Please use this identifier to cite or link to this item:
標題: An Edge-based Light-weight Image Authentication Coding Scheme
作者: 莊惠菁
Hui-Ching Chuang
關鍵字: Edge Detection
Image Authentication
Tamper Detection
引用: [1] C. Rey and J.-L. Dugelay, 'A Survey of Watermarking Algorithms for Image Authentication,' EURASIP Journal on Applied Signal Processing ,vol. 2002, pp. 613-621, 2002. [2] L.Dong, X. Kong, B. Wang, and X.g. You, 'A robust JPEG image tampering detection method using GLCM features,' Advances in Information Sciences and Service Sciences, vol. 3, pp. 348-391, 2011. [3] C.-Y. Lin and S.-F. Chang, 'A robust image authentication method distinguishing JPEG compression from malicious manipulation,' Circuits and System for Video Technology, IEEE Transaction on, vol. 11, pp. 53–168, 2001. [4] J.C. Patra, J.E. Phua, and C. Bornand, 'A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression,' Digital Signal Processing, vol. 20, pp. 1597-1611, Dec 2010. [5] M.I. Khan and V. Jeoti, 'A blind watermarking scheme using bitplane of DC component for JPEG Compressed images,' in Emerging Technologies(ICET),2010 6th International Conference on, pp. 150-154, 2010. [6] S.D. Lin, S.-C. Shie, and J.Y. Guo, 'Improving the robustness of DCT-based image watermarking against JPEG compression,' in Consumer Electronics, 2005. ICCE. 2005 Digest of Technical Papers. International Conference, pp. 343-344, 2005. [7] Y. Huo, H. He, and F. Chen, 'Alterable-capacity fragile watermarking scheme with restoration capability,' Optics Communications, vol. 285, pp. 1759-1766, 2012. [8] P.W. Wong and N. Memon, 'Secret and public key image watermarking schemes for image authentication and ownership verification,' Image Process, IEEE Transaction on, vol. 10, pp. 1593–1601, 2001. [9] C. H. Tzeng and W. H. Tsai, 'A combined approach to integrity protection and verification of palette images using fragile watermarking and digital signatures,' IEICE Transactions on Fundamentals, vol. E87-A, pp. 1612-1619, 2004. [10] D. Lou, and J. Liu, 'Fault resilient and compression tolerant digital signature for image authentication,' IEEE Transactions on Consumer Electronics, vol. 46, pp. 31-39, 2000. [11] R. Safabakhsh, S. Zaboli, and A. Tabibiazar, 'Digital watermarking on still images using wavelet transform,' in Proceedings of International Conference on Information Technology: Coding and Computing, vol. 1, pp. 671–675, 2004. [12] F.A.P. Petitcolas, R.J Anderson, and M.G. Kuhn,'Information hiding-a survey,' Proceedings of the IEEE, vol. 87, pp. 1062-1078, 1999. [13] F. Deguillaume, S. Voloshynovskiy, and T. Pun, 'Secure hybrid robust watermarking resistant against tampering and copy attack,' Signal Processing, vol. 83, pp. 21133-2170, 2003. [14] H.C. Huang, F.H. Wang, and J.S. Pan, 'Efficient and robust watermarking algorithm with vector quantization,' Electronics Letters, vol. 37,Issue 13, pp. 826–828, 2001. [15] W.Y. Chen and C.H. Chen,'A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection,' Pattern Recognition, vol. 38, Issue 4, pp. 587–598, 2005. [16] N. Nikolaidis, I. Pitas, 'Robust image watermarking in the spatial domain,' Signal Process., vol. 66, Issue 3, pp. 385–403, 1988. [17] X. Kang, J. Huang, Y.Q. Shi, and Y. Lin, 'A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,' IEEE Trans. Circuits Syst. Video Technol., vol. 13, Issue 8, p.776-786, 2003. [18] C.