Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Source: Pattern Recognition, Vol. 41, Issue 2, Feb. 2008, pp Authors: Chin-Chen Chang,Yi-Hsuan Fan, and Wei-Liang Tai Reporter: 陳德祐 Date: 2008/10/31
2 Outline Introduction A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang, Pattern Recognition, Vol. 38, Issue 11, 2005 The Proposed attacks The four-scanning attack The blind attack Experimental Results Conclusions Comments
3 Introduction Received ImageDelivered Image
4 Preparation~ block mapping Non-overlapping blocks of 4 × 4 pixels A block-mapping sequence A → B → C → D →· · ·→A X' = [f (X) = (k × X) mod N] + 1 X ', X : the block number ( ∈ [0,N −1]) k : a secret key (a prime and ∈ [0,N − 1]) N : the total number of blocks in the image ( ∈ Z − {0}) The original block The look up table X '=13 × X mod 64 +1
Watermark Embedding (1/2) avg_B=(I 1 +I 2 + … +I 16 )/16 avg_B s =(I 1 +I 2 +I 3 +I 4 )/4 Block B Block A avg_A s =(I 1 +I 2 +I 3 +I 4 )/4 a1a1 a2a2 a3a3 a4a4 a5a5 a6a6 a7a7 a8a8 r v, p of B (Set 2 LSBs of each pixel to zero) Watermark: v, p, r Block mapping A → B (secret key k ) num : the total # of 1’s in the six MSBs of avg_Bs
6 Watermark Embedding (2/2) Block A Block B avg_A s =( )/4=55=( ) 2 avg_B s =( )/4=53=( ) 2 avg_B=( … +164)/16=97 r = v=0, p= Block mapping A → B (secret key k) num : the total # of 1’s in the six MSBs of avg_Bs
7 Hierarchical Tamper Detection (1/3) avg_B ’ s =( )/4=53 (= ) avg_B ’ =( … +164)/16= Level 1 : v=0, p=0 v’=0, p’=0 Sub-Block is invalid, if p’ is not equal to p Sub-Block is invalid, if v’ is not equal to v
8 Hierarchical Tamper Detection (2/3) Level 3 : a valid block is further marked erroneous if there are five or more erroneous blocks in its 3 × 3 block-neighborhood ErrorB Level 2 : a block is marked erroneous if any subblock within it is marked erroneous
9 Hierarchical Tamper Detection (3/3) Level 4 : only required against the VQ counterfeiting attack r = (00) = 56 = avg_B1’ s Block C Block B ’ avg_B ’ s =( )/4=55 avg_B ’ s avg_B1’ s 55= =52 Block mapping B’ →C (secret key k)
10 Tampered Image Recovery Valid Block B r = (00) = 56 Tamped Block ARecovered Block A Block mapping A → B
11 Four-scanning attack The security of Lin et al.’s method is based on the block-mapping sequence X' = [f (X) = ( k × X) mod N] + 1 k is a secret key Unknown k, it is difficult to find the block- mapping sequence A → B → C → D →· · ·→A But…
12 Generate a searched dictionary (r 1,1,r 1,2,r 1,3,r 1,4 ) (r 2,1,r 2,2,r 2,3,r 2,4 ) (r N,1,r N,2,r N,3,r N,4 ) Block 1 Block 2 Block N … … For each block, perform the searching Block i(r i,1,r i,2,r i,3,r i,4 ) (r 1,1,r 1,2,r 1,3,r 1,4 ) (r 2,1,r 2,2,r 2,3,r 2,4 ) (r N,1,r N,2,r N,3,r N,4 ) … B k dubious blocks
13 Blind attack (r,v,p) is encrypted before embedding s.t. none of the 8 bits alone in a block indicate v or p or r rather than bit-by-bit direct meaning Four-scanning attack cannot gain its purpose The watermark (v, p, r) is constant as long as avg_Bs (the average intensity for each sub-block) does not change.
avg_B=(I 1 +I 2 + … +I 16 )/16 avg_B s =(I 1 +I 2 +I 3 +I 4 )/4 Block B Block A avg_A s =(I 1 +I 2 +I 3 +I 4 )/4 a1a1 a2a2 a3a3 a4a4 a5a5 a6a6 a7a7 a8a8 r v, p of B (Set 2 LSBs of each pixel to zero) Watermark: v, p, r Block mapping A → B (secret key k ) num : the total # of 1’s in the six MSBs of avg_Bs
Block A Block B avg_A s =( )/4=55=( ) 2 avg_B s =( )/4=53=( ) 2 avg_B=( … +164)/16=97 r = v=0, p= Block mapping A → B (secret key k) Keep unchanged Keep avg_Bs unchanged
16 The watermarked imageThe original image
17 the tampered F-16the detected tampered regions using level-2 inspection on (a) the tampered F-16 using the proposed attack the detected tampered regions using level-3 inspection on (c) the detected tampered regions using level-4 inspection on (c).
18 the detected tampered regions using level-4 inspection on (a) the tampered F-16 using the proposed blind attack the detected tampered regions Using level-3 inspection on (a)
19 Conclusions The four-scanning attack tracing out the mapping correlation of blocks create elegant and imperceptible tampered images, The blind attack tamper any sub-block with constant average intensity in a watermarked image even though the mapping sequence is unknown. the tampered images are noticeable
20 Comments A Majority-voting Based Watermarking Scheme for Color Image Tamper Detection and Recovery Ming-Shi Wang and Wei-Che Chen, Computer Standards & Interfaces, 29 (2007), pp Increase the searching complexity to resist The four-scanning attack Check bits to resist the blind attack