• 제목/요약/키워드: Image tamper detection

검색결과 25건 처리시간 0.037초

Wavelet-Based Semi-Fragile Watermarking with Tamper Detection

  • Lee, Jun-Hyuk;Jung, Hun;Seo, Yeung-Su;Yu, Chun-Gun;Park, Hae-Woo
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 한국정보컨버전스학회 2008년도 International conference on information convergence
    • /
    • pp.93-97
    • /
    • 2008
  • In this letter, a novel wavelet-based semi-fragile watermarking scheme is presented which exploiting the time-frequency feature of chaotic map. We also analyze the robustness to mild modification and fragility to malicious attack of our scheme. Its application includes tamper detection, image verification and copyright protection of multimedia content. Simulation results show the scheme can detect and localize malicious attacks with high peak signal-to-noise ratio(PSNR), while tolerating certain degree of JPEG compression and channel additive white Gaussian noise(AWGN)

  • PDF

해쉬 함수를 이용한 디지털 영상의 위변조 검출 (Tamper Detection of Digital Images using Hash Functions)

  • 우찬일;이승대
    • 한국산학기술학회논문지
    • /
    • 제15권7호
    • /
    • pp.4516-4521
    • /
    • 2014
  • 디지털 영상의 인증과 무결성을 위한 워터마킹은 fragile 워터마킹을 기반으로 하고 있으며, 워터마크가 삽입된 영상에 대해 삽입된 워터마크와 조작에 의해 변형된 워터마크를 비교함으로써 영상의 변형 여부를 검출할 수 있다. 따라서 스케일링이나 필터링과 같은 영상처리에 의한 변형이 발생할 경우 영상의 인증과 무결성을 위한 워터마크는 쉽게 제거되어야 한다. 본 논문에서는 디지털 영상에 대하여 효과적인 변형 검출 방법을 제안한다. 제안 방법에서는 원 영상을 중첩되지 않은 $2{\times}2$ 크기의 블록으로 나누어 각 블록의 하위 2개의 LSB에 워터마크를 삽입하며, 워터마크 삽입으로 인한 영상의 왜곡은 사람의 눈으로 인지할 수 없다. 그리고 워터마크 추출 과정을 통해 워터마크가 삽입된 영상이 변형 되었는지의 여부를 결정할 수 있으며, 실험 결과는 제안 방법의 효율성을 나타내고 있다.

A High-Quality Image Authentication Scheme for AMBTC-compressed Images

  • Lin, Chia-Chen;Huang, Yuehong;Tai, Wei-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권12호
    • /
    • pp.4588-4603
    • /
    • 2014
  • In this paper, we present a high-quality image authentication scheme based on absolute moment block truncation coding. In the proposed scheme, we use the parity of the bitmap (BM) to generate the authentication code for each compressed image block. Data hiding is used to authenticate whether the content has been altered or not. For image authentication, we embed the authentication code to quantization levels of each image block compressed by absolute moment block truncation coding (AMBTC) which will be altered when the host image is manipulated. The embedding position is generated by a pseudo-random number generator for security concerned. Besides, to improve the detection ability we use a hierarchical structure to ensure the accuracy of tamper localization. A watermarked image can be precisely inspected whether it has been tampered intentionally or incautiously by checking the extracted watermark. Experimental results demonstrated that the proposed scheme achieved high-quality embedded images and good detection accuracy, with stable performance and high expansibility. Performance comparisons with other block-based data hiding schemes are provided to demonstrate the superiority of the proposed scheme.

