Beruflich Dokumente
Kultur Dokumente
2, April 2007 77
CSES International ⓒ2007 ISSN 0973-4406
1 2 3 4
Chia-Hung LU , Hao-Kuan TSO , Der-Chyuan LOU , and David Chien-Ting TAI
1
Department of Electrical Engineering, Military Academy
Fengshan, Kaohsiung 830, Taiwan
E-mail:rockylu9999@yahoo.com.tw
2
Department of Computer and Information Science, Military Academy
Fengshan, Kaohsiung 830, Taiwan
E-mail: hktso@cma.edu.tw
3
Department of Electrical and Electronic Engineering
Chung Cheng Institute of Technology, National Defense University
Tahsi, Taoyuan 335, Taiwan
E-mail: dclou@ccit.edu.tw
4
Department of Computer and Information Science, Military Academy
Fengshan, Kaohsiung 830, Taiwan
E-mail: dctta@cc.cma.edu.tw
[24]. At the top layer, the created watermark can detect the embedded into the LSB of X r and form the watermarked
accurate location of tampered image.
image X ′ .
The rest of this paper is organized as follows. Works The proposed method is described in Section 3. The
related to the proposed method are introduced in Section2. experimental results are shown in Section 4. Finally,
conclusions are drawn in Section 5.
|| M H
M
kp
Compareison
H E
E Dk
ks
2. Related Works
Recently, many researches related to image authentication
have been published. These proposed methods have the
ability to detect the tampered region of an image. The
capability is referred to as localization [9]. Most localized In the verification process, the watermarked image is first
authentication methods rely on some ways of block-wise partitioned into blocks X r′ and the signature Cr′ is
authentication. That is to say, an image is divided into
extracted from each block. Second, the image X r′′ is
blocks and each block is authenticated respectively. If a
block of the image is corrupted, only the affected block obtained by setting the LSB of the watermarked image to
fails to authenticate. zero. Third, the hash value is computed by using the image
dimension and X r′′ as Eq. (3),
In 1998, Wong [21] proposed a block-based watermarking
technique first. The detailed process is illustrated as H r′ = H ( M , N , X r′′). (3)
follows. The original image X is a gray-level image with
M by N pixels. The watermark W is a binary image with Finally, each block of the watermark Wr′ is obtained by
M by N pixels formed by tiling a binary image Y. First,
the original image X and the watermark W are divided into XORing the computed hash value H r′ with the decrypted
non-overlapping blocks with m by n pixels respectively, signatures Cr′ from each block as Eq. (4),
th
where X r and Wr represent the r block of the original
Wr′ = Dk ( H r′ ⊕ Cr′ ). (4)
image X and the watermark W. Second, a corresponding
block Xˆ r is formed by setting the LSB of each block X r where Dk denotes the decryption function. Although the
to zero. Third, the image dimension is utilized to compute proposed method can detect the tampered region of an
the hash value as Eq. (1), image, embedding the hash value into separated block
H r = H ( M , N , Xˆ r ), (1) exists a disadvantage. The blocks of the image can be
where H denotes the cryptographic hash function such as swapped within the image. This is the known Holliman-
MD5 [22]. Forth, the signature of each block is generated Memon attack [24].
by XORing the computed hash value with the
corresponding watermark pattern. The above result is The Holliman-Memon attack is an attack type of applying
encrypted by the public key cryptosystem [23] as Eq. (2), to block-wise watermark. Both Holliman and Memon
consider that embedding the signature into each block of
Cr = Ek ( H r ⊕ Wr ), (2)
an image only depends on the content of the block, which
where ⊕ denotes the XOR operation and Ek denotes the is referred to as block-wise independence. By utilizing the
weakness of the block-wise independence, the attacker can
encryption function. Finally, the signature Cr is create a new image by assembling the independent and
authentic blocks. Furthermore, when an attacker obtains
some images, they can be viewed as a large database of
Image Authentication Method by Combining Digital Signature and Watermarking 79
these authentic blocks. Hence, if the attacker wants to 3. The Proposed Method
forge a watermark in an image, the attacker can divide the
image into blocks and replace each block with the most
similar block from the database. The more the images are, 3.1. The embedding process
the better the similarities are [9].
To prevent the problem of the Holliman-Memon attack, The original image X is a gray-level image with M by N
Wong and Memon [25] proposed another method by pixels, i.e.,
embedding every block index to an image. However, the X = { x(i, j) | 0 ≤ i ≤ M −1,0 ≤ j ≤ N −1,0 ≤ x(i, j) ≤ 255} . (5)
attacker can also launch the counterfeiting attack and Step 1: Set the least two bits of every pixel of the image
to zero and obtain the image X ′ .
create the counterfeiting image from a large database of
these watermarked images [25] [26]. Selecting a large
Step 2: Utilize an edge detection technique to create the
block can reduce the effectiveness of the attack. However,
watermark, i.e.,
if the attacker can obtain quite large images, reasonable a b
forgery can still be happened. Hence, increasing the block
size is not a good method to thwart the Holliman-Memon
W (i , j ) = ∑ ∑ z ( s, t ) x′(i + s, j + t ), (6)
s=−a t =−b
attack [25]. Moreover, using larger blocks will also where a = ( p − 1) / 2 , b = ( q − 1) / 2 , p × q is size
worsen the accuracy of the tampered localization [4] [9]
of the filter mask.
