Browse > Article

The High-Reliable Image Authentication Technique using Histogram Compensation  

Kim, Hyo-Chul (계명문화대학 컴퓨터학부)
Publication Information
Image authentication algorithms have to discriminate forged contents in the various critical fields of military, medical services, digital documents. They must ensure perceptual invisibility and fragility against malicious attacks. It is desirable that watermarking algorithms support sufficient insertion capacity and blind feature. And, high reliable algorithms that can eliminate false-positive and false-negative errors are needed in the watermark extraction process. In this paper, we control coefficients of high frequency band in a DCT domain and compensate brightness histogram for high reliability. As a result, we found that the proposed algorithm guarantee various requirements such as perceptual invisibility with high PSNR values, fragility, high reliability and blind feature. In addition, experiment results show that the proposed algorithm can be used steganographic applications by sufficient capacity of watermark.
Image Authentication; Watermark; Histogram;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 I. J. Cox, J. Killian, T. Leighton, and T.Shamoon, "A Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image Processing, Vol.6, No.12, pp. 1673-1687, December 1997.   DOI   ScienceOn
2 L. Xie and G. R. Arce, "Joint Wavelet Compression and Authentication Watermarking," Proc. of IEEE Int. Conf. on Image Processing, ICIP'98, Chicago, pp. 427-431, 1998.
3 O. Bruyndonckx, J. J. Quisquater, and B. Macq, "Spatial method for Copyright Labeling of Digital Images," Proc. of IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, pp. 456-459, June 1995.
4 Paul Bao and Xiaohu Ma, "Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition," IEEE Trans. on Circuits and Systems for Video Technology, Vol.15, No.1, pp. 96-102, Jan. 2005.   DOI
5 Zhicheng Ni, YunQing Shi, Nirwan Ansari, and Wei Su, "Reversible Data Hiding," IEEE Trans. on Circuits and Systems for Video Technology, Vol.16, No.3, March 2006.
6 김효철, 김현철, 유기영, "무효 블록의 격리를 이용한 새로운 이미지 인증 방법" 정보과학회논문지-컴퓨팅의 실제, 제8권, 제1호, pp. 17-24, 2002. 2.   과학기술학회마을
7 J. S. Coron, "What Is Cryptography?," IEEE Security & Privacy Magazine, Vol.4, pp. 70-73, Jan. 2006.
8 H. W. Tseng and C. C. Chang, "Steganography Using JPEG Compressed Images," The Fourth International Conf. on Computer and Information Technology, pp. 12-17, 2004.
9 E. Koch and J. Zhao, "Towards Robust and Hidden Image Copyright Labeling," Proc. IEEE Nonlinear Signal and Image Processing, pp. 452-455, June 1995.