KR20120055070A - System and method for lossless digital watermarking for image integrity - Google Patents
System and method for lossless digital watermarking for image integrity Download PDFInfo
- Publication number
- KR20120055070A KR20120055070A KR1020100116572A KR20100116572A KR20120055070A KR 20120055070 A KR20120055070 A KR 20120055070A KR 1020100116572 A KR1020100116572 A KR 1020100116572A KR 20100116572 A KR20100116572 A KR 20100116572A KR 20120055070 A KR20120055070 A KR 20120055070A
- Authority
- KR
- South Korea
- Prior art keywords
- watermark
- image
- value
- block
- input image
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03K—PULSE TECHNIQUE
- H03K19/00—Logic circuits, i.e. having at least two inputs acting on one output; Inverting circuits
- H03K19/20—Logic circuits, i.e. having at least two inputs acting on one output; Inverting circuits characterised by logic function, e.g. AND, OR, NOR, NOT circuits
- H03K19/21—EXCLUSIVE-OR circuits, i.e. giving output if input signal exists at only one input; COINCIDENCE circuits, i.e. giving output only if all input signals are identical
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8358—Generation of protective data, e.g. certificates involving watermark
Abstract
Description
The present invention uses a method of embedding a watermark with embedding and distortion to generate a recoverable image data signal, and receiving reconstruction data to reconstruct the original image signal. The present invention relates to a method of inserting auxiliary data into an original image signal. The invention also relates to a corresponding apparatus for embedding a watermark signal in an original video signal.
The present invention relates to a method for reconstructing and reconstructing a watermarked original video signal by 100%, and a composite video information signal for extracting embedded data.
The purpose of authentication and integrity of digital images is to identify the creator of the content and to verify that the content of the content has not been altered or tampered with. In addition, if the content has been modified, it is necessary to identify where the modification has been made. The method of checking whether the image is deformed (manipulated) is a digital signature and a watermarking system. The watermarking system has a problem of slightly damaging the image, but since the watermark is directly inserted into the image, there is no need to store additional data. Digital Signature does not use the unique structure of the image because it regards the image as a simple data sequence, but the watermarking system can take advantage of the structural characteristics of the image so that the position and the type of modulation in the image space can be known.
There are many ways to ensure the authentication and integrity of an image.
The following shows various methods for authentication and integrity.
Wong proposed a method using MD5, a cryptographic hash function (P. W. Wong, "A watermark for image integrity and ownership verification," In Proceedings of IS & T PIC Conference, May 1998). First, the image is divided into blocks of I * J pixel size. (I * J <128) Then the LSB (least significant bit) portion of each block is removed. This creates a digital signature by passing the remaining significant bits (MSBs), the size of the image, and the secret-key through a cryptographic hash function. The generated signature is combined with the watermark image to be inserted through the XOR operation and inserted into the LSB portion of the image block. The process of extracting a watermark from the watermarked image first divides the image into blocks of size I * J pixels. Then, each block's MSBs, image size, and secret key are used to create a digital signature. Then, the LSB of the block and the digital signature and XOR operation obtained earlier will display the first inserted watermark image. Wong's algorithm first inserts a watermark in the image using A's secret key. If B wants to verify the authenticity and integrity, he can extract the correct watermark image using the correct private key. However, if B tries to check the watermark using the wrong key, or if the image is enlarged or only partially cropped, noise will appear instead of the watermark image. Also, when a part of the image pixel is changed, it is possible to check which part of the pixel has changed.
Wong extended the previous watermarking algorithm to apply public key encryption algorithms (P. W. Wong, "A public key watermark for image verification and authentication," In Proceedings of ICIP, Oct. 1998). In other words, the user's private key is used to insert the watermark, and the person's public key is used to extract the watermark. This method is similar to the previous method. First, the image is divided into blocks having a specific size (I * J). In each block, the LSB of each image pixel is deleted, and a digital signature can be obtained by passing the hash function using the remaining portion of the MSBs and the size information of the image. It then encrypts this signature with the user's private key and performs an XOR operation with the image you want to insert as a watermark. Then reinsert it into the LSB portion of the image block. Wong's public key watermark method using public key cryptographic algorithm is the most suitable watermark method for authentication and integrity. In particular, Wong's method uses cryptographic hash functions, so the security of the watermarking algorithm depends on the security of the cryptographic hash functions. However, one of the characteristics of cryptographic hash function is that it is very difficult to break cryptographic hash function, so the method proposed by Wong is safe. Wong's proposed algorithm has two problems. The problem that results from many watermarking and data-hiding schemes is that the original video signal into which the watermark data is inserted is distorted.
