Digital Watermarking Advanced Information Security RFIDUSN 1 v

  • Slides: 13
Download presentation
Digital Watermarking Advanced Information Security RFID/USN 수성대학교

Digital Watermarking Advanced Information Security RFID/USN 수성대학교

디지털 워터마킹 다양한 기술(1) v 주파수 영역에서 워터마크를 선형적으로 더한 경우 Original Signal Forward

디지털 워터마킹 다양한 기술(1) v 주파수 영역에서 워터마크를 선형적으로 더한 경우 Original Signal Forward DCT, FFT, etc. Inverse DCT, FFT, etc. Watermarked Signal Watermark (Copyright, ID) Information security 5 SCU

디지털 워터마킹 다양한 기술(2) v 일정 영역에 워터마크를 넣음 Inverse Zigzag Scan Image Information

디지털 워터마킹 다양한 기술(2) v 일정 영역에 워터마크를 넣음 Inverse Zigzag Scan Image Information security 6 SCU

디지털 워터마킹 다양한 기술(3) v 문서에 워터마크를 입히는 예(글자 모양, 글자 간격, Line 간격)

디지털 워터마킹 다양한 기술(3) v 문서에 워터마크를 입히는 예(글자 모양, 글자 간격, Line 간격) First is the long-aired gripe that the company develops cooler and Better-functioning smartphone apps for Android device than it does for Apple’s i. OS. That makes some sense. After all, Google created Android, and has a business interest in seeing First is the long-aired gripe that the company develops cooler and Better-functioning smartphone apps for Android device than it …. . First is the long-aired gripe that the company develops cooler and Better-functioning smartphone apps for Android device than it does for Apple’s i. OS. That makes some sense. After all, Google created Android, and has a business interest in seeing Information security 7 SCU

Friendly progressive Visual Secret Sharing Share Image Information security Copyright 8 Staked Image SCU

Friendly progressive Visual Secret Sharing Share Image Information security Copyright 8 Staked Image SCU

Friendly progressive Visual Secret Sharing Information security 9 SCU

Friendly progressive Visual Secret Sharing Information security 9 SCU

Friendly progressive Visual Secret Sharing ex 1) Set of random numbers : 3, 2,

Friendly progressive Visual Secret Sharing ex 1) Set of random numbers : 3, 2, 5, 5 ex 2) Set of random numbers : 1, 2, 3, 3 Information security 10 SCU

Experiment Information security 11 SCU

Experiment Information security 11 SCU

Friendly progressive Visual Secret Sharing Secret Image O Expanded Image O’ Stego Image T

Friendly progressive Visual Secret Sharing Secret Image O Expanded Image O’ Stego Image T Information security 12 SCU

Friendly progressive Visual Secret Sharing Share 1 Stack(Share 1, Share 2) Information security Share

Friendly progressive Visual Secret Sharing Share 1 Stack(Share 1, Share 2) Information security Share 2 Share 3 Stack(Share 1, Share 2, Share 3) 13 Share 4 Stack(Share 1, Share 2, Share 3, Share 4) SCU