Sie sind auf Seite 1von 8

IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.1, No.

2, April 2007 77
CSES International ⓒ2007 ISSN 0973-4406

Image Authentication Method by Combining Digital Signature and Watermarking

1 2 3 4
Chia-Hung LU , Hao-Kuan TSO , Der-Chyuan LOU , and David Chien-Ting TAI

1
Department of Electrical Engineering, Military Academy
Fengshan, Kaohsiung 830, Taiwan
E-mail:rockylu9999@yahoo.com.tw
2
Department of Computer and Information Science, Military Academy
Fengshan, Kaohsiung 830, Taiwan
E-mail: hktso@cma.edu.tw
3
Department of Electrical and Electronic Engineering
Chung Cheng Institute of Technology, National Defense University
Tahsi, Taoyuan 335, Taiwan
E-mail: dclou@ccit.edu.tw
4
Department of Computer and Information Science, Military Academy
Fengshan, Kaohsiung 830, Taiwan
E-mail: dctta@cc.cma.edu.tw

Abstract Digital watermarking directly embeds some information


An image authentication method combining digital signature and into digital media such as images, audio files and videos
watermarking is proposed in this paper. The proposed method [10]. Hence, it can reduce the risk of losing the signature.
not only can resist Holliman-Memon attack, but also can A general model of watermarking system is shown as Fig.
accurately detect the tampered location of an image. First, a 2 [9]. Generally speaking, digital watermarking techniques
watermark is created from a protected image by using an edge
can be classified as spatial-domain and transform-domain
detection technique. Second, the created watermark is divided
into blocks and embedded into the 2-LSB (top layer) of the methods. Spatial-domain methods [6] [4] [11-15] embed
protected image. Third, all block signatures are calculated and some messages in the pixel values of an image directly. It
embedded into the 1-LSB (low layer) of the protected image. At has higher performance in computing but is easy distorted
the low layer, the calculated signatures can resist Holliman- suffering from attacks. The least significant bit (LSB)
Memon attack. At the top layer, the created watermark can method is the most common technique for embedding
accurately detect the tampered location of an image. messages in images. The LSB of each pixel of an image
Experimental results show that the proposed method has good can be replaced with some data bits. To increase
performance in tamper detection compared with the Celik et al.’s embedding capacity, many papers have proposed
method.
embedding some messages into two or more LSBs of each
pixel of an image [11] [16] [17].
Keywords: Image Authentication, Digital Watermarking,
Digital Signature, Tamper Detection, Holliman-Memon Attack.
Transform domain methods [18-20] are messages
embedding into the transformed coefficients. It is more
1. Introduction robustness than spatial-domain methods but with low
performance. Discrete cosine transform (DCT), discrete
Multimedia has become more and more popular due to its wavelet transform (DWT), and singular value
characteristics of easy duplication and utilization. How to decomposition (SVD) are common transform techniques.
protect the integrity of multimedia has become a very
important issue. Multimedia integrity can be authenticated In the paper, we propose an image authentication method
by using digital signature [1-5] and watermarking [6] [7]. by combining digital signature and watermarking in spatial
Digital signature is a set of features created from a domain. First, a watermark is created from a protected
medium itself. These features can be encrypted by using image by using an edge detection technique. Second, the
an encryption algorithm and store them into a file. The created watermark is divided into blocks and embedded
disadvantage is that it needs extra bandwidth to transmit into the 2-LSB (top layer) of the protected image. Third,
the signature (shown as Fig. 1 [8]). all block signatures are calculated and embedded into the
1-LSB (low layer) of the protected image. At the low layer,
the calculated signature can resist Holliman-Memon attack

Manuscript Received September 1, 2006.


Manuscript Revised March 1, 2007
78 IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.1, No.2, April 2007

[24]. At the top layer, the created watermark can detect the embedded into the LSB of X r and form the watermarked
accurate location of tampered image.
image X ′ .
The rest of this paper is organized as follows. Works The proposed method is described in Section 3. The
related to the proposed method are introduced in Section2. experimental results are shown in Section 4. Finally,
conclusions are drawn in Section 5.

