DOI QR코드

DOI QR Code

Multi-Watermarking for Image Authentication Based on DWT Coefficients

이미지 인증을 위한 DWT 계수기반 다중 워터마킹

  • Published : 2005.04.01

Abstract

In this paper, we propose a multi-watermarking algorithm to satisfy two purposes: fragility against malicious attacks and robustness against non-malicious attacks. The algorithm can be used for image authentication using coefficients of Discrete Wavelet Transform(DWT). In the proposed method, watermarks are generated by combining binary image with some features extracted from the subband LL3, and then they are embedded into both the spatial and frequency domain. That is, on the spatial domain they are embedded into the Least Significant Bit(LSB) of all pixels of image blocks, and on the frequency domain the coefficients of the subband LH2 and HL2 are adjusted according to the watermarks. Thus the algorithm not only resists malicious attack but also permits non-malicious attacks such as blurring, sharpening, and JPEG compression.

본 논문에서는 악의적인 공격에는 워터마크가 쉽게 깨어지고 비악의적인 공격에는 워터마크가 쉽게 깨어지지 않도록 하는 투 가지 목적을 동시에 만족시키기 위한 다중 워터마킹 알고리즘을 제안한다. Discrete Wavelet Transform(DWT)의 계수를 이용해 이미지를 인증하는 기법으로, 워터마크로 사용될 이진 이미지와 LL3 영역에서 추출된 특징을 조합하여 이미지에 삽입될 정보를 생성한다 이미지의 공간영역과 주파수영역에 정보를 다중으로 삽입하여 공간영역에서 일어날 수 있는 악의적인 공격에 대응할 뿐만 아니라 주파수영역에서의 blurring, sharpening 및 JPEG 압축과 간은 비 악의적인 공격을 허용하는 기법이다. 공간영역에서는 이미지 블록의 모든 픽셀의 Least Significant Bit(LSB)에 정보를 삽입하고, 주파수영역에서는 삽입할 정보에 따라 LH2와 HL2의 계수를 조절하므로 정보를 삽입하게 된다.

Keywords

References

  1. 김종원, 신동환, 신승원, 최종욱, '디지털 워터마킹 기술의 산업적 응용' 한국정보보호학회 , 정보보호학회지, 12권 1호 pp.11-18, 2002
  2. M. M. Yeung, and F. Mintzer, 'An invisible watermarking technique for image verification' Proceedings of IEEE Int. Conf. Image Processing, pp. 680-683, 1997
  3. J. Dittmann, A. Steinmetz, and R. Steinmetz, 'Content-based digital signature for motion pictures authentication and content-fragile watermarking, ' Int. Conf. Multimedia Computing and systems, pp. 209-213, 1999
  4. M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, 'Hierarchical watermarking for secure image authentication with localization,' IEEE Trans. Image Processing, Vol. 11, No. 6, pp. 585-595, 2002 https://doi.org/10.1109/TIP.2002.1014990
  5. J. Fridrich, M. Goljan, and A. C. Baldoza, 'New fragile authentication watermark for images,' Proc. IEEE Int. Conf. Image Processing, Vanco uver, BC, Canada, Sept. 10-13, 2000
  6. P. W. Wong, 'A watermark for ima ge integrity and ownership verification,' Proceedings of IEEE Int. Conf. Image Processing, pp. 455-459, 1998
  7. M. Holliman, and N. Memon, 'Counterfeiting attacks on oblivious block- wise independent invisible watermarking schemes', IEEE Trans. Image Processing, pp.432-441, 2000
  8. C. T. Li, D. C. Lou, and T. H. Chen, 'Image authentication and integrity verification via content-based watermarks and a public key cryptosystem,' Proceedings of IEEE Int. Conf. Image Processing, pp. 694-697, 2000
  9. P. S. L. M. Barreto, H. Y. Kim and V. Rijmen, 'Toward secure public- key blockwise fragile authentication watermarking,' IEE Proc.-Vis. Image Signal Processing, Vol, 149, No. 2, pp.57-62, 2002
  10. C. C. Chien, K. C. Fan, and S. W. Wang, 'A wavelet-based public key image authentication watermarking' Proceedings of IEEE 37th Annual 2003 Int. Carnahan Conf. pp. 321- 324, 2003
  11. R. M. Rao, A. S. Bopardikar, Wavelet transforms introduction to theory and applications, Addison-Wesley, 1998
  12. J. M. Shapiro, 'Embedded image coding using zerotrees of wavelet coefficients,' IEEE Trans. signal Processing, Vol. 41, No. 12, pp.3444-34 63, Dec. 1993