watermarking and an invisible watermarking based on the visibility of a watermark, and the invisible watermarking is again classified into a spatial domain watermarking and a frequency domain watermarking based on the methods embedding a watermark.
  • the visible watermarking specifies a copyright by embedding in an original image author information which can be recognized with eyes.
  • the visible watermarking can be used with ease but has a drawback in that the originals are damaged.
  • the invisible watermarking is mainly used in the image watermarking technologies in these days.
  • the invisible watermarking is a technology embedding a watermark not to be visually perceived by using a limit of senses of the human visual system. While the spatial domain watermarking embeds and extracts a watermark with ease, there is a high possibility to lose a watermark by means of signal processing, video processing (non-linear filtering, rotating, cutting, moving, enlarging, and reducing transforms, and the like), and compressing.
  • the frequency domain watermarking employs transform techniques such as Fourier transform, discrete cosine transform, or the like for embeddings and extractions, so there exists a drawback in that it has a complicated algorithm and requires lots of arithmetic operations. However, it has an advantage in that it is robust against general attacks such as filtering or compression.
  • the invisible embedding of a watermark requires an embedding of the same in a low value on a broad area, which is carried out by the spread spectrum technology of Ingemar J. Cox.
  • a pseudo-random sequence is used as a watermark, which is a method that can be effectively used since the sequence has a uniform distribution function and is evenly distributed over the entire bandwidth of frequencies.
  • the fast Fourier transform(FFT), discrete cosine transform(DCT), and wavelet transform are generally utilized a lot, which takes a method embedding and restoring a watermark into the original state in a transform plane.
  • the method has a high possibility to lose a watermark on attacks such as image rotating, cutting, moving, enlarging, reducing, or the like.
  • the watermarking methods in the spatial domain or frequency domain have advantages and disadvantages in their own ways, and a watermarking method using the log-polar mapping and Fourier transform has been developed to compensate for the loss of a watermark, which is the weak point of the frequency domain watermarking method, in rotating, enlarging, or reducing an image.
  • the method converts rotations, enlargements, and reductions into a simple movement forms through the log-polar mapping and detects a watermark by using the characteristics that the amplitudes of the Fourier transform are invariable with movements.
  • the method is weak at the video processing such as compressions.
  • the developed watermarking technologies for video have advantages and disadvantages in general in their own ways. Further, the pseudo-random sequence watermark being widely used at present can confirm what key value a watermark embedded in an image has, but has difficulties in embedding and extracting various copyright information.
  • an embedded watermark is changed if an image undergoes rotations, partial cuttings, or the like, causing a problem impairing copyright information.
  • a method for embedding a digital watermark in an image signal comprises steps of: using a user key and an inherent key and generating respective pseudo-noise codes thereof; adding the pseudo-noise code generated based on the user key and the pseudo- noise code generated based on the inherent key; and adding to the image signal a digital watermark formed by a step for arranging in a two-dimensional fashion a watermark formed by the addition.
  • a method for detecting a digital watermark comprises steps of: strengthening a component of the digital watermark embedded in the image signal; generating a watermark arranged in a two-dimensional format; resizing the generated digital watermark to a image signal size; applying a convolution integral to the resized digital watermark and the image signal and detecting peaks included in the image signal; measuring positions of the detected peaks, capturing respective regions at the peak-measured positions for an addition thereof, and extracting a watermark embedded in the image signal; calculating a correlation of the extracted watermark and the generated digital watermark; and detecting a watermark embedded in the image signal based on the correlation.
  • the present invention forms a watermark not linearly but spatially and embeds the watermark so that the watermark robust against external variations such as image rotations, cuttings, or the like, can be embedded.
  • a watermark embedded according to the present invention is arranged and embedded in a radial fashion or in a form of plural concentric circles from a watermark of a stream fashion.
  • a high frequency filter is applied to a watermarked image for a watermark detection, all blocks of the watermarked image are added to obtain an effect removing image components, to thereby enhance a watermark detection speed as well as increase a watermark detection rate.
  • Fig. 1 is a block diagram for schematically showing a structure of a digital watermark embedding and detection apparatus according to an embodiment of the present invention
  • Fig. 2 is a flow chart for showing operations of an image converter of a watermark embedding apparatus of Fig. 1;
  • Fig. 3 is a block diagram for schematically showing a structure of a watermark generator of the watermark embedding apparatus of Fig. 1;
  • Fig. 4 is an exemplary view for showing a two-dimensional watermark implemented by a watermark configuration of Fig. 3;
  • Fig. 5A and Fig. 5B are other exemplary views for showing two-dimensional watermarks
  • Fig. 6 is a flow chart for showing operations of an image recorder of the watermark embedding apparatus of Fig. 1;
  • Fig. 7 is an exemplary view for showing filters serving watermark detections, wherein Fig. 7A shows a high boost filter, Fig. 7B shows a Laplacian filter, and Fig. 7C shows a Difference of Gaussian(DoG) filter having 7x7 and 9x9 masks;
  • Fig. 8A is an exemplary view for showing a watermarked image before filter processing
  • Fig. 8B to Fig. 8D show exemplary views for showing processing results by a high boost filter, a Laplacian filter, and a DoG filter, respectively;
  • Fig. 9 is an exemplary view of a mask form employed for effective watermark detections
  • Fig. 10 is a block diagram for schematically showing a watermark resizer of Fig. 1;
  • Fig. 11 is an exemplary view for showing an arithmetic operation result by a watermark convolution operator of Fig. 1;
  • Fig. 12 is a flow chart of showing operations of a post-processor of a watermark detection apparatus of Fig. 1;
  • Fig. 13 is an exemplary view for showing a peak detection used for a watermark detection;
  • Fig. 14 is a flow chart for showing operations of the watermark detector of Fig. 1.
  • FIG. 1 is a block diagram for schematically showing a structure of a digital watermark embedding and detection apparatus according to an embodiment of the present invention.
  • the digital watermark embedding and detection apparatus in Fig. 1 comprises a watermark embedding apparatus 100 for embedding a watermark into an inputted image and a watermark detection apparatus 200 for detecting a watermark from a watermark- embedded image.
  • the watermark embedding apparatus 100 includes an image converter 110 for converting an inputted image 10 into a predetermined form based on the characteristics thereof, an image analyzer 120 for analyzing the number of colors, a histogram shape, a ratio of high and low frequencies, or the like, which are indicative of the characteristics of the inputted image 10 and determining the strength of a watermark to be embedded, a watermark generator 130 for generating a watermark spatially arranged, an adder 140 for adding an image signal outputted from the image analyzer 120 to a watermark generated from the watermark generator 130, and an image recorder 150 for recording a watermark-embedded image signal.
  • the watermark detection apparatus 200 includes an image converter 210 for receiving and converting a retrieved image signal into a format of a predetermined form, a pre-processor 220 for strengthening the characteristics of a watermark included in an output signal of the image converter 210, a watermark generator 230 for generating a watermark spatially arranged, a watermark resizer 240 for resizing a magnitude of a watermark-embedded signal to a size of an image signal, a convolution operator 250 for applying an convolution integral to a watermark characteristics-strengthened signal included in an image signal and a watermark outputted from the watermark resizer 240, a post-processor 260 for playing a role of extracting a watermark from peaks obtained from a result of the convolution integral, a correlation calculator 270 for calculating a correlation between a watermark outputted from the watermark resizer 240 and an image signal processed in the post-processor 260, and a watermark detector 280
  • the inputted image 10 is inputted to the image converter 110 for embedding a watermark in a digital image signal. Describing an operation flow of the image converter 110 with reference to Fig. 2, the image converter 110 checks if the inputted image 10 is a 24-bit color image(SlOO). At this time, it can be determined by checking the header information of the inputted image signal whether the inputted image is a 24-bit signal. If the inputted image 10 is a 24-bit color, the image converter 110 separates the colors into respective R, G, and B channels(SHO) for outputs to the image analyzer 120. However, if the inputted image is not a 24-bit, an output is made without any separation into channels so that processing is done for one channel.
