• 제목/요약/키워드: Original Authentication

검색결과 112건 처리시간 0.03초

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images

  • Zhang, Heng;Wang, Chengyou;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • 제13권2호
    • /
    • pp.385-399
    • /
    • 2017
  • Nowadays, with the development of signal processing technique, the protection to the integrity and authenticity of images has become a topic of great concern. A blind image authentication technology with high tamper detection accuracy for different common attacks is urgently needed. In this paper, an improved fragile watermarking method based on local binary pattern (LBP) is presented for blind tamper location in images. In this method, a binary watermark is generated by LBP operator which is often utilized in face identification and texture analysis. In order to guarantee the safety of the proposed algorithm, Arnold transform and logistic map are used to scramble the authentication watermark. Then, the least significant bits (LSBs) of original pixels are substituted by the encrypted watermark. Since the authentication data is constructed from the image itself, no original image is needed in tamper detection. The LBP map of watermarked image is compared to the extracted authentication data to determine whether it is tampered or not. In comparison with other state-of-the-art schemes, various experiments prove that the proposed algorithm achieves better performance in forgery detection and location for baleful attacks.

무효 블록의 격리를 이용한 새로운 이미지 인증 방법 (A New Image Authentication Method through Isolation of Invalid Blocks)

  • 김효철;김현철;유기영
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제8권1호
    • /
    • pp.17-24
    • /
    • 2002
  • 본 논문에서는 이미지 인증을 목적으로 무효한 블록들을 격리하는 새로운 워터마킹 방법을 제안한다. 이 과정에서 워터마크의 비인식성과 깨지기 쉬운 워터마크를 보장하기 위하여 DCT 도메인의 고주파 영역을 사용하였다. 여러 가지 실험을 통하여 에러가 보정된 원본 영상들과 워터마크된 이미지들 사이에 유효한 블록들이 동일함을 확인하였다. 결과적으로 워터마크 추출 과정에서 원본 이미지나 워터마크와 같은 여분의 정보가 필요 없으며, 워터마크된 이미지만으로 2진 워터마크를 추출할 수 있다는 사실을 발견하였다. 실험 결과들은 제안된 방법이 이미지 인증을 위하여 성공적으로 사용될 수 있음을 보여준다.

기하학적인 변형에 강건한 워터마킹 기법과 디지털 영상의 인증 (Robust watermarking technique in geometric distortion and authentication of digital images)

  • 이나영;김원;김계영;최형일
    • 정보처리학회논문지B
    • /
    • 제10B권4호
    • /
    • pp.367-372
    • /
    • 2003
  • 디지털 영상의 저작권 보호를 위한 기존의 워터마킹 기법들은 기하학적인 왜곡에 약하며 인위적으로 변형되었는지 여부를 검출하기 어렵다. 본 논문에서는 이러한 문제점을 해결하기 위하여 기하학적인 왜곡에 강건한 워터마킹 기법과 디지털 영상의 무결성을 검사하는 인증 기법을 제안한다. 워터마킹 기법에서는 원 영상을 콤플렉스 웨이블릿 변환하여 위상 성분에 워터마크를 삽입하며 워터마크가 삽입된 영상으로부터 점진적으로 워터마크를 추출한다. 추출된 워터마크와 원 워터마크의 상관관계를 비교하여 임계값보다 크면 해당 워터마크의 소유자는 영상에 대한 저작권을 주장할 수 있다. 디지털 영상의 인증 기법에서는 EZW(Embedded Zerotree Wavelet)을 이용하여 워터마크가 삽입된 영상의 인증코드를 생성한다. 생성된 인증 코드와 배포된 영상의 인증 코드를 비교하여 임계값보다 크면 인위적인 조작이 없다고 간주한다. 성능평가를 통하여 본 논문에서 제안한 저작권 보호 방법이 기하학적인 왜곡에 강건하였으며 워터마크된 영상이 인위적으로 변형되었는지 여부를 알 수 있었다.

중재판정의 승인.집행을 위하여 제출할 서류 (Documents to Produce for the Recognition and Enforcement of Arbitral Awards)

  • 이호원
    • 한국중재학회지:중재연구
    • /
    • 제23권2호
    • /
    • pp.141-164
    • /
    • 2013
  • The current Korean Arbitration Act (KAA) ${\S}37(2)$ requires that a formal copy of an arbitral award or a duly certified copy thereof and the original arbitration agreement or a duly certified copy thereof be produced for the recognition and enforcement of a arbitral award. But as the KAA provides that the recognition and enforcement of a foreign arbitral award to which the New York Convention applies shall be granted in accordance with the Convention, the duly authenticated original award should be produced instead of a formal copy in that case. The provision on the documents to produce for the recognition and enforcement of an arbitral award is set to establish a reasonable and transparent standard and to facilitate the recognition and enforcement of awards by prohibiting parochial refusal of the recognition and enforcement on the grounds of formalities. Therefore it is necessary to simplify those documents according to the internationally acknowledged standard. It would be desirable to amend KAA ${\S}37(2)$ to require only "the original arbitral award or a copy thereof" without authentication or certification and a translation into Korean without any condition, adopting the 2006 amendment to the UNCITRAL Model Law on International Commercial Arbitration.

