A Watermark for Image Integrity and Ownership Verification

Similar documents
CERIAS Tech Report

A Visual Cryptography Based Watermark Technology for Individual and Group Images

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Digital Watermarking Using Homogeneity in Image

A Copyright Information Embedding System

Pattern Recognition 41 (2008) Contents lists available at ScienceDirect. Pattern Recognition

Digital Watermarking for Forgery Detection in Printed Materials

Copyright protection scheme for digital images using visual cryptography and sampling methods

DIGITAL IMAGE PROCESSING Quiz exercises preparation for the midterm exam

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Watermarking System Using LSB

Fragile watermark based on polarity of pixel points

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Data Embedding Using Phase Dispersion. Chris Honsinger and Majid Rabbani Imaging Science Division Eastman Kodak Company Rochester, NY USA

Lossless Image Watermarking for HDR Images Using Tone Mapping

Blind Image Fidelity Assessment Using the Histogram

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

Image Forgery Detection Using Svm Classifier

International Journal for Research in Technological Studies Vol. 1, Issue 8, July 2014 ISSN (online):

Dynamic Collage Steganography on Images

An Integrated Image Steganography System. with Improved Image Quality

Stochastic Screens Robust to Mis- Registration in Multi-Pass Printing

Robust and Blind Spatial Watermarking in Digital Image

Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares

Secure Digital Camera

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Printed Document Watermarking Using Phase Modulation

Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression

Tampering Detection Algorithms: A Comparative Study

Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

Journal of mathematics and computer science 11 (2014),

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Stamp detection in scanned documents

Digital Image Watermarking by Spread Spectrum method

Passport Authentication Using PNG Image with Data Repair Capability

Watermarking patient data in encrypted medical images

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

Tampering and Copy-Move Forgery Detection Using Sift Feature

LSB Encoding. Technical Paper by Mark David Gan

Secure Transactio :An Credit Card Fraud Detection System Using Visual Cryptography

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

Multiresolution Watermarking for Digital Images

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Authentication of grayscale document images using shamir secret sharing scheme.

A Novel Watermarking Technique Based on Visual Cryptography

arxiv: v1 [cs.mm] 31 Mar 2014

FPGA implementation of DWT for Audio Watermarking Application

Zero-Based Code Modulation Technique for Digital Video Fingerprinting

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

Computer Generated Hologram for SemiFragile Watermarking with Encrypted Images

International Journal of Advance Research in Computer Science and Management Studies

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Hiding Image in Image by Five Modulus Method for Image Steganography

Visual Secret Sharing Based Digital Image Watermarking

Fragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang

An Enhanced Least Significant Bit Steganography Technique

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS

Joint near-lossless compression and watermarking of still images for authentication and tamper localization

Analysis of Secure Text Embedding using Steganography

A Reversible Data Hiding Scheme Based on Prediction Difference

Compendium of Reversible Data Hiding

Impeding Forgers at Photo Inception

SECTION I - CHAPTER 2 DIGITAL IMAGING PROCESSING CONCEPTS

Digimarc for Images 4.0 Technical Brief Introducing Chroma

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

LECTURE NOTES ON SUBLIMINAL CHANNEL & COMMUNICATION SYSTEM

Fundamentals of Multimedia

A Source and Channel-Coding Framework for Vector-Based Data Hiding in Video

Comparative Analysis of Hybrid Algorithms in Information Hiding

While entry is at the discretion of the centre, it would be beneficial if candidates had the following IT skills:

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method

Method to Improve Watermark Reliability. Adam Brickman. EE381K - Multidimensional Signal Processing. May 08, 2003 ABSTRACT

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

A Blueprint for Civil GPS Navigation Message Authentication

Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh Fading Channels

Adaptive use of thresholding and multiple colour space representation to improve classification of MMCC barcode

IMAGES AND COLOR. N. C. State University. CSC557 Multimedia Computing and Networking. Fall Lecture # 10

Watermarking Still Images Using Parametrized Wavelet Systems

Scientific Working Group on Digital Evidence

A Novel Approach for Hiding Huge Data in Image

A new seal verification for Chinese color seal

1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer.

