An Efficient Watermarking for Tamper Localization Proofing

국부적인 변형 검출을 위한 효율적인 워터마킹

  • Woo, Chan-Il (Dept. of Information and Communication Engineering, Seoil College) ;
  • Jeon, Se-Gil (Korea Highway Corporation HTTI(Highway & Transportation Technology Institute))
  • Published : 2006.06.25

Abstract

Many watermarking methods for protecting the intellectual property right and authentication multimedia data have been proposed in recent years. In image authentication watermarking, watermark is inserted into an image to detect any malicious alteration. So, watermark for authentication and integrity should be erased easily when the image is changed by scaling or cropping etc. We propose in this paper a fragile watermarking algorithm for image integrity verification and tamper localization proofing using special hierarchical structure. In the proposed method, the image to be watermarked is divided into blocks in a multi-level hierarchy and calculating block digital signatures in thus hierarchy. At each level of the hierarchy, a digital signature for each block is calculated using the seven most significant bit(MSBs)-plane values of all pixels within the block. And the resulting signature is incorporated into the LSBs of selected pixels within the block. We provide experimental results to demonstrate the effectiveness of the proposed method.

최근 들어 지적 재산권 보호와 멀티미디어 데이터 인증을 위하여 다양한 워터마킹 방법들이 제안되어 왔다. 이미지 인증을 위한 워터마킹에서 워터마크는 영상의 부당한 변형 검출을 위해서 영상 내에 삽입된다. 따라서, 인증과 무결성을 위한 워터마킹은 스케일링 및 크롭핑 등과 같은 영상 변형에 대하여 삽입된 워터마크가 쉽게 지워져야 한다. 본 논문에서는 계층적 구조를 사용하여 영상의 무결성 검증과 변형 위치 검출을 위한 fragile 워터마킹 방법을 제안한다. 제안 방법에서는 워터마크가 삽입되는 영상을 여러 레벨로 구성하여 각 레벨별로 영상을 여러 블록으로 나눈 후 각 블록에 대한 디지털 서명을 계산한다. 디지털 서명은 블록 내 모든 화소의 상위 7개의 비트들(MSBs)을 사용하여 계산한 후 각 블록 내에서 선택된 화소의 LSB에 삽입된다. 본 논문에서 제안한 방법에 대한 실험 결과는 제안 방법의 효율성을 나타낸다.

Keywords

References

  1. D.Kundur, D.Hatzinakos, 'A Robust Digital Image Watermarking Method using Wavelet-Based Fusion,' Proc. IEEE ICIP, Santa Barbara, California, Vol.1, pp. 544-547, Oct, 1997
  2. L. Qian and K. Nahrstedt, 'Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights,' Pre-print, 1998
  3. M.P. Queluz, 'Content-based integrity protection of digital images,' Proc. of SPIE, vol. 3657, Jan, pp. 85-93, 1999
  4. K.S.NG and L.M.CHENG 'Selective block assignment approach for robust digital image watermarking,' Proc. of SPIE, Vol. 3657, Jan, pp. 14-20, 1999
  5. R.B.Wolfgang, J.D.Edward, 'Fragile Watermarking Using VW2D Watermark,' Proc. of SPIE, Vol. 3657, Jan, pp. 204-213, 1999
  6. Katzenbeisser, Petitcolas, Information Hiding techniques for steganography and digital watermarking, Artech House, 1999
  7. M.U.Celik, G.Sharma, A.M.Tekalp, E.Saber, 'Localized Lossless Authentication Watermark (LAW),' Proc. of SPIE-IS&T Electronic Imaging, Vol. 5020, pp. 689-698, 2003
  8. P.W.Wong, 'A Public Key Watermark for Image Verification and Authentication,' in Proc. IEEE Int. Conf. Image Processing, pp. 425-429, 1998
  9. M.U.Celik, G.Sharma, E.Saber, A.M.Tekalp, 'Hierarchical Watermarking for Secure Image Authentication with Localization,' IEEE Trans. on Image Processing, Vol. 11, No. 6, pp. 585-595, June, 2002 https://doi.org/10.1109/TIP.2002.1014990
  10. William Stallings, Network and Internetwork Security, Prentice Hall, 1995