• 제목/요약/키워드: Image Tamper Detection

검색결과 25건 처리시간 0.022초

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images

  • Zhang, Heng;Wang, Chengyou;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • 제13권2호
    • /
    • pp.385-399
    • /
    • 2017
  • Nowadays, with the development of signal processing technique, the protection to the integrity and authenticity of images has become a topic of great concern. A blind image authentication technology with high tamper detection accuracy for different common attacks is urgently needed. In this paper, an improved fragile watermarking method based on local binary pattern (LBP) is presented for blind tamper location in images. In this method, a binary watermark is generated by LBP operator which is often utilized in face identification and texture analysis. In order to guarantee the safety of the proposed algorithm, Arnold transform and logistic map are used to scramble the authentication watermark. Then, the least significant bits (LSBs) of original pixels are substituted by the encrypted watermark. Since the authentication data is constructed from the image itself, no original image is needed in tamper detection. The LBP map of watermarked image is compared to the extracted authentication data to determine whether it is tampered or not. In comparison with other state-of-the-art schemes, various experiments prove that the proposed algorithm achieves better performance in forgery detection and location for baleful attacks.

A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images

  • Nguyen, Thai-Son;Chang, Chin-Chen;Chung, Ting-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권6호
    • /
    • pp.2005-2021
    • /
    • 2014
  • This paper proposes a novel image authentication scheme, aiming at tampering detection for block truncation coding (BTC) compressed image. The authentication code is generated by using the random number generator with a seed, and the size of the authentication code is based on the user's requirement, with each BTC-compressed image block being used to carry the authentication code using the data hiding method. In the proposed scheme, to obtain a high-quality embedded image, a reference table is used when the authentication code is embedded. The experimental results demonstrate that the proposed scheme achieves high-quality embedded images and guarantees the capability of tamper detection.

Region-based scalable self-recovery for salient-object images

  • Daneshmandpour, Navid;Danyali, Habibollah;Helfroush, Mohammad Sadegh
    • ETRI Journal
    • /
    • 제43권1호
    • /
    • pp.109-119
    • /
    • 2021
  • Self-recovery is a tamper-detection and image recovery methods based on data hiding. It generates two types of data and embeds them into the original image: authentication data for tamper detection and reference data for image recovery. In this paper, a region-based scalable self-recovery (RSS) method is proposed for salient-object images. As the images consist of two main regions, the region of interest (ROI) and the region of non-interest (RONI), the proposed method is aimed at achieving higher reconstruction quality for the ROI. Moreover, tamper tolerability is improved by using scalable recovery. In the RSS method, separate reference data are generated for the ROI and RONI. Initially, two compressed bitstreams at different rates are generated using the embedded zero-block coding source encoder. Subsequently, each bitstream is divided into several parts, which are protected through various redundancy rates, using the Reed-Solomon channel encoder. The proposed method is tested on 10 000 salient-object images from the MSRA database. The results show that the RSS method, compared to related methods, improves reconstruction quality and tamper tolerability by approximately 30% and 15%, respectively.

정지영상에서 저작권 보호 및 위변조 검출을 위한 하이브리드 디지털 워터마킹 기법 (A Hybrid Digital Watermarking Technique for Copyright Protection and Tamper Detection on Still images)

  • 유길상;송근실;최혁;이원형
    • 인터넷정보학회논문지
    • /
    • 제4권4호
    • /
    • pp.27-34
    • /
    • 2003
  • 오늘날, 디지털 이미지 도구 프로그램은 전문가가 아니더라도 누구나 개인용 컴퓨터를 이용하여 쉽고 빠르게 영상을 조작하여 사용할 수 있게 되었다. 그 결과 디지털 컨텐츠의 저작권 보호 및 변조된 영상의 무결성을 보증하는 것이 주요 문제가 되고있다. 본 논문에서는 워터마크 정보는 물론 조작된 영상의 위치까지 검출할 수 있는 하이브리드 워터마킹 알고리즘을 설계하였다. 이를 위해 이산 웨이블릿 변환을 이용하여 영상의 저주파 대역에 PN-시권스를 워터마크로 삽입하였고, 원영상 없이도 검출이 가능하게 하였다. 워터마크 신호를 파괴하기 위한 다양한 공격의 실험 결과 제안한 알고리즘은 강인성을 나타내었고 추출 후 변조된 영상의 위치도 확인할 수 있었다.

  • PDF

A REVERSIBLE IMAGE AUTHENTICATION METHOD FREE FROM LOCATION MAP AND PARAMETER MEMORIZATION

  • Han, Seung-Wu;Fujiyoshi, Masaaki;Kiya, Hitoshi
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 2009년도 IWAIT
    • /
    • pp.572-577
    • /
    • 2009
  • This paper proposes a novel reversible image authentication method that requires neither location map nor memorization of parameters. The proposed method detects image tampering and further localizes tampered regions. Though this method once distorts an image to hide data for tamper detection, it recovers the original image from the distorted image unless no tamper is applied to the image. The method extracts hidden data and recovers the original image without memorization of any location map that indicates hiding places and of any parameter used in the algorithm. This feature makes the proposed method practical. Simulation results show the effectiveness of the proposed method.