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Colored Digital Image Watermarking using the Wavelet Technique

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Local prediction based reversible watermarking framework for digital videos

APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING

AWAY TO discourage illicit reproduction of copyrighted

A PROPOSED ALGORITHM FOR DIGITAL WATERMARKING

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

Real-Time Face Detection and Tracking for High Resolution Smart Camera System

Transcription:

A Watermark for Image Integrity and Ownership Verification Ping Wah Wong Hewlett Packard Company, 11000 Wolfe Road, Cupertino, CA 95014 Abstract We describe in this paper a ing scheme for ownership verification and image authentication. This authentication is invisible, and has applications in trusted cameras, image transactions, legal usages, medical archiving, and others. This, in conjunction with an appropriate digital key, can detect and localize any modifications to images. The inherits the security of a cryptographic hash function, hence it is computationally infeasible for any unauthorized user to confuse the image integrity or ownership by forgery. We also describe using this invisible authentication to protect any visible s. Introduction Digital ing is a technique for inserting a digital signature () into an image, where the signature can be extracted or detected for identification or authentication purposes. There are different types of s that are designed for different applications [1]. For example, ownership assertion s can be inserted to images that are to be posted publicly, so that unauthorized users who claim ownership or resell the images without the consent of the original owner can be caught. This type of is typically robust [2 5] in that the should still be detectable after the ed image has been processed by common image processing algorithms such as image scaling, cropping, and compression. It is well known that digital images can be altered or manipulated with ease. Furthermore, it is generally impossible to tell whether the altered image or the original image is the authentic one. This is an important issue in, for example, news reporting or in legal usages, where we want to be sure a digital image truely reflects what the scene looks like. Another need of image authentication arises in, for example, electronic commerce where a buyer buys a digital image from a seller, and then the seller transmits the digital image to the buyer over the network. In this case the buyer wants to ensure that the received image was indeed the genuine image sent by the seller. Here we not only want to verify the integrity of an image, we also want to check the original ownership. Previously, the idea of a trusted digital camera was proposed [6]. This scheme computes for each captured image a standard digital signature, and then the digital signature is stored and transmitted along with the image. Recently, Yeung and Mintzer [7] propose using an authentication to protect the integrity of images. Yeung and Mintzer's authentication uses a pseudo random sequence and a modified error diffusion method to embed a binary to an image, so that any change in pixel values to the image can be detected. The pseudo random number generator is seeded using the key of the owner, hence associating the image (and the ) with the original owner. In this paper we propose a that allows a user with an appropriate security key to verify the integrity and the ownership of an image. Using the correct key, we can extract a from a ed image that can be identified to be associated with an owner. Otherwise, if the user performs the extraction procedure using either an incorrect key or with an image that was not ed, the user obtains an image that resembles random noise. Furthermore, this authentication can detect and localize any change to the image, including changes in pixel values or image size. The security of the ing algorithm relies on the computational infeasibility to break a cryptographic hash function. As a result, the security of the system 375 374

resides in the secrecy of the user key and not in the obscurity of the algorithm. In fact, the insertion and extraction steps can be make public without compromising the security of the. From the perspective of an image viewer, s can be classified into two categories: visible and invisible. Visible refers to the type of technique where a visible stamp, e.g., a company logo, is inserted to the image [8]. The stamp is visible in similar fashion as the in our dollar bills. There are generally two problem associated with visible s. First a visible must be difficult to be removed. In this regard, Braudaway et al. suggest the insertion of random noise to the ed image to increase the difficultly in manually removing the [8]. Second, a visible must be able to withstand the impersonator problem. It is easy for person A to insert the logo of B to an image and then claim that the resulting image came from B, while in fact B may not want to be associated with such an image. As a result, a visible bearing a certain logo does not constitute a proof of ownership. We describe in this paper a secure visible ing method, where we use the security of an invisible ing algorithm to protect the visible. Invisible Authentication Watermark We describe here the details of our authentication ing algorithm for grayscale images. For color images, the same technique can be applied independently to the color planes of the image, either in the RGB color space or in any other color space such as YUV. Consider an image xm;n of size M by N pixels that we want to insert a to form the ed image ym;n of the same size. We partition xm;n into blocks of I J pixels. Our scheme inserts a to each block of image data. The insertion procedure for each image block is shown in Fig. 1. Let am;n be a bilevel image that we will use as our, to be embedded in xm;n. Note that am;n needs not be of the same size as xm;n. From am;n, we form another bilevel image bm;n of size M N (same size as xm;n). There are many ways of doing so. In our example, we form bm;n by tiling am;n, i.e., periodically replicating am;n to the desired size. Another possibility is to append all zeros (or all ones) to the boundary of block of bitmap B r user key K image width M image height N image block X r set LSB's to zero q? C H(K; M; N; Xr) e ṟ XOR ex r output block insert C r Y into LSB r of Xr e Figure 1: Watermark insertion procedure for each image block. The same insertion procedure is applied independently to each block of the image. am;n so that we obtain bm;n of the desired size. Let Xr = fxii+k;jj+l :0kI,1; 0 l J, 1g be a block of size I J taken from the image xm;n. For simplicity, we are using a single index r to denote the r th block in the image. The corresponding block within the binary image bm;n is denoted Br = fbii+k;jj+l :0kI,1; 0 l J, 1g: Consider a cryptographic hash function H(S) =(d 1 ;d 2 ;:::;dp) where S represents a string of data of arbitrary length, di's are the binary output bits of the hash function, and p is the size of the output bit string. It has the property that given an input bit string S and its corresponding output (d 1 ;:::;dp), it is computationally infeasible to find another input bit string of any length that will be hashed to the same output (d 1 ;:::;dp). An example is the well known MD5 [9] where any string of data is hashed into a bit array of length 128, i.e., p = 128. For the rest of this paper, we will use MD5 as our hash function. It is obvious that any other cryptographic hash function can be used in our ing scheme. In our case, we need to choose the block size parameters I and J so that they satisfy IJ p. Let K be a user key consisting of a string of bits. For each block of data Xr, we form the corresponding block exr where each element in e Xr equals the corresponding 6 376 375

