Please use this identifier to cite or link to this item:
標題: A Study of Image Authentication Technique by Applying Fixed Point of Regular Stochastic Matrix on DCT
作者: 劉耕孜
Ken-Tzu Liu
關鍵字: Discrete cosine transform
Image authentication
JPEG compression
Markov chain
Tamper detection
引用: [1] C. Rey and J.-L. Dugelay, 'A survey of watermarking algorithms for image authentication,' EURASIP Journal on Applied Signal Processing, vol. 2002, pp. 613-621, 2002. [2] C.-Y. Lin and S.-F. Chang, 'A robust Image authentication method distinguishing JPEG compression from malicious manipulation,' Circuits and Systems for Video Technology, IEEE Transactions on, vol. 11, pp. 153-168, 2001. [3] L. Dong, X. Kong, B. Wang, and X. g. You, 'A robust JPEG image tampering detection method using GLCM features,' Advances in Information Sciences and Service Sciences, vol. 3, pp. 384-391, 2011. [4] M. I. Khan and V. Jeoti, 'A blind watermarking scheme using bitplane of DC component for JPEG Compressed images,' in Emerging Technologies (ICET), 2010 6th International Conference on, pp. 150-154, 2010. [5] S. D. Lin, S.-C. Shie, and J. Y. Guo, 'Improving the robustness of DCT-based image watermarking against JPEG compression,' in Consumer Electronics, 2005. ICCE. 2005 Digest of Technical Papers. International Conference on, pp. 343-344, 2005. [6] J. C. Patra, J. E. Phua, and C. Bornand, 'A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression,' Digital Signal Processing, vol. 20, pp. 1597-1611, Dec 2010. [7] Y. Huo, H. He, and F. Chen, 'Alterable-capacity fragile watermarking scheme with restoration capability,' Optics Communications, vol. 285, pp. 1759-1766, 2012. [8] P. W. Wong and N. Memon, 'Secret and public key image watermarking schemes for image authentication and ownership verification,' Image Processing, IEEE Transactions on, vol. 10, pp. 1593-1601, 2001. [9] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, 'Information hiding-a survey,' Proceedings of the IEEE, vol. 87, pp. 1062-1078, 1999. [10] F. Deguillaume, S. Voloshynovskiy, and T. Pun, 'Secure hybrid robust watermarking resistant against tampering and copy attack,' Signal Processing, vol. 83, pp. 2133-2170, 2003. [11] B. Gunsel, U. Uludag, and A. Murat Tekalp, 'Robust watermarking of fingerprint images,' Pattern Recognition, vol. 35, pp. 2739-2747, 2002. [12] W.-Y. Chen and C.-H. Chen, 'A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection,' Pattern Recognition, vol. 38, pp. 587-598, 2005. [13] H. Hsiang-Cheh, W. Feng-Hsing, and P. Jeng-Shyang, 'Efficient and robust watermarking algorithm with vector quantisation,' Electronics Letters, vol. 37, pp. 826-828, 2001. [14] M. U. Celik, G. Sharma, and A. M. Tekalp, 'Lossless watermarking for image authentication: A new framework and an implementation,' Ieee Transactions on Image Processing, vol. 15, pp. 1042-1049, Apr 2006. [15] S.-L. Hsieh, P.-D. Wu, I. J. Tsai, and B.-Y. Huang, 'A recoverable semi-fragile watermarking scheme using cosine transform and adaptive median filter,' Lecture Notes in Computer Science, vol. 5060, pp. 629-640, 2008. [16] R. O. Preda, 'Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain,' Measurement, vol. 46, pp. 367-373, 1/ 2013. [17] Z. Wenyin and F. Y. Shih, 'Semi-fragile spatial watermarking based on local binary pattern operators,' Optics Communications, vol. 284, pp. 3904-3912, 8/1/ 2011. [18] P. Sidiropoulos, N. Nikolaidis, and I. Pitas, 'Invertible chaotic fragile watermarking for robust image authentication,' Chaos, Solitons & Fractals, vol. 42, pp. 2667-2674, 2009. [19] F. Di Martino and S. Sessa, 'Fragile watermarking tamper detection with images compressed by fuzzy transform,' Information Sciences, vol. 195, pp. 62-90, 2012. [20] C.-S. Chan, 'An image authentication method by applying Hamming code on rearranged bits,' Pattern Recognition Letters, vol. 32, pp. 1679-1690, 2011. [21] A. Haouzia and R. Noumeir, 'Methods for image authentication: a survey,' Multimedia Tools Appl., vol. 39, pp. 1-46, 2008. [22] R. Tiwari, S. Buse, and C. Herstatt, 'Mobile Banking as Business Strategy: Impact of Mobile Technologies on Customer Behaviour and Its Implications for Banks,' in Technology Management for the Global Future, 2006. PICMET 2006, 2006, pp. 1935-1946. [23] P. Chuchaisri and R. E. Newman, 'Multi-resolution elliptic curve digital signature,' in Local Computer Networks (LCN), 2012 IEEE 37th Conference on, pp. 93-101, 2012. [24] B.