A Secure Digital Watermarking Scheme based on RSA Function

RSA 함수에 기반한 안전한 워터마킹 기법

  • Published : 2001.06.01

Abstract

Digital watermarking is a technique for the purpose of protecting the ownership of the image by embedding invisible watermarks in a digital imnge. To guarantee the security of the digital watermarking scheme for copyright protection, it is required to satisfy some requirements robustness and perceptual invisibility which provided by the location of embedded bits, the public watermarking algorithm, and the hidden use of the key, which can protect unauthorized accesses from illegal users. For this, in this paper we propose a new copyright watermarking scheme, which is based on one-way hash functions using RSA functions and modular operations. RSA functions are widely used in cryptographic systems. Our watermarking scheme is robust against LSB(Jeast significant bit) attacks and gamma corresction attack, and is also perceptually invisible. We demonstrate the characteristics of our proposed watermarking scheme through experiments.

디지털 워터마킹(digital watermarking)은 기밀 정보를 디지털 이미지 속에 삽입시켜 이미지 소유자의 저작권을 보호하는 것을 목적으로 하는 기법이다. 저작권 보호를 위한 디지털 워터마킹 기법의 안전성을 보장하기 위해서, 삽입 정보의 위치를 결정할 때 워터마킹 공격에 대한 견고성과 육안적 비구별성을 동시에 추구해야 하고, 워터마킹 알고리즘의 은닉성 대신 키의 은닉성이 보장되어 하며, 키의 사용으로 허가받지 않은 사용자의 워터마크 검출을 방지할 수 있어야 한다. 이를 위해 본 논문에서는 암호학에서 사용되는 일방향 해쉬 함수를 사용하는 워터마킹 기법을 제안한다. 일방향 해쉬 함수를 구현하기 위해 RSA 일방향 함수와 모듈라 연산을 사용한다. 제안하는 워터마킹 기법은 LSB(least significant bit) 공격과 감마 보정 공격에 대해 견고하며 육안적 비구별성(perceptual invisibility)이 높다. 제안하는 워터마킹 기법의 실제 구현 및 실험을 통한 실험 결과를 분석하여 견고성과 육안적 비구별성의 특징을 확인한다.

Keywords

References

  1. T.Aura, 'Practical Invisibility in Digital Communication,' Proceedings of Information Hiding Workshop, LNCS Vol.1174, pp.265-278, Springer-Verlag, 1996 https://doi.org/10.1007/3-540-61996-8_46
  2. Bloom, 'Copy Protection for DVD Video,' Proceedings of IEEE, Vol.87, No.7, July 1999 https://doi.org/10.1109/5.771077
  3. B.Chor, A.Fiat, M.Naor, 'Tracing Traitors,' Proceedings of Crypto'94, LNCS Vol.839, pp.257-270, Springer-Verlag, 1994
  4. S.Craver, N.Memon, B.Yeo, 'Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks and Implications,' IEEE Journal of SAC, Vol.16, No.4, pp.573-586, May 1998 https://doi.org/10.1109/49.668979
  5. E.Franz, A.Jerichow, S.Moller, A.Pfitzmann, I.Stierand, 'Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, At Best,' Proceedings of Information Hiding Workshop, LNCS Vol.1174, pp.7-21, Springer-Verlag, 1996 https://doi.org/10.1007/3-540-61996-8_28
  6. N.F.Johnson, S.Jajodia, 'Steganalysis of Images Created Using Current Steganography Software,' Proceedings of Information Hiding Workshop, LNCS Vol.1525, pp.273-289, Springer-Verlag, 1998
  7. S. Katzenbeisser, F.A.P. Petitcolas, editor. Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, 1999
  8. Eugene T. Lin, E. J. Delp, 'A Review of Data Hiding in Digital Images,' Proceedings of the Image Processing, Image Quality,Image Capture Systems Conference'99, pp. 274-278, April 1999
  9. M.Luby, C.Rackoff, 'How to Construct Pseudorandom Permutations from Pseudorandom Functions,' SIAM Journal on Computation, Vol.17, No.2, pp. 373-386, 1988 https://doi.org/10.1137/0217022
  10. R.C.Merkle, 'One-way Hash Functions and DES,' 'Proceedings of Crypto'89, LNCS Vol.435, pp.428 -446, Springer-Verlag, 1989
  11. N.Memon, P.W.Wong, 'Protecting Digital Media Content,' CACM, Vol.41, No.7, pp.35-43, July 1998 https://doi.org/10.1145/278476.278485
  12. M.Naor, O.Reingold, 'On the Construction Pseudorandom Permutations: Luby-Rackoff Revisited,' Journal of Cryptology, Vol.12, No.l, pp.29-66, 1999
  13. R.J. Anderson, editor. Information hiding: first international workshop, LNCS Vol. 1174, Springer-Verlag, May 1996 https://doi.org/10.1007/3-540-61996-8_52
  14. R.Rivest, A.Shamir, L.Adleman, 'A Method for Obtaining Digital Signatures and Public Key Cryptosystems,' CACM, Vol.21, No.2, pp.120-126, Feb. 1978 https://doi.org/10.1145/359340.359342