user key K image width M image height N image block Y r q set LSB's to zero H(K; M; N; Xr) e XOR ex r 6 Cr block of extracted extract LSB's Figure 2: Block diagram of extraction procedure for each image block. Figure 3: An original image. element in Xr except that the least significant bit is set to zero. We compute for each block the hash H(K; M; N; e Xr) =(d r 1 ;dr 2 ;:::;dr p ): Then, we select the first IJ bits in the hash output and form the rectangular array dm;n of size I J. This array is combined with Br to form a new binary block Cr using a pixel by pixel exclusiveor (XOR) operation. That is, we form cm;n = bm;n di; where is the XOR operation, and cm;n are the elements in Cr. Finally we put cm;n into the least significant bit of the block e Xr to form the output block Yr. This procedure is repeated for each block of data, and all the output blocks Yr are assembled together to form the ed image ym;n. Figure 4: Watermarked image. This image should be visually identical to the original of Fig. 3. The extraction procedure is shown in Fig. 2. Note in particular that if we set the least significant bits of each element in the block Yr to zero, we obtain a block exr as the one in Fig. 1. For each block of data Yr, we compute H(K; M; N; e Xr) and perform a pixel by pixel XOR operation with Cr to form a block of the output binary. Properties of The Authentication Watermark This ing approach allows the detection of any change to a marked image. The correct user key is required for the extraction of the proper. The ing scheme exhibits the following properties: Figure 5: Extracted from the image in Fig. 4. 377 376

Fig. 3 shows an original image and Fig. 4 shows an image ed using the technique in this paper. It clearly demonstrates that the is invisible. If one uses the correct user key K and applies the extraction procedure to Fig. 4, one obtains an output image Fig. 5, indicating the presence of a proper. Figure 6: Extracted from the image in Fig. 4 using an incorrect user key. The output resembles random noise. Similar output will result if the image contains no, of if a ed image is cropped. If an image is unmarked, i.e., if it does not contain a, the extraction procedure returns an output that resembles random noise as shown in Fig. 6. If one applies an incorrect key (for example, if one does not know the key), then the extraction procedure returns an output that resembles random noise as shown in Fig. 6. If a ed image is cropped and then one applies the extraction procedure on this cropped image, the procedure returns an output that resembles random noise as shown in Fig. 6. Figure 7: The ed image in Fig. 4 has been changed where a glass was pasted on top. Figure 8: Extracted from Fig. 7 indicating the location where changes have occurred. If one changes certain pixels in the ed image, then the specific locations of the changes are reflected at the output of the extraction procedure. Fig. 7 shows an image where a glass is pasted onto Fig. 4. Fig. 8 shows the extracted from Fig. 7, indicating the specific area where changes have been made. A question that arises is that whether the is secure if it is put into the least significant bit of the image. Recall that this is designed for authentication purposes, i.e., to detect any change to the image. If someone attempts to remove the by changing some bit planes of the image, the extraction procedure will detect the changes. A very important issue is whether it is possible for someone to forge a into the scheme. Consider an image block Br. Suppose someone wants to alter some or all of the pixels in this image block so that it becomes b Br. It is necessary that the pixel values in the two image blocks satisfy H(K; M; N; Br) =H(K; M; N; b Br): 378 377

