A Study on Semi-fragile Watermarking for Robust Authentication on Image Compression

영상압축에 강인한 변질검증 워터마킹에 관한 연구

  • 안성철 ((주)디티브이인터랙티브) ;
  • 이경학 (광운대학교 전자통신공학과 영상처리연구실) ;
  • 박화범 (광운대학교 전자통신공학과 영상처리연구실) ;
  • 고형화 (광운대학교 전자통신공학과 영상처리연구실)
  • Published : 2006.12.30

Abstract

The rapid progress of the software has enabled individuals to copy and remark digital contents, which was only done by professionals. As a solution for the problems, contents producer needs to have certification and inspection of its contents and hold the proprietary right. A fragile watermarking method is able to detect the distortion and damage of watermarked image, but the watermark is also fragile on standardized image compression. That is the problem of fragile watermarking technique. We propose semi-fragile watermarking technique that is robust in the image processing such as JPEG compression used on computer, but it is fragile on the addition of noise and other attacks. In the proposed method, we can generate the watermarks of an image from the relationship between two block coefficients, also the generated watermark is inserted into insensible part of HVS(Human Visual System) after processing DCT(Discrete Cosine Transform) and using quantization. As a result, on the spatial domain, high detection of distortion has been possible even in slight changes, and could detect the corrupted blocks on image. Therefore, it is simple to judge the pixels at which some location has been changed in the space.

소프트웨어의 발전으로 인해 디지털 컨텐츠에 대한 복사, 변경이 손쉽게 일반인들에 의해서도 가능하게 되어 컨텐츠의 제작자는 소유권 수장이나 내용의 변질에 대한 인증과 검증을 필요로 하게 되었다. 변질검증(Fragile) 워터마킹 기법은 워터마크가 삽입된 영상의 변질 및 훼손 여부를 판별할 수 있지만, 고의적이지 않은 표준화된 영상압축 등에서도 워터마크가 사라지는 문제점이 있다. 본 논문에서 JPEG 압축과 같은 영상처리에서는 강인하지만 변질에는 약한 Semi-Fragile 워터마킹 방법을 제안하였다. 제안한 방법은 블록간의 상관관계를 이용하여 워터마크를 생성하고, DCT(Discrete Cosine Transform)수행 후에 계수 값들의 양자화를 이용하여 HVS(Human Visual System)에 둔감한 부분의 계수 값에 삽입하는 방법을 제안하였다. 실험결과 공간영역 상에서 미세한 변화에도 변질여부의 검출 정도가 뛰어났으며, 변질된 부분을 블록별로 검출할 수 있어 공간상의 어떤 위치의 픽셀들이 변화하였는지를 시각적으로 확인할 수 있었다.

Keywords

References

  1. R.J. Anderson and F. Petitcolas, 'On the Limits of Steganography,' IEEE J. Select Areas Commun., Vol. 16, pp. 474-481, May 1998 https://doi.org/10.1109/49.668971
  2. N. F. Johnson, Z. Duric and S. Jajodia, 'Information Hiding: Steganography and Watermarking - Attacks and Countermeasures,' Kluwer Academic Publishers, pp.22-29, 2001
  3. Nikolaidis, N., and Pitas, I., 'Digital Image Watermarking: An Overview,' IEEE IICMCS, Florence, Italy, 1999
  4. P.S.M. Barreto, H.Y. Kim, and V. Rijmen, 'Toward Secure Public-key Blockwise Fragile Authentication Watermarking,' in IEEE Proc. V.I.S.P, Vol. 148, No.2, pp.57-62, April 2002
  5. Gary L. Friedman, 'The Trustworthy Digital Camera Restoring Credibility to the Photographic Image,' IEEE Trans. on Consumer Electronics, Vol. 39, No.4, November 1993
  6. D. Kundur and D. Hatzinakos, 'Digital Watermarking for Telltale Tamper Proofmg and Authentication,' Proc. of the IEEE Identification and Protection of Multimedia Information, Vol. 87(7), pp. 1167-1180, July 1999
  7. C.K. Ho and C.T. Li, 'Semi-fragile Watermarking Scheme for Authentication of JPEG Image,' in Proc. IEEE ICIT LV, USA, April 2004
  8. J.J.K. O Ruanaidh, W.J. Dowling, and F.M. Boland, 'Watermarking Digital Images for Copyright Protection,' IEE Proc. vis. Image Signal Process. Vol. 143, No.4, pp.250-256, August 1996 https://doi.org/10.1049/ip-vis:19960711
  9. I.J. Cox and M.L. Miller, 'A Review of Watermarking and the Importance of Perceptual Modeling,' Proc. SPIE Conf. on H.V. Electronic Imaging II, Vol. 3-16, pp. 92-99, February 1997
  10. R.B. Wolfgang and E.J. Delp, 'A Watermarking Teclnique for Digital Imagery : Further Studies,' Video and Imaging Processing Laboratory, Proceeding of the International Conf. on Imaging Science, pp.279-287, 1997
  11. I.J. Cox, J. Kilian, T. Leighton and T. Shamoon, 'Secure Spread Spectrum Watermarking for Multimedia,' IEEE Trans. on Image Processing, Vol. 6, No. 12, pp. 1673-1687, December 1997 https://doi.org/10.1109/83.650120
  12. P.W. Wong 'A Public Key Watermark for Image Authentication,' ICIP 98. Proceedings Vol. 2, pp.437-441
  13. M. Wu and B. Liu, 'Watermarking for Image Authentication,' IEEE National Conf. on Image Processing, 1998
  14. C.Y. Lin and S.F. Chang, 'Semi-Fragile Watermarking for Authentication JPEG Visual Content,' SPIE ICSQMCII, Vol. 3971, No. 13, EI '00, 2000
  15. J. Fridrich, M. Goljan and R. Du, 'Invertible Authentication,' in Proc. SPIE, San Jose CA, January 23-26, 2001