  • an inputted image is a 24-bit color image and is in the NTSC mode processing in a YIQ format rather than in an RGB format
  • the RGB components of the inputted image are converted into a model of the YIQ(Y: Luminance, I: In-phase, and Q: Quadrature) format by using Formula 1 as below.
  • the I and Q components in a model of the converted format are separately stored, and only the Y component is extracted(S120).
  • the extracted Y component is transferred, for a next process, to the image analyzer 120 for analyzing image characteristics.
  • an inputted image is not a 24-bit, it is possible without a separate image converter 110.
  • a processed result of the image converter 110 is outputted to the image analyzer 120.
  • the image analyzer 120 determines the strength of a watermark to be embedded block by block in consideration of the entire characteristics of an inputted image.
  • the determination of the watermark strength can be accomplished in a variety of forms. For example, it is determined based on the number of colors used for respective channels in a block, a histogram shape, an energy ratio of high and low frequencies, and so on. Viewing it in more detail, when an image is divided block by block, the number of colors used for each block and a color value are obtained. As a result, if the number of used colors are large and the color value is high, a real image corresponds to one having severe color changes or colors of brilliant forms. Accordingly, no severe influence is visually undergone even though a watermark to be embedded in a corresponding block is strengthened.
  • a feeling may be given like lots of noise is included in an original image even though a less strengthened watermark is embedded. Therefore, under considerations of the number of colors used in a block and a color value, it may be determined to strengthen a watermark to be embedded when the value is high and to less strengthen a watermark when the value is low. Further, when applying a DCT transform to an image and indicating the result in a block, it is characterized that part corresponding to a low frequency region is clustered on the upper left of the block, part corresponding to an intermediate frequency region on the middle, and part corresponding to a high frequency region on the lower right. That is, the characteristics of an inputted image may be grasped based on a ratio of a low frequency energy and a high frequency energy as a result of the DCT.
  • a histogram is prepared based on the above values for image regions, and it is possible to grasp the changes and used colors in the image based on the shape and variation of the histogram. That is, if the number of used colors is small, the distribution of a histogram becomes narrow, and, to the contrary, if the number of used colors is large, the distribution of a histogram becomes wide.
  • the large number of used colors means that an image has severe variations, and, to the contrary, the small number of colors means that an image is dull without particular variations. Therefore, through this, it may be determined whether the energy of an image is concentrated on a high frequency region or on a low frequency region.
  • the image analyzer 120 analyzes the characteristics of an inputted image and determines the strength of a watermark to be embedded block by block. Based on such an analysis result, inputted images separated channel by channel are added with a watermark generated from the watermark generator 130 for embeddings into the inputted images.
  • the watermark generator 130 generates a watermark based on a structure shown in Fig. 3. First, if a user key is inputted to a pseudo-noise code generator 122 for a seed value, a pseudo-noise code is generated by using the seed value. In the meantime, an inherent key, separately from the user key, generated to facilitate a watermark detection is inputted to a pseudo-noise code. generator 124 to generate a pseudo-noise code in the same manner as well.
  • the two pseudo-noise codes so generated are transferred to an adder 126 to be added each other.
  • An added noise code is inputted to a watermark configurer 128.
  • the watermark configurer 128 newly configures a watermark in a spatial arrangement form instead of one formed in a one-dimensional stream fashion. Viewing an example of a shape shown in Fig. 4, a watermark is configured in a two-dimensional radial fashion while rotating 360 degrees about a first value of a watermark of a predetermined length. In case of configuring a watermark in the two-dimensional radial fashion as above, no influence is given since the form of a watermark does not vary even though a watermark-embedded image varies by rotations and the like.
  • such a watermark shape may be configured in a circular form as shown in Fig. 5A and Fig. 5B.
  • a watermark shape is configured in a circular form as shown in Fig. 5B
  • a one-dimensional watermark is formed((a) of Fig. 5A)
  • a watermark is arranged in a concentric form about the center of a block.
  • the watermarks are sampled at a predetermined rate based on radius sizes to be enlarged and reduced for preparations((b) of Fig. 5A), and the sampled watermarks are arranged in a circular fashion.
  • the stream When arranged in a circular fashion, after forming the upper side in a watermark stream, the stream is duplicated and then arranged in the same rotation direction on the lower side, so the two-dimensional watermark can be formed in the shape shown in Fig. 5B.
  • the watermark so formed is outputted to be added to an image signal of the image analyzer 120.
  • the adder 140 first divides an image into blocks of a predetermined size, that is, watermark sizes, in order to add a watermark formed from the watermark generator 130 and an image signal outputted from the image analyzer 120.
  • a divided image signal is added to a watermark signal with an " application of a value adjusting a strength of a watermark to be embedded which is determined based on the entire characteristics(the entire characteristics for one inputted image scene) of an inputted image in the watermark analyzer 120. That is, the strength of a watermark is adjusted by multiplying a watermark of Fig. 4 by a watermark strength determined in the image analyzer 120, and then added to the image signal.
  • a method adding a watermark is to directly embed a watermark into each channel without passing through the image converter 110, that is, to independently embed a watermark into a gray channel for a gray image and into respective R, G, and B channels for an RGB image(24 bits). If a watermark-embedded signal is outputted, the signal is inputted to the image recorder 150 for storage as a watermarked image.
  • the image recorder 150 determines whether a watermarked signal is a 24-bit image or not(S200). If the watermarked signal is a 24-bit image, the image recorder 150 adds signals which are separated channel by channel(S210), and, if not a 24-bit image, the signals are ones inputted without a separate conversion process in the preceding image converter 110, so that a step S230 directly proceeds for storage since the above conversion is not necessary.
  • a watermark-embedded image signal is added to the Y component and the IQ components remaining beforehand after extracting the Y component from the components in the image converter 110.
  • the signal of the YIQ format is converted again to the RGB signal by using Formula 2 as below(S220).
  • the signal converted as above is stored in a storage medium as a watermarked image.
  • a watermarked signal is not a 24-bit image in step S200
  • the signal is one inputted without a separate conversion process in the preceding image converter 110 and the above conversion is not necessary, to thereby proceed directly to a step S230 for storage.
  • the watermark embedding apparatus 100 arranges a watermark in a two- dimensional space for embeddings, so that, even though a watermark is directly embedded in a spatial domain without a conversion process into a frequency domain, there exists an effect robustly keeping a watermark alive against image variations such as rotations, cuttings, and the like with respect to a watermark-embedded image. Further, upon embedding a watermark, the strength of the watermark to be embedded is determined for embedding in consideration of image characteristics, to thereby enable a watermark to be more effectively embedded.
  • a watermark detection apparatus for detecting a watermark from an image signal in which a watermark is embedded as above is described with reference to Fig. 1, and Fig. 7 to Fig. 14.
  • a watermarked image can flow into illegal users through various ways, and its piracy, variations, and so on, the image can be carried out.
  • spatial arrangements and embeddings of a watermark by the watermark embedding apparatus 100 according to the present invention as above makes the watermark robust enough to be able to maintain a shape of the watermark embedded in an image despite image variations such as image rotations, cuttings, and so on, and an apparatus and method for detecting a watermark embedded by such a method is described.
  • a watermark-embedded image is inputted to the watermark detection apparatus 200, the image is firstly converted into a signal of a predetermined format through the image converter 210.
  • the structure and operations of the image converter 210 in the watermark detection apparatus 200 are the same as those of the image converter 110 in the watermark embedding apparatus 100. That is, if an inputted image is a 24-bit image, the inputted image is separated into channels(R, G, and B) for outputs, and, if not a 24-bit image, the image is outputted without a separate process.
