PROTECTION OF COPYRIGHT TO THE IMAGE WITH THE USE OF METHODS OF MORPHOLOGICAL PROCESSING

  • А.М. Abasova Southern Federal University
  • L.K. Babenko Southern Federal University
Keywords: Steganography, stegocontainer, digital watermarkind, morphological image processing

Abstract

This article raises the issue of the introduction of digital watermarks in the image area, which are less likely modified and, therefore, are suitable for ensuring effective protection of cop-yright, taking into account the type of destructive effects that are characteristic of their violation. The container is a color image, as a digital watermark - a text containing a copyright protection symbol. For the implementation, foreground blocks are chosen, because according to the survey they represent the value of the image, which is especially characteristic for commercial photo-graphs. The search for data blocks for implementation is carried out using marking using methods of mathematical morphology. Also in the article, the ability of a structural element to fulfill the role of key information has been demonstrated. It is proposed to use the geometric center of each found block of the foreground for the introduction of the digital watermark as a reference point when it is filled. The results of the evaluation of the ability to correctly extract an embedded digital watermark according to the proposed solution using the developed program, the results of the analysis of the effectiveness of the developed program and a comparison with existing software products used for copyright protection are presented

References

1. Nevskaya M.A., Tarasova E.N., Sukharev E.E. Avtorskoye pravo v izdatel’skom biznese i SMI [Copyright in the publishing business and media]. Moscow: Dashkov i K, 2008, 300 p. 2. Abasova A.M., Babenko L.K. Razrabotka algoritma vnedreniya tsifrovogo vodyanogo znaka na baze morfologicheskoy obrabotki izobrazheniya i modulyarnoy arifmetiki dlya protivodeystviya ugrozam khishcheniya ob’’ektov intellektual’noy sobstvennosti [Develop-ment of an algorithm for the introduction of a digital watermark based on morphological image processing and modular arithmetic to counter threats of theft of intellectual property], Mezhdunarodnyy zhurnal prikladnykh i fundamental’nykh issledovaniy [International journal of applied and fundamental research], 2018, No. 6, pp. 9-14. 3. Gribunin V.G., Kostyukov V.E, Martynov A.P., Nikolayev D.B., Fomchenko V.N. Steganograficheskiye sistemy. Ataki, propusknaya sposobnost kanalov i otsenka stoykosti: uchebno-metodicheskoye posobiye [Steganographic systems. Attack, channel capacity and du-rability assessment: textbook], ed. by V.G. Gribunin. Sarov: FGUP «RFYATS-VNIIEF», 2015, 217 p. 4. Belobokova Y.A. Modeli i algoritmy zashchitnoy markirovki dlya obespecheniya autentichnosti i tselostnosti rastrovykh izobrazheniy: avtoref. dis. na soisk. uchen. step. kand. tekhnich. nauk [Models and algorithms of protective marking to ensure the authenticity and in-tegrity of bitmaps: the author's abstract cand. of eng. sc. diss.] (05.13.17). Moscow, 2014, 19 p. 5. Konakhovich, G.F., Puzyrenko A.Y. Komp’yuternaya steganografiya. Teoriya i praktika [Com-puter steganography. Theory and practice]. Kiev: MK-Press, 2006, 288 p.
6. Cox I.J., Miller M., Bloom J., Fridrich J. Digital watermarking and steganography. San Fran-cisco: Morgan Kaufmann Publishing, 2008, 624 p.
7. Terzija N. Robust digital image watermarking algorithms for copyright protection: genehmigte dissertation. Belgrad, 2006, 161 p. 8. Karpin A. Fotografiya dlya nachinayushchikh [Photography for beginners]. Samizdat, 2012, 239 p.
9. Gupta S., Girshick R., Arbel´aez P., Malik J. Learning rich features from RGB-D images for object detection and segmentation, European Conference on Computer Vision, Springer, 2014, pp. 345-360. 10. Kukharenko B.G. Algoritmy vydeleniya ob"yektov perednego plana iz fona i interaktivnogo redaktirovaniya izobrazheniy [Algorithms for selecting foreground objects from the back-ground and interactive image editing], Prilozheniye k zhurnalu informatsionnye tekhnologii [Appendix to the journal information technology], No. 4. Moscow, 2012, 32 p. 11. Gonsales R., Vuds R. Tsifrovaya obrabotka izobrazheniy [Digital image processing]. Moscow: Tekhnosfera, 2005, 1072 p.
12. Abasova A.M. Algoritm povysheniya ustoychivosti k destruktivnym vozdeystviyam tsifrovykh vodyanykh znakov, vstraivayemykh v tsvetnoye izobrazheniye [Algorithm for increasing re-sistance to destructive effects of digital watermarks embedded in a color image], Izvestiya YuFU. Tekhnicheskiye nauki [Izvestiya SFedU. Engineering Sciences], 2014, No. 8 (157), pp. 75-81. 13. Abasova A.M. Ispolzovaniye metodov morfologicheskoy obrabotki izobrazheniy dlya vnedreniya tsifrovykh vodyanykh znakov [The use of morphological image processing meth-ods for the introduction of digital watermarks], Materialy VI Mezhdunarodnoy nauchno-tekhnicheskoy konferentsii «Infokommunikatsionnyye tekhnologii v nauke, proizvodstve i obrazovanii (Infokom-6)». FGAOU VPO Severo-Kavkazskiy federalnyy universitet, 2014 [Pro-ceedings of the VI International scientific and technical conference " infocommunication tech-nologies in science, production and education (InfoCom-6)". North Caucasus Federal University, 2014], pp. 199-203.
14. Abasova A.M. Zashchita informatsionnogo soderzhaniya tsifrovykh izobrazheniy putem primeneniya dopolnitel'nykh kriteriyev vybora ob"yektov dlya vnedreniya tsifrovykh vodyanykh znakov [Protection of information content of digital images by applying additional criteria for the selection of objects for the introduction of digital watermarks], Vestnik sovremennykh issledovaniy [Bulletin of modern research], 2018, No. 10-1, pp. 249-252.
15. Mills R.L. Novel method and system for pattern recognition and processing using data encoded as Fourier series in Fourier space, Engineering Applications of Artificial Intelligence, March 2006, Vol. 19, Issue 2, pp. 219-234. 16. Khorn B. K. P. Zreniye robotov [Vision robots]: transl. from Engl. Moscow: Mir, 1989б 487 p.
17. Kutter M., Jordan F., Bossen F. Digital signature of color images using amplitude modula-tion, Journal of Electronics Imaging, 1998, Vol. 7, pp. 326-332.
18. Kutter M., Jordan F., Bossen F. Digital signature of color images using amplitude modulation, Proc. of the SPIE Storage and Retrieval for Image and Video Databases, 1997, pp. 518-526. 19. Gribunin V.G., Okov I.N., Turintsev V.I. Tsifrovaya steganografiya [Digital steganography]. Moscow: SOLON-Press, 2017, 262 p. 20. Akushskiy I.Ya., Yuditskiy D.I. Mashinnaya arifmetika v ostatochnykh klassakh [Machine arithmetic in residual classes]. Moscow: Sovetskoye radio, 1968, 440 p.
Published
2019-04-04
Section
SECTION III. MATHEMATICAL AND SOFTWARE