Image Authentication Scheme using Digital Signature and Digital Watermarking



Similar documents
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

Security and protection of digital images by using watermarking methods

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

WATERMARKING FOR IMAGE AUTHENTICATION

CHAPTER 7 CONCLUSION AND FUTURE WORK

Security Based Data Transfer and Privacy Storage through Watermark Detection

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Multimedia Document Authentication using On-line Signatures as Watermarks

Multi-factor Authentication in Banking Sector

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

Combating Anti-forensics of Jpeg Compression

An Incomplete Cryptography based Digital Rights Management with DCFF

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

JPEG Image Compression by Using DCT

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

Using fractal compression scheme to embed a digital signature into an image

A Digital Audio Watermark Embedding Algorithm

A Concept of Digital Picture Envelope for Internet Communication

Reversible Data Hiding for Security Applications

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS

Image Compression through DCT and Huffman Coding Technique

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain

Safer data transmission using Steganography

Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents

Multiple Embedding Using Robust Watermarks for Wireless Medical Images

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation

International Journal of Computer Sciences and Engineering Open Access. A novel technique to hide information using Daubechies Transformation

Triple Security of Information Using Stegnography and Cryptography

Data Hiding: Current Status and Key Issues

SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS. Nitin Khanna and Edward J. Delp

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of

Experimental DRM Architecture Using Watermarking and PKI

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

International Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 9, September 2012)

Robust Blind Watermarking Mechanism For Point Sampled Geometry

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

Automated Image Forgery Detection through Classification of JPEG Ghosts

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet

Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?

A comprehensive survey on various ETC techniques for secure Data transmission

A Novel Watermarking Method using Geographical Random Image for Cloud Computing based on DCT Reversible Color Hiding Algorithm

Redundant Wavelet Transform Based Image Super Resolution

Analecta Vol. 8, No. 2 ISSN

Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics

Keywords: Image complexity, PSNR, Levenberg-Marquardt, Multi-layer neural network.

Technical aspects of Digital Rights Management

Steganography and Visual Cryptography in Computer Forensics

A Model of Unforgeable Digital Certificate Document System

Digimarc for Images. Best Practices Guide (Chroma + Classic Edition)

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs

New security and control protocol for VoIP based on steganography and digital watermarking

Performance Evaluation of Online Image Compression Tools

Biometric Authentication using Online Signature

Parametric Comparison of H.264 with Existing Video Standards

Sachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India

MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION

Alternative security architecture for IP Telephony based on digital watermarking

International Journal of Advanced Computer Technology (IJACT) ISSN: Least Significant Bit algorithm for image steganography

A Feature Selection Methodology for Steganalysis

Soumendu Chakraborty, Anand Singh Jalal* and Charul Bhatnagar

Video Authentication- An Overview

Friendly Medical Image Sharing Scheme

A Secure Data Transmission By Integrating Cryptography And Video Steganography

Performance Verification of Super-Resolution Image Reconstruction

INTELLECTUAL PROPERTY PROTECTION FOR ELECTRONIC COMMERCE APPLICATIONS

Side Channel Analysis and Embedded Systems Impact and Countermeasures

CHAPTER 1 INTRODUCTION

Generating Robust Digital Signature for Image/Video Authentication

Information Hiding by Stochastic Diffusion and its Application to Printed Document Authentication

COMPONENT FORENSICS OF DIGITAL CAMERAS: A NON-INTRUSIVE APPROACH

An Application of Visual Cryptography To Financial Documents

Steganography Detection for Digital Forensics

Multimodal Biometric Recognition Security System

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

A Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

International Journal of Computer Sciences and Engineering. Research Paper Volume-4, Issue-4 E-ISSN:

Two-Factor Biometric Recognition with Integrated Tamper-protection Watermarking

Lightweight Security Principles for Distributed Multimedia Based Sensor Networks

Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument

How To Filter Spam Image From A Picture By Color Or Color

PERFORMANCE ANALYSIS OF HIGH RESOLUTION IMAGES USING INTERPOLATION TECHNIQUES IN MULTIMEDIA COMMUNICATION SYSTEM

CHAPTER 2 LITERATURE REVIEW

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Understanding and Integrating KODAK Picture Authentication Cameras

