Lossless Watermarking for Image Authentication: A New Framework and an Implementation IEEE TRANSACTIONS ON IMAGE PROCESSING APRIL 2006 C.M.Chen.

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Digital Signatures and Hash Functions. Digital Signatures.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
Reversible watermarking Wu Dan Introduction Difference expansion Histogram bin shifting.
Reversible Data Hiding ECE643 Digital Image Processing (I) Course Project Professor: Yun Q. Shi Su Yu 12/02/2011.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Binary Image Compression Using Efficient Partitioning into Rectangular Regions IEEE Transactions on Communications Sherif A.Mohamed and Moustafa M. Fahmy.
Watermarking For Image Authentication Presented by San-Hao Wang.
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang Xi'an University of Technology,
Scalable Authentication of MPEG-4 Streams Yongdong Wu & Robert H. Deng present: Yu-Song Syu.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Paul Blythe and Jessica Fridrich Secure Digital Camera.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Image Watermarking For Tampering Protection and Self-Recovery
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Reversible Color Image Watermarking in YCoCg-R Color Space Aniket Roy under the supervision of Dr. Rajat Subhra Chakraborty.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Multiple Image Watermarking Applied to Health Information Management
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
ECE643 Course Project, Fall /21/20081 Optimum histogram pair based image lossless data embedding By G. Xuan, Y. Q. Shi, etc. Summarized By: Zhi.
Reversible watermarking Wu Dan Introduction What?
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Chapter 8 Lossy Compression Algorithms. Fundamentals of Multimedia, Chapter Introduction Lossless compression algorithms do not deliver compression.
Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Adaptive Block Coding Order for Intra Prediction in HEVC
Source: IEEE Signal Processing Letters (Accepted)2016
Cryptographic Hash Function
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Reversible Data Hiding in JPEG Images using Ordered Embedding
Watermarking for Image Authentication ( Fragile Watermarking )
Increasing Watermarking Robustness using Turbo Codes
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Recent Developments on Multimedia and Secure Networking Technologies
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Data Hiding Scheme Based Upon Block Truncation Coding
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Image Coding and Compression
Reversible Data Hiding
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Partial reversible data hiding scheme using (7, 4) hamming code
Recent Developments on Multimedia and Secure Networking Technologies
Partial reversible data hiding scheme using (7, 4) hamming code
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Protection and Recovery with Reversible Data Hiding
An imperceptible spatial domain color image watermarking scheme
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Presentation transcript:

Lossless Watermarking for Image Authentication: A New Framework and an Implementation IEEE TRANSACTIONS ON IMAGE PROCESSING APRIL 2006 C.M.Chen

Outline Introduction New Lossless Authentication Watermarking Framework :Law Localized Lossless Authentication Watermark (L-LAW)  Implementation  Experimental Results

Introduction Traditionally, source authentication and integrity verification of digital data have been performed by digital signatures A digital signature is a data string which associates (binds) a piece of information (in digital form) with some originating entity

Introduction With the availability of sophisticated image/video editing tools, authentication of multimedia data is gaining importance To include the digital signatures within the image data can be achieved using watermarks, which exploit the redundancy in the image data and the insensitivity of the human visual system (HVS) to small distortions

Introduction Digital watermarks have the advantage of tamper localization, which refers to the ability to identify the image regions that have been tampered (manipulated) after insertion of the watermark

New Lossless Authentication Watermarking Framework :Law This paper proposed a new framework that they refer to as lossless authentication watermarking LAW LAW enhances the functionality and reduces the complexity of earlier methods

New Lossless Authentication Watermarking Framework :Law LAW achieves its performance advantages over the existing framework by interchanging the order of the authentication information computation and reversible embedding steps

New Lossless Authentication Watermarking Framework :Law

The watermark embedding phase comprises of two steps: a) lossless (reversible) pre-embedding b) (nonreversible) authentication watermarking The actions of these two steps are coordinated together by partitioning the code space used for storage of image data into two disjoint parts, P A and P I, which together comprise the complete code space

New Lossless Authentication Watermarking Framework :Law In the watermarked image, the part P A carries authentication information and the part P I carries (complete) original image information

Embedding Phase In the pre-embedding step, original image data in P A is reversibly embedded into the data in P I Next, in the authentication watermarking step, authentication information for data in P I (which has been modified in a reversible manner in the preceding step) is computed and placed in part P A

Embedding Phase Note that the placement of data in P A does not alter the data in P I The reversibility of the pre-embedding thus ensures that the full image data is recoverable from data in P I partition in the watermarked image

Verification Phase The verification phase of LAW comprises of two steps: a) authentication watermark verification b) (if the verification step is successful) original image recovery

Verification Phase In the first step, authentication information is extracted from part P A and is used to validate the integrity of data in part P I If a third party has tampered with the image data after the watermark insertion, the extracted authentication information does not match the image data and image is deemed non-authentic Otherwise, the watermarked image is considered authentic

Advantages Advantages of the LAW Framework: The reversal in the order of authentication and lossless watermarking steps (with respect to earlier methods) results in reduced computational burden and additional functionality

Computational Advantages in the Verification Phase the image reconstruction step may be skipped when either a) the verification step fails, or b) the watermarked image meets the quality criteria and the perfect original is not needed The computational savings are often substantial due to the complexity of the reconstruction step

Computational Advantages in the Embedding Phase In client/server applications where a single image is served to multiple clients with different signatures (or time-stamps), the LAW framework has additional computational advantages In this case, the server performs the—often costly—pre-embedding step only once and inserts different signatures as requested by clients