|| M H
M
kp
Compareison
H E
E Dk
ks

Fig. 1 RSA signature method

2. Related Works
Recently, many researches related to image authentication
have been published. These proposed methods have the
ability to detect the tampered region of an image. The
capability is referred to as localization [9]. Most localized In the verification process, the watermarked image is first
authentication methods rely on some ways of block-wise partitioned into blocks X r′ and the signature Cr′ is
authentication. That is to say, an image is divided into
extracted from each block. Second, the image X r′′ is
blocks and each block is authenticated respectively. If a
block of the image is corrupted, only the affected block obtained by setting the LSB of the watermarked image to
fails to authenticate. zero. Third, the hash value is computed by using the image
dimension and X r′′ as Eq. (3),
In 1998, Wong [21] proposed a block-based watermarking
technique first. The detailed process is illustrated as H r′ = H ( M , N , X r′′). (3)
follows. The original image X is a gray-level image with
M by N pixels. The watermark W is a binary image with Finally, each block of the watermark Wr′ is obtained by
M by N pixels formed by tiling a binary image Y. First,
the original image X and the watermark W are divided into XORing the computed hash value H r′ with the decrypted
non-overlapping blocks with m by n pixels respectively, signatures Cr′ from each block as Eq. (4),
th
where X r and Wr represent the r block of the original
Wr′ = Dk ( H r′ ⊕ Cr′ ). (4)
image X and the watermark W. Second, a corresponding
block Xˆ r is formed by setting the LSB of each block X r where Dk denotes the decryption function. Although the
to zero. Third, the image dimension is utilized to compute proposed method can detect the tampered region of an
the hash value as Eq. (1), image, embedding the hash value into separated block
H r = H ( M , N , Xˆ r ), (1) exists a disadvantage. The blocks of the image can be
where H denotes the cryptographic hash function such as swapped within the image. This is the known Holliman-
MD5 [22]. Forth, the signature of each block is generated Memon attack [24].
by XORing the computed hash value with the
corresponding watermark pattern. The above result is The Holliman-Memon attack is an attack type of applying
encrypted by the public key cryptosystem [23] as Eq. (2), to block-wise watermark. Both Holliman and Memon
consider that embedding the signature into each block of
Cr = Ek ( H r ⊕ Wr ), (2)
an image only depends on the content of the block, which
where ⊕ denotes the XOR operation and Ek denotes the is referred to as block-wise independence. By utilizing the
weakness of the block-wise independence, the attacker can
encryption function. Finally, the signature Cr is create a new image by assembling the independent and
authentic blocks. Furthermore, when an attacker obtains
some images, they can be viewed as a large database of
Image Authentication Method by Combining Digital Signature and Watermarking 79

these authentic blocks. Hence, if the attacker wants to 3. The Proposed Method
forge a watermark in an image, the attacker can divide the
image into blocks and replace each block with the most
similar block from the database. The more the images are, 3.1. The embedding process
the better the similarities are [9].

To prevent the problem of the Holliman-Memon attack, The original image X is a gray-level image with M by N
Wong and Memon [25] proposed another method by pixels, i.e.,
embedding every block index to an image. However, the X = { x(i, j) | 0 ≤ i ≤ M −1,0 ≤ j ≤ N −1,0 ≤ x(i, j) ≤ 255} . (5)
attacker can also launch the counterfeiting attack and Step 1: Set the least two bits of every pixel of the image
to zero and obtain the image X ′ .
create the counterfeiting image from a large database of
these watermarked images [25] [26]. Selecting a large
Step 2: Utilize an edge detection technique to create the
block can reduce the effectiveness of the attack. However,
watermark, i.e.,
if the attacker can obtain quite large images, reasonable a b
forgery can still be happened. Hence, increasing the block
size is not a good method to thwart the Holliman-Memon
W (i , j ) = ∑ ∑ z ( s, t ) x′(i + s, j + t ), (6)
s=−a t =−b
attack [25]. Moreover, using larger blocks will also where a = ( p − 1) / 2 , b = ( q − 1) / 2 , p × q is size
worsen the accuracy of the tampered localization [4] [9]
of the filter mask.
[26]. The counterfeiting problem mentioned above can be
Step 3: Convert the watermark into binary image.
avoided by adding the block dimension [4].
Step 4: Divide the watermark into blocks Wmn′ , then
The same authors proposed another method to thwart the permute each block (shown as Fig. 3) and encrypt
attack by including the image index [6]. The method is them by Kp , i.e.,
similar to use a different key for every image and actually W%mn (i, j ) = K p ⊕ Wmn′ (i, j ), (7)
solves the problem. However, when an user wants to
authenticate the image, the image index must be known in where ⊕ denotes the XOR operation.
advance by users [6] [26]. Hence, the solution is Step 5: Embed the watermark into the 2-LSB of every
impractical in real application. Moreover, managing pixel of image X ′ .
different indexes for all images in a database are also an Step 6: Set the least significant bit of every pixel of the
enormous burden [4]. In 1999, Wu et al. [27] suggested image to zero and divide the image X ′′ into
using a larger surrounding neighborhood (e.g., 32 by 32) ′′ .
blocks X mn
to be hash and inserted in a smaller block (e.g., 24 by 24).
Step 7: Compute the larger adjacent blocks (e.g., the 3 by
The method is an elegant solution to solve the above
3 windows), then encrypt them by the private key
problem [4] [6] [25] [26]. However, it will lose the
and insert into the middle block (shown as Fig. 4)
accuracy of the tampered localization [5] [26].
as Eq. (8),
In 2002, Celik et al. [4] proposed another solution to S mn = Ek ( H { X m′′+ o , n + p : o, p ∈ {−1, 0,1}}). (8)
s

