Der-Chyuan Lou and Jiang-Lung Liu,

Slides:



Advertisements
Similar presentations
H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías.
Advertisements

IEEE Transactions on Consumer Electronics, Vol. 45, No. 1, AUGUST 1999 Muhammad Bilal Ahmad and Tae-Sun Choi, Senior Member,IEEE.
1 A video authentication scheme for H.264/AVC Main profile Nandakishore Ramaswamy Multimedia Processing Lab July 9 th, 2004.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
A study for Relational Database watermarking scheme Speaker: Pei-Feng Shiu Date: 2012/09/21.
Multiple Image Watermarking Applied to Health Information Management
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Source: IEEE Transactions on Multimedia, Vol. 5, No
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
DONE BY S.MURALIRAJAN M.NIRMAL
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Watermarking for Image Authentication ( Fragile Watermarking )
A Data Hiding Scheme Based Upon Block Truncation Coding
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
A Novel Latin Square-based Secret Sharing for M2M Communications
Parag Agarwal Digital Watermarking Parag Agarwal
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Reduction of blocking artifacts in DCT-coded images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Dynamic embedding strategy of VQ-based information hiding approach
Hung, K. -L. and Chang, C. -C. , IEE Image and Signal Processing, vol
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Hiding Information in VQ Index Tables with Reversibility
Authors:Tae-Yun Chung; Min-Suk Hong; Young-Nam Oh;
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Digital Watermarking for Image Authentication with Localization
Hung, K. -L. and Chang, C. -C. , IEE Image and Signal Processing, vol
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
Reverse Seam Carving 2011 Sixth International conference on Image and Graphics Gang Pan, Weishu Li, Wei Bai, Jinyan Chen, and Luyuan Li Speaker: Hon-Hang.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
Source: IEICE-Transactions on Info and Systems
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Secret image sharing with steganography and authentication
Ming-Shi Wang *, Wei-Che Chen 11 November 2006 present: 沈雅楓
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Hidden Digital Watermarks in Images
An Efficient Spatial Prediction-Based Image Compression Scheme
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Fault Resilient and Compression Tolerant Digital Signature for Image Authentication Der-Chyuan Lou and Jiang-Lung Liu, IEEE Transactions on Consumer Electronics, Vol. 46, No. 1,February 2000, pp.31-39 Advisor :Dr. Chang, Chin-Chen Reporter:Lee, Jiau-Yun Date :2003/3/25

Outline Introduction The Proposed Method Feature Extraction Feature Comparison Image Recovery Experimental Results Conclusions

Introduction Image authentication is becoming important. The study categories of Image authentication: Digital watermark---sellers Digital signature---buyers The criteria of fault resilient and compression tolerant scheme.

The Criteria of Fault Resilient and Compression Tolerant Scheme Any legal receiver can authenticate the ownership. It should be detected when the image is tampered. The modified portion should be located. The hash result should be small and robust.

The Proposed Method Digital signature generation: Feature Original Extraction Encryption Original Image Digital Signature Sender’s Secret Key

The Proposed Method(cont.) Verification and recovery: Received Image Decompression Feature Extraction Feature Comparison Digital Signature Decryption Feature Reversing Sender’s Public Key Image Recovery

Feature Extraction---Steps Original Image Block-means computation Block-means Quantization Encoding Image Feature

Feature Extraction---Steps(cont.) Steps can be formulated as: Original map: Io Block-means map: IM Quantized means map: IQ Encoded map: IE Transformation function: f

Feature Extraction---threshold Block-means Quantization Original Image Block-means computation Encoding Image Feature Compression & Decompression Corrupted Image Block-means Quantization Difference Computation threshold Compression ration

Feature Comparison The procedure of feature comparison: 1.Create a temporary map of the same size as feature map and assign white color. 2.Find the difference between two features. 3.If the difference is large than the threshold, then mark it with black 4.If no black-marked in the temporary map, it is authentic.

Image Recovery Replace the intensity of black-marked blocks. There will possible exist some edges between blocks. Smoothing algorithms: 8 neighbor blocks must be recovered while the black-marked block is recovered.

Experimental Results (a)original image (b)map of block-means (c)quantized (256*256) (32*32) block-means(32*32)

Experimental Results(cont.) a tampered image by removing “U.S. AIR Force” the detected result. recovered image by using received image-feature. PSNR=31.6718dB retransmission 5% PSNR=79.8611dB

Conclusions The proposed image-features are compression tolerant. The threshold for compression tolerant property is user-defined. The proposed image-features can recover the modified portions.