  • an RGB-format signal is converted into the YIQ format, and only the Y component is extracted and outputted to detect a watermark.
  • the pre-processor 220 is for boosting the characteristics of a watermark embedded in the image signal, which performs high-pass filtering, sharpen-filtering, and high-boost filtering processing. Examples of filters employed in such a pre-processor are shown in Fig. 7 to Fig. 9.
  • Fig. 7 shows examples of various spatial filters playing a role of boosting the high frequency components of an image signal
  • Fig. 7A, Fig. 7B, and Fig. 7C show mask forms for a high boost filter, a Laplacian filter, and a Difference of Gaussian(DoG) filter, respectively.
  • the high boost filter of Fig. 7A serves watermark detections and plays a role of boosting a watermark signal. That is, The filter reduces an image component energy and increases a watermark signal energy, to thereby play a role capable of effectively detecting a watermark.
  • the DoG filter of Fig. 7C follows Formula 3 as below. [Formula 3]
  • FIG. 8A is an exemplary view for showing a watermarked image before filter processing
  • FIG. 8B to Fig. 8D show exemplary views for showing processing results by a high boost filter, a Laplacian filter, and a DoG filter, respectively.
  • a filter shown in Fig. 9 may be used, besides the filters in Fig. 7, to reduce an image component energy and to strengthen a watermark component energy.
  • the pre-processor 220 as stated above is for strengthening a watermark component of an image signal, which can be processed by using any one of the filters shown in Fig. 7 or Fig. 9.
  • the watermark generator 230 of the watermark detection apparatus 200 does not include the adder 126 compared to the watermark generator 130 of the watermark embedding apparatus 100 in Fig. 3, uses pseudo-noises generated from the pseudo-noise code generators 122 and 124 based on an inherent key and a user key, respectively, and generates a two-dimensional watermark spatially arranged for the respective pseudo-noises from the watermark configurer 128. Further, it is possible to generate a two-dimensional watermark spatially arranged after adding pseudo-noise codes obtained with respect to the respective pseudo-noise codes, with the same process as that of the watermark generator 130 of the watermark embedding apparatus 100. However, respective watermarks inputted to the correlation calculator 270 to be later described are ones not added.
  • a generated watermark is inputted to the watermark resizer 240.
  • the watermark resizer 240 as shown in Fig. 10, includes a zero padding part 242 for resizing the generated watermark to an image signal size, and a watermark enlargement/reduction part 244 for enlarging/reducing a watermark size.
  • a watermark generated in the watermark generator 230 is inputted to the zero padding part 242, the watermark is fit to an image size and '0' values are filled, for an output, in remaining portions except for portions in which a watermark actually exists.
  • the reason for filling with '0' in all the portions except for the watermark after the watermark is fit to an image size, as stated above, is because processing can be simply done in a multiplication form if converting into the frequency domain a convolution integral in the spatial domain which is a next operation step, so the same size as an image signal size is formed and a zero padding is performed for the sake of calculations.
  • the zero padding-processed watermark is inputted to the convolution operator 250.
  • the convolution operator 250 carries out a convolution integral with respect to the watermark component-strengthened signal of an image signal by the pre-processor 220 and the zero padding-processed watermark. Since the convolution in the spatial domain performs lots of repeated multiplications, for the sake of operation efficiency, transforming is applied with a Fourier transform into the frequency domain, a multiplication is carried out with respect to the transformed watermark-embedded image and a watermark, and a result of which is inverse-Fourier-transformed into the spatial domain again, to thereby enable a convolution result to be obtained. Such calculations are carried out by using Formula 4 as below. [Formula 4]
  • IFFF2 denotes a two-dimensional inverse Fourier transform
  • FFT2 a two- dimensional Fourier transform
  • W img a watermark-embedded image
  • W m-zeropadding is a zero-padding watermark
  • a watermark can be resized in various ways, and, in the present invention, peaks appear every repeatedly embedded period if an autocorrelation is obtained with respect to a watermarked image, and intervals among the peaks are measured for resizing a watermark. However, since a peak interval may occur at a different position due to noise, intervals among peaks are defined as candidate scale elements, and a watermark is resized with respect to the candidate scale elements.
  • the convolution operator 250 carries out the convolution with respect to a watermark component-strengthened signal of the image signal by the preprocessor 220 and a zero padding-processed watermark. Such a calculation finds out a peak, as shown in Fig. 11, while resizing a watermark until the peak is detected within a range of the predetermined number of times.
  • a corresponding image with respect to one image is divided into plural regions corresponding to a watermark size and a watermark is embedded for the respective regions, so peaks appearing in the plural small regions as a result detected through the above process is that the watermark embedded in corresponding regions is detected.
  • the post-processor 260 is performed in accordance with the operation flows shown in Fig. 12.
  • Fig. 11 if peaks are detected as a convolution result, the positions of all the spots at which corresponding peaks appear are detected(S300).
  • a peak detection is to extract the certain number of peaks after arrangement in the descending order. Such positions are the above convolution result and the peaks are detected at the corners of a region a watermark occupies, so the regions in which peaks appear are captured by watermark sizes(S310), and the regions are added(S320).
  • the peak detection in the above process is done when two identical signals are matched and a signal correlation is obtained while sliding the two signals, the biggest peak appears when the two signals are matched. Accordingly, since a part at which the signals are matched is one coincident with a region of a set watermark block, a peak is detected at a corner.
  • a result signal and a watermark signal generated by the watermark generator 230 are inputted to the correlation operator 270 for obtaining a correlation Corr by using Formula 5 as below.
  • the correlation is respectively carried out with respect to a watermark generated by an inherent key and a watermark generated by a user key.
  • W imgsum denotes a watermark-strengthened signal processed by the post- processor and W m denotes a watermark generated by the watermark generator.
  • IFFT2 denotes a two-dimensional inverse fast Fourier transform
  • FFT2 a two-dimensional fast Fourier transform
  • conj a complex conjugate.
  • a multiplication is performed with respect to data obtained through the two-dimensional fast Fourier transform of a watermarked image W imgsum and data obtained through the two-dimensional fast Fourier transform of a watermark W m generated from the watermark generator 230 based on a user key or an inherent key, and the inverse fast Fourier transform is applied to the multiplication again for a conversion into the spatial domain.
  • the conversion into the frequency domain and the multiplication calculation as stated above can reduce the number of calculations compared to the case of the convolution of an image watermarked in the spatial domain and a watermark, so that data processing can be performed at a higher speed.
  • Fig. 13 is a floating view of a correlation calculated by Formula 5 under assumption of a case that a watermark is embedded. Since the correlation obtained by Formula 5 is a two-dimensional sequence form rather than a certain value, the maximum peak value and its position can be obtained through a process as below in comparison of such plural values.
  • the watermark detector 280 if peaks occur, checks whether all the two key values exist and the peaks appear at the same position(S400). Sharpness is calculated if the two peaks occur at the same position(S410). The sharpness calculation determines, through the fourth moment(Kurtosis; K) in Formula 6 as below, whether a K value has a value above a predetermined threshold value(S420), and it is determined that a watermark is detected when satisfying both of the two conditions. [Formula 6]
  • the determination as to whether a value of K is more than a certain threshold value in the above step is to determine whether a watermark is embedded through a comparison between a peak value and a set threshold value since a peak appears high at an calculated value in case that the watermark is embedded.
  • the threshold value is shown as a value constantly allocated by experiments. However, when the condition is not satisfied in the step S420, it is determined that a watermark is not detected.
  • the present invention relates to a method and apparatus for embedding and detecting a watermark, which uses a watermark formed in a two- dimensional radial fashion for its configuration changes upon embeddings thereof, enhancing the robustness of a watermark against signal variations. Further, upon the detection of the watermark, a convolution integral is used to detect a watermark embedded in the two-dimensional radial fashion as above for effective detections, enhancing the accuracy and promptness for watermark detections.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

