• Title/Summary/Keyword: Image Signature

Search Result 143, Processing Time 0.027 seconds

An Efficient Watermarking for Tamper Localization Proofing (국부적인 변형 검출을 위한 효율적인 워터마킹)

  • Woo, Chan-Il;Jeon, Se-Gil
    • 전자공학회논문지 IE
    • /
    • v.43 no.2
    • /
    • pp.87-92
    • /
    • 2006
  • Many watermarking methods for protecting the intellectual property right and authentication multimedia data have been proposed in recent years. In image authentication watermarking, watermark is inserted into an image to detect any malicious alteration. So, watermark for authentication and integrity should be erased easily when the image is changed by scaling or cropping etc. We propose in this paper a fragile watermarking algorithm for image integrity verification and tamper localization proofing using special hierarchical structure. In the proposed method, the image to be watermarked is divided into blocks in a multi-level hierarchy and calculating block digital signatures in thus hierarchy. At each level of the hierarchy, a digital signature for each block is calculated using the seven most significant bit(MSBs)-plane values of all pixels within the block. And the resulting signature is incorporated into the LSBs of selected pixels within the block. We provide experimental results to demonstrate the effectiveness of the proposed method.

Image-Based Machine Learning Model for Malware Detection on LLVM IR (LLVM IR 대상 악성코드 탐지를 위한 이미지 기반 머신러닝 모델)

  • Kyung-bin Park;Yo-seob Yoon;Baasantogtokh Duulga;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.31-40
    • /
    • 2024
  • Recently, static analysis-based signature and pattern detection technologies have limitations due to the advanced IT technologies. Moreover, It is a compatibility problem of multiple architectures and an inherent problem of signature and pattern detection. Malicious codes use obfuscation and packing techniques to hide their identity, and they also avoid existing static analysis-based signature and pattern detection techniques such as code rearrangement, register modification, and branching statement addition. In this paper, We propose an LLVM IR image-based automated static analysis of malicious code technology using machine learning to solve the problems mentioned above. Whether binary is obfuscated or packed, it's decompiled into LLVM IR, which is an intermediate representation dedicated to static analysis and optimization. "Therefore, the LLVM IR code is converted into an image before being fed to the CNN-based transfer learning algorithm ResNet50v2 supported by Keras". As a result, we present a model for image-based detection of malicious code.

A Signature-based Spatial Match Retrieval Method for Iconic Image Databases (아이콘 이미지 데이타베이스를 위한 시그니쳐에 기반한 공간-매치 검색기법)

  • Chang, Jae-Woo;Srivastava, Jaideep
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.2931-2946
    • /
    • 1997
  • In multimedia information retrieval applications, content-based image retrieval is essential for retrieving relevant multimedia documents. The purpose of our paper is to provide effective representation and efficient retrieval of images when a pixel-level original image is automatically or manually transformaed into its iconic image containing meaningful graphic descriptions, called icon objects. For this, we first propose new spatial match representationschemes to describe spatial relationships between icon objects accurately by expressing them as rectangles, rather than as points. In order to accelerate image searching, we also design an efficient retrieval method using a two-dimensional signature file organization. Finally, we show from our experiment that the proposed representation schemes achieve better retrieval effectiveness than the 9-DLT (Direction Lower Triangular) scheme.

  • PDF

Infrared Signature Analysis of a Ship for Different Atmosphere Temperature and Wind Velocity (대기온도 및 풍속 변화에 따른 함정의 적외선 신호 특성 분석)

  • Choi, Jun-Hyuk;Lee, Ji-Sun;Kim, Jung-Ho;Lee, Sung-Ho;Kim, Tae-Kuk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.5
    • /
    • pp.84-91
    • /
    • 2008
  • The spectral radiance received by a remote sensor at a given temperature and wavelength region is consisted of the self-emitted component directly from the object surface, the reflected component of the solar irradiation at the object surface, and the scattered component by the atmosphere without ever reaching the object surface. The IR image of a ship is mainly affected by location, meteorological condition(atmosphere temperature, wind direction and velocity, humidity etc.), atmospheric transmittance, solar position and ship surface temperature etc. Computer simulations for prediction of the IR signatures of ships are very useful to examine the effects of various meteorological conditions. In this paper, we have acquired the IR signature for different meteorological conditions by using two different computer programs. The numerical results show that the IR image contrast as compared to the background sea considering the atmosphere temperature and wind velocity.

Content Adaptive Signature Generation Method for Acceptable Image Manipulation (허용 가능한 이미지 조작에 대한 내용 적응 시그너쳐 생성 기법)

  • 안세정;정성환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.255-258
    • /
    • 2003
  • 본 논문에서는 JPEG 압축 이외의 블러링(blumng) 및 샤프닝(sharpening) 등의 허용 가능한 이미지 조작에도 정보가 유지될 수 있는 내용 적응(content adaptive) 서명(signature) 기법을 제안하였다. 제안한 방법은 블록의 이미지 내용의 특성을 사용하여, 기존의 이미지 블록 사이의 DCT 계수 차이가 유지되는 DCT를 기반으로 한 Chang의 서명 방법의 단점을 개선하였다. 즉, 허용 가능한 이미지 조작에 대하여 에러 발생 확률이 높은 블록을 피하여 서명을 생성하였다 Lenna를 포함한 여러 표준 영상을 사용하여 실험한 결과, 제안한 랑법은 Chang의 방법에서 발생하는 서명의 비트 스트림 에러보다 에러 발생 빈도가 블러링 이미지에서는 평균 약 55%, 사프닝 이미지에서는 평균 약 51% 더 낮았다.

