Binary Image Authentication Watermarking Scheme Against Collage Attack
-
摘要: 为提高算法抵抗拼贴攻击的能力,本文结合块相关思想提出一种二值图像认证算法.该算法首先将每个图像块中的像素点分为“可翻转”和“不可翻转”两类,将“不可翻转”像素点 Hash 生成水印信息,用其替代相应映射块的“可翻转”像素点实现水印嵌入.通过比较图像块重构水印及提取水印的一致性判断该图像块的真实性,并结合各图像块邻域篡改特征进一步提高篡改检测性能.实验结果表明,该算法不仅提高了在替换、添加、删除攻击下的篡改检测性能,而且能够有效抵抗拼贴攻击.Abstract: To improve the ability against collage attack, a watermarking scheme for binary image authentication is proposed by introducing dependence of blocks in this paper. In the proposed algorithm, all pixels in each block are divided into the flipped pixels and the unflipped ones. The watermark information of each block is generated by hashing the unflipped pixels of it, and embedded in the flipped pixels of the corresponding mapping block. The authenticity of each block is detected by comparing the consistency between the reconstructed watermark and the extracted one. The neighborhood tampering feature is used to improve the tamper detection performance. Experimental results show that the proposed algorithm can not only improve the performance of tamper detection in the general tampering such as replace, add, delete, etc., but also effectively resist collage attack.
-
Key words:
- Binary image /
- collage attack /
- block correlation /
- neighborhood tampering feature
-
[1] Zhou Lin-Na. Study of Digital Forensics Based on Image Content [Ph.D. dissertation], Beijing University of Posts and Telecommunications, China, 2007 (周琳娜. 数字图像盲取证技术研究 [博士学位论文], 北京邮电大学, 中国, 2007) [2] Huang F J, Huang J W, Shi Y Q. Detecting double JPEG compression with the same quantization matrix. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 848-856 [3] Peng F, Nie Y Y, Long M. A complete passive blind image copy-move forensics scheme based on compound statistics features. Forensic Science International, 2011, 212(1-3): e21-e25 [4] Mahalakshmi S D, Vijayalakshmi K, Priyadharsini S. Digital image forgery detection and estimation by exploring basic image manipulations. Digital Investigation, 2012, 8(3-4): 215-225 [5] Stamm M C, Liu K J R. Anti-forensics of digital image compression. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 1050-1065 [6] Haouzia A, Noumeir R. Methods for image authentication: a survey. Multimedia Tools and Applications, 2008, 39(1): 1-46 [7] Qi Ke, Xie Dong-Qing. Watermarking scheme against geometrical attacks based on second generation Bandelet. Acta Automatica Sinica, 2012, 38(10): 1646-1653(綦科, 谢冬青. 基于第二代Bandelet变换的抗几何攻击图像水印. 自动化学报, 2012, 38(10): 1646-1653) [8] Aldeeb N H H, Abuhaiba I S I. An improved watermarking scheme for tiny tamper detection of color images. International Journal of Image, Graphics and Signal Processing, 2013, 5(5): 1-14 [9] He H J, Chen F, Tai H M, Kalker T, Zhang J S. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 185-196 [10] Tzeng C H, Tsai W H. A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement. IEEE Communications Letters, 2003, 7(9): 443-445 [11] Yang H J, Alex C K. Binary image authentication with tampering localization by embedding cryptographic signature and block identifier. IEEE Signal Processing Letters, 2006, 13(12): 741-744 [12] Xi Y H, Zhang M R. A document watermarking algorithm based on partitioned character image. In: Proceedings of the 2009 International Conference on E-Business and Information System Security. Wuhan, China: IEEE, 2009. 1-4 [13] Kwon O J, Kim W G, Kim Y. Binary image watermarking with tampering localization in binary wavelet transform domain. International Journal of Multimedia and Ubiquitous Engineering, 2012, 7(2): 341-346 [14] Wu M, Liu B D. Data hiding in binary image for authentication and annotation. IEEE Transactions on Multimedia, 2004, 6(4): 528-538 [15] Zhu Cong-Xu, Chen Zhi-Gang. Sensitive chaotic fragile watermarking technique for binary images verification. Mini-Micro Systems, 2006, 27(1): 151-154(朱从旭, 陈志刚. 一种灵敏的文本图像认证混沌脆弱水印技术. 小型微型计算机系统, 2006, 27(1): 151-154) [16] Li Zhao-Hong, Hou Jian-Jun, Song Wei. Binary document image authentication watermarking technique based on hierarchical structure. Acta Automatica Sinica, 2008, 8(8): 841-848(李赵红, 侯建军, 宋伟. 基于等级结构的二值文本图像认证水印算法. 自动化学报, 2008, 8(8): 841-848) [17] Fridrich J, Goljan M, Memon N. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262-274 [18] Wang Z, Bovik A C, Sheikh H R, Simoncelli E P. Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing, 2004, 13(4): 600-612 [19] He Hong-Jie, Zhang Jia-Shu. Chaos-based scramble self-embedding watermarking algorithm. Journal on Communications, 2006, 27(7): 80-86, 93(和红杰, 张家树. 基于混沌置乱的分块自嵌入水印算法. 通信学报, 2006, 27(7): 80-86, 93) [20] He Hong-Jie. Digital Image Secure Authentication Watermarking Algorithms and Their Performance Analysis of Statistical Detection [Ph.D. dissertation]. Southwest Jiaotong University, China, 2009(和红杰. 数字图像安全认证水印算法及其统计检测性能分析 [博士学位论文], 西南交通大学, 中国, 2009)
点击查看大图
计量
- 文章访问数: 1770
- HTML全文浏览量: 76
- PDF下载量: 551
- 被引次数: 0