In embedding a watermark, it is possible to effectively detect the watermark even in case of rotating, cutting, and enlarging/shrinking an image by designing the watermark to be robust against geometric modification and embedding the watermark as 2-dimensional form, for example radial or concentric form. Also, in detecting a watermark, it is possible to detect a peak formed by the watermark through the convolution of the watermark and an input image while accommodating a size of the generated watermark, thereby effectively detecting the watermark using correlation between the input image and the watermark.

Description

METHOD OF INSERTING/DETECTING DIGITAL WATERMARK AND APPARATUS FOR USING THEREOF
Technical Field The present invention relates to a method for embedding and detecting a digital watermark in digital multimedia contents and an apparatus using the same. More particularly, the present invention relates to a digital watermark embedding/detection method and an embedding/detection apparatus using the same which can spatially form a watermark and embed and detect the watermark in an image, to thereby enhance robustness against image variations.
Background Art
Recently, together with the wide spreading of the internet and computers and the rapid distributions of multimedia data, illegal copies(piracy) and distributions are widely prevalent so that an effective protection apparatus for a copyright to multimedia data gets required. Watermarking technologies are ones that embed user information(watermark) in multimedia data to be unrecognizable by a user, to thereby prevent pirated copies and protect a copyright of a copyright owner.
The watermark means a mark developed in a step using a frame for pressing wet fibrous material to get rid of water in a process making paper from papyrus in ancient times. Marks embedded in paper in order for paper manufacturers in the middle ages to prove their own goods are the watermarks in the middle ages, and, nowadays, an image is embedded which can be recognized only with light when, in a process of making banknotes, printing on both sides of a sheet of paper after drying the wet sheet on which printing has been done, and the image is referred to as a watermark.
In these days, together with the increase of digital media, the concept of a digital watermark has appeared. Like paper in an analog concept is substituted with the concept of digital paper, digitalizing all the analog media in which the past watermarks were embedded has brought about the concept of the digital watermark as a mark hidden in digital image, audio, video, and so on. That is, the watermarking refers to all technical methods hiding and extracting a watermark of a special form in multimedia contents in order to protect a series of multimedia contents. At the beginning, researches have been carried out for methods hiding original multimedia contents themselves, but, at present, it is a trend that strong watermarking technologies using lots of transform methods are developing.
The watermarking is classified into a visible watermarking and an invisible watermarking based on the visibility of a watermark, and the invisible watermarking is again classified into a spatial domain watermarking and a frequency domain watermarking based on the methods embedding a watermark.
The visible watermarking specifies a copyright by embedding in an original image author information which can be recognized with eyes. The visible watermarking can be used with ease but has a drawback in that the originals are damaged.
Accordingly, the invisible watermarking is mainly used in the image watermarking technologies in these days. The invisible watermarking is a technology embedding a watermark not to be visually perceived by using a limit of senses of the human visual system. While the spatial domain watermarking embeds and extracts a watermark with ease, there is a high possibility to lose a watermark by means of signal processing, video processing (non-linear filtering, rotating, cutting, moving, enlarging, and reducing transforms, and the like), and compressing.
In the meantime, the frequency domain watermarking employs transform techniques such as Fourier transform, discrete cosine transform, or the like for embeddings and extractions, so there exists a drawback in that it has a complicated algorithm and requires lots of arithmetic operations. However, it has an advantage in that it is robust against general attacks such as filtering or compression.
The invisible embedding of a watermark requires an embedding of the same in a low value on a broad area, which is carried out by the spread spectrum technology of Ingemar J. Cox. In the spread spectrum technology, a pseudo-random sequence is used as a watermark, which is a method that can be effectively used since the sequence has a uniform distribution function and is evenly distributed over the entire bandwidth of frequencies.
For methods transforming an original image into a frequency domain, the fast Fourier transform(FFT), discrete cosine transform(DCT), and wavelet transform are generally utilized a lot, which takes a method embedding and restoring a watermark into the original state in a transform plane. However, the method has a high possibility to lose a watermark on attacks such as image rotating, cutting, moving, enlarging, reducing, or the like.
The watermarking methods in the spatial domain or frequency domain have advantages and disadvantages in their own ways, and a watermarking method using the log-polar mapping and Fourier transform has been developed to compensate for the loss of a watermark, which is the weak point of the frequency domain watermarking method, in rotating, enlarging, or reducing an image. The method converts rotations, enlargements, and reductions into a simple movement forms through the log-polar mapping and detects a watermark by using the characteristics that the amplitudes of the Fourier transform are invariable with movements. However, the method is weak at the video processing such as compressions.
As mentioned above, the developed watermarking technologies for video have advantages and disadvantages in general in their own ways. Further, the pseudo-random sequence watermark being widely used at present can confirm what key value a watermark embedded in an image has, but has difficulties in embedding and extracting various copyright information.
Further, indiscriminately embedding a watermark regardless of the characteristics of an inputted image brings about a drawback weak at attacks from external.
Furthermore, in case of firstly casting and then embedding a watermark in an input image, an embedded watermark is changed if an image undergoes rotations, partial cuttings, or the like, causing a problem impairing copyright information.
Detailed Description of the Invention
It is an object of the present invention to provide a digital watermark embedding and detection method and a apparatus using the same which are robust against image variations such as rotation, enlargement/reduction, cutting, and filtering.
It is another object of the present invention to provide a digital watermark embedding and detection method and a apparatus using the same which spatially configure a watermark and embed the spatially configured watermark to thereby be robust against image variations.
It is yet another object of the present invention to provide a watermark detection method and a apparatus using the same which effectively detect a spatially configured digital watermark embedded in an image signal by fitting to a position at which the watermark is embedded through convolutions.
In order to achieve the above objects, a method for embedding a digital watermark in an image signal according to the present invention comprises steps of: using a user key and an inherent key and generating respective pseudo-noise codes thereof; adding the pseudo-noise code generated based on the user key and the pseudo- noise code generated based on the inherent key; and adding to the image signal a digital watermark formed by a step for arranging in a two-dimensional fashion a watermark formed by the addition.
Further, a method for detecting a digital watermark according to the present invention comprises steps of: strengthening a component of the digital watermark embedded in the image signal; generating a watermark arranged in a two-dimensional format; resizing the generated digital watermark to a image signal size; applying a convolution integral to the resized digital watermark and the image signal and detecting peaks included in the image signal; measuring positions of the detected peaks, capturing respective regions at the peak-measured positions for an addition thereof, and extracting a watermark embedded in the image signal; calculating a correlation of the extracted watermark and the generated digital watermark; and detecting a watermark embedded in the image signal based on the correlation. As stated above, unlike a method simply embedding a watermark of a certain form in the existing spatial domain, the present invention forms a watermark not linearly but spatially and embeds the watermark so that the watermark robust against external variations such as image rotations, cuttings, or the like, can be embedded. In particular, a watermark embedded according to the present invention is arranged and embedded in a radial fashion or in a form of plural concentric circles from a watermark of a stream fashion.
Furthermore, unlike the existing methods, a high frequency filter is applied to a watermarked image for a watermark detection, all blocks of the watermarked image are added to obtain an effect removing image components, to thereby enhance a watermark detection speed as well as increase a watermark detection rate.
Brief Description of the Drawings
The above objects and other features of the present invention will become more apparent by describing in detail a preferred embodiment thereof with reference to the' attached drawings, in which:
Fig. 1 is a block diagram for schematically showing a structure of a digital watermark embedding and detection apparatus according to an embodiment of the present invention; Fig. 2 is a flow chart for showing operations of an image converter of a watermark embedding apparatus of Fig. 1;
Fig. 3 is a block diagram for schematically showing a structure of a watermark generator of the watermark embedding apparatus of Fig. 1;
Fig. 4 is an exemplary view for showing a two-dimensional watermark implemented by a watermark configuration of Fig. 3;
Fig. 5A and Fig. 5B are other exemplary views for showing two-dimensional watermarks;
Fig. 6 is a flow chart for showing operations of an image recorder of the watermark embedding apparatus of Fig. 1;
Fig. 7 is an exemplary view for showing filters serving watermark detections, wherein Fig. 7A shows a high boost filter, Fig. 7B shows a Laplacian filter, and Fig. 7C shows a Difference of Gaussian(DoG) filter having 7x7 and 9x9 masks;
Fig. 8A is an exemplary view for showing a watermarked image before filter processing, Fig. 8B to Fig. 8D show exemplary views for showing processing results by a high boost filter, a Laplacian filter, and a DoG filter, respectively;
Fig. 9 is an exemplary view of a mask form employed for effective watermark detections;
Fig. 10 is a block diagram for schematically showing a watermark resizer of Fig. 1;
Fig. 11 is an exemplary view for showing an arithmetic operation result by a watermark convolution operator of Fig. 1;
Fig. 12 is a flow chart of showing operations of a post-processor of a watermark detection apparatus of Fig. 1; Fig. 13 is an exemplary view for showing a peak detection used for a watermark detection; and
Fig. 14 is a flow chart for showing operations of the watermark detector of Fig. 1. Embodiment
Hereinafter, a watermark embedding and detection method and an embedding/detection apparatus using the same will be described in detail with reference to the accompanying drawings. Fig. 1 is a block diagram for schematically showing a structure of a digital watermark embedding and detection apparatus according to an embodiment of the present invention.
