DOI QR코드

DOI QR Code

Tamper Detection of Digital Images using Hash Functions

해쉬 함수를 이용한 디지털 영상의 위변조 검출

  • Woo, Chan-Il (Dept. of Information and Communication Engineering, Seoil University) ;
  • Lee, Seung-Dae (Dept. of Electronic Engineering, Namseoul University)
  • Received : 2014.03.11
  • Accepted : 2014.07.10
  • Published : 2014.07.31

Abstract

Digital watermarking for digital image authentication and integrity schemes are based on fragile watermarking and can detect any modifications in a watermark embedded image by comparing the embedded watermark with the regenerated watermark. Therefore, the digital watermark for image authentication and integrity should be erased easily when the image is changed by digital image processing, such as scaling or filtering etc. This paper proposes an effective tamper detection scheme for digital images. In the proposed scheme, the original image was divided into many non-overlapping $2{\times}2$ blocks. The digital watermark was divided into two LSB of each block and the image distortion was imperceptible to the human eye. The watermark extraction process can be used to determine if the watermarked image has been tampered. The experimental results successfully revealed the effectiveness of the proposed scheme.

디지털 영상의 인증과 무결성을 위한 워터마킹은 fragile 워터마킹을 기반으로 하고 있으며, 워터마크가 삽입된 영상에 대해 삽입된 워터마크와 조작에 의해 변형된 워터마크를 비교함으로써 영상의 변형 여부를 검출할 수 있다. 따라서 스케일링이나 필터링과 같은 영상처리에 의한 변형이 발생할 경우 영상의 인증과 무결성을 위한 워터마크는 쉽게 제거되어야 한다. 본 논문에서는 디지털 영상에 대하여 효과적인 변형 검출 방법을 제안한다. 제안 방법에서는 원 영상을 중첩되지 않은 $2{\times}2$ 크기의 블록으로 나누어 각 블록의 하위 2개의 LSB에 워터마크를 삽입하며, 워터마크 삽입으로 인한 영상의 왜곡은 사람의 눈으로 인지할 수 없다. 그리고 워터마크 추출 과정을 통해 워터마크가 삽입된 영상이 변형 되었는지의 여부를 결정할 수 있으며, 실험 결과는 제안 방법의 효율성을 나타내고 있다.

Keywords

References

  1. R. M. Rad, A. Attar and R. E. Atani, "A New Fast and Simple Image Encryption Algorithm Using Scan Patterns and XOR," International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 6, no. 5, pp. 275-290, 2013. DOI: http://dx.doi.org/10.14257/ijsip.2013.6.5.25
  2. G. Kaur, K. Kaur, "Image Watermarking using LSB," International Journal of Advanced Research in Computer Science and Sofrware Engineering, Vol. 3, no. 4, pp. 858-861, April 2013.
  3. M. Wu, B. Liu, "Watermarking for image authentication," ICIP 98, Vol. 2, pp. 437-441, October 1998.
  4. http://140.127.82.166/handle/987654321/15174
  5. C. M. Wu, Y. S. Shin, "A Simple Image Tamper Detection and Recovery Based on Fragile Watermark with One Parity Section and Two Restoration Sections," Optics and Photonics Journal 3, pp. 103-107, 2013. DOI: http://dx.doi.org/10.4236/opj.2013.32B026
  6. H. Nyeem, W. Boles and C. Boyd, "Counterfeiting Attacks on Block-Wise Dependent Fragile Watermarking Schemes" in Proc. of the 6th International Conference on Security of Information and Networks, ACM Press and Digital Library, 2013. DOI: http://dx.doi.org/10.1145/2523514.2523530
  7. P. W. Wong, "A Public Key Watermark for Image Verification and Authentication," in Proc. of IEEE Conf. on Image Processing, pp. 425-429, 1998. DOI: http://dx.doi.org/10.1109/ICIP.1998.723526
  8. P. L. Lin, C. K. Hsieh and P. W. Huang, "A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery," Pattern Recognition, Vol. 38, no. 12, pp. 2519-2529, 2005. DOI: http://dx.doi.org/10.1016/j.patcog.2005.02.007