prevent the Holliman-Memon attack. They partition an Step 8: Embed the signature into the 1-LSB of every
image into hierarchical structure, and then the signature of
′′′ and obtain the stego image X̂ .
pixel of X mn
each layer is embedded into the LSB of the image
respectively. However, when the image is tampered, their The embedding process of the digital signature and
method can only find out the block localization of the watermarking is shown in Fig. 5.
tampered region rather than the accurate location of the
tampered region. Moreover, their solution is very
1 2 3 4 9 1 1 2
complicated [26].
5 6 7 8 1 1 5 6
Based on the above discussion, we propose a new method
combining digital signature and watermarking to improve 9 1 1 1 1 1 3 4
the disadvantage of celik et al.’s method.
The proposed method not only can resist Holliman- 1 1 1 1 1 1 7 8
Memon attack, but also can accurately detect the tampered
location of an image.
Fig.3 Permuting blocks.
80 IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.1, No.2, April 2007

Sliding window Step 3: Label the corresponding block if the verification


result is false in Step 2.
Step 4: Extract the watermark from the 2-LSB of every
pixel of the stego image, then decrypt them by Kp
and recombination blocks to obtain W ′ .
Step 5: Set least two bits of every pixel of the stego
image to zero and create a watermark Ŵ by an
edge detection technique.
Step 6: Convert Ŵ into the binary image.
Fig. 4 Computing the larger adjacent blocks
and inserting into the middle block. Step 7: Compare the difference between blocks according
to the result of Step 3 and label the wrong bit as
Eq. (11),
⎧ True, if Wˆmn (i, j) = Wmn′ (i, j)
Verfication = ⎨ (11)
⎩False, Otherwise.
The extraction process of the digital signature and
watermarking is shown in Fig. 6.

Fig. 5 The embedding process of the digital


signature and watermarking.

3.2. The verification process Fig. 6 The extraction process of the digital
signature and watermarking.
Step 1: Divide the stego image X̂ into blocks Xˆ mn , then
extract the signature from the 1-LSB of every
pixel of Xˆ mn and decrypt them by the public key, 4. The Experimental Results
i.e.,
We use a gray-level image of size 256 by 256, called
′ = DK ( S mn
H mn ′ ). (9) “Lena”, as the protected image (as shown in Fig. 7(a)).
p
First, the least two bits of every pixel of the protected
Step 2: Obtain Smn ′′ by computing the larger adjacent image are set to zero. Then the watermark is created by an
edge detection technique (as shown in Fig. 7(b)). Finally,
blocks and compare the difference between the digital signature is created by computing the larger
blocks as Eq. (10), adjacent blocks and inserted into the middle block. Fig.
⎧ True, if Hmn′ = H (Smn′′ ) 7(c) shows the result of embedding the watermark and the
Verfication = ⎨ (10) digital signature into the image. The PSNR (Peak Signal to
⎩False, Otherwise.
Noise Ratio) is 42.59 dB. The PSNR is defined as follows:
Image Authentication Method by Combining Digital Signature and Watermarking 81

2
255
PSNR = 10 log10 ( dB), (12)
MSE
m −1 n − 1 2
1
MSE =
m×n
∑ ∑ ( X ij − X ij′ ) , (13)
i =0 j =0

where X ij and X ij′ represent the protected image and (a) (b )


stego image respectively. A larger PSNR value represents
little difference between the protected image and the stego
image. In general, it is very difficult to distinguish the
difference between the protected image and the stego
image if the PSNR value is greater than 30 dB.

