Source: IEEE Transactions on Multimedia, Vol. 5, No

Slides:



Advertisements
Similar presentations
H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías.
Advertisements

Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Source: Pattern Recognition, Vol. 41, Issue 2,
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
An Efficient and Anonymous Buyer- Seller Watermarking Protocol C. L. Lei, P. L. Yu, P. L. Tsai and M. H. Chan, IEEE Transactions on Image Processing, VOL.
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
Kyle Wesson, Mark Rothlisberger, and Todd Humphreys
FRIP: A Region-Based Image Retrieval Tool Using Automatic Image Segmentation and Stepwise Boolean AND Matching IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7,
A public fragile watermarking scheme for 3D model authentication Chang-Min Chou, Din-Chang Tseng Computer-Aided Design Vol. 38 (Nov. 2006) 1154–1165 Reporter:
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
Multiple Image Watermarking Applied to Health Information Management
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,
Tamper Resistant Software: An Implementation By David Aucsmith, IAL In Information Hiding Workshop, RJ Anderson (ed), LNCS, 1174, pp , “Integrity.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang
1 Marco Carli VPQM /01/2007 ON BETWEEN-COEFFICIENT CONTRAST MASKING OF DCT BASIS FUNCTIONS Nikolay Ponomarenko (*), Flavia Silvestri(**), Karen.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
Watermarking Scheme Capable of Resisting Sensitivity Attack
PERFORMANCE ANALYSIS OF VISUALLY LOSSLESS IMAGE COMPRESSION
(k, n)-Image Reversible Data Hiding
Vishal Monga and Prof. Brian L. Evans
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Technical Aspects of Digital Rights Management
Der-Chyuan Lou and Jiang-Lung Liu,
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Vishal Monga, Divyanshu Vats and Brian L. Evans
Image camouflage by reversible image transformation
Watermarking for Image Authentication ( Fragile Watermarking )
Source: Mobile Information Systems, vol. 2017, 2017.
QR Code Authentication with Embedded Message Authentication Code
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
2018/7/28 GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid Authors: Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
Cocktail Watermarking for Digital Image Protection
A message-based cocktail watermarking system
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Reversible Data Hiding in JPEG Images
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Digital Watermarking for Image Authentication with Localization
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
Blind Reversible Authentication Based on PEE and CS Reconstruction
Source: IEEE Transactions on Circuits and Systems,
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Secret image sharing with steganography and authentication
Ming-Shi Wang *, Wei-Che Chen 11 November 2006 present: 沈雅楓
Using Association Rules as Texture features
Hidden Digital Watermarks in Images
Source : Digital Signal Processing. Vol. 73, pp , Feb
Source: Circuits and Systems for Video Technology,
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme Source: IEEE Transactions on Multimedia, Vol. 5, No. 2, pp. 161-173, 2003 Authors: Chun-Shien Lu and Hong-Yuan Mark Liao Reporter: Jen-Bang Feng

Outline Digital Signature Scenarios During the Authentication Process SDS Based on Interscale Relation of Wavelet Coefficients Ex. Results Discussions Conclusions

Examples of Digital Signature

Possible Scenarios During the Authentication Process

Parent-children Pair

Structural Digital Signature (SDS) Parent-children pair in Wavelet Trans. SDS(I): 0 <= i,j <= 1, o is the position index

Structural Digital Signature (SDS) Symbol I: p > 0, c > 0 Symbol II: p > 0, c < 0 Symbol III: p < 0, c > 0 Symbol IV: p < 0, c < 0 Record the Symbols as the signature

Verification Completeness of SDS:

Ex. Results 22~4 scales when σ = 256 22~4 scales when σ = 128

Ex. Results 22~4 scales when σ = 256 22~4 scales when σ = 128

Ex. Results

Ex. Results

Ex. Results

Discussions Num. of scales Complexity False Positive & False Negative Relation between σ and robustness Relation between σ and sensitivity If image intensity is changed If the selected parent-children pair are known and changed

Conclusions Threshold value determines the size of the authentication message. Malicious tampering is distinguished from incidental modifications. Tampered regions are localized. The recovery of the tampered region is not provided.