Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/92931
標題: An Edge-based Light-weight Image Authentication Coding Scheme
基於邊緣特徵的輕量型影像認證技術
作者: 莊惠菁
Hui-Ching Chuang
關鍵字: Edge Detection
Image Authentication
Tamper Detection
Watermark
邊緣偵測
影像認證
竄改偵測
浮水印
引用: [1] C. Rey and J.-L. Dugelay, 'A Survey of Watermarking Algorithms for Image Authentication,' EURASIP Journal on Applied Signal Processing ,vol. 2002, pp. 613-621, 2002. [2] L.Dong, X. Kong, B. Wang, and X.g. You, 'A robust JPEG image tampering detection method using GLCM features,' Advances in Information Sciences and Service Sciences, vol. 3, pp. 348-391, 2011. [3] C.-Y. Lin and S.-F. Chang, 'A robust image authentication method distinguishing JPEG compression from malicious manipulation,' Circuits and System for Video Technology, IEEE Transaction on, vol. 11, pp. 53–168, 2001. [4] J.C. Patra, J.E. Phua, and C. Bornand, 'A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression,' Digital Signal Processing, vol. 20, pp. 1597-1611, Dec 2010. [5] M.I. Khan and V. Jeoti, 'A blind watermarking scheme using bitplane of DC component for JPEG Compressed images,' in Emerging Technologies(ICET),2010 6th International Conference on, pp. 150-154, 2010. [6] S.D. Lin, S.-C. Shie, and J.Y. Guo, 'Improving the robustness of DCT-based image watermarking against JPEG compression,' in Consumer Electronics, 2005. ICCE. 2005 Digest of Technical Papers. International Conference, pp. 343-344, 2005. [7] Y. Huo, H. He, and F. Chen, 'Alterable-capacity fragile watermarking scheme with restoration capability,' Optics Communications, vol. 285, pp. 1759-1766, 2012. [8] P.W. Wong and N. Memon, 'Secret and public key image watermarking schemes for image authentication and ownership verification,' Image Process, IEEE Transaction on, vol. 10, pp. 1593–1601, 2001. [9] C. H. Tzeng and W. H. Tsai, 'A combined approach to integrity protection and verification of palette images using fragile watermarking and digital signatures,' IEICE Transactions on Fundamentals, vol. E87-A, pp. 1612-1619, 2004. [10] D. Lou, and J. Liu, 'Fault resilient and compression tolerant digital signature for image authentication,' IEEE Transactions on Consumer Electronics, vol. 46, pp. 31-39, 2000. [11] R. Safabakhsh, S. Zaboli, and A. Tabibiazar, 'Digital watermarking on still images using wavelet transform,' in Proceedings of International Conference on Information Technology: Coding and Computing, vol. 1, pp. 671–675, 2004. [12] F.A.P. Petitcolas, R.J Anderson, and M.G. Kuhn,'Information hiding-a survey,' Proceedings of the IEEE, vol. 87, pp. 1062-1078, 1999. [13] F. Deguillaume, S. Voloshynovskiy, and T. Pun, 'Secure hybrid robust watermarking resistant against tampering and copy attack,' Signal Processing, vol. 83, pp. 21133-2170, 2003. [14] H.C. Huang, F.H. Wang, and J.S. Pan, 'Efficient and robust watermarking algorithm with vector quantization,' Electronics Letters, vol. 37,Issue 13, pp. 826–828, 2001. [15] W.Y. Chen and C.H. Chen,'A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection,' Pattern Recognition, vol. 38, Issue 4, pp. 587–598, 2005. [16] N. Nikolaidis, I. Pitas, 'Robust image watermarking in the spatial domain,' Signal Process., vol. 66, Issue 3, pp. 385–403, 1988. [17] X. Kang, J. Huang, Y.Q. Shi, and Y. Lin, 'A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,' IEEE Trans. Circuits Syst. Video Technol., vol. 13, Issue 8, p.776-786, 2003. [18] C.