To detect whether the stego image is tampered or not, the


digital signature and watermarking are extracted from the
stego image to verify the integrity of the image. Fig. 7(d) (c ) (d)
shows the image has been tampered. The labeled block of
tampered image is shown in Fig. 7(e). Fig. 7(f) shows the
accurate location of the tampered image. Moreover, we
use another image with size of 256 by 256, called
“Baboon”, to be the protected image (as shown in Fig.
8(a)). Fig. 8(b) shows that the stego-image has been
tampered with different range. Fig. 8(c) and Fig. 8(d)
show the labeled block and accurate location of the (e ) (f )
tampered image respectively. The experimental result
shows that although the low layer loses the accuracy of the Fig. 7 (a)The protected image, (b)the watermark, (c)the
tampered image by using the larger adjacent blocks, the stego image. (d)the tampered image, (e)the labeled region
high layer can accurately detect the tampered location of of the tampered image, (f)the accurate location of the
the image. tampered image.

In 2002, Celik et al. [4] proposed an image authentication


method with localization. However, by dividing the image
into hierarchical structure and computing the signature of
each layer, the method is too complicated [26]. Moreover,
their method can not accurately detect the tampered
location of the image. Table 1 shows the comparison
results with the Celik et al.’s method [4].
(a) ( b)
Table 1 The comparison results of different methods.
Holliman-
Hierarchical Tamper
Memon
structure detection
attack
The
propose Accurate
Two layers Can resist
d location (c ) (d)
method
Celik et Fig. 8 (a)The protected image, (b)the tampered image,
al.’s (c)the labeled block of the tampered image, (d)the accurate
even layers Can resist Localization
method location of the tampered image.
[4]
82 IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.1, No.2, April 2007

5. Conclusions [10] F. Gonzalez and J. Hernandez, “A tutorial on digital


watermarking,” Proceedings of IEEE 33rd Annual
In this paper, we describe the main characteristics of International Carnahan Conference on Security
Technology, pp. 286-292, Oct. 1999.
digital signature and watermarking. We also summarize
some limits of current technologies in tamper detection of [11] D.-C. Lou and J.-L. Liu, “Steganographic method for secure
digital image. Based on the above observation, we propose communications,” Computers & Security, Vol. 21, No. 5,
an image authentication method combining digital Oct. 2002, pp. 449-460.
signature and watermarking. [12] M. Kutter, F. Jordan, and F. Bossen, “Digital signature of
color images using amplitude modulation,” Journal of
By embedding the digital signature and watermarking into Electronic Imaging, Vol. 7, No. 2, April 1998, pp. 326-332.
an image, the proposed method not only can resist [13] M. D. Swanson, M. Kobayashi, and A. H. Tewfik,
Holliman-Memon attack, but also can accurately detect the “Multimedia data embedding and watermarking
tampered location of the image. Experimental results show technologies,” Proceedings of IEEE International
that the proposed method has good performance in tamper Conference on spectrum, June 1998, Vol. 86, No. 6, pp.
detection compared with the Celik et al.’s method. In the 1064-1087.
future, we will focus on the research of recovering the [14] Z.-M. Lu, D.-G. Xu, and S.-H. Sun, “Multipurpose image
tampered image and enhancing the robustness of watermarking algorithm based on multistage vector
watermarking. quantization,” IEEE Transactions on Image Processing,
Vol. 14, No. 6, June 2005, pp. 822-831.

