• Title/Summary/Keyword: tamper

Search Result 108, Processing Time 0.024 seconds

A Study on the Image Tamper Detection using Digital Signature (디지털 서명을 이용한 영상의 위변조 검출에 관한 연구)

  • Woo, Chan-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4912-4917
    • /
    • 2015
  • Fragile watermarking is a technique to insert a watermark into an image without significantly degrading its visual quality so that the watermark can be extracted for the purposes of authentication or integrity verification. And the watermark for authentication and integrity verification should be erased easily when the image is changed by filtering etc. In this paper, we propose a image block-wise watermarking method for image tamper proofing using digital signature. In the proposed method, a digital signature is generated from the hash code of the initialized image block. And The proposed method is able to detect the tampered parts of the image without testing the entire block of the watermarked image.

Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery

  • Wang, Chengyou;Zhang, Heng;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.510-522
    • /
    • 2018
  • As the major source of information, digital images play an indispensable role in our lives. However, with the development of image processing techniques, people can optionally retouch or even forge an image by using image processing software. Therefore, the authenticity and integrity of digital images are facing severe challenge. To resolve this issue, the fragile watermarking schemes for image authentication have been proposed. According to different purposes, the fragile watermarking can be divided into two categories: fragile watermarking for tamper localization and fragile watermarking with recovery ability. The fragile watermarking for image tamper localization can only identify and locate the tampered regions, but it cannot further restore the modified regions. In some cases, image recovery for tampered regions is very essential. Generally, the fragile watermarking for image authentication and recovery includes three procedures: watermark generation and embedding, tamper localization, and image self-recovery. In this article, we make a review on self-embedding fragile watermarking methods. The basic model and the evaluation indexes of this watermarking scheme are presented in this paper. Some related works proposed in recent years and their advantages and disadvantages are described in detail to help the future research in this field. Based on the analysis, we give the future research prospects and suggestions in the end.

A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images

  • Nguyen, Thai-Son;Chang, Chin-Chen;Shih, Tso-Hsien
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.395-413
    • /
    • 2016
  • Image authentication is a technique aiming at protecting the integrity of digital images. Reversible image authentication has attracted much attention of researcher because it allows to authenticate tampered regions in the image and to reconstruct the stego image to its original version losslessly. In this paper, we propose a new, reversible image authentication scheme based on adaptive prediction error expansion (PEE) technique. In the proposed scheme, each image block is classified into smooth or complex regions. Then, according to the characteristic of each block, the authentication code is embedded adaptively to achieve high performance of tamper detection. The experimental results demonstrated that the proposed scheme achieves good quality of stego images. In addition, the proposed scheme has ability to reconstruct the stego image to its original version, if no modification is performed on it. Also demonstrated in the experimental results, the proposed scheme provides higher accuracy of tamper detection than state-of-the-art schemes.

A Study on the Crushing Characteristic of the Ballast Gravel at High-Speed Railroad (고속선 도상자갈의 파쇄특성에 관한 연구)

  • Lee, Choon-Kil;Kim, Nam-Hong;Woo, Byoung-Koo;Lee, Sung-Uk
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.4
    • /
    • pp.384-389
    • /
    • 2008
  • The ballast, one of track components, plays an essential role as intermedium in transmitting train load to subgrade safely, and the deterioration of ballast directly effects the growth of track irregularity. In this study, we determined the main factor of ballast deterioration was miniature of ballast gravel caused MTT (Multiple Tie Tamper) works and accumulated traffic loads. To estimate the deterioration characteristics of ballast, we carried out field test (Chap.2) through track construction for test and the model test (Chap.3) simulating the actual operation environment, have done a comparative analysis with the sample's result (crushing rate) of high-speed railroad running actually.

A Study on the Characteristics of Mammoth Vibro Tamper by Numerical Analysis (대형진동햄머다짐의 수치해석적 연구)

  • 박양수;박인준;김수일
    • Journal of the Korean Geotechnical Society
    • /
    • v.16 no.5
    • /
    • pp.45-54
    • /
    • 2000
  • 경험적으로 방법에 의존해온 대형 진동햄머다짐의 영향심도를 평가하고자 수치해석적인 기법을 사용하였다. 수치해석적인 기법을 사용하였다. 수치해석에 사용한 프로그램은 범용 유한요소 해석프로그램인 ABAQUS이며, 인천 신공항 매립지에서 시험 시공한 대형 진동햄머다짐의 자료와 수치해석한 결과의 비교를 통해 검증하였다. 수치해성에 사용한 물성은 현장시험과 실내시험을통해 구하였으며 영향깊이는 지반이 동적 하중에 변형할 때 소산하는 소성변형율에너지량의 분포를 판정하였다. 수치해석결과 소성변형율에너지 소산량의 시간에 따른 변화로부터 다짐의 영향깊이 및 수평영향거리를 추정할 수 있었다. 소성변형율에너지 수렴시의 외부에너지를 Menard의 경험식에 적용할 경우 영향깊이를 판정할 수 있음을 알았다. 따라서 Menardtlr으로부터 영향깊이를 다짐하는데 필요한 최소한의 에너지를 구할수 있을 것으로 판단된다.