디지털 영상의 효율적인 변형 검출에 관한 연구 (A Study on Efficient Tamper Detection of Digital Image)

  • 우찬일;이승대
    • 한국산학기술학회논문지
    • /
    • 제17권11호
    • /
    • pp.196-201
    • /
    • 2016
  • 디지털 워터마킹은 디지털 미디어 내부에 정보를 숨기기 위해 사용하는 기술로, 디지털 워터마킹 기술은 Robust 워터마킹 기술과 Fragile 워터마킹 기술로 분류할 수 있다. Robust 워터마킹 기술은 일반적으로 저작권을 보호하기 위한 목적으로 사용되고 있으며, Fragile 워터마킹 기술은 영상에 대한 인증과 무결성을 검증하기 위한 목적으로 사용된다. 따라서 Fragile 워터마킹 기술에서는 워터마킹 된 영상에 대해 작은 변형이라도 발생 하였을 경우 삽입된 워터마크는 쉽게 부수어져야 되는 특성을 가지고 있어야 한다. 본 논문에서는 공간 영역에서 영상의 변형 검출을 위한 효과적인 Fragile 워터마킹 방법을 제안하였으며, 본 논문에서 제안한 방법에서는 해쉬 코드와 대칭키 암호를 사용하였다. 제안 방법에서는 원 영상을 작은 크기로 구성된 여러 블록들로 분할한 후 워터마크를 삽입하기 때문에 cut and paste와 같은 공격에 취약하지 않은 특징을 가지고 있으며, 변형 검출을 위하여 워터마크가 삽입된 영상에 대해 전체 블록을 검사하지 않고도 변형이 발생된 부분만을 빠르게 검출할 수 있는 장점이 있다.

Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization

  • Tang, Zhenjun;Wang, Shuozhong;Zhang, Xinpeng;Wei, Weimin;Su, Shengjun
    • Journal of Ubiquitous Convergence Technology
    • /
    • 제2권1호
    • /
    • pp.18-26
    • /
    • 2008
  • The invariance relation existing in the non-negative matrix factorization (NMF) is used for constructing robust image hashes in this work. The image is first re-scaled to a fixed size. Low-pass filtering is performed on the luminance component of the re-sized image to produce a normalized matrix. Entries in the normalized matrix are pseudo-randomly re-arranged under the control of a secret key to generate a secondary image. Non-negative matrix factorization is then performed on the secondary image. As the relation between most pairs of adjacent entries in the NMF's coefficient matrix is basically invariant to ordinary image processing, a coarse quantization scheme is devised to compress the extracted features contained in the coefficient matrix. The obtained binary elements are used to form the image hash after being scrambled based on another key. Similarity between hashes is measured by the Hamming distance. Experimental results show that the proposed scheme is robust against perceptually acceptable modifications to the image such as Gaussian filtering, moderate noise contamination, JPEG compression, re-scaling, and watermark embedding. Hashes of different images have very low collision probability. Tampering to local image areas can be detected by comparing the Hamming distance with a predetermined threshold, indicating the usefulness of the technique in digital forensics.

  • PDF

Research on the Detection of Image Tampering

  • Kim, Hye-jin
    • 한국컴퓨터정보학회논문지
    • /
    • 제26권12호
    • /
    • pp.111-121
    • /
    • 2021
  • 정보의 주요 전달체로서 디지털 이미지는 점점 더 중요해지고 있다. 그러나 이미지 획득 장비의 대중화와 이미지 편집 소프트웨어의 급속한 발전으로 인해, 최근 몇 년간 디지털 이미지 위조 사건이 잇따라 발생해 이미지의 신뢰도를 떨어뜨릴 뿐만 아니라 사회와 개인에게도 큰 악영향을 미치고 있다. 이미지 복사-붙여넣기 변조(image copy-paste tampering)는 가장 일반적인 유형의 이미지 변조 중 하나이며, 조작이 쉽고 효과적이기 때문에 디지털 이미지 의미 정보 변경에 자주 사용된다. 본 논문에서는 이미지 복사 및 붙여넣기의 변조 탐지 방법을 연구하여 이미지 콘텐츠의 진정성과 무결성을 보호하는 방법이 제안되었다. 딥러닝의 우수한 학습과 분석능력을 감안해 영상처리작업이 남긴 흔적을 활용해 영상 속 원본 영역과 변조된 영역을 구분하는 딥러닝 기반 변조 검출법 2가지가 제안되었다. 또한 실험을 통해 이론적 근거의 합리성, 변조 탐지, 위치 및 분류의 정확성을 검증하였다.

