This page has only limited features, please log in for full access.
Digital watermarking is a technique used for embedding information in digital content and protecting its copyright. The important issues to be considered are robustness, quality and capacity. Our goal is to satisfy these requirements according to the Information Hiding and its Criteria for evaluation (IHC) criteria. In this study, we evaluate our watermarking scheme along the IHC criteria Ver.3 as the primary step. Although image watermarking techniques based on machine learning already exist, their robustness against desynchronization attacks such as cropping, rotation, and scaling is still one of the most challenging issues. We propose a watermarking scheme based on machine learning which also has cropping tolerance. First, the luminance space of the image is decomposed by one level through wavelet transform. Then, a bit of the watermark and the marker for synchronization are embedded or extracted by adjusting or comparing the relation between the embedded coefficients value of the LL space and the output coefficients value of the trained machine learning model. This model can well memorize the relationship between its selected coefficients and the neighboring coefficients. The marker for synchronization is embedded in a latticed format in the LL space. Binarization processing is performed on the watermarked image to find the lattice-shaped marker and synchronize it against cropping. Our experimental results showed that there were no errors in 10HDTV-size areas after the second decompression.
Ryo Sakuma; Hyunho Kang; Keiichi Iwamura; Isao Echizen. Digital Watermarking Scheme Based on Machine Learning for the IHC Evaluation Criteria. Blockchain Technology and Innovations in Business Processes 2017, 81, 370 -380.
AMA StyleRyo Sakuma, Hyunho Kang, Keiichi Iwamura, Isao Echizen. Digital Watermarking Scheme Based on Machine Learning for the IHC Evaluation Criteria. Blockchain Technology and Innovations in Business Processes. 2017; 81 ():370-380.
Chicago/Turabian StyleRyo Sakuma; Hyunho Kang; Keiichi Iwamura; Isao Echizen. 2017. "Digital Watermarking Scheme Based on Machine Learning for the IHC Evaluation Criteria." Blockchain Technology and Innovations in Business Processes 81, no. : 370-380.
Keiichi Iwamura; Masaki Kawamura; Minoru Kuribayashi; Motoi Iwata; Hyunho Kang; Seiichi Gohshi; Akira Nishimura. Information Hiding and Its Criteria for Evaluation. IEICE Transactions on Information and Systems 2017, E100.D, 2 -12.
AMA StyleKeiichi Iwamura, Masaki Kawamura, Minoru Kuribayashi, Motoi Iwata, Hyunho Kang, Seiichi Gohshi, Akira Nishimura. Information Hiding and Its Criteria for Evaluation. IEICE Transactions on Information and Systems. 2017; E100.D (1):2-12.
Chicago/Turabian StyleKeiichi Iwamura; Masaki Kawamura; Minoru Kuribayashi; Motoi Iwata; Hyunho Kang; Seiichi Gohshi; Akira Nishimura. 2017. "Information Hiding and Its Criteria for Evaluation." IEICE Transactions on Information and Systems E100.D, no. 1: 2-12.
Various digital watermarking methods have recently been developed. Among them, the frequency component is often used in watermark embedding. The discrete wavelet transform is a general frequency conversion technique that has been adopted in some watermarking methods. We found that different wavelet filters provide different watermarking performances based on the wavelet transform. In recent years, the Information Hiding and its Criteria for evaluation (IHC) Committee of Japan has developed evaluation criteria for information hiding. In this study, we developed a new audio watermarking method that satisfies the IHC evaluation criteria.
Toshiki Ito; Hyunho Kang; Keiichi Iwamura; Kitahiro Kaneda; Isao Echizen. Audio Watermarking Using Different Wavelet Filters. Transactions on Petri Nets and Other Models of Concurrency XV 2016, 312 -320.
AMA StyleToshiki Ito, Hyunho Kang, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen. Audio Watermarking Using Different Wavelet Filters. Transactions on Petri Nets and Other Models of Concurrency XV. 2016; ():312-320.
Chicago/Turabian StyleToshiki Ito; Hyunho Kang; Keiichi Iwamura; Kitahiro Kaneda; Isao Echizen. 2016. "Audio Watermarking Using Different Wavelet Filters." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 312-320.
In recent years, information hiding and its evaluation criteria have been developed by the IHC (Information Hiding and its Criteria) Committee of Japan. This committee was established in 2011 with the aim of establishing standard evaluation criteria for robust watermarks. In this study, we developed an information hiding method that satisfies the IHC evaluation criteria. The proposed method uses the difference of the frequency coefficients derived from a discrete cosine transform or a discrete wavelet transform. The algorithm employs a statistical analysis to find the best positions in the frequency domains for watermark insertion. In particular, we use the BCH (Bose-Chaudhuri-Hocquenghem) (511,31,109) code to error correct the watermark bits and the BCH (63,16,11) code as the sync signal to withstand JPEG (Joint Photographic Experts Group) compression and cropping attacks. Our experimental results showed that there were no errors in 10 HDTV-size areas after the second decompression. It should be noted that after the second compression, the file size should be less than 1 25 of the original size to satisfy the IHC evaluation criteria.