The digital watermark embedding and detection apparatus in Fig. 1 comprises a watermark embedding apparatus 100 for embedding a watermark into an inputted image and a watermark detection apparatus 200 for detecting a watermark from a watermark- embedded image. The watermark embedding apparatus 100 includes an image converter 110 for converting an inputted image 10 into a predetermined form based on the characteristics thereof, an image analyzer 120 for analyzing the number of colors, a histogram shape, a ratio of high and low frequencies, or the like, which are indicative of the characteristics of the inputted image 10 and determining the strength of a watermark to be embedded, a watermark generator 130 for generating a watermark spatially arranged, an adder 140 for adding an image signal outputted from the image analyzer 120 to a watermark generated from the watermark generator 130, and an image recorder 150 for recording a watermark-embedded image signal. Further, the watermark detection apparatus 200 includes an image converter 210 for receiving and converting a retrieved image signal into a format of a predetermined form, a pre-processor 220 for strengthening the characteristics of a watermark included in an output signal of the image converter 210, a watermark generator 230 for generating a watermark spatially arranged, a watermark resizer 240 for resizing a magnitude of a watermark-embedded signal to a size of an image signal, a convolution operator 250 for applying an convolution integral to a watermark characteristics-strengthened signal included in an image signal and a watermark outputted from the watermark resizer 240, a post-processor 260 for playing a role of extracting a watermark from peaks obtained from a result of the convolution integral, a correlation calculator 270 for calculating a correlation between a watermark outputted from the watermark resizer 240 and an image signal processed in the post-processor 260, and a watermark detector 280 for detecting a watermark included in an image signal based on an output value of the correlation calculator 240. The operations of the watermark embedding and detection apparatus having the above structure will be described in respective parts. Firstly, the operations of the watermark embedding apparatus 100 will be described with reference to Fig. 2 to Fig. 6.
The inputted image 10 is inputted to the image converter 110 for embedding a watermark in a digital image signal. Describing an operation flow of the image converter 110 with reference to Fig. 2, the image converter 110 checks if the inputted image 10 is a 24-bit color image(SlOO). At this time, it can be determined by checking the header information of the inputted image signal whether the inputted image is a 24-bit signal. If the inputted image 10 is a 24-bit color, the image converter 110 separates the colors into respective R, G, and B channels(SHO) for outputs to the image analyzer 120. However, if the inputted image is not a 24-bit, an output is made without any separation into channels so that processing is done for one channel.
Further, if an inputted image is a 24-bit color image and is in the NTSC mode processing in a YIQ format rather than in an RGB format, the RGB components of the inputted image are converted into a model of the YIQ(Y: Luminance, I: In-phase, and Q: Quadrature) format by using Formula 1 as below. [Formula 1]
Figure imgf000011_0001
The I and Q components in a model of the converted format are separately stored, and only the Y component is extracted(S120). The extracted Y component is transferred, for a next process, to the image analyzer 120 for analyzing image characteristics.
As stated above, if an inputted image is not a 24-bit, it is possible without a separate image converter 110.
A processed result of the image converter 110 is outputted to the image analyzer 120. The image analyzer 120 determines the strength of a watermark to be embedded block by block in consideration of the entire characteristics of an inputted image. The determination of the watermark strength can be accomplished in a variety of forms. For example, it is determined based on the number of colors used for respective channels in a block, a histogram shape, an energy ratio of high and low frequencies, and so on. Viewing it in more detail, when an image is divided block by block, the number of colors used for each block and a color value are obtained. As a result, if the number of used colors are large and the color value is high, a real image corresponds to one having severe color changes or colors of brilliant forms. Accordingly, no severe influence is visually undergone even though a watermark to be embedded in a corresponding block is strengthened.
However, if the color changes are small, a feeling may be given like lots of noise is included in an original image even though a less strengthened watermark is embedded. Therefore, under considerations of the number of colors used in a block and a color value, it may be determined to strengthen a watermark to be embedded when the value is high and to less strengthen a watermark when the value is low. Further, when applying a DCT transform to an image and indicating the result in a block, it is characterized that part corresponding to a low frequency region is clustered on the upper left of the block, part corresponding to an intermediate frequency region on the middle, and part corresponding to a high frequency region on the lower right. That is, the characteristics of an inputted image may be grasped based on a ratio of a low frequency energy and a high frequency energy as a result of the DCT.
Moreover, if an inputted image is analyzed channel by channel, for example, in case of a 24-bit image, respective R, G, and B channels have 8 bits(28=256) and 0 ~ 255 values, a histogram is prepared based on the above values for image regions, and it is possible to grasp the changes and used colors in the image based on the shape and variation of the histogram. That is, if the number of used colors is small, the distribution of a histogram becomes narrow, and, to the contrary, if the number of used colors is large, the distribution of a histogram becomes wide. The large number of used colors means that an image has severe variations, and, to the contrary, the small number of colors means that an image is dull without particular variations. Therefore, through this, it may be determined whether the energy of an image is concentrated on a high frequency region or on a low frequency region.
As stated above, the image analyzer 120 analyzes the characteristics of an inputted image and determines the strength of a watermark to be embedded block by block. Based on such an analysis result, inputted images separated channel by channel are added with a watermark generated from the watermark generator 130 for embeddings into the inputted images.
The watermark generator 130 generates a watermark based on a structure shown in Fig. 3. First, if a user key is inputted to a pseudo-noise code generator 122 for a seed value, a pseudo-noise code is generated by using the seed value. In the meantime, an inherent key, separately from the user key, generated to facilitate a watermark detection is inputted to a pseudo-noise code. generator 124 to generate a pseudo-noise code in the same manner as well.
The two pseudo-noise codes so generated are transferred to an adder 126 to be added each other. An added noise code is inputted to a watermark configurer 128. The watermark configurer 128 newly configures a watermark in a spatial arrangement form instead of one formed in a one-dimensional stream fashion. Viewing an example of a shape shown in Fig. 4, a watermark is configured in a two-dimensional radial fashion while rotating 360 degrees about a first value of a watermark of a predetermined length. In case of configuring a watermark in the two-dimensional radial fashion as above, no influence is given since the form of a watermark does not vary even though a watermark-embedded image varies by rotations and the like.
Further, other than the radial fashion, such a watermark shape may be configured in a circular form as shown in Fig. 5A and Fig. 5B. In case that a watermark shape is configured in a circular form as shown in Fig. 5B, first, a one-dimensional watermark is formed((a) of Fig. 5A), and a watermark is arranged in a concentric form about the center of a block. In case of arranged in the concentric form, there exists a radius difference between a watermark formed inside and a watermark formed outside, so a difference between the lengths of the bits configuring the watermarks takes place. Accordingly, the watermarks are sampled at a predetermined rate based on radius sizes to be enlarged and reduced for preparations((b) of Fig. 5A), and the sampled watermarks are arranged in a circular fashion.
When arranged in a circular fashion, after forming the upper side in a watermark stream, the stream is duplicated and then arranged in the same rotation direction on the lower side, so the two-dimensional watermark can be formed in the shape shown in Fig. 5B.
The watermark so formed is outputted to be added to an image signal of the image analyzer 120. The adder 140 first divides an image into blocks of a predetermined size, that is, watermark sizes, in order to add a watermark formed from the watermark generator 130 and an image signal outputted from the image analyzer 120. A divided image signal is added to a watermark signal with an "application of a value adjusting a strength of a watermark to be embedded which is determined based on the entire characteristics(the entire characteristics for one inputted image scene) of an inputted image in the watermark analyzer 120. That is, the strength of a watermark is adjusted by multiplying a watermark of Fig. 4 by a watermark strength determined in the image analyzer 120, and then added to the image signal.
A method adding a watermark is to directly embed a watermark into each channel without passing through the image converter 110, that is, to independently embed a watermark into a gray channel for a gray image and into respective R, G, and B channels for an RGB image(24 bits). If a watermark-embedded signal is outputted, the signal is inputted to the image recorder 150 for storage as a watermarked image.
The recording operations in the image recorder 150 is described with reference to Fig. 6.
The image recorder 150 determines whether a watermarked signal is a 24-bit image or not(S200). If the watermarked signal is a 24-bit image, the image recorder 150 adds signals which are separated channel by channel(S210), and, if not a 24-bit image, the signals are ones inputted without a separate conversion process in the preceding image converter 110, so that a step S230 directly proceeds for storage since the above conversion is not necessary.
Further, in case that a signal processing is applied to an inputted image in the YIQ format of the NTSC mode rather than the RGB format, a watermark-embedded image signal is added to the Y component and the IQ components remaining beforehand after extracting the Y component from the components in the image converter 110. After the addition, the signal of the YIQ format is converted again to the RGB signal by using Formula 2 as below(S220). [Formula 2]
Figure imgf000015_0001
The signal converted as above is stored in a storage medium as a watermarked image.
However, in case that a watermarked signal is not a 24-bit image in step S200, the signal is one inputted without a separate conversion process in the preceding image converter 110 and the above conversion is not necessary, to thereby proceed directly to a step S230 for storage.
The watermark embedding apparatus 100 as above arranges a watermark in a two- dimensional space for embeddings, so that, even though a watermark is directly embedded in a spatial domain without a conversion process into a frequency domain, there exists an effect robustly keeping a watermark alive against image variations such as rotations, cuttings, and the like with respect to a watermark-embedded image. Further, upon embedding a watermark, the strength of the watermark to be embedded is determined for embedding in consideration of image characteristics, to thereby enable a watermark to be more effectively embedded.
Further, a watermark detection apparatus for detecting a watermark from an image signal in which a watermark is embedded as above is described with reference to Fig. 1, and Fig. 7 to Fig. 14.
A watermarked image can flow into illegal users through various ways, and its piracy, variations, and so on, the image can be carried out. However, spatial arrangements and embeddings of a watermark by the watermark embedding apparatus 100 according to the present invention as above makes the watermark robust enough to be able to maintain a shape of the watermark embedded in an image despite image variations such as image rotations, cuttings, and so on, and an apparatus and method for detecting a watermark embedded by such a method is described.