  • PDF

Review on Digital Image Watermarking Based on Singular Value Decomposition

  • Wang, Chengyou;Zhang, Yunpeng;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1585-1601
    • /
    • 2017
  • With the rapid development of computer technologies, a number of image modification methods have emerged, which have great impacts on the security of image information. Therefore, it is necessary to protect the integrity and authenticity of digital images, and digital watermarking technique consequently becomes a research hotspot. An effort is made to survey and analyze advancements of image watermarking algorithms based on singular value decomposition (SVD) in recent years. In the first part, an overview of watermarking techniques is presented and then mathematical theory of SVD is given. Besides, SVD watermarking model, features, and evaluation indexes are demonstrated. Various SVD-based watermarking algorithms, as well as hybrid watermarking algorithms based on SVD and other transforms for copyright protection, tamper detection, location, and recovery are reviewed in the last part.

The analysis of ballast abrasion and fracture by Multiple Tie Tamper (장비작업에 의한 도상자갈의 마모.파쇄변화에 관한 분석)

  • Lee, Choon-Kil;Kim, Kwan-Hyung
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.1024-1028
    • /
    • 2008
  • The ballast, one of track components, plays an essential role as intermedium in transmitting train load to subgrade safely, and the deterioration of ballast directly effects the growth of track irregularity. In this study, we determined the main factor of ballast deterioration was miniature of ballast gravel caused MTT(Multiple Tie Tamper) works and accumulated traffic loads. To estimate the deterioration characteristics of ballast, we carried out field test through track construction for test and the model test simulating the actual operation environment, have done a comparative analysis with the sample's result(crushing rate) of high-speed railroad running actually.

  • PDF

Tamper Detection of Digital Images using Hash Functions (해쉬 함수를 이용한 디지털 영상의 위변조 검출)

  • Woo, Chan-Il;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.7
    • /
    • pp.4516-4521
    • /
    • 2014
  • Digital watermarking for digital image authentication and integrity schemes are based on fragile watermarking and can detect any modifications in a watermark embedded image by comparing the embedded watermark with the regenerated watermark. Therefore, the digital watermark for image authentication and integrity should be erased easily when the image is changed by digital image processing, such as scaling or filtering etc. This paper proposes an effective tamper detection scheme for digital images. In the proposed scheme, the original image was divided into many non-overlapping $2{\times}2$ blocks. The digital watermark was divided into two LSB of each block and the image distortion was imperceptible to the human eye. The watermark extraction process can be used to determine if the watermarked image has been tampered. The experimental results successfully revealed the effectiveness of the proposed scheme.

A Study on Efficient Tamper Detection of Digital Image (디지털 영상의 효율적인 변형 검출에 관한 연구)

  • Woo, Chan-Il;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.196-201
    • /
    • 2016
  • Digital watermarking is a technique used to hide information within digital media. Digital watermarking techniques can be classified as either robust watermarking or fragile watermarking. Robust watermarking techniques are generally used for the purpose of copyright protection. In addition, fragile watermarking techniques are used for the authentication and integrity verification of a digital image. Therefore, fragile watermarks should be easily breakable for trivial tampering of a watermarked image. This paper proposes an efficient fragile watermarking method for image tamper detection in the spatial domain. In the proposed method, a hash code and symmetric key encryption algorithm are used. The proposed method of inserting a watermark by dividing the original image into many blocks of small sizes is not weak against attacks, such as cut and paste. The proposed method can detect the manipulated parts of a watermarked image without testing the entire block of the image.

HyperCerts : Privacy-Enhanced OTP-Based Educational Certificate Blockchian System (HyperCerts : 개인정보를 고려한 OTP 기반 디지털 졸업장 블록체인 시스템)

  • Jung, Seung Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.987-997
    • /
    • 2018
  • Blockchain has tamper-free, so many applications are developing to leverage tamper-free features of blockchain. MIT Media Labs proposed BlockCerts, educational certificate blockchain System, to solve problems of legacy certificate verifications. Existing educational certificate blockchain Systems are based on public blockchain such as bitcoin, Ethereum, so any entity can participate educational institute in principal. Moreover, the exisitng educational certricate blockchain system utilizes the integrity of blockchain, but the confidentiality of the educational certificate is not provided. This paper propose a digital certificate system based on private blockchain, name HyperCerts. Therefore, only trusted entity can participate in the private blockchain network, Hyperledger, as the issuer of digital certificate. Furthermore, the practical byzantine fault tolerance is used as consensus algorithm, HyperCerts reduce dramatically the latency of issuing digital certificate and required computing power. HyperCerts stores the hash value of digital certificate into the ledger, so breach of personal information by malicious entity in the private blockchain is protected.