Hyunho Kang; Keiichi Iwamura. Information Hiding Method Using Best DCT and Wavelet Coefficients and Its Watermark Competition. Entropy 2015, 17, 1218 -1235.
AMA StyleHyunho Kang, Keiichi Iwamura. Information Hiding Method Using Best DCT and Wavelet Coefficients and Its Watermark Competition. Entropy. 2015; 17 (3):1218-1235.
Chicago/Turabian StyleHyunho Kang; Keiichi Iwamura. 2015. "Information Hiding Method Using Best DCT and Wavelet Coefficients and Its Watermark Competition." Entropy 17, no. 3: 1218-1235.
Sensor nodes used for constructing a wireless sensor network consume a small amount of electrical power and resources, and should be used efficiently in terms of energy consumption. LEACH (low energy adaptive clustering hierarchy), a protocol that periodically changes the cluster head, averages the power consumption of all nodes. Some researchers have suggested the use of a security system for LEACH, but such systems create a possibility in which certain nodes no longer connect with other nodes in the network. In this paper, we propose a new LEACH protocol that improves on these problems using a hierarchical-structured key-sharing scheme. Our method offers greater security than other related methods.
Shinichi Goto; Soma Saito; Hyunho Kang; Keiichi Iwamura. New Secure LEACH Protocol Using Hierarchy-Based Preshared Key Scheme. Lecture Notes in Electrical Engineering 2015, 330, 99 -106.
AMA StyleShinichi Goto, Soma Saito, Hyunho Kang, Keiichi Iwamura. New Secure LEACH Protocol Using Hierarchy-Based Preshared Key Scheme. Lecture Notes in Electrical Engineering. 2015; 330 ():99-106.
Chicago/Turabian StyleShinichi Goto; Soma Saito; Hyunho Kang; Keiichi Iwamura. 2015. "New Secure LEACH Protocol Using Hierarchy-Based Preshared Key Scheme." Lecture Notes in Electrical Engineering 330, no. : 99-106.
Collusion attacks are effective against fingerprinting schemes. When a watermark is embedded as part of a fingerprinting schemes, it should be resistant to collusion by multiple users who each have a different version of the watermark. However, there is a limitation to detecting the watermark when classical spread spectrum watermarking is used. In this paper, we propose a negative correlation watermarking scheme to resolve this limitation using a modified Barni’s watermarking scheme, which is a method that can be used in many application areas. In particular, the difference between the frequency coefficients and uniformly distributed real numbers is used as the embedded watermark. This method can also be applied to our previously proposed wavelet-based video fingerprinting system.
Hyunho Kang; Keiichi Iwamura. Collusion-Resistant Watermarking Using Modified Barni Method. Lecture Notes in Electrical Engineering 2014, 627 -634.
AMA StyleHyunho Kang, Keiichi Iwamura. Collusion-Resistant Watermarking Using Modified Barni Method. Lecture Notes in Electrical Engineering. 2014; ():627-634.
Chicago/Turabian StyleHyunho Kang; Keiichi Iwamura. 2014. "Collusion-Resistant Watermarking Using Modified Barni Method." Lecture Notes in Electrical Engineering , no. : 627-634.
The extraction of a stable signal from noisy data is very useful in applications that aim to combine it with a cryptographic key. An approach based on an error correcting code was proposed by Dodis et al., which is known as a fuzzy extractor. Physical unclonable functions (PUFs) generate device-specific data streams, although PUFs are noisy functions. In this paper, we describe a method for preparing a PUF key during fuzzy extractor implementation. The experimental results showed that all possible combinations of input message length and the number of correctable errors were tested for a BCH code with codeword length N, which was the length of the PUF responses.
Hyunho Kang; Yohei Hori; Toshihiro Katashita; Manabu Hagiwara; Keiichi Iwamura. Performance Analysis for PUF Data Using Fuzzy Extractor. Lecture Notes in Electrical Engineering 2014, 277 -284.
AMA StyleHyunho Kang, Yohei Hori, Toshihiro Katashita, Manabu Hagiwara, Keiichi Iwamura. Performance Analysis for PUF Data Using Fuzzy Extractor. Lecture Notes in Electrical Engineering. 2014; ():277-284.
Chicago/Turabian StyleHyunho Kang; Yohei Hori; Toshihiro Katashita; Manabu Hagiwara; Keiichi Iwamura. 2014. "Performance Analysis for PUF Data Using Fuzzy Extractor." Lecture Notes in Electrical Engineering , no. : 277-284.