Sources of distortion include rounding errors, rounding errors, and quantization errors. This distortion is problematic in some applications, such as media analysis and law enforcement, because it is important to accurately restore the original image to its pre-insertion state as soon as the hidden data is retrieved. Watermarking techniques that meet this requirement are referred to as lossless or distortion free.
Integrity verification and lossless watermarking are efficient for integrity verification because they are a method of restoring the original in the future, unlike watermarking that damages the original. In the case of medical images, if the image reading is performed without reconstructing the original image with integrity verification, it can probablely cause the wrong care of the reader. In the present invention, when the watermark is inserted and the watermark is extracted using a lossless technique, the original image can be restored at the same time as the integrity verification.
In order to achieve the above object, a method for embedding a lossless digital watermark for integrity authentication of a digital image according to the present invention includes converting an input image into a predetermined block;
Dividing the least significant bit values representing the characteristics of the input image and a watermarking block into which a watermark is to be inserted;
Calculating the LSB region of the input image by MD5 hash function value and XOR operation;
Generating a pseudo noise sequence using a private secret key and inserting the pseudo noise sequence into the hash function result value and the input image;
And inserting the feature value into the watermarking block as a watermark.
In addition, a method for extracting a lossless digital watermark for authenticating the integrity of a digital image according to the present invention comprises: dividing an input image into predetermined blocks;
Extracting least significant bits from the divided input image;
Dividing the input image into a predetermined size based on the extracted least significant bit;
And determining the integrity and the forgery of the input image according to the difference between the pseudo sequence value generated as the secret key value and the feature value in the watermarking block.
Hereinafter, a method of inserting and extracting a digital watermark for authenticating a digital image according to the present invention will be described in detail with reference to the accompanying drawings.
The process of embedding the watermark includes
The least significant bit of the image to be used as the input of FIG. 4 is divided into 16 * 8 pixel forms (110) and all LSB values are initialized to zero. In the
The watermark extraction process is performed through the extraction
Conventional fragile watermarking has been used to discriminate forgery of an image, but it does not reconstruct the original image at the same time as watermark extraction. The present invention can be used for the authentication and reconstruction of the sensitive image that can cause a huge loss even in small changes such as military image or medical image by solving the disadvantage of the existing soft soft watermarking.
For the purpose of illustrating various aspects of the invention, drawings illustrating preferred embodiments of the invention are shown, but are not limited to the means shown and the precise arrangement.
1 is a flowchart schematically illustrating a process of inserting, verifying, and recovering a digital watermark for a lossless digital watermarking system and method capable of verifying and restoring an integrity of an image according to the present invention.
2 is a flowchart schematically illustrating a process of inserting a watermark generator and generated feature values as watermark information.
3 is a block diagram schematically illustrating a calculation unit for extracting a watermark, and an integrity verification and restoration process.
4 is a photograph showing an example of an image performed in a watermarking test, which is an example of an image (original image) having a size of 512 * 512 pixels.
FIG. 5 illustrates an image after watermarking the image of FIG. 4.
6 is a graph showing the correlation degree NC between the extracted watermark and the inserted watermark.
FIG. 7 is an image of artificially modulating FIG. 4.
FIG. 8 is a diagram illustrating a difference of pixel difference values between an original image and the modulated image of FIG. 7 by an algorithm.
9 illustrates an image restored to an original image after authentication of forgery by an algorithm.
Claims (12)
Calculating an LSB region of the input image as an MD5 hash function value;
Generating a watermark formed of a pseudo noise sequence;
Dividing the input image into a LSB block and a witter marking block into which a watermark is to be inserted;
Embedding the feature value as a watermark in the watermarking block.
And converting the input image into a predetermined block.
Generating the watermark
Generating a pseudonoise sequence using a predetermined secret key; And
And sequentially inserting the generated watermark with respect to the entire area of the input image.
And inserting a digital watermark by modulating the least significant bit of an image into a hash function and an XOR operation to allow lossless recovery of the generated watermark sequence.
Inserting the final watermark is
And XOR conversion of the LSB value, the hash function value, and the binary sequence value.
Inserting a bit value into the block by modifying the pixel value of the pixels using a logical one bit difference value.