References [15] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber,


“Lossless generalized-LSB data embedding,” IEEE
[1] G. L. Friedman, “The trustworthy digital camera: restoring
Transactions on Image Processing, Vol. 14, No. 2, Feb.
credibility to the photographic image,” IEEE Transactions
2005, pp. 253-266,.
on Consumer Electronics, Vol. 39, Nov. 1993, pp. 905-
910. [16] W. N. Lie and L. C. Chang, “Data hiding in images with
adaptive numbers of least significant bits based on the
[2] C.-Y. Lin and S.-F. Chang, “A robust image authentication
human visual system,” Proceedings of IEEE International
method distinguishing JPEG compression from malicious
manipulation,” IEEE Transactions on Circuits and Conference on Image Processing, Oct. 1999, Vol. 1, pp.
Systems for Video Technology, Vol. 11, No. 2, June 1999, 286-290.
pp. 153-168. [17] Y.-K. Lee and L.-H. Chen, “High capacity image
[3] C.-S. Lu and H.-Y. Liao, “Structural digital signature for steganographic model,” IEE Proceedings - Vision, Image
image authentication: an incidental distortion resistant Signal Processing, Vol. 147, No. 3, June 2000, pp. 288-294.
scheme,” IEEE Transactions on Multimedia, Vol. 5, No. [18] C.-T. Hsu and J.-L. Wu, “Hidden digital watermarking in
2, June 2003, pp. 161-173. images,” IEEE Transactions on Image Processing, Vol. 8,
[4] M. U. Celik, G. Sharma, and E. Saber, “Hierarchical No. 1, Jan. 1999, pp. 58-68.
watermarking for secure image authentication with [19] P. Bao and X. Ma, “Image adaptive watermarking using
localization,” IEEE Transactions on Image Processing, wavelet domain singular value decomposition,” IEEE
Vol. 11, No. 6, June 2002, pp. 585-594. Transactions on Circuits and Systems for Video
[5] P. W. Wong and N. Memon, “Secret and public key image Technology, Vol. 15, No. 1, Jan. 2005, pp. 97-102.
watermarking schemes for image authentication and [20] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon,
ownership verification,” IEEE Transactions on Image “Secure spread spectrum watermarking for multimedia,”
Processing, Vol. 10, No. 10, Oct. 2001, pp. 1593-1601. IEEE Transactions on Image Processing, Vol. 6, No. 12,
[6] C.-S. Lu and H.-Y. Liao , “Multipurpose watermarking for Dec. 1997, pp. 1673-1687.
image authentication and protection,” IEEE Transactions [21] P. W. Wong, “A public key watermark for image
on Image Processing, Vol. 10, No. 10, Oct. 2001, pp. verification and authentication,” Proceedings of ICIP,
1579-1592. Chicago, Oct. 1998, IL, pp. 425-429.
[7] L. Xie and G. R. Arce, “A class of authentication digital [22] R. L. Rivest, “The MD5 message digest algorithm,” Tech.
watermarks for secure multimedia communication,” IEEE Report, 1992.
Transactions on Image Processing, Vol. 10, No. 11, Nov.
[23] R. L. Rivest, A. Shamir, and L. Adleman, “A method for
2001, pp. 1754-1764.
obtaining digital signatures and public-key cryptosystems,”
[8] S. William, Cryptography and network security, 3rd Communications of the ACM, Vol. 21, Feb. 1978, pp.
Edition, Prentice Hall, Upper Saddle River, New Jersey, 120-126.
2002.
[24] M. Holliman and N. Memon, “Counterfeiting attacks on
[9] I. J Cox, M. L. Miller, and J. A. Bloom, Digital oblivious block-wise independent invisible watermarking
watermarking, Morgan Kaufmann, San Francisco, USA,
2002.
Image Authentication Method by Combining Digital Signature and Watermarking 83

schemes,” IEEE Transactions on Image Processing, Vol. [27] C. W. Wu, D. Coppersmith, F. C. Mintzer, C. P. Tresser,
9, No. 3, March 2000, pp. 432-441. and M. M. Yeung, “Fragile imperceptible digital watermark
with privacy control,” Proceedings of SPIE Security and
[25] M. Holliman and N. Memon, “Secret and public key
authentication watermarking schemes that resist vector Watermarking of Multimedia Contents, Vol. 3657, No. 8,
quantization attack,” Proceedings of SPIE Security and April 1999, pp. 79−84.
Watermarking of Multimedia Contents, Vol. 3971, No. [28] C. G. Rafael and E. W. Richard, Digital image processing,
40, Jan. 2000, pp. 417−427. 2nd Edition, Prentice Hall, Upper Saddle River, New Jersey,
[26] Fridrich, “Security of fragile authentication watermarks 2002.
with localization,” Proceedings of SPIE Security and
Watermarking of Multimedia Contents, April 2002, Vol.
4675, pp. 691-700.

Das könnte Ihnen auch gefallen