-S. Chan, 'An image authentication method by applying Hamming code on rearranged bits,' Pattern Recognition Letters, vol. 32, pp. 1679-1690, 2011. [19] F.D. Martino and S. Sessa, 'Fragile watermarking tamper detection with images compressed by fuzzy transform,' Information Sciences, vol. 195, pp. 62-90, 2012. [20] P. Sidiropoulos, N. Nikolaidis, and I. Pitas, 'Invertible chaotic fragile watermarking for robust image authentication,' Chaos, Solitons & Fractals, vol. 42, pp. 2667-2674, 2009. [21] M.U. Celik, G. Sharma, E. Saber, and A.M. Tekalp, 'Hierarchical water-marking for secure image authentication with localization,' IEEE Trans. Image Process., vol. 11, issue 6, p.585–594, 2002. [22] M.U. Celik, G. Sharma, and A.M. Tekalp, 'Loss less watermarking for image authentication: a new framework and an implementation,' IEEE Trans. Image Process., vol. 15, issue 4, p.1042–1049, 2006. [23] J. Fridrich, 'Image watermarking for tamper detection,' in:Proceed- ings of the IEEE International Conferenceon Image Processing,' vol. II, Chicago, IL, USA, pp. 404–408, 1998. [24] J. Fridrich, M. Goljan, and A.C. Baldoza, 'New fragile authentication Watermark for images,' in: Proceedings of the IEEE International Conference on Image Processing, Vancouver, BC, Canada, pp. 10–13, 2000. [25] E. T. Lin and E. J. Delp, 'A review of Fragile Watermarking,' Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN 47907-2086, 2001. [26] S. Shivani, A. K. Patel, S. Kamble, and S. Agarwal, 'An effective pixel-wise fragile watermarking scheme based on ARA bits,' In: International Conference on Communication, Computing & Security (ICCCS '11), pp. 221-226, 2011. [27] S. Che, B. Ma, and Z. Che, 'An adaptive and fragile image watermarking algorithm based on composite chaotic iterative dynamic system,' In: Intelligent Information Hiding and Multimedia Signal Processing, IEEE, IIHMSP'08 , pp. 159-162 , 2008. [28] Y. Z. He and Z. Han, ' A fragile watermarking scheme with pixel-wise alteration localization,' In: 9th International Conference on Signal Processing,. ICSP 2008, pp. 2201-2204, 2008. [29] Y. Lim, C. Xu, and D. D. Feng, 'Web based Image Authentication Using Invisible Fragile Watermark,' In: Australian Computer Society, Inc., 2002. [30] H. He, J. Zhang, and F.Chen, 'Block-wise Fragile Watermarking Scheme Based on Scramble Encryption,' In: Bio-Inspired Computing: Theories and Applications., pp. 216-220, 2007. [31] J. R. Hernandez, M. Amado, and F. Perez-Gonzalez, 'DCT-domain watermarking techniques for still images: detector performance analysis and a new structure,' In: IEEE Transactions on Image Processing, vol. 9, pp. 55-68, 2000. [32] A.T.S. Ho, X. Zhu, J. Shen, and P. Marziliano, 'Fragile Watermarking Based on Encoding of the Zeroes of the z-Transform.' In: IEEE Transactions on Information Forensics and Security, vol. 3, pp. 567-569, 2008. [33] C.Y. Lin and S.F. Chang, 'Semi-fragile watermarking for authenticating JPEG visual content,' in SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol. 3971, San Jose, CA, USA, January 2000. [34] E.T. Lin, I. Christine, B. Podilchuk, and E.J. Delp, 'Detection of image alterations using semi-fragile watermarks,' in Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol. 3971,San Jose, CA, USA, 2000. [35] J. Fridrich, 'A hybrid watermark for tamper detection in digital images,' International Symposium on Signal Processing and Its Applications, vol. 1, pp. 301–304, 1999. [36] P.W. Wong, 'A public key watermark for image verification and authentication,' in Proceedings of the IEEE International Conference on Image Processing , Chicago, IL, pp. 455–459, 1998. [37] Z.M. Lu, C.H. Liu, D.G. Xu, 'Semi-fragile image watermarking method based on index constrained vector quantization', Electron Lett. vol. 39, issue 1, p. 35–36, 2003. [38] Z. Wenyin and F. Y. Shih, 'Semi-fragile spatial watermarking based on local binary pattern operators,' Optics Communications, vol. 284, pp. 3904-3912, 2011. [39] X. Zhang, S. Wang, Z. Qian, and G. Feng, 'Self-embedding watermark with flexible restoration Quality,' In: Journal Multimedia Tools and Applications, vol. 54, pp. 385-395, 2010. [40] X. Zhang and S. Wang, 'Fragile watermarking scheme using a hierarchical mechanism,' In:Signal Processing, vol. 89 , pp. 675-679, 2008. [41] D. Singh, S. Shivani, and S. Agarwal, 'Self-embedding pixel wise fragile watermarking scheme for image authentication,' Intelligent Interactive Technologies and Multimedia, vol. 276, pp. 111-122, 2013. [42] C.