이미지 왜곡을 줄인 이진 이미지 인증을 위한 정보 은닉 기법

A Data Hiding Scheme for Binary Image Authentication with Small Image Distortion

  • 이윤호 (영남대학교 전자정보공학부) ;
  • 김병호 (경성대학교 컴퓨터공학과)
  • 발행 : 2009.04.15

초록

본 연구에서는 삽입되는 정보에 의한 이미지의 왜곡을 최소화하는 이미지 인증을 위한 정보은닉 기법을 제안한다. 제안 방법은 해밍 코드를 이용한 메시지 삽입 방법을 이용하여 적은 화소의 왜곡만으로 많은 양의 인증 정보의 삽입이 가능하다. 또한 정보 삽입으로 인한 이미지 영역의 훼손을 줄이기 위해 Yang 등이 제안한 변조 가능 기준(flippablity criteria)에 의해 선택된 변조 가능 화소(flippable pixel) 만을 정보 삽입에 사용한다. 마지막으로, 인증 정보가 각 변조 가능 화소에 삽입되는 순서를 은폐함으로써, 적법한 검증자가 아닐 경우, 이미지로부터 인증 정보를 추출해 내기 어렵게 한다. 제안 방법의 우수성을 보이기 위해, 기존 연구들과 반전되는 화소의 수, 오합율에 대하여 비교 분석을 수행하며 그 결과로써 제안 방법이 적은 양의 화소값의 변화만으로 매우 낮은 오탐율을 보장함을 보인다. 이에 부가하여, 다양한 이진 이미지에 대해 제안 방법과 Yang 등의 방법을 적용하여 정보를 삽입하는 실험을 수행한다. 실험 결과에 대한 이미지 영역 분석을 통해 제안 방법이 이전의 방법보다 적은 왜곡을 갖게 됨을 보이고, 최근에 제안된 이진 이미지 정보 은닉 방법에 대한 공격에도 이전의 방법들보다 좀 더 안정성이 있음을 보인다.

This paper proposes a new data hiding scheme for binary image authentication with minimizing the distortion of host image. Based on the Hamming-Code-Based data embedding algorithm, the proposed scheme makes it possible to embed authentication information into host image with only flipping small number of pixels. To minimize visual distortion, the proposed scheme only modifies the values of the flippable pixels that are selected based on Yang et al's flippablity criteria. In addition to this, by randomly shuffling the bit-order of the authentication information to be embedded, only the designated receiver, who has the secret key that was used for data embedding, can extract the embedded data. To show the superiority of the proposed scheme, the two measurement metrics, the miss detection rate and the number of flipped pixels by data embedding, are used for the comparison analysis between the proposed scheme and the previous schemes. As a result of analysis, it has been shown that the proposed scheme flips smaller number of pixels than the previous schemes to embed the authentication information of the same bit-length. Moreover, it has been shown that the proposed scheme causes smaller visual distortion and more resilient against recent steg-analysis attacks than the previous schemes by the experimental results.

키워드

참고문헌

  1. C. Tzeng, and W. Tsai, "A New Approach to Authentication of Binary Images for Multimedia Communication With Distortion Reduction and Security Enhancement," IEEE Communications Letters, Vol.7, No.9, pp. 443-445, Sep.2003. https://doi.org/10.1109/LCOMM.2003.815656
  2. H. Kim, and A. Afif, "Secure Authentication Watermarking for Binary Images," Brazilian Symposium on Computer Graphics and Image Processing, pp. 199-206, 2003.
  3. H. Kim, and A. Afif, " A Secure Authentication Watermarking for Halftone and Binary Images," International Journal of Imaging Systems and Technology, Vol.14, No.4, pp. 147-152, 2004. https://doi.org/10.1002/ima.20018
  4. H. Kim, "A New Public-Key Authentication Watermarking for Binary Document Images Resistant to Parity Cheks," in the Proceedings of IEEE Int. Conf. Image Processing(ICIP) 2005, Vol.2, pp. 1074-1077, 2005. https://doi.org/10.1109/ICIP.2005.1530245
  5. H. Kim, R. Queiroz "Alteration-Locating Authentication Watermarking for Binary Images," In Proceedings of Intermational Workshop on Digital Watermarking (IWDW) 2004, LNCS Vol.3302, pp. 125-136, 2005. https://doi.org/10.1007/978-3-540-31805-7_11
  6. M. Wu, and B. Liu, "Data Hiding in Binary Images for Authentication and Annotation," IEEE Trans. Multimedia, Vol.6, No.4, pp. 528-538, 2004. https://doi.org/10.1109/TMM.2004.830814
  7. H. Yang, and A. C. Kot, "Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Presserving," IEEE Trans. Multimedia, Vol.9, No.3, pp. 475-486, 2007. https://doi.org/10.1109/TMM.2006.887990
  8. J. Cheng, A. C. Kot, J. Liu, and H. Cao, "Detection of Data Hiding in Binary Text Image," In proc. IEEE Int. Con. on Image Processing (ICIP) 2005, Vol.3, pp. 73-76, 2005. https://doi.org/10.1109/ICIP.2005.1530331
  9. J. Cheng, A. C. Kot, and S. Rahardja, "Steganalysis o Binary Cartoon Image Using Disortion Measure," In proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP) 2007, Vol.2, pp. 261-264, 2007. https://doi.org/10.1109/ICASSP.2007.366222
  10. Tim Downey, Calculating the Hamming Code, [Online], Available: http://www.cs.fiu.edu/~downeyt/cop3402/hamming.html, 2004.
  11. J. Fridrich and D. Soukal, "Matrix Embedding for Large Payloads," in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, Vol. 6072, San Jose, CA, January 16-19, pp. W1-W15, 2006.
  12. J. Cheng, and A. C. Kot, "Objective Distortion Measure for Binary Text Image Based on Edge Line Segment Similarity," IEEE Tran. Image Processing, Vol.16, No.6, 2007. https://doi.org/10.1109/TIP.2007.896619
  13. S. Myers, "Eicient-Amplification of the Security of Weak Pseudo-random Function Generators," In Proc. EUROCRYPT 2001, Lecture Notes in Computer Sciences, Vol. 2045, pp. 358-372, 2001.
  14. S. G. Akl, and H. Meijer, "A Fast Pesudo Random Permutation Generator with Applications for Cryptology," In Proc. CRYPTO 1985, Vol. 196, pp. 269-275, 1985.
  15. M. Luby, and C. Rackoff, "How to construct pseudorandom permutations from pseudorandom functions," SIAM J. on Computing, Vol.17, No.2, pp. 373-386, Apr.1998. https://doi.org/10.1137/0217022
  16. D. Eastlake and T. hansen, "US Secure Hash Algorithms (SHA and HMAC-SHA)," IETF RFC 4634, Available: http://www.ietf.org/rfc/rfc4634.txt?number=4634, 2004.
  17. H. Lu, A. C. Kot, and Y. Shi, "Distance-Reciprocal Distortion Measure for binary document images," IEEE Signal Processing Letters, Vol.11 , No.2, pp. 228-31, 2004. https://doi.org/10.1109/LSP.2003.821748
  18. J. Cheng, and A. C. Kot, "Objective distortion measure or binary images," In proc. IEEE TENCON, pp. 355-358, 2004. https://doi.org/10.1109/TENCON.2004.1414430
  19. "Security Requirements for Cryptographic Modules: Compromision the security of the key establishment method," in FIPS 140-2, NIST.