If a watermark-embedded image is inputted to the watermark detection apparatus 200, the image is firstly converted into a signal of a predetermined format through the image converter 210. The structure and operations of the image converter 210 in the watermark detection apparatus 200 are the same as those of the image converter 110 in the watermark embedding apparatus 100. That is, if an inputted image is a 24-bit image, the inputted image is separated into channels(R, G, and B) for outputs, and, if not a 24-bit image, the image is outputted without a separate process. Further, if the inputted image is a 24-bit and processed in the YIQ format based on the NTSC mode other than the RGB format, an RGB-format signal is converted into the YIQ format, and only the Y component is extracted and outputted to detect a watermark.
An image signal outputted from the image converter 210 is inputted to the pre- processor 220. The pre-processor 220 is for boosting the characteristics of a watermark embedded in the image signal, which performs high-pass filtering, sharpen-filtering, and high-boost filtering processing. Examples of filters employed in such a pre-processor are shown in Fig. 7 to Fig. 9.
Fig. 7 shows examples of various spatial filters playing a role of boosting the high frequency components of an image signal, Fig. 7A, Fig. 7B, and Fig. 7C show mask forms for a high boost filter, a Laplacian filter, and a Difference of Gaussian(DoG) filter, respectively. The high boost filter of Fig. 7A serves watermark detections and plays a role of boosting a watermark signal. That is, The filter reduces an image component energy and increases a watermark signal energy, to thereby play a role capable of effectively detecting a watermark. Further, the DoG filter of Fig. 7C follows Formula 3 as below. [Formula 3]
Figure imgf000017_0001
DoG(x,y) =
2π σ 1 2π σ 2
One example of a processing result by the filter as above is shown in Fig. 8. Fig. 8A is an exemplary view for showing a watermarked image before filter processing, Fig.
8B to Fig. 8D show exemplary views for showing processing results by a high boost filter, a Laplacian filter, and a DoG filter, respectively.
A filter shown in Fig. 9 may be used, besides the filters in Fig. 7, to reduce an image component energy and to strengthen a watermark component energy.
The pre-processor 220 as stated above is for strengthening a watermark component of an image signal, which can be processed by using any one of the filters shown in Fig. 7 or Fig. 9.
In the meantime, the watermark generator 230 of the watermark detection apparatus 200 does not include the adder 126 compared to the watermark generator 130 of the watermark embedding apparatus 100 in Fig. 3, uses pseudo-noises generated from the pseudo-noise code generators 122 and 124 based on an inherent key and a user key, respectively, and generates a two-dimensional watermark spatially arranged for the respective pseudo-noises from the watermark configurer 128. Further, it is possible to generate a two-dimensional watermark spatially arranged after adding pseudo-noise codes obtained with respect to the respective pseudo-noise codes, with the same process as that of the watermark generator 130 of the watermark embedding apparatus 100. However, respective watermarks inputted to the correlation calculator 270 to be later described are ones not added.
A generated watermark is inputted to the watermark resizer 240. The watermark resizer 240, as shown in Fig. 10, includes a zero padding part 242 for resizing the generated watermark to an image signal size, and a watermark enlargement/reduction part 244 for enlarging/reducing a watermark size.
If a watermark generated in the watermark generator 230 is inputted to the zero padding part 242, the watermark is fit to an image size and '0' values are filled, for an output, in remaining portions except for portions in which a watermark actually exists. The reason for filling with '0' in all the portions except for the watermark after the watermark is fit to an image size, as stated above, is because processing can be simply done in a multiplication form if converting into the frequency domain a convolution integral in the spatial domain which is a next operation step, so the same size as an image signal size is formed and a zero padding is performed for the sake of calculations.
The zero padding-processed watermark is inputted to the convolution operator 250. The convolution operator 250 carries out a convolution integral with respect to the watermark component-strengthened signal of an image signal by the pre-processor 220 and the zero padding-processed watermark. Since the convolution in the spatial domain performs lots of repeated multiplications, for the sake of operation efficiency, transforming is applied with a Fourier transform into the frequency domain, a multiplication is carried out with respect to the transformed watermark-embedded image and a watermark, and a result of which is inverse-Fourier-transformed into the spatial domain again, to thereby enable a convolution result to be obtained. Such calculations are carried out by using Formula 4 as below. [Formula 4]
Conv = IFFT2( vFFT2(W ι.rag ) XFFT2( vW m-zeropad .di .ng ))
In here, IFFF2 denotes a two-dimensional inverse Fourier transform, FFT2 a two- dimensional Fourier transform, Wimg a watermark-embedded image, and Wm-zeropadding is a zero-padding watermark.
As a calculation result by the above Formula 4, it is checked whether there is a peak having a value over a predetermined magnitude from the result values. A position at which a watermark is embedded in an image can be grasped from a position at which such a peak exists. If any peak does not appear as a result of the convolution calculations, the calculations continue while resizing a watermark until a peak appears. That is, if a peak does not appear, it is notified to the watermark enlargement/reduction part 244 in the watermark resizer 240, the watermark enlargement/reduction part 244 resizes a watermark generated from the watermark generator 230 for transferring to the zero padding part 242. The zero padding part 242 fills with 'O's in an image size remaining except for a resized watermark or an output.
A watermark can be resized in various ways, and, in the present invention, peaks appear every repeatedly embedded period if an autocorrelation is obtained with respect to a watermarked image, and intervals among the peaks are measured for resizing a watermark. However, since a peak interval may occur at a different position due to noise, intervals among peaks are defined as candidate scale elements, and a watermark is resized with respect to the candidate scale elements.
The convolution operator 250, as stated above, carries out the convolution with respect to a watermark component-strengthened signal of the image signal by the preprocessor 220 and a zero padding-processed watermark. Such a calculation finds out a peak, as shown in Fig. 11, while resizing a watermark until the peak is detected within a range of the predetermined number of times.
In the watermark embedding, a corresponding image with respect to one image is divided into plural regions corresponding to a watermark size and a watermark is embedded for the respective regions, so peaks appearing in the plural small regions as a result detected through the above process is that the watermark embedded in corresponding regions is detected.
If peaks are detected, the post-processor 260 is performed in accordance with the operation flows shown in Fig. 12. First, as shown in Fig. 11, if peaks are detected as a convolution result, the positions of all the spots at which corresponding peaks appear are detected(S300). A peak detection is to extract the certain number of peaks after arrangement in the descending order. Such positions are the above convolution result and the peaks are detected at the corners of a region a watermark occupies, so the regions in which peaks appear are captured by watermark sizes(S310), and the regions are added(S320).
Since the peak detection in the above process is done when two identical signals are matched and a signal correlation is obtained while sliding the two signals, the biggest peak appears when the two signals are matched. Accordingly, since a part at which the signals are matched is one coincident with a region of a set watermark block, a peak is detected at a corner.
As stated above, with the addition of the regions captured in the post-processor 260, an image component energy comes closer to an average, but a watermark component gradually increases, to thereby play a role of strengthen the watermark component as well.
If a result is obtained by the addition, a result signal and a watermark signal generated by the watermark generator 230 are inputted to the correlation operator 270 for obtaining a correlation Corr by using Formula 5 as below. The correlation is respectively carried out with respect to a watermark generated by an inherent key and a watermark generated by a user key. [Formula 5]
Corr = IFFT2(FFT2( lmaesum) Xconj(FFT2(W J))
In here, Wimgsum denotes a watermark-strengthened signal processed by the post- processor and Wm denotes a watermark generated by the watermark generator. IFFT2 denotes a two-dimensional inverse fast Fourier transform, FFT2 a two-dimensional fast Fourier transform, and conj a complex conjugate.
In the correlation calculation using the above Formula 5, a multiplication is performed with respect to data obtained through the two-dimensional fast Fourier transform of a watermarked image Wimgsum and data obtained through the two-dimensional fast Fourier transform of a watermark Wm generated from the watermark generator 230 based on a user key or an inherent key, and the inverse fast Fourier transform is applied to the multiplication again for a conversion into the spatial domain. The conversion into the frequency domain and the multiplication calculation as stated above can reduce the number of calculations compared to the case of the convolution of an image watermarked in the spatial domain and a watermark, so that data processing can be performed at a higher speed.
Fig. 13 is a floating view of a correlation calculated by Formula 5 under assumption of a case that a watermark is embedded. Since the correlation obtained by Formula 5 is a two-dimensional sequence form rather than a certain value, the maximum peak value and its position can be obtained through a process as below in comparison of such plural values.
Just like the watermark generator 230 generates a watermark through an inherent key and a user key, as shown in Fig. 14, the watermark detector 280, if peaks occur, checks whether all the two key values exist and the peaks appear at the same position(S400). Sharpness is calculated if the two peaks occur at the same position(S410). The sharpness calculation determines, through the fourth moment(Kurtosis; K) in Formula 6 as below, whether a K value has a value above a predetermined threshold value(S420), and it is determined that a watermark is detected when satisfying both of the two conditions. [Formula 6]
Here,
Figure imgf000023_0001
denotes a result value of a correlation between two watermarks
X X
Wm and Wimg, an average of 1'" "' N , and a standard deviation. The determination as to whether a value of K is more than a certain threshold value in the above step is to determine whether a watermark is embedded through a comparison between a peak value and a set threshold value since a peak appears high at an calculated value in case that the watermark is embedded. In here, the threshold value is shown as a value constantly allocated by experiments. However, when the condition is not satisfied in the step S420, it is determined that a watermark is not detected.
Industrial Applicability
As described above, the present invention relates to a method and apparatus for embedding and detecting a watermark, which uses a watermark formed in a two- dimensional radial fashion for its configuration changes upon embeddings thereof, enhancing the robustness of a watermark against signal variations. Further, upon the detection of the watermark, a convolution integral is used to detect a watermark embedded in the two-dimensional radial fashion as above for effective detections, enhancing the accuracy and promptness for watermark detections. Although the preferred embodiment of the present invention has been described in particular, it will be understood by those skilled in the art that the present invention should not be limited to the described preferred embodiment, but various changes and modifications can be made within the spirit and scope of the present invention as defined by the appended claims.