Effective Management of Medical Information through ROI-Lossless Fragile Image Watermarking Technique

Statistical Modeling of Huffman Tables Coding

SSIM Technique for Comparison of Images

Source Class Identification for DSLR and Compact Cameras

Transcription:

www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for image authentication encode the signature in a file separate from the original image, so this process require extra bandwidth to transmit it. Meantime, watermarking is an information hiding sub-discipline that embeds some information into host image. In this paper a joined digital signature and digital watermarking scheme for image authentication is proposed which is based on signature generation method purposed by [4] and combined DWT-DCT watermark embedding procedure [3]. The scheme extracts signature from the original image and embeds them back into the image as watermark which leads to avoiding additional signature file. Keywords: Image Authentication, Watermark, DWT, DCT, Digital Signature, watermarking. 1. Introduction People have been always tried to develop innovative methods for secret communication, and today s rapid growth of networked multimedia systems has created one urgent need to protect digital information against illegal duplication and manipulation. In order to be successful, we should use the security systems such as cryptography and information hiding methods. There are three techniques which are interlinked; steganography, watermarking and cryptography as it has been shown in figure 1 presented by [6]. 1.1 Digital Signature Digital signature which is some sort of cryptographic is a mathematical scheme for demonstrating the authenticity of a digital message or document. Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering. They also act as checksums which are depended on the time period during which they were produced [1]. Fig 1. The different embodiment disciplines of security systems [6].

www..org 60 1.2 Watermarking Digital watermarking is the process of embedding information, call digital signature or watermarking, into a digital signal in a way that is difficult to remove. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. Like traditional watermarks, digital watermarks are only perceptible under certain conditions. To find the balance among the aspects such as robustness to various attacks, security and invisibility is the main point of digital watermarking. A watermark is a hidden signal added to images that can be detected or extracted later to make some verification about the host image [2].There are different sorts of watermarking as shown in figure 2. As it has been explained by [3], the compression, filtering, rotation, scaling, cropping, collusion attacks among many other digital signal processing operations are common Fig 2. Different sorts of watermarking studies. image manipulations, where a digital watermarking method should be effective enough to be undetectable and robust to them. Some watermarking attacks are mentioned in the figure blow. Fig 3. The classification of different watermarking attacks

www..org 61 2. The proposed scheme 2.1 Digital Signature Generation The signature generation method purposed by [4], the content dependent robust bits are extracted from the original image. In this method an image is divided into blocks of 16x16 pixels (for large images, larger size could be used). A secret key K (a number uniquely associated with an author, movie distributor, or a digital camera) is used to generate N random matrices with entries uniformly distributed in the interval [0, 1]. Then, a low-pass filter is repeatedly applied to each random matrix to obtain N random smooth patterns. After subtracting the mean from each pattern considering the block and the pattern as vectors, the image block B is projected on each pattern P i, 1 i N and its absolute value is compared with a threshold Th to obtain N bits b i : b i = { The projections do not depend on the mean gray value of the block and only depend on the variations in the block itself because of patterns P i have zero mean. The distribution of the projections is image dependent and should be adjusted accordingly so that approximately half of the bits b i are zeros and half are ones. This will guarantee the highest information content of the extracted N-tuple. This adaptive choice of the threshold becomes important for those image operations that significantly change the distribution of projections, such as contrast adjustment. Experiments in [4] showed that these extracted bits are robust to some image processing operations. In this paper these bits considered content dependent digital signature and will be embed back into the original image as watermark. 2.2 Digital Watermark Insertion and Detection There are many watermark insertion and detection algorithms in the literatures. The foremost requirement of image authentication is blind detection. Blind detection means watermark must be extracted from the watermarked image without referring to the original one. Also, the watermark can be neither too robust to be insensitive to content modification, nor to fragile to be easily corrupted bye reasonable compression[7]. In this procedure a Fig 4. Digital Signature generation frequency domain method is used [5] which is based on the joint DWT-DCT scheme. The watermark which is our extracted digital signature is scrambled by Arnold cat map and embedded in certain coefficient sets of a 3-level DWT transformed of a host image. Then, DCT transform of each selected DWT subband is computed and the PN-sequences of the watermark bits are embedded in the middle frequencies coefficients of the corresponding DCT block.

