A New Image Authentication Method through Isolation of Invalid Blocks

무효 블록의 격리를 이용한 새로운 이미지 인증 방법

  • 김효철 (계명문화대학 전산정보처리과) ;
  • 김현철 (포항1대학 정보통신과) ;
  • 유기영 (경북대학교 컴퓨터공학과)
  • Published : 2002.02.01


In this paper, we propose a new watermarking method using isolation of invalid blocks for image authentication. We embed messages into the high frequency band in the DCT domain because of its imperceptibility and fragility. And we were able to inspect the identity of valid blocks between error corrected original images and watermarked images through experiments. As a result, we found that the watermarked image is enough to extract binary messages. Therefore, the extra information such as the original image or watermark was not necessary in our extracting process. Experiment results show that the proposed method can be used successfully for image authentication.

본 논문에서는 이미지 인증을 목적으로 무효한 블록들을 격리하는 새로운 워터마킹 방법을 제안한다. 이 과정에서 워터마크의 비인식성과 깨지기 쉬운 워터마크를 보장하기 위하여 DCT 도메인의 고주파 영역을 사용하였다. 여러 가지 실험을 통하여 에러가 보정된 원본 영상들과 워터마크된 이미지들 사이에 유효한 블록들이 동일함을 확인하였다. 결과적으로 워터마크 추출 과정에서 원본 이미지나 워터마크와 같은 여분의 정보가 필요 없으며, 워터마크된 이미지만으로 2진 워터마크를 추출할 수 있다는 사실을 발견하였다. 실험 결과들은 제안된 방법이 이미지 인증을 위하여 성공적으로 사용될 수 있음을 보여준다.



  1. J. T. Brassil, S. Low, N. F. Maxemchuk, and L. O'Gorman, 'Electronic Marking and Identification Techniques to Discourage Document Copying,' IEEE J. Selected Areas Commum., vol. 13, no. 8, Oct 1995 https://doi.org/10.1109/49.464718
  2. I. Pitas and T. H. Kaskalis, 'Applying Signatures on Digital Images,' Proc. IEEE Nonlinear Signal and Image Processing, pp. 460-463, June 1995
  3. I. J. Cox, J. Killian, T. Leighton, and T.Shamoon, 'A Secure Robust Watermark for Multimedia,' IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673-1687, Dec 1997 https://doi.org/10.1109/83.650120
  4. Stefan Katzenbeisser, Fabien A. P. Petitcolas and editors, Information Hiding Techniques for Steganography and Digital Watermarking, 2000 ARTECH HOUSE, INC., 1999
  5. C.-T Hsu and J.-L. Wu, 'Hidden digital watermarkings in images,' IEEE Trans. Image Processing, vol. 8, no. 1, pp. 58-68, Jan 1999 https://doi.org/10.1109/83.736686
  6. F. Mintzer, G. W. Braudaway, M. M. Yeung, 'Effective and Ineffective Digital Watermarks,' IClP, 1997 https://doi.org/10.1109/ICIP.1997.631957
  7. Don Coppersmith, Fred Mintzer, Charles Tresser, Chai Wah Wu and Minerva M. Yeung, 'Fragile imperceptible digital watermark with privacy control,' Procdddings of SPIE, Security and Watermarking of Multi- media Contents, San Jose California, pp. 79-84, Jan 1999
  8. Shi-Kuo Chang, Principles of Pictorial Information Systems Design, Prentice Hall, pp. 61-81, 1989
  9. K. S. NG, L. M. Cheng, 'Selective block assignment approach for robust digital image watermarking,' Proceedings of SPIE, Security and Watermarking of Multimedia Contents, San Jose California, USA, Jan 1999
  10. J. J. K. Oruanaidh, W. J. Dowling, and F. M. Boland, 'Watermarking digital images for copyright protection,' IEEE Proceedings on Vision, Image and Signal Processing, 143, pp. 243-246, Aug 1996 https://doi.org/10.1049/ip-vis:19960711