| 研究生: |
章益銓 Chang, I-Chuan |
|---|---|
| 論文名稱: |
植基於DCT量化技術之數位影像鑑識系統 A DCT Quantization-Based Image Authentication System for Digital Forensics |
| 指導教授: |
賴溪松
Laih, Chi Sung |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 電腦與通信工程研究所 Institute of Computer & Communication Engineering |
| 論文出版年: | 2005 |
| 畢業學年度: | 93 |
| 語文別: | 英文 |
| 論文頁數: | 66 |
| 中文關鍵詞: | 影像認證 、數位證據 |
| 外文關鍵詞: | digital evidence, digital forensics, image authentication, content feature, malicious manipulation, acceptable manipulation |
| 相關次數: | 點閱:154 下載:2 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著數位時代的來臨,使得數位資料逐漸地取代了原本的類比資料。但由於數位編輯軟體的普遍,卻造成數位資料的真實性面臨極大的挑戰。尤其當數位資料成為法律相關證據時,其可靠性將是很大的疑慮。
本論文提出完整的數位影像鑑識系統,並改善了基於DCT量化技術之影像認證系統的偵測問題。所提出的改善方法能有效地解決偵測問題,並同時考量系統之安全性、可靠性及實用性等等,以期減少對數位證據誤判的可能。最後實現影像認證及可正確偵測惡意修改影像內容之系統。當法庭對犯罪之相關數位證據產生疑問時,期望此系統能適當地提供可靠的訊息,以供法官作出更準確且更客觀的判決。
With the advent of digital times, the digital data has gradually taken the place of the original analog data. However, the authenticity of digital data faces a great challenge due to the fact that the digital edit software is ubiquitous. It has aroused the suspicion on the reliability of digital data especially when the digital data renders to the court as the digital evidence.
We propose an integrated image authentication system for digital forensics and improve the detection problems of a DCT quantization-based image authentication scheme. The improved detection schemes will effectively solve the detection problems and, at the same time, take into account the reliability, the security, and the practicability of the system. It is expected to reduce the wrong detection probability of the digital evidence. Finally, the improved image authentication schemes will be implemented. If the digital evidence presented to the court is under suspicions, the system is expected to provide accurate information to help the judiciary to make the verdict right and objective.
[1] M.M. Amin, M. Salleh, S. Ibrahim, M.R. Katmin, and M.Z.I. Shamsuddin, “Information Hiding using Steganography,” Telecommunication Technology, 2003. NCTT 2003 Proceedings. 4th National Conference, pp. 21-25, 14-15 Jan. 2003.
[2] D. Artz, “Digital Steganography: Hiding Data within Data,” IEEE Internet Computing, vol. 5, pp. 75-80, May-June 2001.
[3] S. Burnett and S. Paine, RSA Security's Official Guide to Cryptography, McGraw-Hill Osborne Media, 2001.
[4] D. Eastlake 3rd and P. Jones, “US Secure Hash Algorithm 1 (SHA1),” RFC 3174, Sep. 2001.
[5] G.L. Friedman, “The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image,” IEEE Trans. on Consumer Electronics, vol. 39, no. 4, pp. 905-910, Nov 1993.
[6] G.C. Langelaar, I. Setyawan, and R.L. Lagendijk, “Watermarking Digital Image and Video Data. A State-of-the-art Overview,” IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20-46, Sept. 2000.
[7] X. Li and X. Xue, “A Novel Blind Watermarking Based on Lattice Vector Quantization,” Electrical and Computer Engineering, vol. 3, pp. 1823-1826, May 2004.
[8] C.Y. Lin and S.F. Chang, “A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation,” CU/CTR Technical Report 486-97-19, Dec 1997; also appear on IEEE Trans. on Circuits and Systems for Video Technology, vol. 11, no. 2, pp. 153-168, February 2001.
[9] C.Y. Lin and S.F. Chang, “Generating Robust Digital Signature for Image/Video Authentication,” Multimedia and Security Workshop at ACM Multimedia, Bristol, UK, Sep. 1998.
[10] C.Y. Lin and S.F. Chang, “Issues and Solutions for Authenticating MPEG Video,” Proc. of SPIE Security and Watermarking of Multimedia Contents, vol. 3657, San Jose, CA, January 1999.
[11] C.Y. Lin and S.F. Chang, “Semi-Fragile Watermarking for Authenticating JPEG Visual Content,” SPIE Security and Watermarking of Multimedia Content II, San Jose, CA, pp.140-151, Jan 2000.
[12] C.Y. Lin, “Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection,” Ph.D. Thesis, Columbia University, 2000.
[13] C.Y. Lin, D. Sow, and S.F. Chang, “Using Self-Authentication-and-Recovery Images for Error Concealment in Wireless Environments,” SPIE ITCom/OptiComm, Denver, CO, vol. 4518, Aug. 2001.
[14] C.Y. Lin and S.F. Chang, “SARI: Self-Authentication-and-Recovery Image Watermarking System,” In ACM Multimedia, Ottawa, Canada, pp.628-629, Oct. 2001.
[15] C.Y. Lin and S.F. Chang, “Robust Digital Signature for Multimedia Authentication: A Summary,” IEEE Circuits and Systems Magazine, vol. 3, no. 4, pp. 23-26, October 2003.