Hiding the inserted bit value in the block of the image to be reconstructible.
Converting the input image into a predetermined block;
Extracting a least significant bit value from the input image;
Generating a pseudo sequence from a predetermined secret key;
Extracting a watermark from the extracted LSB value;
And determining whether the input image is forged or altered according to the magnitude of the difference between the extracted value LSB and the feature value in the pseudo queen block.
And calculating a degree of correlation between the added input image and the watermark bit to extract a watermark from a calculated value to determine the integrity of the digital watermark.
Extract the inserted bit value using the block difference value,
And extracting a logical one-bit sequence from the block difference value, and restoring the pixel value to a state of the pixel value before being changed from the extracted bit value to the inserted bit value. Data extraction method and extraction device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020100116572A KR20120055070A (en) | 2010-11-23 | 2010-11-23 | System and method for lossless digital watermarking for image integrity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020100116572A KR20120055070A (en) | 2010-11-23 | 2010-11-23 | System and method for lossless digital watermarking for image integrity |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20120055070A true KR20120055070A (en) | 2012-05-31 |
Family
ID=46270708
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020100116572A KR20120055070A (en) | 2010-11-23 | 2010-11-23 | System and method for lossless digital watermarking for image integrity |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20120055070A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101534272B1 (en) * | 2014-06-13 | 2015-07-07 | 주식회사 노드데이타 | Method for managing medical image data |
KR20150136320A (en) * | 2014-05-27 | 2015-12-07 | 한밭대학교 산학협력단 | System and Method for Embedding and Extracting Digital Watermark Using QR Code |
WO2023246403A1 (en) * | 2022-06-23 | 2023-12-28 | 北京火山引擎科技有限公司 | Model training method, watermark restoration method, and related device |
-
2010
- 2010-11-23 KR KR1020100116572A patent/KR20120055070A/en not_active Application Discontinuation
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20150136320A (en) * | 2014-05-27 | 2015-12-07 | 한밭대학교 산학협력단 | System and Method for Embedding and Extracting Digital Watermark Using QR Code |
KR101534272B1 (en) * | 2014-06-13 | 2015-07-07 | 주식회사 노드데이타 | Method for managing medical image data |
WO2023246403A1 (en) * | 2022-06-23 | 2023-12-28 | 北京火山引擎科技有限公司 | Model training method, watermark restoration method, and related device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Celik et al. | Hierarchical watermarking for secure image authentication with localization | |
Chang et al. | A watermarking-based image ownership and tampering authentication scheme | |
KR100465950B1 (en) | Information processing apparatus and its control method, storage medium storing computer program | |
Fridrich et al. | Invertible authentication | |
Zhu et al. | When seeing isn't believing [multimedia authentication technologies] | |
EP1718060A1 (en) | Digital watermarking of the digital documents in a set of digital documents | |
Wang et al. | A majority-voting based watermarking scheme for color image tamper detection and recovery | |
CN100547608C (en) | The method of digital figure watermark and related device and the digital camera that can add watermark | |
CN105634732B (en) | A kind of more bit reversible information hidden methods of ciphertext domain | |
Wu et al. | Reversible watermarking by modulation and security enhancement | |
Li et al. | Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme | |
JP2008503162A (en) | System and method for digital content security | |
Munir | A secure fragile video watermarking algorithm for content authentication based on arnold CAT map | |
KR20120055070A (en) | System and method for lossless digital watermarking for image integrity | |
Singh et al. | Quantization-based fragile watermarking using block-wise authentication and pixel-wise recovery scheme for tampered image | |
US7313250B2 (en) | Method and system for frequency domain watermarking using a phase based filter signature | |
Naseem et al. | Spread spectrum based invertible watermarking for medical images using RNS and chaos. | |
CN114119332A (en) | Block chain-based digital watermark writing and reading method and device | |
He et al. | Cryptanalysis on majority-voting based self-recovery watermarking scheme | |
Dadkhah et al. | Efficient image authentication and tamper localization algorithm using active watermarking | |
US20030048924A1 (en) | Method for inserting binary messages in a digital image | |
Hosseini et al. | Image content dependent semi-fragile watermarking with localized tamper detection | |
CN113194319B (en) | Encryption and decryption method and system for exchange cipher watermark | |
CN113705806B (en) | Network training, encoding and decoding method, device and medium for digital watermarking | |
Yoo et al. | Reversible watermarking for authentication using singular value decomposition |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E601 | Decision to refuse application |