  • PDF

A Camera Image Authentication Using Image Information Copyright Signature for Mobile Device without Distortion (무왜곡 휴대용 단말기 영상정보 권한서명을 이용한 카메라 영상 인증)

  • Han, Chan-Ho;Moon, Kwang-Seok
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.2
    • /
    • pp.30-36
    • /
    • 2014
  • Quality and resolution of camera in mobile device is improved significantly. In this paper, we propose block-based information hide techniques without image distortion for mobile device to solve image degradation in conventional watermarking methods. Information of image is composed with text such as camera maker, model, date, time, etc. Each text is converted to $8{\times}8$ pixel blocks and is added to the bottom of image. Generally image including block based information for image authentication are compressed using JPEG in mobile device. The vertical line value in JPEG header is modified by original size of image sensor. This technique can hide the block based authentication information using general decoder. In the experimental results, JPEG file size is slightly increased within 0.1% for the proposed block based authentication information encoding. Finally proposed methods can be adopted for various embedded systems using medical image, smart phone and DSLR camera.

The Undeniable Digital Multi-Signature Scheme based on Biometric Information (생체정보 기반의 부인봉쇄 디지털 다중서명 기법)

  • Yun, Sung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.3
    • /
    • pp.549-555
    • /
    • 2007
  • A digital signature scheme provides integrity of the document, authentication and non-repudiation of a signer. Usually the key for digital signature is stored in hard disk or removal disk storage. The drawback of this approach is that the signer can let the agent to sign instead of the signer by providing the key information. It can be abused in applications such as electronic election. In this paper, we propose the undeniable biometric digital multi-signature scheme suitable for applications where the signer should not make an agent sign instead of himself/herself. The undeniable multi-signature scheme requires many signers and only the designated user can confirm the authenticity of multi-signature. The proposed scheme satisfies undeniable property and it is secure against active attacks such as modification and denial of the multi-signature by signers. As the key is generated through the signer's fingerprint image, it's also secure against signing by an agent.

  • PDF

Incremental-based Digital Signature with Neighbouring Block Similarity Measure for Video Authentication

  • Kultangwattana, Wilaiporn;Chotikakamthorn, Nopporn
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1412-1415
    • /
    • 2002
  • This paper describes a digital signature-based method for original and updated video authentication. The method uses multiple digital signatures in dealing with video data undergoing multiple change/updating. In addition, a feature based on neighbouring block similarity measure is applied to deal with certain image/video modification. The proposed method can cope with wide range of image/video tampering. It is suitable for practical use of video data, where updating may be performed by more than one legal parties. Experimental results are included with concluding remarks.

  • PDF

Wavelet-Based Digital Image Watermarking by Using Lorenz Chaotic Signal Localization

  • Panyavaraporn, Jantana;Horkaew, Paramate
    • Journal of Information Processing Systems
    • /
    • v.15 no.1
    • /
    • pp.169-180
    • /
    • 2019
  • Transmitting visual information over a broadcasting network is not only prone to a copyright violation but also is a forgery. Authenticating such information and protecting its authorship rights call for more advanced data encoding. To this end, electronic watermarking is often adopted to embed inscriptive signature in imaging data. Most existing watermarking methods while focusing on robustness against degradation remain lacking of measurement against security loophole in which the encrypting scheme once discovered may be recreated by an unauthorized party. This could reveal the underlying signature which may potentially be replaced or forged. This paper therefore proposes a novel digital watermarking scheme in temporal-frequency domain. Unlike other typical wavelet based watermarking, the proposed scheme employed the Lorenz chaotic map to specify embedding positions. Effectively making this is not only a formidable method to decrypt but also a stronger will against deterministic attacks. Simulation report herein highlights its strength to withstand spatial and frequent adulterations, e.g., lossy compression, filtering, zooming and noise.

Effect On-line Automatic Signature Verification by Improved DTW (개선된 DTW를 통한 효과적인 서명인식 시스템의 제안)

  • Dong-uk Cho;Gun-hee Han
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.4 no.2
    • /
    • pp.87-95
    • /
    • 2003
  • Dynamic Programming Matching (DPM) is a mathematical optimization technique for sequentially structured problems, which has, over the years, played a major role in providing primary algorithms in pattern recognition fields. Most practical applications of this method in signature verification have been based on the practical implementational version proposed by Sakoe and Chiba [9], and il usually applied as a case of slope constraint p = 0. We found, in this case, a modified version of DPM by applying a heuristic (forward seeking) implementation is more efficient, offering significantly reduced processing complexity as well as slightly improved verification performance.

  • PDF