DOI QR코드

DOI QR Code

A Digital Image Watermarking Scheme using ElGamal Function

ElGarnal함수를 사용하는 디지털 이미지 워터마킹 기법

  • Lee, Jean-Ho (Dept.of Computer Sceince, Graduate School of Korea University) ;
  • Kim, Tai-Yun (Dept.of Computer Sceince, Korea University)
  • 이진호 (고려대학교 대학원 컴퓨터학과/LG-EDS 기술연구소) ;
  • 김태윤 (고려대학교 컴퓨터학과)
  • Published : 2002.02.01

Abstract

Digital image watermarking is a technique for the purpose of protecting the ownership of the image by embedding proprietary watermarks in a digital image. It is required for the digital image watermarking scheme to pursue the robustness against water marking attacks and the perceptual Invisibility more than usual in steganography area, to guarantee not a hidden watermarking algorithm but the publicity of water-marking algorithm details and hidden use of key, which can protect the unauthorized user access from detection. In this paper we propose a new copyright watermarking scheme, which is barred on one-way hash functions using ElGamal functions and modular operations. ElGamal functions are widely used in cryptographic systems. Our watermarking scheme is robust against LSB(least significant bit) attacks and gamma correction attack, and also perceptually invisible. We demonstrate the characteristics of our proposed watermarking scheme through experiments. It is necessary to proceed as the future work the algorithm of achieving at the same time both the pseudo-randomness for the steno-key generation and the asymmetric-key generation.

디지털 이미지 워터마킹(digital image watermarking)은 이미지 소유자의 정보를 디지털 이미지 속에 삽입시켜 이미지 소유자의 저작권을 보호하는 것을 목적으로 하는 기법이다. 저작권 보호를 위한 디지털 이미지 워터마킹 기법은 기존의 스테가노그라피(steganography)보다 워터마킹 공격에 대한 견고성과 육안적 비구별성을 동시에 추구해야 하고, 워터마킹 알고리즘의 은닉성 대신 키의 은닉성이 보장되어야 하며, 암호학과 마찬가지로 키의 사용으로 허가받지 않은 사용자의 워터마크 검출을 방지할 수 있어야 한다. 본 논문에서는 암호학 함수인 ElGamal함수를 사용하는 워터마킹 기법을 제안한다. 일방향 해쉬 함수를 구현하기 위해 ElGamal일방향 함수와 모듈라 연산을 사용한다. 제안하는 워터마킹 기법은 LSB(least significant bit)공격과 감마 보정 공격에 대해 견고하며 육안적 비구별성(perceptual invisibility)이 높다. 제안하는 워터마킹 기법의 실제 구현 및 실험을 통한 실험 결과를 분석하여 견고성과 육안적 비구별성의 특징을 확인한다 향후 과제로, 키생성을 위한 의사난수성과 비대칭키의 생성을 동시에 달성시키는 알고리즘 연구가 요구된다.

Keywords

References

  1. T. Aura, 'Practical Invisibility in Digital Communication,' Proceedings of Information Hiding Workshop, LNCS Vol. 1174, pp.265-278, Springer-Verlag, 1996 https://doi.org/10.1007/3-540-61996-8_46
  2. Bloom, 'Copy Protection for DVD Video,' Proceedings of IEEE, Vol.87, No.7, July, 1999 https://doi.org/10.1109/5.771077
  3. B. Chor, A. Fiat, M. Naor, 'Tracing Traitors,' Proceedings of Crypto'94, LNCS, Vol.839, pp.257-270, Springer-Verlag, 1994
  4. S. Craver, N. Memon, B. Yeo, 'Resolving Rightful Ownerships with Invisible Watermarking Techniques : Limitations, Attacks and Implications,' IEEE Journal of SAC, Vol.16, No.4, pp.573-586, May, 1998 https://doi.org/10.1109/49.668979
  5. E. Franz, A. Ierichow, S. Moller, A. Pfitzmann, I. Stierand, 'Computer Based Steganography : How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, At Best,' Proceedings of Information Hiding Workshop, LNCS Vol.1174, pp.7-21, Springer-Verlag, 1996 https://doi.org/10.1007/3-540-61996-8_28
  6. N. F. Johnson, S. Jajodia, 'Steganalysis of Images Created Using Current Steganography Software,' Proceedings of Information Hiding Workshop, LNCS Vol.1525, pp.273-289, Springer-Verlag, 1998 https://doi.org/10.1007/3-540-49380-8_19
  7. S. Katzenbeisser, F. A. P. Petiteolas, editor. Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, 1999
  8. Eugene T. Lin, E. J. Delp, 'A Review of Data Hiding in Digital Images,' Proceedings of the Image Processing, Image Ouality, Image Capture Systems Conference'99, pp.274-278, April, 1999
  9. M. Luby, C. Rackoff, 'How to Construct Pseudorandom Permutations from Pseudorandom Functions,' SIAM Journal on Computation, Vol.17, No.2, pp.373-386, 1988 https://doi.org/10.1137/0217022
  10. R. C. Merkle, 'One-way Hash Functions and DES,' Proceedings of Crypto'89, LNCS Vol.435, pp.428-446, Springer-Verlag, 1989
  11. N. Memon, P. W. Wong, 'Protecting Digital Media Content,' CACM, Vol.41 , No.7, pp.35-43, July, 1998 https://doi.org/10.1145/278476.278485
  12. M. Naor, O. Reingold, 'On the Construction Pseudorandom Permutations: Luby-Rackoff Revisited,' Journal of Cryptology, Vol.12, No.1, pp.29-66, 1999 https://doi.org/10.1007/PL00003817
  13. R. J. Anderson, editor. Information hiding: first international workshop, LNCS Vol.1174, Springer-Verlag, May, 1996
  14. T. ElGamal 'A Public Key Cryptosystem and A Signature Scheme Based on Discrete Logarithms,' Proceedings of Crypto'84, LNCS Vol.196, pp.10-18, Springer-Verlag, 1985