www..org 62 In extraction procedure, the watermarked image, which maybe attacked, is pre-filtered by combination of sharpening and Laplacian of Gaussian filters to increase distinction between host image and watermark information. Subsequently, the same procedures as the embedding process is used to extract the DCT middle frequencies of each sub-band. Finally, correlation between mid-band coefficients and PN-sequences is calculated to determine watermarked bits. More details can be found in [5]. Fig 5. The proposed watermark embedding procedure. Fig 6. The proposed watermark extraction and verification procedure.

www..org 63 2.3 Verification In the receiver s side, the same robust bits extraction and watermark detection methods are performed threshold, the correspondent block is regarded as being modified by others. Otherwise, the image is considered as integrity. Block based verification techniques is quite useful if the image is distributed in the Internet. If only some blocks are undesirably modified, just these blocks need to be retransmitted, which reduces the burden of the network. This is very efficient when the Internet is in congestion. 3. Experimental Results The experiment result in [4] shows that the purposed algorithm will find applications in many oblivious Watermarking schemes including secure data embedding into videos and watermarking images for tamper detection. And according to experiments and results in [5] the performance of the watermarking methods under consideration is investigated by measuring their imperceptible and robust capabilities. For the imperceptible capability, a quantitative index, Peek Signal-to-Noise Ratio (PSNR), is employed to evaluate the difference between an original image O and a watermarked image O. The watermarked is almost invisible to human visual system if PSNR value is greater than 35dB the watermarked image is within acceptable degradation levels. Authentication, International Journal of Advanced Science and Technology, Vol. 24, November, 2010. [3] Ali Al-Haj, (2007 ) Combined DWT-DCT Digital Image Watermarking, Journal of Computer Science 3 (9): 740-746, 2007. [4] J. Fridrich, (1999) Robust Bit Extraction from Images, in Proceedings of IEEE International Conference on Multimedia Computing and Systems (ICMCS 99), Vol. 2, 1999, pp. 536-540. [5] Saeed K Amirgholipour, Ahmad R. Naghsh-Nilchi, (2009) Robust Digital Image Watermarking based on joint DWT- DCT, International Journal of Digital Content Technology and its Applications, Vol. 3, No. 2. [6] A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, (2010) "Digital Image Steganography: Survey and Analysis of Current Methods," Journal of Signal Processing, 90(3)(2010) 727-752. [7] Neha Chauhanm Akhilesh A. Waoo, P. S. Patheja, Information Hiding Watermarking Detection Technique by PSNR and RGB Intensity International Journal of Computational Engineering and Management, Vol. 15 issue 6, Nov. 2012. Seyed Mohammad Mousavi recived his Associate s Degree in Computer Software from Amir Kabir Technical Academy, Arak, Iran and his Bachelor Degree in Hardwar Engineering Technology from Bahmanyar Higher Education Institute, Kerman, Iran. He is employed in Indusrial Management Institute - Qom Representative as IT Manager. His research intrests icludes Cryptography, Digital Watermarking and E- Commerce Security. 4. Conclusion Digital signature and digital watermark are two techniques used for copyright protection and authentication, respectively. In this paper, a combined digital signature and watermarking scheme is proposed for image authentication. The highest advantage of this combination besides the digital signature robustness and the watermark image imperceptibility, is that is not necessary an additional band width to transmit the digital signature, since this is embedded in the host image as a watermark. Experiments show our scheme is robust against common signal processing attacks like blurring, noising, cropping, scaling, JPEG compression and so on. References [1] M.Sreerama Murty, D.Veeraiah, Bernito A, A.Srinivas Rao,( 2011) Digital Signature and Watermark Methods For Image Authentication using Cryptography Analysis,Signal & Image Processing : An International Journal (SIPIJ) Vol.2, No.2, June 2011. [2] Dr.M.Mohamed Sathik, S.S.Sujatha, (2010) An Improved Invisible Watermarking Technique for Image