Claims

What is claimed is:
1. A digital watermark embedding method for embedding a digital watermark in an image signal, comprising steps of: using a user key and an inherent key and generating respective pseudo-noise codes thereof; adding the pseudo-noise code generated based on the user key and the pseudo- noise code generated based on the inherent key; and adding to the image signal a digital watermark formed by a step for arranging in a two-dimensional fashion a watermark formed by the addition.
2. The method as claimed in claim 1, wherein the watermark arrangement step arranges in a radial fashion the watermark of a stream fashion while rotating a watermark of a predetermined length 360 degrees about a first value.
3. The method as claimed in claim 1, wherein the watermark arrangement step, with respect to each of plural blocks configuring the image signal, arranges the watermark of the stream format into plural concentric circles about a center portion of each block.
4. The method as claimed in claim 3, wherein the watermark arranged in the concentric circles is enlarged/reduced for the arrangement by sampling a corresponding stream with reference to a predetermined radius.
5. The method as claimed in any one of claims 1 to 4, wherein the addition of the digital watermark and the image signal is accomplished by adjusting strength of a digital watermark to be added based on characteristics of the image signal.
6. The method as claimed in claim 5, wherein the digital watermark strength adjustment is determined by the number of colors used for each of channels in the blocks of the image signal.
7. The method as claimed in claim 5, wherein the digital watermark strength adjustment is determined by a ratio of a high frequency energy and a low frequency energy of the image signal.
8. The method as claimed in claim 5, wherein the digital watermark strength adjustment is determined by a histogram distribution formed based on a color value of each channel of the image signal.
9. The method as claimed in claim 5, wherein the image signal is a 24-bit color, further comprising, before adding the digital watermark and the image signal, steps of: converting the image signal inputted in an RGB format into a YIQ(Y: Luminance, I: In-phase, and Q: Quadrature) format; and extracting only a Y component from components of the converted YIQ format, the Y component being added to the digital watermark.
10. The method as claimed in claim 5, wherein the image signal is in a 24-bit color, and the image signal inputted in the RGB format is separated into respective R, G, and B channels for the addition with the digital watermark.
11. The method as claimed in claim 9, further comprising a step of storing an image signal obtained from the addition of the image signal and the digital watermark, and the storage step including steps of: adding IQ components except for the Y component from the components of the
YIQ format and the added image signal; converting the added signal into the RGB format; and storing the converted signal in a storage medium as a record signal.
12. The method as claimed in claim 10, further comprising a step of adding the image signal to which the digital watermark is added with respect to each channel.
13. A digital watermark detection method for detecting a digital watermark embedded in an image signal, comprising steps of: strengthening a component of the digital watermark embedded in the image signal; generating a watermark arranged in a two-dimensional format; resizing the generated digital watermark to a image signal size; applying a convolution integral to the resized digital watermark and the image signal and detecting peaks included in the image signal; measuring positions of the detected peaks, capturing respective regions at the peak-measured positions for an addition thereof, and extracting a watermark embedded in the image signal; calculating a correlation of the extracted watermark and the generated digital watermark; and detecting a watermark embedded in the image signal based on the correlation.
14. The method as claimed in claim 13, wherein the watermark generation step includes steps of: using a user key and an inherent key to generate a watermark and generating respective pseudo-noise codes; and arranging the watermark in a two-dimensional format of a certain shape.
15. The method as claimed in claim 13 or claim 14, wherein the image signal is in a 24-bit color, further comprising, before the step of strengthening the component of the digital watermark embedded in the image signal, steps of: converting the image signal inputted in an RGB format into a YIQ format; and extracting only a Y component from components of the converted YIQ format.
16. The method as claimed in claim 13 or claim 14, wherein the image signal is in a 24-bit color, the image signal inputted in the RGB format is strengthened in a component of the digital watermark embedded in each of R, G, and B channels.
17. The method as claimed in claim 13, wherein the watermark-resizing step includes steps of: resizing the watermark to an image signal size; and filling with 0's in remaining portions except for portions in which the resized watermark exists, the watermark size being enlarged/reduced based on a result of the convolution operation.
18. The method as claimed in claim 17, wherein the watermark resizing is repeated until a predetermined peak appears as a result of the convolution operation.
19. The method as claimed in claim 13, 14, 17, or 18, wherein the step for strengthening the component of the digital watermark includes a filtering step for strengthening a high frequency component of the image signal.
20. The method as claimed in claim 13, 14, 17, or 18, wherein the step for strengthening the component of the digital watermark carries out masking to reduce an image component energy of the image signal and increase a watermark component energy.
21. The method as claimed in claim 19, wherein the filtering step for strengthening the high frequency component is performed by a high boost filter, a
Laplacian filter, or a Difference of Gaussian(DoG) filter.
22. The method as claimed in claim 13, wherein the convolution operation is carried out based on a Formula as below:
Conv = IFFT2(FFT2(W ™. S ) XFFT2(W m.-zeropaddi .ng )7-)' here, IFFF2 denotes a two-dimensional inverse Fourier transform, FFT2 a two- dimensional Fourier transform, Wimg a watermark-embedded image, and Wm-zeropaddiπg a '0'- embedded watermark.
23. The method as claimed in claim 13, 14, 17, or 18, wherein the correlation calculation is carried out based on a Formula as below:
Corr = IFFT2(FFT2(Wimags Xconj(FFT2( ))
here, Wimagsum denotes a watermark-embedded image signal, Wm a watermark generated by using the user key and the inherent key, IFFT2 a two-dimensional inverse fast Fourier transform, FFT2 a two-dimensional fast Fourier transform, and conj a complex conjugate.
24. The method as claimed in claim 13, 14, 17, or 18, wherein the watermark detection step includes steps of: calculating peak positions from the correlation; calculation peak sharpness; and determining whether a watermark is included in the image signal based on the peak positions and the sharpness.
25. A digital watermark embedding apparatus for embedding a watermark in an image signal, comprising: a watermark generation means for generating a watermark; and a first addition means for adding the watermark to the image signal, the watermark generation means including: a) a first pseudo-noise code generation means for generating a pseudo-noise code by using a user key; b) a second pseudo-noise code generation means for generating a pseudo-noise code by using an inherent key; c) a first addition means for adding the pseudo-noise codes generated from the first and second pseudo-noise generation means respectively; and d) means for arranging in a two-dimensional format the watermark formed by the addition.
26. The apparatus as claimed in claim 25, wherein the watermark arrangement means arranges in a radial fashion the watermark of a stream fashion while rotating a watermark of a predetermined length 360 degrees about a first value.
27. The apparatus as claimed in claim 25, wherein the watermark arrangement means arranges the watermark of the stream format into plural concentric circles about a center portion of each of blocks configuring the image signal.
28. The apparatus as claimed in claim 27, wherein the watermark arrangement means enlarges and reduces the watermark arranged in the concentric circles by sampling a corresponding stream with reference to a predetermined radius for arrangements in plural concentric circles.
29. The apparatus as claimed in any one of claims 25 to 28, wherein the first addition means divides the image signal into watermark sizes, and the divided image signal and the watermark are added for every channel.
30. The apparatus as claimed in claim 25, further comprising an image analysis means for adjusting a strength of a digital watermark to be added based on characteristics of the image signal in order to add the digital watermark and the image signal.
31. The apparatus as claimed in claim 30, wherein the digital watermark strength adjustment is determined based on the number of colors used for each channel in the blocks of the image signal.
32. The apparatus as claimed in claim 30, wherein the digital watermark strength adjustment is determined by a ratio of a high frequency energy and a low frequency energy of the image signal.
33. The method as claimed in claim 30, wherein the digital watermark strength adjustment is determined by a histogram distribution formed based on a color value of each channel of the image signal.
34. The apparatus as claimed in claim 30, further comprising, before adding the image signal and the watermark, an image conversion means for converting the image signal into a predetermined format, the image conversion means separating, if the image signal is a 24-bit color signal, the image signal into respective R, G, and B channels for outputs.
35. The apparatus as claimed in claim 30, before adding the image signal and the watermark, further comprising an image conversion means for converting the image signal into a predetermined format, the image conversion means including: a first determination means for determining whether the image signal is a 24-bit image signal by reading header information of the image signal; a first conversion means for converting, if the image signal is a 24-bit image signal, the image signal of the RGB format into a YIQ format; and an extraction means for extracting only a Y component from an image signal converted into the YIQ format, and, if the image signal is not a 24 bits, the image signal being outputted to the first addition means without the conversion.
36. The apparatus as claimed in claim 35, further comprising an image storage means for storing the watermark-embedded image signal by the first addition means, the image storage means including: a first determination means for determining whether the image signal is a 24-bit image by reading header information of the image signal; an addition means for adding, if the image signal is a 24-bit image signal, the watermark-embedded image signal of the Y component and the IQ components separated by the extraction means; and a second conversion means for converting the added signal of the YIQ format into the RGB format, the processed image signal being stored in a storage medium.
37. A digital watermark detection apparatus for detecting a watermark included in an image signal, comprising: a pre-processing means for strengthening a watermark component included in the retrieved image signal; a watermark generation means for generating a watermark arranged in a two- dimensional format; a watermark resizing means for resizing the generated watermark to a size of the image signal; a convolution operation means for carrying out a convolution operation with respect to the resized watermark and the image signal and detecting peaks; an extraction means for measuring positions of the detected peaks, capturing respective region at the peak-measured positions for an addition thereof, and extracting a watermark included in the image signal; a correlation means for obtaining a correlation between the extracted watermark and the generated watermark; and a watermark detection determination means for determining whether the watermark embedded in the image signal is detected based on a result of the correlation.
38. The apparatus as claimed in claim 37, wherein the watermark generation means includes a first addition means for adding the watermark to the image signal, the watermark generation means having: a) a first pseudo-noise code generation means for generating a pseudo-noise code by using a user key to form a watermark; b) a second pseudo-noise code generation means for generating a pseudo-noise code by using an inherent key to form a watermark; and c) an arrangement means for arranging the formed watermark in a two- dimensional format.
39. The apparatus as claimed in claim 38, the image signal being in a 24-bit color, further comprising an image conversion means for converting the format of the image signal before the carrying-out of the pre-processing means for strengthening the component of the digital watermark embedded in the image signal, the image signal conversion means having: a conversion means for converting the image signal inputted in an RGB format into a YIQ format; and an extraction means for extracting only a Y component from the components of the converted YIQ format.
40. The apparatus as claimed in claim 38, wherein the image signal is in a 24-bit color, and the image signal inputted in the RGB format is inputted to the pre-processing means by R, G, and B channels.
41. The apparatus as claimed in claim 38, wherein the watermark resizing means includes: a watermark enlargement/reduction means for enlarging and reducing the watermark size based on a result of a convolution operation; and a zero-padding means for fitting the watermark size to the image signal size and filling with O's as values for portions remaining except for portions in which the watermark exists.
42. The apparatus as claimed in claim 41, wherein the watermark resizing is repeated until peaks appear as a result of the convolution operation.
43. The apparatus as claimed in claim 41, wherein the pre-processing means filters a high frequency component of the image signal.
5 44. The apparatus as claimed in claim 41, wherein the pre-processing means performs masking to reduce an image component energy and to increase a watermark component energy of the image signal.
45. The apparatus as claimed in claim 43, wherein the filtering for strengthening 10 the high frequency component is carried out by at least any one of a high boost filter, a
Laplacian filter, and a Difference of Gaussian(DoG) filter.
46. The apparatus as claimed in claim 41, wherein the convolution operation is carried out based on Formula as below:
"L5 Conv = IFFT2( vFFT2( vW i.mg )" XFFT2( vW m-zeropa JddΛi.ng- )'')
here, IFFF2 denotes a two-dimensional inverse Fourier transform, FFT2 a two- dimensional Fourier transform, Wimg a watermark-embedded image, and Wm.zeropaddi-g a '0'- embedded watermark.
20 47. The apparatus as claimed in claim 41, wherein the correlation calculation is carried out based on a Formula as below:
Corr = IFFT2(FFT2(Wlmagsun) Xconj(FFT2(WJ))
here, W^^-, denotes a watermark-embedded image signal, Wm a watermark generated by using the user key and the inherent key, IFFT2 a two-dimensional inverse fast Fourier transform, FFT2 a two-dimensional fast Fourier transform, and conj a complex conjugate.
48. The apparatus as claimed in claim 41, wherein the watermark detection determination means includes: means for calculating peak positions and peak sharpness from the correlation; and determining whether a watermark is embedded in the image signal based on the peak positions and the sharpness.
PCT/KR2002/000728 2001-04-20 2002-04-19 Method of inserting/detecting digital watermark and apparatus for using thereof WO2002087251A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR10-2001-0021531A KR100423159B1 (en) 2001-04-20 2001-04-20 Method of inserting/detecting digital watermarks and apparatus for using thereof
KR2001-0021531 2001-04-20

