Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Source: Pattern Recognition, Vol. 41, Issue 2,

Slides:



Advertisements
Similar presentations
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
1 Self-Recovery Fragile Watermarking Scheme with Variable Watermark Payload Fan Chen, Hong-Jie He, Yaoran Huo, Hongxia Wang Southwest Jiaotong University,
1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
Watermarking Techniques Digital Rights Seminar © April 28, 2006 Mahmoud El-Gayyar.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
1 An ID-based multisignature scheme without reblocking and predetermined signing order Chin-Chen Chang, Iuon-Chang Lin, and Kwok-Yan Lam Computer Standards.
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Watermarking Text Document Images Using Edge Direction Histograms Young-Won Kim and Il-Seok Oh Pattern Recognition Letters, Vol. 25, 2004, pp – 1251.
Lossless Watermarking for Image Authentication: A New Framework and an Implementation IEEE TRANSACTIONS ON IMAGE PROCESSING APRIL 2006 C.M.Chen.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Data hiding in Least Significant Bit (LSB) Speaker: Feng Jen-Bang ( 馮振邦 )
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform Source : IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 8,
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Data Hiding in a Kind of PDF Texts for Secret Communication Authors : S.P. Zhong, X.Q. Cheng, and T.R. Chen Source : International Journal of Network Security,
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
International Journal of Smart Home Vol.7, No.5 (2013), pp Digital Watermarking for Image Tamper Detection.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
Watermarking Scheme Capable of Resisting Sensitivity Attack
A secure and traceable E-DRM system based on mobile device
Der-Chyuan Lou and Jiang-Lung Liu,
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
2003/04/291 Hiding data in images by optimal moderately- significant-bit replacement Wang, Ran-Zan, Lin, Chi-Fang, and Lin, Ja-Chen, IEE Electronics Letters,
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source :Journal of visual Communication and Image Representation
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
High-capacity image hiding scheme based on vector quantization
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
High Capacity Data Hiding for Grayscale Images
A new chaotic algorithm for image encryption
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
J. Byun et al. In Secure Data Management, LNCS 4165,
Secret image sharing with steganography and authentication
Ming-Shi Wang *, Wei-Che Chen 11 November 2006 present: 沈雅楓
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
An imperceptible spatial domain color image watermarking scheme
Hidden Digital Watermarks in Images
Source : Digital Signal Processing. Vol. 73, pp , Feb
Improvements of Image Sharing with Steganography and Authentication
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Reversible data hiding in encrypted binary images by pixel prediction
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Source: Pattern Recognition, Vol. 41, Issue 2, Feb. 2008, pp Authors: Chin-Chen Chang,Yi-Hsuan Fan, and Wei-Liang Tai Reporter: 陳德祐 Date: 2008/10/31

2 Outline Introduction A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery  Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang, Pattern Recognition, Vol. 38, Issue 11, 2005 The Proposed attacks  The four-scanning attack  The blind attack Experimental Results Conclusions Comments

3 Introduction Received ImageDelivered Image

4 Preparation~ block mapping Non-overlapping blocks of 4 × 4 pixels A block-mapping sequence A → B → C → D →· · ·→A X' = [f (X) = (k × X) mod N] + 1 X ', X : the block number ( ∈ [0,N −1]) k : a secret key (a prime and ∈ [0,N − 1]) N : the total number of blocks in the image ( ∈ Z − {0}) The original block The look up table X '=13 × X mod 64 +1

Watermark Embedding (1/2) avg_B=(I 1 +I 2 + … +I 16 )/16 avg_B s =(I 1 +I 2 +I 3 +I 4 )/4 Block B Block A avg_A s =(I 1 +I 2 +I 3 +I 4 )/4 a1a1 a2a2 a3a3 a4a4 a5a5 a6a6 a7a7 a8a8 r v, p of B (Set 2 LSBs of each pixel to zero) Watermark: v, p, r Block mapping A → B (secret key k ) num : the total # of 1’s in the six MSBs of avg_Bs