Public/Private-key Support The LAW framework also supports the public- validation/private-recovery property without the need for a second signature When a public-key authentication signature is used in conjunction with a private-key dependent lossless watermark, the framework supports public validation of the watermarked image, but limits access to the perfect original

Accurate Tamper Localization Most (nonreversible) authentication watermarks offer the ability to pin-point the image regions that have been tampered Existing lossless authentication watermarks may provide the same functionality in a similar manner

Accurate Tamper Localization Nevertheless, lossless data embedding methods used in those schemes are not as efficient when applied on small image blocks In the LAW framework, lossless data embedding (pre-embedding) algorithm processes the whole image in a single step with high efficiency The resultant capacity is then shared between small blocks for authentication watermarking

Implementation Flexibility The LAW framework may be implemented using different lossless data embedding and authentication watermarking algorithms, as long as the necessary coordination between two steps is established

Localized Lossless Authentication Watermark (L-LAW) L-LAW uses the hierarchical image authentication scheme and the lossless generalized-LSB data embedding method

Localized Lossless Authentication Watermark (L-LAW)

Embedding Phase The image is divided into blocks that correspond to the elementary localization units of the hierarchical authentication watermark used in the subsequent authentication watermarking step In each block, LSBs of the first N pixels (in the raster-scan order) are designated to carry the authentication payload, where N and the block sizes are determined by the (cryptographic) security and localization requirements

Embedding Phase In each block, LSBs of shaded areas (nonwhite pixels) carry authentication information (forming part P A ) All remaining bits in the image carry image information forming part P I Unshaded areas are modified during the pre- embedding step to allow lossless recovery (original LSB values in the dark regions are inserted into these white regions by the lossless G-LSB algorithm)

Embedding Phase In the pre-embedding step (a) of the watermark embedding phase, the LSB values in part P A (LSBs for dark regions in Fig.) are read and reversibly embedded into the rest of the image (white regions in Fig.) using Lossless generalized-LSB (LGLSB) data embedding

Embedding Phase The LGLSB data embedding method creates capacity for lossless insertion of payload data by compressing pixel LSBs, exploiting more- significant-bits (MSBs) as side information for improving compression efficiency

Embedding Phase In the embedded version of the image, the LSBs carry the compressed bit stream of original LSBs as well as the payload data The algorithm may be applied selectively on part of the image, a fact that we exploit in our implementation of pre-embedding: we use the image data in part P A as the “payload” and embed it in spatial pixel locations corresponding to the white regions

Embedding Phase The data in part P A, i.e., LSBs in shaded regions, is then reset to 0 to produce the pre- embedded image

Embedding Phase The authentication watermarking step (b), uses the hierarchical image authentication scheme on the image obtained after the pre- embedding step The (nonoverlapping) blocks of the pre- embedded image constitute the lowest level of the hierarchy Successive levels of the hierarchy are formed by combining distinct groups of blocks at a preceding level of the hierarchy

Embedding Phase In general, the number of blocks from a lower level of the hierarchy that are combined to form a block at the next level of the hierarchy may be arbitrarily chosen A quad-tree for the hierarchy as shown in Fig. MAC : message authentication code

Embedding Phase For each block at each level of the multilevel hierarchy, a digital signature or message authentication code is computed for the data (in the pre-embedded image) within the block A standard digital signature algorithm operates on the concatenation of all binary digits representing the pixel values in the block (blocks at higher level of the hierarchy use all the image bits within the corresponding region)

Embedding Phase These signature are then placed in the part P A of the image data locations corresponding to LSBs of shaded regions In order to incorporate localization capability, the distribution of the signature information bits also follows the quad-tree hierarchy

Embedding Phase the LSBs for the shaded region within each block contain all of the signature for the block at the lowest level of the hierarchy in which it is located, 1/4 of the signature bits for the second level of the hierarchy, 1/16 of the signature bits for the third level of the hierarchy, and so on

Embedding Phase The hierarchical nature of the scheme provides security against vector-quantization attacks and good tamper localization accuracy

Verification Phase The process begins by overlaying the grid of image blocks (at the lowest level of the hierarchy) over the image pixels which allows the determination of the parts P A and P I that carry authentication information and image information, respectively

Verification Phase The (presumed) authentication information from bits constituting part (the LSBs corresponding to shaded regions) is then extracted and these bits are reset to zero in the image If the received image is exactly the watermarked image (no alterations), this process recovers the pre-embedded image that was produced at the embedder

Verification Phase Next, the quad-tree hierarchy is overlaid on the image blocks (and the corresponding extracted authentication information) to compute signatures corresponding to each of blocks in the hierarchy and validate these against the signatures already extracted from part P A

Verification Phase The signature for the entire image (corresponding to the highest level of the hierarchy) is computed and verified against the signature computed from the (presumed) pre-embedded image already recovered

Verification Phase If the image/signature pair is valid, the image is deemed authentic and (if required) the recovery component of the lossless G-LSB algorithm is utilized to extract and restore the original LSBs, effectively reconstructing the original image If the image signature verification step fails, the hierarchical authentication scheme determines the tampered regions

Experimental Results A 1024 X 1024 grayscale image is watermarked using Localized-LAW algorithm The watermarked image is visually identical to the original (not shown) at a peak-signal- tonoise-ratio (PSNR) of dB

Experimental Results

A set of standard images (grayscale, 512 X 512 pixels) has been used to further evaluate the impact of the proposed algorithm on image quality and subsequent lossless compression For each image, the PSNR value after embedding the 584 byte payload required by our L-LAW implementation is shown in table

Experimental Results

Thanks for your listening