-S. Chan, 'An image authentication method by applying Hamming code on rearranged bits,' Pattern Recognition Letters, vol. 32, pp. 1679-1690, 2011. [19] F.D. Martino and S. Sessa, 'Fragile watermarking tamper detection with images compressed by fuzzy transform,' Information Sciences, vol. 195, pp. 62-90, 2012. [20] P. Sidiropoulos, N. Nikolaidis, and I. Pitas, 'Invertible chaotic fragile watermarking for robust image authentication,' Chaos, Solitons & Fractals, vol. 42, pp. 2667-2674, 2009. [21] M.U. Celik, G. Sharma, E. Saber, and A.M. Tekalp, 'Hierarchical water-marking for secure image authentication with localization,' IEEE Trans. Image Process., vol. 11, issue 6, p.585–594, 2002. [22] M.U. Celik, G. Sharma, and A.M. Tekalp, 'Loss less watermarking for image authentication: a new framework and an implementation,' IEEE Trans. Image Process., vol. 15, issue 4, p.1042–1049, 2006. [23] J. Fridrich, 'Image watermarking for tamper detection,' in:Proceed- ings of the IEEE International Conferenceon Image Processing,' vol. II, Chicago, IL, USA, pp. 404–408, 1998. [24] J. Fridrich, M. Goljan, and A.C. Baldoza, 'New fragile authentication Watermark for images,' in: Proceedings of the IEEE International Conference on Image Processing, Vancouver, BC, Canada, pp. 10–13, 2000. [25] E. T. Lin and E. J. Delp, 'A review of Fragile Watermarking,' Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN 47907-2086, 2001. [26] S. Shivani, A. K. Patel, S. Kamble, and S. Agarwal, 'An effective pixel-wise fragile watermarking scheme based on ARA bits,' In: International Conference on Communication, Computing & Security (ICCCS '11), pp. 221-226, 2011. [27] S. Che, B. Ma, and Z. Che, 'An adaptive and fragile image watermarking algorithm based on composite chaotic iterative dynamic system,' In: Intelligent Information Hiding and Multimedia Signal Processing, IEEE, IIHMSP'08 , pp. 159-162 , 2008. [28] Y. Z. He and Z. Han, ' A fragile watermarking scheme with pixel-wise alteration localization,' In: 9th International Conference on Signal Processing,. ICSP 2008, pp. 2201-2204, 2008. [29] Y. Lim, C. Xu, and D. D. Feng, 'Web based Image Authentication Using Invisible Fragile Watermark,' In: Australian Computer Society, Inc., 2002. [30] H. He, J. Zhang, and F.Chen, 'Block-wise Fragile Watermarking Scheme Based on Scramble Encryption,' In: Bio-Inspired Computing: Theories and Applications., pp. 216-220, 2007. [31] J. R. Hernandez, M. Amado, and F. Perez-Gonzalez, 'DCT-domain watermarking techniques for still images: detector performance analysis and a new structure,' In: IEEE Transactions on Image Processing, vol. 9, pp. 55-68, 2000. [32] A.T.S. Ho, X. Zhu, J. Shen, and P. Marziliano, 'Fragile Watermarking Based on Encoding of the Zeroes of the z-Transform.' In: IEEE Transactions on Information Forensics and Security, vol. 3, pp. 567-569, 2008. [33] C.Y. Lin and S.F. Chang, 'Semi-fragile watermarking for authenticating JPEG visual content,' in SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol. 3971, San Jose, CA, USA, January 2000. [34] E.T. Lin, I. Christine, B. Podilchuk, and E.J. Delp, 'Detection of image alterations using semi-fragile watermarks,' in Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol. 3971,San Jose, CA, USA, 2000. [35] J. Fridrich, 'A hybrid watermark for tamper detection in digital images,' International Symposium on Signal Processing and Its Applications, vol. 1, pp. 301–304, 1999. [36] P.W. Wong, 'A public key watermark for image verification and authentication,' in Proceedings of the IEEE International Conference on Image Processing , Chicago, IL, pp. 455–459, 1998. [37] Z.M. Lu, C.H. Liu, D.G. Xu, 'Semi-fragile image watermarking method based on index constrained vector quantization', Electron Lett. vol. 39, issue 1, p. 35–36, 2003. [38] Z. Wenyin and F. Y. Shih, 'Semi-fragile spatial watermarking based on local binary pattern operators,' Optics Communications, vol. 284, pp. 3904-3912, 2011. [39] X. Zhang, S. Wang, Z. Qian, and G. Feng, 'Self-embedding watermark with flexible restoration Quality,' In: Journal Multimedia Tools and Applications, vol. 54, pp. 385-395, 2010. [40] X. Zhang and S. Wang, 'Fragile watermarking scheme using a hierarchical mechanism,' In:Signal Processing, vol. 89 , pp. 675-679, 2008. [41] D. Singh, S. Shivani, and S. Agarwal, 'Self-embedding pixel wise fragile watermarking scheme for image authentication,' Intelligent Interactive Technologies and Multimedia, vol. 276, pp. 111-122, 2013. [42] C.