[16] E. Maiwald, Network Security: A Beginner’s Guide, McGraw-Hill Osborne Media, 2001.
[17] H. Morito, K. Anzai, D. Watanabe, H. Yoshiura, and Y. Seto, “Digital Camera for Taking Evidential Photographic Images,” Consumer Electronics, 2001. ICCE. International Conference, pp. 118-119, 19-21 June 2001.
[18] T.T. Ng and S.F. Chang, “A Model for Image Splicing,” IEEE International Conference on Image Processing, Singapore, Oct 24-27, 2004.
[19] G. Palmer, “A Road Map for Digital Forensic Research,” Technical Report DTR-T0010-01, DFRWS. Report from the First Digital Forensic Research Workshop (DFRWS), November 2001.
[20] F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, “Information Hiding-A Survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062-1078, July 1999.
[21] C. Podilchuk and E. Delp, “Digital Watermarking: Algorithms And Applications,” IEEE Signal Processing Magazine, vol. 18, no. 4, pp. 33-46, July 2001.
[22] A.C. Popescu and H. Farid, “Exposing Digital Forgeries by Detecting Duplicated Image Regions,” Technical Report, TR2004-515, Dartmouth College, Computer Science, 2004.
[23] A.C. Popescu and H. Farid, “Statistical Tools for Digital Forensics,” 6th International Workshop on Information Hiding, Toronto, Canada, 2004.
[24] A.C. Popescu and H. Farid, “Exposing Digital Forgeries by Detecting Traces of Resampling,” IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 758-767, February 2005.
[25] A.C. Popescu and H. Farid, “Exposing Digital Forgeries in Color Filter Array Interpolated Images,” IEEE Transactions on Signal Processing, 2005 (in press).
[26] N. Provos and P. Honeyman, “Hide and Seek: An Introduction to Steganography,” Security & Privacy Magazine, IEEE, vol. 1, pp. 32-44, May-June 2003.
[27] R. Radhakrishnan and N. Memon, “On the Security of the SARI Image Authentication System,” IEEE Int. Conf. Image Processing, vol. 3, pp. 971-974, Oct. 2001.
[28] R. Radhakrishnan and N. Memon, “On the Security of the Digest Function in the SARI Image Authentication System,” IEEE Trans. Circuits and Systems for Video Technology, vol. 12, no. 11, pp. 1030-1033, Nov. 2002.
[29] M. Reith, C. Carr, and G. Gunsch, “An Examination of Digital Forensic Model,” International Journal of Digital Evidence, vol. 1, 2002.
[30] G. Schaefer and M. Stich, “UCID - An Uncompressed Colour Image Database,” Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia, pp. 472-480, San Jose, USA, 2004.
[31] M. Schneider and S.F. Chang, “A Robust Content Based Digital Signature for Image Authentication,” Proc. ICIP-96, vol. 3, pp. 227-230, Sep. 1996.
[32] Q. Sun, Q. Tian, and S.F. Chang, “A Robust and Secure Media Signature Scheme for JPEG Images,” Multimedia Signal Processing, 2002 IEEE Workshop, pp. 296-299, 9-11 Dec. 2002.
[33] Q. Sun, S. Ye, C.Y. Lin and S.F. Chang, “A Crypto Signature Scheme for Image Authentication over Wireless Channel,” International Journal of Image and Graphics (IJIG), March 2004.
[34] G.K. Wallace, “The JPEG Still Picture Compression Standard,” IEEE Trans. Consumer Electronics, vol.38, no.1, pp. 18-34, Feb. 1992.
[35] X. Wang, Y.L. Yin, and H. Yu, “Collision Search Attacks on SHA1,” Feb. 2005.
[36] J. Wu, B.B. Zhu, S. Li, and F. Lin, “New Attacks on SARI Image Authentication System,” IS&T and SPIE, Electronic Image, San Jose, CA, 2004.
[37] S. Ye, Z. Zhou, Q. Sun, and Q. Tian, “A Quantization-based Image Authentication System,” Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint Conference of the Fourth International Conference, vol. 2, pp. 955–959, 15-18 Dec. 2003.
[38] B.B. Zhu and M.D. Swanson, “Multimedia Authentication and Watermarking,” Multimedia Information Retrieval and Management, D. Feng, W. C. Siu, and H. Zhang, Eds., Springer-Verlag, Berlin, Heidelberg, New York, chap. 7, pp. 148-177, 2003.
[39] B.B. Zhu, M.D. Swanson, and A. H. Tewfik, “When Seeing Isn't Believing,” IEEE Signal Processing Magazine, vol. 21, no. 2, pp. 40-49, March 2004.
[40] “Information Technology - Digital Compression and Coding of Continuous-tone Still Image - Requirements and Guidelines” ITU-T Recommendation T.81, 1992. | ISO/IEC 10918-1:1993 International Telecommunications Union. (Commonly referred to as JPEG standard)
[41] http://www.faqs.org/faqs/jpeg-faq
[42] 賴溪松、韓亮、張真誠,近代密碼學及其應用,旗標出版股份有限公司,2003。