Fast Detection of Forgery Image using Discrete Cosine Transform Four Step Search Algorithm

  • Shin, Yong-Dal;Cho, Yong-Suk
    • 한국멀티미디어학회논문지
    • /
    • 제22권5호
    • /
    • pp.527-534
    • /
    • 2019
  • Recently, Photo editing softwares such as digital cameras, Paintshop Pro, and Photoshop digital can create counterfeit images easily. Various techniques for detection of tamper images or forgery images have been proposed in the literature. A form of digital forgery is copy-move image forgery. Copy-move is one of the forgeries and is used wherever you need to cover a part of the image to add or remove information. Copy-move image forgery refers to copying a specific area of an image itself and pasting it into another area of the same image. The purpose of copy-move image forgery detection is to detect the same or very similar region image within the original image. In this paper, we proposed fast detection of forgery image using four step search based on discrete cosine transform and a four step search algorithm using discrete cosine transform (FSSDCT). The computational complexity of our algorithm reduced 34.23 % than conventional DCT three step search algorithm (DCTTSS).

웨이블릿 기반 이미지 워터마킹 (A Wavelet-based Image Watermarking Scheme)

  • 박호식;배철수
    • 한국정보통신학회논문지
    • /
    • 제8권7호
    • /
    • pp.1469-1474
    • /
    • 2004
  • 본 논문에서는 웨이블릿 기반의 이미지 워터마킹 방법을 제안하고자 한다. 제안한 방법은 원영상의 주파수 영역에 의사 잡음 코드를 첨가하여 워터마크 된 디지털 영상을 만드는 것이다. 또한, 원영상은 워터마킹 검출을 위해 사용되어지고, 부가되는 서명의 강도는 원영상에 따라 달라지므로, 적합한 신호를 제안된 방법에 의해 산출 할 수가 있었다. 실험 결과, 제안된 방법이 주파수 영역에서 기존의 사설 방식에 비해 우수한 변조방지와 낮은 가시성을 보임을 나타내었다.

A Survey on Passive Image Copy-Move Forgery Detection

  • Zhang, Zhi;Wang, Chengyou;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • 제14권1호
    • /
    • pp.6-31
    • /
    • 2018
  • With the rapid development of the science and technology, it has been becoming more and more convenient to obtain abundant information via the diverse multimedia medium. However, the contents of the multimedia are easily altered with different editing software, and the authenticity and the integrity of multimedia content are under threat. Forensics technology is developed to solve this problem. We focus on reviewing the blind image forensics technologies for copy-move forgery in this survey. Copy-move forgery is one of the most common manners to manipulate images that usually obscure the objects by flat regions or append the objects within the same image. In this paper, two classical models of copy-move forgery are reviewed, and two frameworks of copy-move forgery detection (CMFD) methods are summarized. Then, massive CMFD methods are mainly divided into two types to retrospect the development process of CMFD technologies, including block-based and keypoint-based. Besides, the performance evaluation criterions and the datasets created for evaluating the performance of CMFD methods are also collected in this review. At last, future research directions and conclusions are given to provide beneficial advice for researchers in this field.

Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors

  • Zhang, Zhi;Wang, Dongyan;Wang, Chengyou;Zhou, Xiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권9호
    • /
    • pp.4567-4587
    • /
    • 2017
  • With the growth of the Internet and the extensive applications of image editing software, it has become easier to manipulate digital images without leaving obvious traces. Copy-move is one of the most common techniques for image forgery. Image blind forensics is an effective technique for detecting tampered images. This paper proposes an improved copy-move forgery detection method based on the discrete cosine transform (DCT). The quantized DCT coefficients, which are feature representations of image blocks, are truncated using a truncation factor to reduce the feature dimensions. A method for judging whether two image blocks are similar is proposed to improve the accuracy of similarity judgments. The main transfer vectors whose frequencies exceed a threshold are found to locate the copied and pasted regions in forged images. Several experiments are conducted to test the practicability of the proposed algorithm using images from copy-move databases and to evaluate its robustness against post-processing methods such as additive white Gaussian noise (AWGN), Gaussian blurring, and JPEG compression. The results of experiments show that the proposed scheme effectively detects both copied region and pasted region of forged images and that it is robust to the post-processing methods mentioned above.