-K. Chan and L. M. Cheng, 'Hiding in images by simple LSB substitution,' Pattern Recognition, Vol. 37, Issue 3, pp. 469-474, 2004. [43] R. Z. Wang, C. F. Lin, and J. C. Lin, 'Image Hiding by Optimal LSB Substitution and Genetic Algorithm,' Pattern Recognition, Vol. 34, pp. 671-683, 2001. [44] S. Katzenbeisser and F.A.P. Petitcolas, 'Information Hiding Techniques for Steganography and Digital Watermarking,' Boston: Artech House, pp. 45-47, 2000. [45] C.C. Thin and J.C. Lin, ' A simple and high-hiding capacity method for hiding digit-by-digit data in image based on modulus function,' Pettern Recognition, vol. 36, pp.2875-2281, 2003. [46] R. Schyndel, A. Z. Tirkel, and C. F. Osborne, 'A digital watermark,' Proceeding of 1st IEEE International Conference on Image Processing, vol. 2, pp. 86 - 90, 1994. [47] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, 'Secure spread spectrum watermarking for multimedia,' IEEE Transactions on Image Processing, pp.1673–1687, 1997. [48] R. Liu and T. Tan, 'An SVD-based watermarking scheme for protecting rightful ownership,' IEEE Transactions on Multimedia, vol.4 ,pp. 121-128, 2002. [49] I. Kbaier, and Z. Belhadj, 'A novel content preserving watermarking scheme for multipectral images,' Proceedings of the ICTTA 2006 , Damascus, pp.322~327, 2006. [50] Q. Chen, P. P. Xie, W. J. Ma, W. Y. Wei, and L. H. Ai, 'A digital watermarking algorithm based on characters of the remote-sensing imagery,' International Conference on MASS 2010 , pp.1~4, 2010. [51] I. J. M. Cox, L. Miller, and J. A. Bloom, 'Digital Watermarking,' Morgan Kaufmann, 2002. [52] 王旭正、柯建萱及ICCL(資訊密碼暨資料建構實驗室),資訊媒體安全-偽裝學與數位浮水印,博碩文化出版社,2007年。 [53] 呂慈純、陸哲明及張真誠,多媒體安全技術,全華圖書股份有限公司,2007年。
摘要: In this thesis, we propose an overall image authentication scheme including two parts: one is authenticating codes automatically self-generated and self-embedded mechanism, the other is tamper region localization. In this scheme, the authentication codes are generated based on the edge feature of the image and are reused to be embedded into the LSBs of the same image. A Pseudo-Random Number Generators as a secret key is applied to generate a random sequence for the sake of embedding positions. In order to higher the correctness of tamper area identification, duplicate codes for authenticating are scattered according to the order of random sequence and then are embedded into the image. In addition, at the extraction stage the threshold is set to adjust positioning accuracy of tampered area. This consecutive process can easily identify illegally image tampering, and more efficiently mark out tampered areas. Because the authentication codes are hidden into the LSBs, embedded image still retains the very high image quality. Lastly, in our several experiments, some common image processing attacks are applied for verifying scheme feasibility, and the results show that the scheme of this thesis has great friability and high fidelity for the main demands of image authentication purpose.
其他識別: U0005-2801201510234000
文章公開時間: 2015-01-29
Appears in Collections:資訊管理學系



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.