  • PDF

A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images

  • Nguyen, Thai-Son;Chang, Chin-Chen;Shih, Tso-Hsien
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권1호
    • /
    • pp.395-413
    • /
    • 2016
  • Image authentication is a technique aiming at protecting the integrity of digital images. Reversible image authentication has attracted much attention of researcher because it allows to authenticate tampered regions in the image and to reconstruct the stego image to its original version losslessly. In this paper, we propose a new, reversible image authentication scheme based on adaptive prediction error expansion (PEE) technique. In the proposed scheme, each image block is classified into smooth or complex regions. Then, according to the characteristic of each block, the authentication code is embedded adaptively to achieve high performance of tamper detection. The experimental results demonstrated that the proposed scheme achieves good quality of stego images. In addition, the proposed scheme has ability to reconstruct the stego image to its original version, if no modification is performed on it. Also demonstrated in the experimental results, the proposed scheme provides higher accuracy of tamper detection than state-of-the-art schemes.

디지털 서명을 이용한 영상의 위변조 검출에 관한 연구 (A Study on the Image Tamper Detection using Digital Signature)

  • 우찬일
    • 한국산학기술학회논문지
    • /
    • 제16권7호
    • /
    • pp.4912-4917
    • /
    • 2015
  • 연성 워터마킹은 인증이나 무결성 검증을 위한 목적으로 시각적인 화질저하 없이 워터마크를 영상에 삽입하는 기술로, 인증과 무결성 검증을 위한 워터마크는 필터링과 같은 영상 변형에 대하여 삽입된 워터마크가 쉽게 제거되어야한다. 본 논문에서는 디지털 서명을 이용하여 영상의 위변조 여부를 검출할 수 있는 블록기반 워터마킹 방법을 제안한다. 제안 방법에서는 초기화된 영상 블록의 해쉬 코드로부터 디지털 서명을 생성하고, 워터마킹 된 영상의 전체 블록을 검사하지 않고도 변형이 발생된 부분을 빠르게 검출할 수 있는 장점이 있다.

Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities

  • Badshah, Gran;Liew, Siau-Chuin;Zain, Jasni Mohamad;Ali, Mushtaq
    • Journal of Information Processing Systems
    • /
    • 제11권4호
    • /
    • pp.601-615
    • /
    • 2015
  • Region of interest (ROI) is the most informative part of a medical image and mostly has been used as a major part of watermark. Various shapes ROIs selection have been reported in region-based watermarking techniques. In region-based watermarking schemes an image region of non-interest (RONI) is the second important part of the image and is used mostly for watermark encapsulation. In online healthcare systems the ROI wrong selection by missing some important portions of the image to be part of ROI can create problem at the destination. This paper discusses the complete medical image availability in original at destination using the whole image as a watermark for authentication, tamper localization and lossless recovery (WITALLOR). The WITALLOR watermarking scheme ensures the complete image security without of ROI selection at the source point as compared to the other region-based watermarking techniques. The complete image is compressed using the Lempel-Ziv-Welch (LZW) lossless compression technique to get the watermark in reduced number of bits. Bits reduction occurs to a number that can be completely encapsulated into image. The watermark is randomly encapsulated at the least significant bits (LSBs) of the image without caring of the ROI and RONI to keep the image perceptual degradation negligible. After communication, the watermark is retrieved, decompressed and used for authentication of the whole image, tamper detection, localization and lossless recovery. WITALLOR scheme is capable of any number of tampers detection and recovery at any part of the image. The complete authentic image gives the opportunity to conduct an image based analysis of medical problem without restriction to a fixed ROI.

컬러 영상을 위한 하이브리드 워터마킹 (A Hybrid Watermarking Scheme for Color Images)

  • 이현석;비비 옥타비아;김미애;이원형
    • 인터넷정보학회논문지
    • /
    • 제5권3호
    • /
    • pp.73-86
    • /
    • 2004
  • 본 논문에서는 컬러 영상을 위한 하이브리드(hybrid) 디지털 워터마킹 기법을 제안한다. 즉, 두 개의 워터마크가 주파수 영역과 공간 영역 상에 각각 삽입된다. 첫 번째 워터마크는 영상 데이터를 DW(discrete wavelet transform)를 사용하여 주파수 공간으로 변환한 후, 인간의 시각이 밝기에 민감하지 않다는 사실을 이용하여 컬러 영상의 밝기(luminance) 성분에 대역확산(spread-spectrum) 방법으로 워터마크를 삽입한다. 삽입되는 워터마크는 유사난수 패턴(pseudo-random pattern)을 사용하며 워터마크 검출시에는 상관도(correlation)를 이용하여 워터마크를 추출한다. 두 번째 워터마크는 첫 번째 워터마크가 클로핑(cropping)과 같은 기하학적 공격(geometrical of attack)에 취약한 점을 보완하기 위해 삽입한다. 영상의 공간 영역에서 블루 채널 상에 두 번째 워터마크가 삽입되며, 이때 영상의 특징점의 픽셀값을 입력 값으로 하여 해쉬함수의 출력값을 구한다. 따라서 두 번째 워터마크는 영상의 위 변조를 판별할 수 있는 tamper defection의 기능을 한다.

  • PDF

Review on Digital Image Watermarking Based on Singular Value Decomposition

  • Wang, Chengyou;Zhang, Yunpeng;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • 제13권6호
    • /
    • pp.1585-1601
    • /
    • 2017
  • With the rapid development of computer technologies, a number of image modification methods have emerged, which have great impacts on the security of image information. Therefore, it is necessary to protect the integrity and authenticity of digital images, and digital watermarking technique consequently becomes a research hotspot. An effort is made to survey and analyze advancements of image watermarking algorithms based on singular value decomposition (SVD) in recent years. In the first part, an overview of watermarking techniques is presented and then mathematical theory of SVD is given. Besides, SVD watermarking model, features, and evaluation indexes are demonstrated. Various SVD-based watermarking algorithms, as well as hybrid watermarking algorithms based on SVD and other transforms for copyright protection, tamper detection, location, and recovery are reviewed in the last part.