Browse > Article
http://dx.doi.org/10.3745/KIPSTB.2012.19B.2.083

Integrity Authentication Algorithm of JPEG Compressed Images through Reversible Watermarking  

Jo, Hyun-Wu ((주)에이티아이)
Yeo, Dong-Gyu (국립금오공과대학교 모바일연구소)
Lee, Hae-Yeoun (국립금오공과대학교 컴퓨터소프트웨어공학과)
Abstract
Multimedia contents can be copied and manipulated without quality degradation. Therefore, they are vulnerable to digital forgery and illegal distribution. In these days, with increasing the importance of multimedia security, various multimedia security techniques are studied. In this paper, we propose a content authentication algorithm based on reversible watermarking which supports JPEG compression commonly used for multimedia contents. After splitting image blocks, a specific authentication code for each block is extracted and embedded into the quantized coefficients on JPEG compression which are preserved against lossy processing. At a decoding process, the watermarked JPEG image is authenticated by extracting the embedded code and restored to have the original image quality. To evaluate the performance of the proposed algorithm, we analyzed image quality and compression ratio on various test images. The average PSNR value and compression ratio of the watermarked JPEG image were 33.13dB and 90.65%, respectively, whose difference with the standard JPEG compression were 2.44dB and 1.63%.
Keywords
Integrity Authentication; Reversible Watermarking; JPEG; Histogram Shifting;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 F. Mintzer, J. Lotspiech, and N. Morimoto, "Safeguarding digital library contents and users: digital watermarking," D-Lib Magazine, 1997.
2 A. Shiozaki, M. Iwata, and A. Ogihara, "Reversible Watermarking Method for JPEG Image," IEICE Trans. on Information and Systems, Vol.E91-D, No.7, pp.2068-2071, 2008.   DOI   ScienceOn
3 X. Wang, J. Wang, and H. Peng, "A Semi-fragile Image Watermarking Resisting to JPEG Compression," Proc. of the International Conference on Management of e-Commerce and e-Government, pp.498-502, 2009.
4 H. Wang and C. Liao, "Compressed-domain fragile watermarking scheme for distinguishing tampers on image content or watermark", Proc. of the International Conference on Communications, Circuits and Systems, pp.480-484, 2009.
5 R. Caldelli, F. Filippini, and R. Becarelli, "Reversible Watermarking Techniques: An Overview and a Classification," EURASIP Journal on Information Security, Vol.2010, Article ID. 134546, 2010.
6 M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. on Image Processing, Vol.14, No.2, pp.253-266, 2005.   DOI   ScienceOn
7 S. Lee, C. D. Yoo, and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Trans. on Information Forensics and Security, Vol.2, No.3, pp.321-330, 2007.   DOI   ScienceOn
8 최학남, 김종원, 최종욱, 김학일, "JPEG 압축 영역에서의 리버 서블 워터마킹", 정보처리학회논문지, Vol.17, pp.121-130, 2007.
9 여동규, 이해연, "차이값 히스토그램 기반 가역 워터마킹을 이용한 블록 단위 영상 인증 알고리즘", 정보처리학회논문지, Vol.18-B, No.6, 2011.
10 I. J. Cox, M. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Morgan Kaufmann Publishers Inc., San Francisco, CA, 2007.
11 P. H. W. Wong, C. Andy, and O. C. Au, "On improving the iterative watermark embedding technique for JPEG-to-JPEG watermarking," Proc. of the International Symposium on Circuits and Systems, pp.161-164, 2004.
12 X. Shi, F. Liu, D. Gong, and J. Jing, "An Authentication Watermark Algorithm for JPEG images," Proc. of the International Conference on Availability, Reliability and Security, pp.584-588, 2009.
13 P. L. Lin, C. K. Hsieh, and P. W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, Vol.38, No.12, pp.2519-2529, Dec., 2005.   DOI   ScienceOn
14 X. Q. Zhou, H. K. Huang, and S. L. Lou, "Authenticity and integrity of digital mammography images," IEEE Trans. Medical Imaging, Vol.20, No.8, pp.784-791, Aug., 2001.   DOI   ScienceOn
15 A. U. Rajendra, D. Anand, B. P. Subbanna, and U. C. Niranjan, "Compact storage of medical images with patient information," IEEE Trans. Information Technology in Biomedicine, Vol.5, No.4, pp.320-323, Dec., 2001.   DOI   ScienceOn
16 강태환, 장호현, 김동서, 주낙근, "이미지 인증과 변형 검출을 위한 DWT기반 다중워터마킹," 한국콘텐츠학회 2005 추계종합 학술대회 논문집, Vol.3, No.2, pp.480-484, 2005.
17 김효철, "히스토그램 보정을 이용한 고신뢰성 영상 인증 기법," Journal of Korea Multimedia Society, Vol.13, No.7, pp.1088-1094, July, 2010.
18 S. Emmanuel, H. C. Kiang, and A. Das, "A Reversible Watermarking Scheme for JPEG-2000 Compressed Images," Proc. of the IEEE International Conference on Multimedia and Expo, pp.69-72, 2005.
19 J. M. Zain and M. Clarke, "Reversible Watermarking Surviving JPEG Compression," Proc. of the International Conference of IEEE Engineering in Medicine and Biology Society, Vol.4, pp.3759-3762, 2005.