user key K input image visible insertion 6 visible template vm;n invisible insertion 6 invisible bitmap bm;n Figure 9: A method in using an invisible authentication to protect a visible. That is, the digest generated from both image blocks must be identical. This is considered computationally infeasible because of the properties of cryptographic hash functions such as MD5 [9]. Secure Visible Watermark As mentioned in the Introduction Section, we like to protect a visible with an invisible authentication, so that a person cannot insert a visible logo that belongs to somebody else. To this end, we first insert a visible by modulating the pixel values according to the logo. We then insert the authentication as described in an earlier section. The overall scheme is shown in Fig. 9. In such way, all the security features of the invisible described in the previous section will hold for the visible as well. Consider a graylevel image um;n, where a grayscale visible vm;n is to be inserted. As done previously, we assume that vm;n is of the same size as um;n. If this is not the case, we can always extend the template in some fashion so that vm;n and um;n are of the same size. The insertion of vm;n to um;n is performed by amplitude modulating the pixels in um;n. To insert the visible, we first choose a parameter that controls the intensity of the visible. That is, it controls how dark the visible is on the output image. We then normalize the template vm;n so that all the pixels fall within the range f0; 1;:::;g, and that the values 0 and are taken up by pixels within vm;n. The insertion procedure for the visible is simply wm;n = um;n, + vm;n: Figure 10: Image of Fig. 3 with both visible and invisible s inserted. Here we used = 30. We can darken the visible by using a larger. If we apply the invisible extraction procedure to this image, we will obtain an image identical to Fig. 5. This form ensures that a white pixel in vm;n will not change the corresponding intensity of the image um;n, while a black pixel in vm;n will darken the corresponding pixel um;n by. This insertion procedure can also be applied if um;n is a color image. In such case, we simply modulate the luminance component of the color image. Consider the transformation between YUV and RGB color spaces (See, for example, [10].) 0 1 0 1 0 1 R 1 0 1:14 Y @ G A = @ 1,0:396,0:581 A @ U A : B 1 2:029 0 In this case, modulating the luminance component Y is equivalent to independently modulating the R, G and B components. Similar observation holds for other color spaces such as YIQ and YCrCb. Fig. 10 shows an image where both visible and invisible s are added where =30.Ifwewanta darker visible, we can increase the value of. Note that the template for the visible and invisible s are complete independently of each other. If we apply to this image the invisible extraction procedure as shown in Fig. 2, we will obtain an output image identical to Fig. 5. References [1] N. Memon and P. W. Wong, Protecting digital me V 379 378

dia content: Watermarks for copyrighting and authentication, Communications of ACM. To appear. [2] M. D. Swanson, B. Zhu, and A. H. Tewfik, Transparent robust image ing, in Proceedings of ICIP, (Lausanne, Switzerland), pp. III 211 214, September 1996. [3] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure spread spectrum ing for multimedia, Tech. Rep. 9510, NEC Research Institute, 1995. [4] N. Nikolaidis and I. Pitas, Copyright protection of images using robust digital signatures, in Proceedings of ICASSP, May 1996. [5] R. B. Wolfgang and E. J. Delp, A ing technique for digital imagery: Further studies, in Proceedings of International Conference on Imaging Science, Systems, and Technology, (LasVegas NV), 1997. [6] G. L. Friedman, The trustworthy digital camera: restoring credibility to the photographic image, IEEE Transactions on Consumer Electronics, vol. 39, pp. 905 910, November 1993. [7] M. M. Yeung and F. Mintzer, An invisible ing technique for image verification, in Proceedings of ICIP, (Santa Barbara, CA), October 1997. [8] G. W. Braudaway, K. A. Magerlein, and F. C. Mintzer, Color correct digital ing of images. United States Patent 5530759, June 1996. [9] R. L. Rivest, The MD5 message digest algorithm. Internet RFC 1321, April 1992. [10] R. W. G. Hunt, The Reproduction of Colour in Photography, Printing & Television. England, UK: Fountain Press, fourth ed., 1987. 380 379