[26]. The counterfeiting problem mentioned above can be
Step 3: Convert the watermark into binary image.
avoided by adding the block dimension [4].
Step 4: Divide the watermark into blocks Wmn′ , then
The same authors proposed another method to thwart the permute each block (shown as Fig. 3) and encrypt
attack by including the image index [6]. The method is them by Kp , i.e.,
similar to use a different key for every image and actually W%mn (i, j ) = K p ⊕ Wmn′ (i, j ), (7)
solves the problem. However, when an user wants to
authenticate the image, the image index must be known in where ⊕ denotes the XOR operation.
advance by users [6] [26]. Hence, the solution is Step 5: Embed the watermark into the 2-LSB of every
impractical in real application. Moreover, managing pixel of image X ′ .
different indexes for all images in a database are also an Step 6: Set the least significant bit of every pixel of the
enormous burden [4]. In 1999, Wu et al. [27] suggested image to zero and divide the image X ′′ into
using a larger surrounding neighborhood (e.g., 32 by 32) ′′ .
blocks X mn
to be hash and inserted in a smaller block (e.g., 24 by 24).
Step 7: Compute the larger adjacent blocks (e.g., the 3 by
The method is an elegant solution to solve the above
3 windows), then encrypt them by the private key
problem [4] [6] [25] [26]. However, it will lose the
and insert into the middle block (shown as Fig. 4)
accuracy of the tampered localization [5] [26].
as Eq. (8),
In 2002, Celik et al. [4] proposed another solution to S mn = Ek ( H { X m′′+ o , n + p : o, p ∈ {−1, 0,1}}). (8)
s
prevent the Holliman-Memon attack. They partition an Step 8: Embed the signature into the 1-LSB of every
image into hierarchical structure, and then the signature of
′′′ and obtain the stego image X̂ .
pixel of X mn
each layer is embedded into the LSB of the image
respectively. However, when the image is tampered, their The embedding process of the digital signature and
method can only find out the block localization of the watermarking is shown in Fig. 5.
tampered region rather than the accurate location of the
tampered region. Moreover, their solution is very
1 2 3 4 9 1 1 2
complicated [26].
5 6 7 8 1 1 5 6
Based on the above discussion, we propose a new method
combining digital signature and watermarking to improve 9 1 1 1 1 1 3 4
the disadvantage of celik et al.’s method.
The proposed method not only can resist Holliman- 1 1 1 1 1 1 7 8
Memon attack, but also can accurately detect the tampered
location of an image.
Fig.3 Permuting blocks.
80 IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.1, No.2, April 2007
3.2. The verification process Fig. 6 The extraction process of the digital
signature and watermarking.
Step 1: Divide the stego image X̂ into blocks Xˆ mn , then
extract the signature from the 1-LSB of every
pixel of Xˆ mn and decrypt them by the public key, 4. The Experimental Results
i.e.,
We use a gray-level image of size 256 by 256, called
′ = DK ( S mn
H mn ′ ). (9) “Lena”, as the protected image (as shown in Fig. 7(a)).
p
First, the least two bits of every pixel of the protected
Step 2: Obtain Smn ′′ by computing the larger adjacent image are set to zero. Then the watermark is created by an
edge detection technique (as shown in Fig. 7(b)). Finally,
blocks and compare the difference between the digital signature is created by computing the larger
blocks as Eq. (10), adjacent blocks and inserted into the middle block. Fig.
⎧ True, if Hmn′ = H (Smn′′ ) 7(c) shows the result of embedding the watermark and the
Verfication = ⎨ (10) digital signature into the image. The PSNR (Peak Signal to
⎩False, Otherwise.
Noise Ratio) is 42.59 dB. The PSNR is defined as follows:
Image Authentication Method by Combining Digital Signature and Watermarking 81
2
255
PSNR = 10 log10 ( dB), (12)
MSE
m −1 n − 1 2
1
MSE =
m×n
∑ ∑ ( X ij − X ij′ ) , (13)
i =0 j =0
schemes,” IEEE Transactions on Image Processing, Vol. [27] C. W. Wu, D. Coppersmith, F. C. Mintzer, C. P. Tresser,
9, No. 3, March 2000, pp. 432-441. and M. M. Yeung, “Fragile imperceptible digital watermark
with privacy control,” Proceedings of SPIE Security and
[25] M. Holliman and N. Memon, “Secret and public key
authentication watermarking schemes that resist vector Watermarking of Multimedia Contents, Vol. 3657, No. 8,
quantization attack,” Proceedings of SPIE Security and April 1999, pp. 79−84.
Watermarking of Multimedia Contents, Vol. 3971, No. [28] C. G. Rafael and E. W. Richard, Digital image processing,
40, Jan. 2000, pp. 417−427. 2nd Edition, Prentice Hall, Upper Saddle River, New Jersey,
[26] Fridrich, “Security of fragile authentication watermarks 2002.
with localization,” Proceedings of SPIE Security and
Watermarking of Multimedia Contents, April 2002, Vol.
4675, pp. 691-700.