A New Method for Tamper Detection and Recovery

Slides:



Advertisements
Similar presentations
Cyclic Code.
Advertisements

Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
5 Qubits Error Correcting Shor’s code uses 9 qubits to encode 1 qubit, but more efficient codes exist. Given our error model where errors can be any of.
Paul Blythe and Jessica Fridrich Secure Digital Camera.
Image and Video Compression
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
Basic Concepts of Encoding Codes and Error Correction 1.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
1 Transform Domain Fragile Image Watermark Prof. Ja-Ling Wu Graduate Institute of Networking and Multimedia Dept. of Computer Science and Information Engineering.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Robust Data Hiding for MCLT Based Acoustic Data Transmission
High Capacity Data Embedding in JPEG Bit Streams Using Visual Models
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
K. ZEBBICHE , F. KHELIFI and A. BOURIDANE
Data Mining and Its Applications to Image Processing
Chapter 3 向量量化編碼法.
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Basic Concepts of Audio Watermarking
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Steganography with Digital Images
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Source :Journal of visual Communication and Image Representation
Chair Professor Chin-Chen Chang Feng Chia University
High-capacity image hiding scheme based on vector quantization
A Data Hiding Scheme Based Upon Block Truncation Coding
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
A Study of Digital Image Coding and Retrieving Techniques
Parag Agarwal Digital Watermarking Parag Agarwal
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Image Coding and Compression
第 四 章 VQ 加速運算與編碼表壓縮 4-.
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Dynamic embedding strategy of VQ-based information hiding approach
Chair Professor Chin-Chen Chang Feng Chia University
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Digital Steganography Utilizing Features of JPEG Images
Partial reversible data hiding scheme using (7, 4) hamming code
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
第 十 章 隱像術.
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
EarthTour Presentations
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Partial reversible data hiding scheme using (7, 4) hamming code
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
A Data Hiding Scheme Based Upon Block Truncation Coding
Predictive Grayscale Image Coding Scheme Using VQ and BTC
資訊偽裝術 張真誠 講座教授 多媒體暨網路安全實驗室
Department of Computer Science, University of Central Florida ,Orlando
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
A Quadratic-Residue-based Fragile Watermarking Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

A New Method for Tamper Detection and Recovery Speaker : Kuo-Lung Hung (洪國龍) Date : 2001.01.18

Problem Definition The definition of tampered detection and recovery When somebody modified an specific image, the technique that can detect the tamper, and, moreover, can recover the modification.

Requirement Effectiveness: Differentiation: Security: Recoverability: Provide a very high probability of tamper detection. Can distinguish between an innocent adjustment and replacing or adding features. Provide the security mechanism; only a selected group of people sharing a secret key should perform the detection. Can recover back to the correct image from the modification.

Previous Work Problem The security is not enough. Using the indices of the codewords of size 16(for detection) and the low-bit rate compressed image, namely the indices of the codewords of size 256 (for recovery) as the watermark. To hide the watermark to the middle-frequency DCT coefficient. The detection codewords of a block are hiding in the itself block, and its recovery codewords are hiding in the randomly selected block. Problem The security is not enough. The number of hiding bits is too many (= 32 bits/per block). Therefore, the method can not endure some image adjustment operations.

The proposed method Three techniques employed by our method: Watermark Generating Watermark Embedding Tamper Detecting and Recovering

Watermark Generating 8 Divide the image into 88 blocks. Divide a block into 44 sub-blocks. 4 45 48 50 47 53 52 55 51 46 80 78 60 65 85 90 Calculate the mean values of the sub-blocks of a block to form a 4-dimensional vector.

Watermark Generating (cont.) Use these vectors to generate local codebook of size 512. 40,50,50,48 50,50,50,55 1 2 3 . 511 Perform the pseudo-gray coding upon the codebook. 50,50,50,55 1 2 3 40,50,50,48 . 511 After pseudo-gray coding The codebook is used to encode the vector of each block, and some indices are obtained. Use the RS coding to encode the codewords of the codebook. (for error correction) Watermark = the indices + checksums of the indices +the RS-encoded codewords  16 bit/per block

Image Adjustment Before Embedding The distortion exists between the mean value of each sub-block and the value after VQ decoding. 50 40 45 35 the value after VQ decoding : 48 Motivation Image adjustment Calculate the mean value of each sub-block. the mean value : 45 Subtract the mean value and add the value after VQ decoding to each pixel. 53 43 48 38

Watermark Embedding DCT coefficients 1 2 6 7 15 16 28 29 1 2 6 7 15 16 28 29 3 5 8 14 17 27 30 43 4 9 13 18 26 31 42 44 10 12 19 25 32 41 45 54 11 20 24 33 40 46 53 55 21 23 34 39 47 52 56 61 22 35 38 48 51 57 60 62 36 37 49 50 58 59 63 64 Randomly hide the scrambled watermark to the middle-frequency DCT coefficients of each block. DCT coefficients Totally scramble the watermark.

Watermark Embedding (cont.) =2 Example: Bit hiding mj H(mj,wj) = 4 4+2  if wj=1, Mj+2  4 if wj=0, H(mj,1) = (mj / 8)  8 + 4 H(mj,0) = ((mj +4)/ 8)  8 eg. H(0,1)->4, H(6,1)-> 4, H(10,1)->12 where   1 is the adjusting magnitude. eg. H(0,0)->0, H(6,0)-> 8, H(10,0)->8 Bit extracting E(mj) = 1 otherwise. 0 if ((mj+) mod 4 ) < 2 ,

Detection and Recovery Use the bit extracting function to extract the hided watermark. Since the extracted watermark might have some errors, the error correction technique needs performed upon the watermark. According to the extracted watermark, the hided mean value Mi of each sub-block could be obtained. Calculate the mean value Mj of the sub-block that might have been tampered with. Therefore, tampered if Abs(Mi - Mj) > threshold, not tampered otherwise. the block is:

The Demo

Remarks The proposed tamper proofing technique can securely and effectively detect and recover the image that tampered with. Compare to previous work, the security is enhanced, moreover, the proposed technique can distinguish between an innocent adjustment and intentional modification. The image adjustment may loss some image quality. If the range of the modification is large, the detection has some false drops. To alleviate the problem of (3) and (4) is the future work.