-K. Chan and L. M. Cheng, 'Hiding in images by simple LSB substitution,' Pattern Recognition, Vol. 37, Issue 3, pp. 469-474, 2004. [43] R. Z. Wang, C. F. Lin, and J. C. Lin, 'Image Hiding by Optimal LSB Substitution and Genetic Algorithm,' Pattern Recognition, Vol. 34, pp. 671-683, 2001. [44] S. Katzenbeisser and F.A.P. Petitcolas, 'Information Hiding Techniques for Steganography and Digital Watermarking,' Boston: Artech House, pp. 45-47, 2000. [45] C.C. Thin and J.C. Lin, ' A simple and high-hiding capacity method for hiding digit-by-digit data in image based on modulus function,' Pettern Recognition, vol. 36, pp.2875-2281, 2003. [46] R. Schyndel, A. Z. Tirkel, and C. F. Osborne, 'A digital watermark,' Proceeding of 1st IEEE International Conference on Image Processing, vol. 2, pp. 86 - 90, 1994. [47] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, 'Secure spread spectrum watermarking for multimedia,' IEEE Transactions on Image Processing, pp.1673–1687, 1997. [48] R. Liu and T. Tan, 'An SVD-based watermarking scheme for protecting rightful ownership,' IEEE Transactions on Multimedia, vol.4 ,pp. 121-128, 2002. [49] I. Kbaier, and Z. Belhadj, 'A novel content preserving watermarking scheme for multipectral images,' Proceedings of the ICTTA 2006 , Damascus, pp.322~327, 2006. [50] Q. Chen, P. P. Xie, W. J. Ma, W. Y. Wei, and L. H. Ai, 'A digital watermarking algorithm based on characters of the remote-sensing imagery,' International Conference on MASS 2010 , pp.1~4, 2010. [51] I. J. M. Cox, L. Miller, and J. A. Bloom, 'Digital Watermarking,' Morgan Kaufmann, 2002. [52] 王旭正、柯建萱及ICCL(資訊密碼暨資料建構實驗室),資訊媒體安全-偽裝學與數位浮水印,博碩文化出版社,2007年。 [53] 呂慈純、陸哲明及張真誠,多媒體安全技術,全華圖書股份有限公司,2007年。
摘要: In this thesis, we propose an overall image authentication scheme including two parts: one is authenticating codes automatically self-generated and self-embedded mechanism, the other is tamper region localization. In this scheme, the authentication codes are generated based on the edge feature of the image and are reused to be embedded into the LSBs of the same image. A Pseudo-Random Number Generators as a secret key is applied to generate a random sequence for the sake of embedding positions. In order to higher the correctness of tamper area identification, duplicate codes for authenticating are scattered according to the order of random sequence and then are embedded into the image. In addition, at the extraction stage the threshold is set to adjust positioning accuracy of tampered area. This consecutive process can easily identify illegally image tampering, and more efficiently mark out tampered areas. Because the authentication codes are hidden into the LSBs, embedded image still retains the very high image quality. Lastly, in our several experiments, some common image processing attacks are applied for verifying scheme feasibility, and the results show that the scheme of this thesis has great friability and high fidelity for the main demands of image authentication purpose.
在本文中我們提出了一個整體影像的認證方案,包括兩部分:一是驗證碼自動自我生成及自我嵌入機制,另一個是竄改區域定位。在本文方法中,認證碼是以影像的邊緣資訊做為特徵值而產生並嵌入到原始影像的最低有效位元(LSB)中。以一個虛擬亂數產生器為秘密金鑰來產生隨機序列作為嵌入的位置。為了提高竄改區域識別的正確性,將認證碼根據隨機序列的順序重複藏入影像中,此外,在擷取階段透過門檻值的設定來調整竄改區域定位的準確度。這連續的過程可以很容易地識別出非法的影像竄改,並更有效地標示出被竄改區域。由於認證碼是藏入在最低有效位元(LSB),所以藏入後的影像仍保有良好的影像品質。最後,在我們的多次實驗中,利用一些常見的影像處理攻擊來驗證本文方法的可行性,結果顯示,本文方法具有很高的易碎性和保真度。
URI: http://hdl.handle.net/11455/92931
其他識別: U0005-2801201510234000
文章公開時間: 2015-01-29
Appears in Collections:資訊管理學系

文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.