Publications (1)

Publication Number Publication Date
WO2002087251A1 true WO2002087251A1 (en) 2002-10-31

Family

ID=19708542

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2002/000728 WO2002087251A1 (en) 2001-04-20 2002-04-19 Method of inserting/detecting digital watermark and apparatus for using thereof

Country Status (2)

Country Link
KR (1) KR100423159B1 (en)
WO (1) WO2002087251A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008066235A1 (en) * 2006-12-02 2008-06-05 Electronics And Telecommunications Research Institute Apparatus and method for inserting/extracting nonblind watermark using features of digital media data
KR100834095B1 (en) * 2006-12-02 2008-06-10 한국전자통신연구원 Apparatus and method for inserting/extracting nonblind watermarkusing feathers of digital media data
EP2296362A1 (en) * 2009-09-09 2011-03-16 European Central Bank A method for generating a security bi-level image for a banknote
CN110896484A (en) * 2018-09-12 2020-03-20 中兴通讯股份有限公司 Video watermark adding and extracting method and device, video playing end and storage medium
CN112241929A (en) * 2019-07-16 2021-01-19 阿里巴巴集团控股有限公司 Watermark embedding method, watermark detecting method, watermark embedding device, watermark detecting device and electronic equipment

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20160083276A (en) * 2014-12-30 2016-07-12 (주)노바코스 Apparatus and method for detecting position of car
KR102124502B1 (en) * 2018-02-14 2020-06-24 경일대학교산학협력단 Apparatus for processing watermarking using artificial neural network, method thereof and computer recordable medium storing program to perform the method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0962886A2 (en) * 1998-05-12 1999-12-08 Lucent Technologies Inc. Method and system for watermarking in the frequency domain
EP0967803A2 (en) * 1998-06-24 1999-12-29 Nec Corporation Robust digital watermarking

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100327210B1 (en) * 1998-03-03 2002-05-09 윤종용 Copy control apparatus of video data and method thereof

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0962886A2 (en) * 1998-05-12 1999-12-08 Lucent Technologies Inc. Method and system for watermarking in the frequency domain
EP0967803A2 (en) * 1998-06-24 1999-12-29 Nec Corporation Robust digital watermarking

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
DJUROVIC I.: "Generalization of the fourier domain watermarking to the space/spatial-frequency domain", IMAGE AND SIGNAL PROCESSING AND ANALYSIS. IWISPA 2000. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP. IEEE, 2000, pages 47 - 51, XP010538123 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008066235A1 (en) * 2006-12-02 2008-06-05 Electronics And Telecommunications Research Institute Apparatus and method for inserting/extracting nonblind watermark using features of digital media data
KR100834095B1 (en) * 2006-12-02 2008-06-10 한국전자통신연구원 Apparatus and method for inserting/extracting nonblind watermarkusing feathers of digital media data
EP2296362A1 (en) * 2009-09-09 2011-03-16 European Central Bank A method for generating a security bi-level image for a banknote
WO2011029845A3 (en) * 2009-09-09 2011-06-16 European Central Bank (Ecb) A method for generating a security bi-level image for a banknote
US9317988B2 (en) 2009-09-09 2016-04-19 European Central Bank (Ecb) Method for generating a security bi-level image for a banknote
CN110896484A (en) * 2018-09-12 2020-03-20 中兴通讯股份有限公司 Video watermark adding and extracting method and device, video playing end and storage medium
CN110896484B (en) * 2018-09-12 2023-05-05 中兴通讯股份有限公司 Video watermark adding and extracting method and device, video playing end and storage medium
CN112241929A (en) * 2019-07-16 2021-01-19 阿里巴巴集团控股有限公司 Watermark embedding method, watermark detecting method, watermark embedding device, watermark detecting device and electronic equipment
CN112241929B (en) * 2019-07-16 2022-11-11 阿里巴巴集团控股有限公司 Watermark embedding method, watermark detecting method, watermark embedding device, watermark detecting device and electronic equipment

Also Published As

Publication number Publication date
KR20020081937A (en) 2002-10-30
KR100423159B1 (en) 2004-03-18

Similar Documents

Publication Publication Date Title
US7386729B2 (en) Method of inserting/detecting digital watermark and apparatus for using thereof
Kutter et al. Towards second generation watermarking schemes
Nikolaidis et al. Region-based image watermarking
Stankovic et al. Watermarking in the space/spatial-frequency domain using two-dimensional Radon-Wigner distribution
US6198832B1 (en) Embedding and detecting a watermark in images
EP0981903B1 (en) Watermark detection
WO2001054331A9 (en) Rotation, scale, and translation resilient public watermarking for images
Sun et al. A geometrically robust multi-bit video watermarking algorithm based on 2-D DFT
US7395432B2 (en) Method of embedding/detecting digital watermark and apparatus for using thereof
KR20100095245A (en) Method and apparatus for embedding watermark
WO2002087251A1 (en) Method of inserting/detecting digital watermark and apparatus for using thereof
US20030068068A1 (en) Content based digital watermarking using wavelet based directionality measures
Kay et al. Robust content based image watermarking
Chang et al. Watermarking 2D/3D graphics for copyright protection
Pham et al. Robust object-based watermarking using feature matching
KR100454668B1 (en) System for embedding and detecting watermark including template
JP2002354221A (en) Image processor, data processor, image and data processing method, and storage medium
Zheng et al. A rotation invariant feature and image normalization based image watermarking algorithm
Mangaiyarkarasi et al. A Novel Digital Blind Watermark Embedding Process Using Gain Control Tamper Detection Algorithm
Shih et al. Achieving image watermarking robustness by geometric rectification
Ayyalasomayajula et al. Differentiating photographic and PRCG images using tampering localization features
KR100510354B1 (en) Image watermarking method resistant to geometric attack combined with removal attack
Hien et al. Curvelet transform based logo watermarking
Santhi et al. Adaptive visible watermarking for digital images using SURF technique in wavelet domain
Oh et al. A Wavelet Transform based Watermarking for Digital Signatures

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP