DOI QR코드

DOI QR Code

Block-based Image Authentication Algorithm using Differential Histogram-based Reversible Watermarking

차이값 히스토그램 기반 가역 워터마킹을 이용한 블록 단위 영상 인증 알고리즘

  • 여동규 (국립금오공과대학교 모바일연구소) ;
  • 이해연 (국립금오공과대학교 컴퓨터공학부)
  • Received : 2011.05.06
  • Accepted : 2011.08.17
  • Published : 2011.12.31

Abstract

In most applications requiring high-confidential images, reversible watermarking is an effective way to ensure the integrity of images. Many watermarking researches which have been adapted to authenticate contents cannot recover the original image after authentication. However, reversible watermarking inserts the watermark signal into digital contents in such a way that the original contents can be restored without any quality loss while preserving visual quality. To detect malicious tampering, this paper presents a new block-based image authentication algorithm using differential histogram-based reversible watermarking. To generate an authentication code, the DCT-based authentication feature from each image block is extracted and combined with user-specific code. Then, the authentication code is embedded into image itself with reversible watermarking. The image can be authenticated by comparing the extracted code and the newly generated code and restored into the original image. Through experiments using multiple images, we prove that the presented algorithm has achieved over 97% authentication rate with high visual quality and complete reversibility.

위변조되지 않은 고신뢰성의 영상이 요구되는 서비스에서 무결성을 인증하기위하여 가역 워터마킹 기법이 유용하게 적용될 수 있다. 콘텐츠의 인증을 위한 기존의 연구들은 워터마크의 제거후에 원본 복원이 불가능한 것이 많다. 가역 워터마킹 기법은 디지털 콘텐츠에 지각적 투명성을 유지하며 워터마크를 삽입한 후, 이를 아무런 손상없이 원본 상태로 복원할 수 있는 메시지 은닉 수단으로서 높은 품질과 높은 삽입용량이 요구되는 분야에서 다양하게 이용되어질 수 있다. 본 논문에서는 차이값 히스토그램 기반의 가역 워터마킹을 이용하여 영상의 위변조된 영역을 탐지하는 블록단위 인증 알고리즘을 제안한다. 먼저, 영상의 각 블록에 대하여 DCT 계수에 기반하여 영상의 특징값을 추출하고, 사용자의 정보와 결합하여 영상 인증 코드를 생성한다. 생성된 인증코드는 가역 워터마킹을 통하여 콘텐츠 자체에 직접 삽입한다. 이와 같은 영상의 인증을 위해서는 추출된 인증코드와 새로 생성된 인증코드의 비교를 수행한다. 다양한 영상들에 대하여 비교 분석한 실험 결과에 따르면 제안한 알고리즘은 완전한 가역성과 함께 낮은 왜곡을 유지하면서도 97% 이상의 높은 인증률을 얻을 수 있었다.

Keywords

References

  1. I. J. Cox, M. Miller, J. A. Bloom, J. Fridrich and T. Kalker, "Digital Watermarking and Steganography," Morgan Kaufmann Publishers Inc., San Francisco, CA, 2007.
  2. M. Awrangjeb, "An Overview of Reversible Data Hiding," Proc. of the Sixth International Conference on Computer and Information Technology, Jahangirnagar University, Bangladesh, pp.75-79, 2003.
  3. X. Q. Zhou, H. K. Huang, S. L. Lou, "Authenticity and integrity of digital mammography images," IEEE Trans. Medical Imaging, Vol.20, No.8, pp.784-791, Aug., 2001. https://doi.org/10.1109/42.938246
  4. A. U. Rajendra, D. Anand, B. P. Subbanna, U. C. Niranjan, "Compact storage of medical images with patient information," IEEE Trans. Information Technology in Biomedicine, Vol.5, No.4, pp.320-323, Dec., 2001. https://doi.org/10.1109/4233.966107
  5. G.-J. Yu, C.-S. Lu, H.-Y. M. Liao, "Mean-quantization-based fragile watermarking for image authentication," Optical Engineering, Vol.40, No.7, pp.1396-1408, Jul., 2001. https://doi.org/10.1117/1.1384885
  6. K.-F. Li, T.-S. Chen, S.-C. Wu, "Image tamper detection and recovery system based on discrete wavelet transform," IEEE Pacific Rim Conf. on Communications, Computers and Signal Processing, Vol.1, pp.164-167, Aug., 2001.
  7. P.-L. Lin, P.-W. Huang, A.-W. Peng, "A fragile watermarking scheme for image authentication with localization and recovery," IEEE Sixth International Symposium on Multimedia Software Engineering, pp.146-153, Dec., 2004.
  8. C.-L. Wang, R.-H. Hwang, T.-S. Chen, H.-Y. Lee, "Detecting and restoring system of tampered image based on discrete wavelet transformation and block truncation coding," 19th International Conference on Advanced Information Networking and Applications, 2005.
  9. P. L. Lin, C. K. Hsieh, P. W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, Vol.38, No.12, pp.2519-2529, Dec., 2005. https://doi.org/10.1016/j.patcog.2005.02.007
  10. T.-Y. Lee, S. D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognition, Vol.41, No.11, pp.3497-3506, Nov., 2008. https://doi.org/10.1016/j.patcog.2008.05.003
  11. M.U. Celik, G. Sharma, A.M. Tekalp and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. on Image Processing, Vol.14, No.2, pp.253-266, 2005. https://doi.org/10.1109/TIP.2004.840686
  12. S. Lee, C.D. Yoo and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Trans. on Information Forensics and Security, Vol.2, No.3, pp.321-330, 2007. https://doi.org/10.1109/TIFS.2007.905146
  13. J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. on Circuits and Systems for Video Technology, Vol.13, No.8, pp.890-896, 2003. https://doi.org/10.1109/TCSVT.2003.815962
  14. D.M. Thodi and J.J. Rodriguez, "Expansion embedding techniques for reversible watermarking," IEEE Trans. on Image Processing, Vol.16, No.3, pp.721-730, 2007. https://doi.org/10.1109/TIP.2006.891046
  15. Z. Ni, Y.-Q. Shi, N. Ansari and W. Su, "Reversible data hiding," IEEE Trans. on Circuits and Systems for Video Technology, Vol.16, No.3, pp.354-362, Mar., 2006. https://doi.org/10.1109/TCSVT.2006.869964
  16. W.-C. Kuo, D.-J. Jiang and Y.-C. Huang, "Reversible data hiding based on histogram," International Conference on Intelligent Computing, Lecture Notes in Artificial Intelligence, Vol.4682, Springer-Verlag, Qing Dao, China, pp.1152-1161, 2007.
  17. S.-K. Lee, Y.-H. Suh and Y.-S. Ho, "Lossless data hiding based on histogram modification of difference images," Pacific Rim Conference on Multimedia, Lecture Notes in Computer Science, Vol.3333, Springer-Verlag, Tokyo, Japan, pp.340-347, 2005.
  18. P. Tsai, Y.-C. Hu and H.-L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Processing, Vol.89, No.6, pp.1129-1143, 2009. https://doi.org/10.1016/j.sigpro.2008.12.017
  19. K.-S. Kim, M.-J. Lee, H.-Y. Lee and H.-K. Lee, "Reversible data hiding exploiting spatial correlation between sub-sampled images," Pattern Recognition, Vol.42, No.11, pp.3083-3096, 2009. https://doi.org/10.1016/j.patcog.2009.04.004
  20. D.-G. Yeo, H.-Y. Lee, B. M. Kim, K.-S. Kim, "Reversible Image Watermarking with Differential Histogram Shifting and Error Prediction Compensation," Journal of KIISE : Software and Applications, Vol.37, No.6, pp.417-429, 2010.
  21. D.-G. Yeo, H.-Y. Lee, and B. M. Kim, "High Capacity Reversible Watermarking using Differential Histogram Shifting and Predicted Error Compensation," Journal of Electronic Imaging, SPIE, Vol.20, No.1, 2011.