6 Watermark Embedding (2/2) Block A Block B avg_A s =( )/4=55=( ) 2 avg_B s =( )/4=53=( ) 2 avg_B=( … +164)/16=97 r = v=0, p= Block mapping A → B (secret key k) num : the total # of 1’s in the six MSBs of avg_Bs

7 Hierarchical Tamper Detection (1/3) avg_B ’ s =( )/4=53 (= ) avg_B ’ =( … +164)/16= Level 1 : v=0, p=0 v’=0, p’=0 Sub-Block is invalid, if p’ is not equal to p Sub-Block is invalid, if v’ is not equal to v

8 Hierarchical Tamper Detection (2/3) Level 3 : a valid block is further marked erroneous if there are five or more erroneous blocks in its 3 × 3 block-neighborhood ErrorB Level 2 : a block is marked erroneous if any subblock within it is marked erroneous

9 Hierarchical Tamper Detection (3/3) Level 4 : only required against the VQ counterfeiting attack r = (00) = 56 = avg_B1’ s Block C Block B ’ avg_B ’ s =( )/4=55 avg_B ’ s  avg_B1’ s 55=  =52 Block mapping B’ →C (secret key k)

10 Tampered Image Recovery Valid Block B r = (00) = 56 Tamped Block ARecovered Block A Block mapping A → B

11 Four-scanning attack The security of Lin et al.’s method is based on the block-mapping sequence  X' = [f (X) = ( k × X) mod N] + 1  k is a secret key  Unknown k, it is difficult to find the block- mapping sequence A → B → C → D →· · ·→A But…

12 Generate a searched dictionary (r 1,1,r 1,2,r 1,3,r 1,4 ) (r 2,1,r 2,2,r 2,3,r 2,4 ) (r N,1,r N,2,r N,3,r N,4 ) Block 1 Block 2 Block N … … For each block, perform the searching Block i(r i,1,r i,2,r i,3,r i,4 ) (r 1,1,r 1,2,r 1,3,r 1,4 ) (r 2,1,r 2,2,r 2,3,r 2,4 ) (r N,1,r N,2,r N,3,r N,4 ) … B k dubious blocks

13 Blind attack (r,v,p) is encrypted before embedding s.t. none of the 8 bits alone in a block indicate v or p or r rather than bit-by-bit direct meaning  Four-scanning attack cannot gain its purpose The watermark (v, p, r) is constant as long as avg_Bs (the average intensity for each sub-block) does not change.

avg_B=(I 1 +I 2 + … +I 16 )/16 avg_B s =(I 1 +I 2 +I 3 +I 4 )/4 Block B Block A avg_A s =(I 1 +I 2 +I 3 +I 4 )/4 a1a1 a2a2 a3a3 a4a4 a5a5 a6a6 a7a7 a8a8 r v, p of B (Set 2 LSBs of each pixel to zero) Watermark: v, p, r Block mapping A → B (secret key k ) num : the total # of 1’s in the six MSBs of avg_Bs

Block A Block B avg_A s =( )/4=55=( ) 2 avg_B s =( )/4=53=( ) 2 avg_B=( … +164)/16=97 r = v=0, p= Block mapping A → B (secret key k) Keep unchanged Keep avg_Bs unchanged

16 The watermarked imageThe original image

17 the tampered F-16the detected tampered regions using level-2 inspection on (a) the tampered F-16 using the proposed attack the detected tampered regions using level-3 inspection on (c) the detected tampered regions using level-4 inspection on (c).

18 the detected tampered regions using level-4 inspection on (a) the tampered F-16 using the proposed blind attack the detected tampered regions Using level-3 inspection on (a)

19 Conclusions The four-scanning attack  tracing out the mapping correlation of blocks  create elegant and imperceptible tampered images, The blind attack  tamper any sub-block with constant average intensity in a watermarked image even though the mapping sequence is unknown.  the tampered images are noticeable

20 Comments A Majority-voting Based Watermarking Scheme for Color Image Tamper Detection and Recovery  Ming-Shi Wang and Wei-Che Chen, Computer Standards & Interfaces, 29 (2007), pp Increase the searching complexity to resist The four-scanning attack Check bits to resist the blind attack