  • PDF

Secure Face Authentication Framework in Open Networks

  • Lee, Yong-Jin;Lee, Yong-Ki;Chung, Yun-Su;Moon, Ki-Young
    • ETRI Journal
    • /
    • 제32권6호
    • /
    • pp.950-960
    • /
    • 2010
  • In response to increased security concerns, biometrics is becoming more focused on overcoming or complementing conventional knowledge and possession-based authentication. However, biometric authentication requires special care since the loss of biometric data is irrecoverable. In this paper, we present a biometric authentication framework, where several novel techniques are applied to provide security and privacy. First, a biometric template is saved in a transformed form. This makes it possible for a template to be canceled upon its loss while the original biometric information is not revealed. Second, when a user is registered with a server, a biometric template is stored in a special form, named a 'soft vault'. This technique prevents impersonation attacks even if data in a server is disclosed to an attacker. Finally, a one-time template technique is applied in order to prevent replay attacks against templates transmitted over networks. In addition, the whole scheme keeps decision equivalence with conventional face authentication, and thus it does not decrease biometric recognition performance. As a result, the proposed techniques construct a secure face authentication framework in open networks.

Authentication Technologies of X-ray Inspection Image for Container Terminal Automation

  • Kim, Jong-Nam;Hwang, Jin-Ho;Ryu, Tae-Kyung;Moon, Kwang-Seok;Jung, Gwang-S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1684-1688
    • /
    • 2005
  • In this paper, authentication technologies for X-ray inspection images in container merchandises are introduced and a method of authentication for X-ray inspection images is proposed. Until now, X-ray images of container merchandises have been managed without any authentication of inspection results and environments, it means that there was no any action for protection of illegal copy and counterfeiting of X-ray images from inspection results. Here, authentication identifies that who did inspect container X-ray images and, whether the container X-ray images were counterfeited or not. Our proposed algorithm indicates to put important information about X-ray inspection results on an X-ray image without affecting quality of the original image. Therefore, this paper will be useful in determining an appropriate technology and system specification for authentication of X-ray inspection images. As a result of experiment, we find that the information can be embedded to X-ray image without large degradation of image quality. Our proposed algorithm has high detection ratio by Quality 20 of JPEG attack.

  • PDF

DWT기반 이미지 인증 및 변형 검출을 위한 혼합 워터마킹 (Hybrid-Watermarking for DWT Based Authentication and Detection of Image Modification)

  • 김동서;주낙근;강태환
    • 한국콘텐츠학회논문지
    • /
    • 제6권1호
    • /
    • pp.170-178
    • /
    • 2006
  • 본 논문에서는 디지털 영상의 인증과 변형 검출 및 저작권 보호를 가능하도록 혼합 워터마킹 기법이 제안되었다. 원영상을 DWT(Discrete Wavelet Transform) 변환한 후 이미지의 인증과 변형된 위치를 검출하기 위하여 저주파 부분인 LL 밴드의 LSB(Least Significant Bit)에 암호화된 워터마크 정보를 삽입한다. 또 저작권 보호를 위하여 고주파부분의 웨이블릿 계수들의 교환을 통해 워터마크 정보를 삽입한다. 이렇게 함으로써 저주파부분의 LSB값 추출을 통해 인증 및 그 변형 위치를 찾을 수 있었으며, 고주파 부분에 삽입된 워터마크를 추출하여 원영상의 저작권 정보를 감지할 수 있었다.

  • PDF

A REVERSIBLE IMAGE AUTHENTICATION METHOD FREE FROM LOCATION MAP AND PARAMETER MEMORIZATION

  • Han, Seung-Wu;Fujiyoshi, Masaaki;Kiya, Hitoshi
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 2009년도 IWAIT
    • /
    • pp.572-577
    • /
    • 2009
  • This paper proposes a novel reversible image authentication method that requires neither location map nor memorization of parameters. The proposed method detects image tampering and further localizes tampered regions. Though this method once distorts an image to hide data for tamper detection, it recovers the original image from the distorted image unless no tamper is applied to the image. The method extracts hidden data and recovers the original image without memorization of any location map that indicates hiding places and of any parameter used in the algorithm. This feature makes the proposed method practical. Simulation results show the effectiveness of the proposed method.

  • PDF

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • 디지털산업정보학회논문지
    • /
    • 제13권1호
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

LUT 기반의 블록 연성 워터마킹 (Block Fragile Watermarking Based on LUT)

  • 주은경;강현호;박지환
    • 한국멀티미디어학회논문지
    • /
    • 제7권9호
    • /
    • pp.1294-1303
    • /
    • 2004
  • 본 논문에서는 기존의 픽셀 기반 방식과 블록 기반 방식의 개념을 도입하여 영상의 인증과 무결성을 위한 새로운 블록 연성 워터마킹을 제안하였다. 제안 방식은 원 영상의 각 픽셀과 해당 블록의 정보로 LUT(Look Up Table)을 선택하여 원 영상을 이진화 한 값과 워터마크를 비교하여 원 영상을 수정하면서 워터마크를 삽입하였다. 그 결과 기존 방식의 약점으로 지적된 collage 공격 등을 방지하면서도 워터마크된 영상에서 워터마크인 이진로고를 추출하여 시각적으로 편리하게 소유권 확인과 변조 위치를 적셀 단위 또는 블록 단위로 검출할 수 있었다.

  • PDF