DOI QR코드

DOI QR Code

A Study on Integrity Verification and Tamper Detection of Digital Image

디지털 영상의 무결성 검증과 변형 검출에 관한 연구

  • Woo, Chan-Il (Department of Information and Communication Engineering, Seoil University) ;
  • Goo, Eun-Hee (Dasan University College, Ajou University)
  • 우찬일 (서일대학교 정보통신공학과) ;
  • 구은희 (아주대학교 다산학부대학)
  • Received : 2019.07.11
  • Accepted : 2019.10.04
  • Published : 2019.10.31

Abstract

Digital watermarking was developed to protect copyright by discouraging the illegal copying of digital content. On the other hand, recently, watermarking has also been used to verify the integrity of digital content, such as medical images, and detect illegal manipulation or distortion locations. Watermarking should be tenacious so as to protect copyright from illegal copying and should remain firm to the content through a range of attacks, such as distortion or filtering. At the same time, however, it should be removed easily even in a slight transformation of the material to verify the integrity. Therefore, this paper proposes a watermarking technique that easily checks and verifies the deformation or manipulation of digital images. In the proposed method, the entire image was examined in $16{\times}16$ blocks to check for deformation of the image. When deformation was detected, further inspection proceeded in $4{\times}4$ blocks and the location where deformation occurred was identified.

디지털 워터마킹은 디지털 컨텐츠에 대한 불법적인 복제를 방지하기 위한 저작권 보호 용도로 개발 되었으나, 최근에는 의료 영상과 같은 디지털 컨텐츠에 대하여 무결성을 검증하고 불법적인 조작이나 변형 위치를 감지하기 위한 기술로도 활용하고 있다. 디지털 컨텐츠에 대한 불법적인 복제를 방지하기 위한 저작권 보호 기술에서는 디지털 컨텐츠에 삽입된 워터마크가 왜곡이나 필터링과 같은 다양한 공격에 대하여 강인해야 하는 특성이 있어야 한다. 그러나 디지털 컨텐츠에 대한 조작이나 변형을 감지하기 위한 기술에서는 컨텐츠에 대한 사소한 변형에 대해서도 삽입된 워터마크가 쉽게 제거되어야 하는 특성이 있어야 컨텐츠에 대한 변형 여부를 확인할 수 있다. 따라서 본 논문에서는 디지털 영상에 대한 변형이나 조작 여부를 쉽게 확인하기 위한 워터마킹 기술을 제안한다. 제안 방법에서는 영상에 대한 변형 유, 무를 확인하기 위해 전체 영상을 $16{\times}16$ 블록 단위로 변형 여부를 검사하고 변형이 발생 된 블록에 대해서는 $4{\times}4$ 블록 단위로 검사를 수행하여 변형이 발생 된 위치를 확인한다.

Keywords

References

  1. P. W. Wong, "A Public Key Watermark for Image Verification and Authentication," in Proc. of IEEE Conf. on Image Processing, pp. 425-429, 1998. DOI: http://dx.doi.org/10.1109/ICIP.1998.723526
  2. Yoo, Heung-Ryol, Son, Yung-Deug, "Fragile Watermark System using Quantization and DC Coefficients", Journal of IKEEE, Vol. 22, No. 3, pp. 774-779, 2018. DOI: https://doi.org/10.7471/ikeee.2018.22.3.774
  3. P. MeenakshiDevi, M. Venkatesan and K. Duraiswamy, "A Fragile Watermarking Scheme for Image Authentication with Tamper Localization Using Integer Wavelet Transform", Journal of Computer Science, Vol. 5, No. 11, pp. 831-837, 2009. DOI: https://doi.org/10.3844/jcssp.2009.831.837
  4. A.Kannammal, S.Subha Rani, "Authentication of DICOM Medical Images using Multiple fragile watermarking Techniques in Wavelet Transform Domain", International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, pp. 181-189, 2011.
  5. S. Dadkhah, A. Abd Manaf and S. Sadeghi, "Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking", International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, pp. 1-8, 2012.
  6. Heng Zhang, Chengyou Wang, and Xiao Zhou, "Fragile Watermarking Based on LBP for Blind Tamper Detection in Images", Journal of Information Processing Systems, Vol. 13, No. 2, pp. 385-399, 2017. DOI: https://doi.org/10.3745/JIPS.03.0070
  7. M. A. Hajjaji, S. Ajili, A. Mtibaa, E. Bourennane, "Fragile Method for Watermarking of Medical Image: Method Based LSBs", International Journal of Sciences and Techniques of Automatic control & computer engineering IJ-STA, Vol. 6, No. 1, pp. 1764-1781, 2012.
  8. P. Rahmati, A. Adler, T. Tran, " Watermarking in E-commerce", International Journal of Advanced Computer Science and Applications, Vol. 4, No. 6, pp. 256-265, 2013 DOI: https://doi.org/10.14569/ijacsa.2013.040634