-j. Gao and M. Du, 'A Binary Text Image Authentication Algorithm Based on Short Digital Signature,' in Photonics and Optoelectronic (SOPO), 2010 Symposium on, 2010, pp. 1-6. [25] R. Saadi, J. M. Pierson, and L. Brunie, 'Morph Digital Signature A New Signature Framework for e-Documents in Pervasive Environments,' in Pervasive Services, IEEE International Conference on, pp. 185-188, 2007. [26] R. Kaur and A. Kaur, 'Digital Signature,' in Computing Sciences (ICCS), 2012 International Conference on, pp. 295-301, 2012. [27] T. Y. Lee and S. F. D. Lin, 'Dual watermark for image tamper detection and recovery,' Pattern Recognition, vol. 41, pp. 3497-3506, Nov 2008. [28] C.-W. Yang and J.-J. Shen, 'Recover the tampered image based on VQ indexing,' Signal Process., vol. 90, pp. 331-343, 2010. [29] P. L. Lin, C.-K. Hsieh, and P.-W. Huang, 'A hierarchical digital watermarking method for image tamper detection and recovery,' Pattern Recognition, vol. 38, pp. 2519-2529, 2005. [30] C.-C. Chang, Y.-S. Hu, and T.-C. Lu, 'A watermarking-based image ownership and tampering authentication scheme,' Pattern Recognition Letters, vol. 27, pp. 439-446, 2006. [31] G. K. Wallace, 'The JPEG still picture compression standard,' Consumer Electronics, IEEE Transactions on, vol. 38, pp. xviii-xxxiv, 1992. [32] D. Singh, S. Shivani, and S. Agarwal, 'Self-embedding Pixel Wise Fragile Watermarking Scheme for Image Authentication,' in Intelligent Interactive Technologies and Multimedia. vol. 276, A. Agrawal, R. C. Tripathi, E.-L. Do, and M. D. Tiwari, Eds., ed: Springer Berlin Heidelberg, 2013, pp. 111-122. [33] S. Jau-Ji and H. Wei-Cheng, 'The First Robust Image Tamper Detection Scheme under Brightness,' in Genetic and Evolutionary Computing (ICGEC), 2011 Fifth International Conference on, pp. 200-203, 2011. [34] J.-J. Shen and P.-W. Hsu, 'A robust associative watermarking technique based on similarity diagrams,' Pattern Recognition, vol. 40, pp. 1355-1367, 2007. [35] J. Dittmann, A. Steinmetz, and R. Steinmetz, 'Content-based digital signature for motion pictures authentication and content-fragile watermarking,' in Multimedia Computing and Systems, 1999. IEEE International Conference on, pp. 209-213 vol.2, 1999. [36] N. Zhicheng, Y. Q. Shi, N. Ansari, and S. Wei, 'Reversible data hiding,' in Circuits and Systems, 2003. ISCAS '03. Proceedings of the 2003 International Symposium on, pp. II-912-II-915 vol.2, 2003. [37] T. Jun, 'Reversible data embedding using a difference expansion,' Circuits and Systems for Video Technology, IEEE Transactions on, vol. 13, pp. 890-896, 2003. [38] P. G. Hoel, S. C. Port, and C. J. Stone, Introduction to stochastic processes: Houghton Mifflin, 1972. [39] N. Ahmed, T. Natarajan, and K. R. Rao, 'Discrete Cosine Transform,' Computers, IEEE Transactions on, vol. C-23, pp. 90-93, 1974. [40] A. G. Marrugo, M. S. Millan, G. Cristobal, S. Gabarda, and H. C. Abril, 'Anisotropy-based robust focus measure for non-mydriatic retinal imaging,' Journal of Biomedical Optics, vol. 17, pp. 0760211-0760219, 2012. [41] J.-J. Shen and W.-C. Huang, 'A novel image authentication technique based on fixed point of regular stochastic matrix,' in Proceedings of the IASTED International Conference on Computational Photography, CPhoto 2011, Vancouver, BC, Canada, pp. 138-143, 2011.
摘要: In this paper, we propose a novel method of robust, high accuracy image tampering detection. By using the idea of fixed points extracted from a DCT (Discrete Cosine Transform) coefficient matrix from the field of stochastic matrices, we can modify this fixed point and render it an image's authentication code. The authentication code can be used to detect tampering and locate the suspected region under our cross-examination procedure. Moreover, when the image is modified, even by slight brightness adjustment and widely used, lossy JPEG compression, our method is significantly good at detecting the tampered image regions. In this experiment, the results show that our proposed method is able to detect and locate the tampered image regions precisely and robustly against brightness adjustments and the JPEG compressions. Our method works quite well even when the watermarked image has been JPEG-compressed twice. Besides, a new idea of digital document authentication is proposed. We apply the characteristics of the Markov chain to document authentication. This concept which combines document authentication and image processing is able to authenticate the document and also remain the same document size.
在本論文中,我們提出一個新穎的方法,利用馬可夫鏈的概念從DCT(Discrete Cosine Transform)係數矩陣中產生特徵值,並加以修改後當成是影像的認證碼,接著利用這些認證碼在我們特別設計的兩階段式檢查機制下,能有效的偵測出遭到竄改的區域。本文提出的方法不僅能察覺到影像被竄改,更能標示出遭到竄改的區域。此外亦針對在實際應用中的情境,即使影像經過些微的亮度調整或失真壓縮,也能順利地標示出遭到竄改的區域。我們在實驗中利用一些常見的攻擊方式來測驗我們的方法。同時,我們也顯示在亮度調整及失真壓縮下的結果,此外在論文中也進一步討論兩次失真壓縮的問題,而在亮度調整及失真壓縮下的認證結果,顯示此影像驗證方法能準確標示出竄改區,而且具有很好的強韌性。另外,我們將馬可夫鏈之特性應用於文件認證之上。結合文字檔案與影像處理的概念,在不需要增加檔案尺寸的前提之下達到文件認證和找出被修改過之文字。
其他識別: U0005-0707201402250000
文章公開時間: 10000-01-01
Appears in Collections:資訊管理學系



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.