| 研究生: |
陳煒喆 Chen, Wei-Che |
|---|---|
| 論文名稱: |
數位影像的版權保護與內容驗證技術之研究 The Study of Copyright Protection and Content Authentication for Digital Images |
| 指導教授: |
王明習
Wang, Ming-Shi |
| 學位類別: |
博士 Doctor |
| 系所名稱: |
工學院 - 工程科學系 Department of Engineering Science |
| 論文出版年: | 2008 |
| 畢業學年度: | 96 |
| 語文別: | 英文 |
| 論文頁數: | 102 |
| 中文關鍵詞: | 浮水印 、版權保護 、內容驗證 、影像 、視覺密碼 、竄改偵測 、竄改定位 、竄改回復 |
| 外文關鍵詞: | digital watermarking, tamper localization, tamper detection, visual cryptography, digital image, content authentication, copyright protection, tamper recovery |
| 相關次數: | 點閱:132 下載:2 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本論文旨在研究數位影像之版權保護(copyright protection)與內容驗證(content authentication)。本文首先提出一植基於視覺密碼(visual cryptography)之版權保護技術。有別於大多數傳統的版權保護方法藉由將浮水印直接嵌入影像中來達成其目的之餘,難免會對欲保護之影像造成程度不一的影像失真;本文所提之方法利用欲保護之影像的特徵與一事先定義好之視覺密碼編碼簿將二元浮水印(binary watermark)藏匿於兩張分享影像中,不需要修改到欲保護之影像的內容。因此,欲保護之影像的視覺品質能夠被完整的保留下來。本方法的另一項優點即是無論欲保護之影像的尺寸為何,任意大小的二元影像皆可作為識別影像版權用之浮水印。本方法的實驗結果顯示,即使受保護之影像在經過如JPEG壓縮、雜訊添加和各種濾波器等影像處理攻擊後,藏匿於分享影像中之浮水印仍然能夠成功地被顯現出來。為了進一步節省儲存視覺密碼編碼簿所需的額外儲存空間,本論文提出另一個植基於視覺密碼且不需要依賴任何視覺密碼編碼即可達成影像版權保護之技術。相較於現有之版權保護方法,此強化後之技術對於許多常見的影像處理攻擊具有更強韌之抵抗能力。另外,實驗結果也顯示,惡意攻擊者無法成功地偽造出合法的分享影像來企圖竄改或侵犯受保護之影像的版權,證明本方法具有高度的安全性。
為了確保數位影像之完整性(integrity)與正確性(authenticity),各種以區塊為基礎之影像驗證方法已經被陸續地發表出來。一個有效的影像驗證方法,除了必須具有敏銳的竄改偵測(tamper detection)能力來抵擋任何可能的攻擊之外,同時也要能夠從受攻擊的影像中,精確地定位出有哪些內容已經被竄改。然而在現有方法之中,絕大多數不是無法同時達成此兩項條件,就是必須犧牲竄改定位(tamper localization)的準確度來增強其對各種如向量量化(vector quantization)等偽造攻擊(counterfeiting attack)的抵抗能力。為了解決此一缺失,本論文提出一植基於fuzzy c-means分群法之以區塊為基礎的影像驗證技術來偵測並定位出受保護的影像中受竄改之區塊位置。本方法利用fuzzy c-means分群法成功地破除了各區塊之間的獨立性,使其除了能有效地抵抗各種偽造攻擊之外,亦同時提供精確的竄改定位功能。
假使影像認證執行者在偽造影像中找出被竄改的影像內容後,能夠立即自行復原該內容,使復原後的影像具有與原始影像相似的品質,便可以節省重新傳輸該影像所需的額外頻寬,因此,發展具有竄改復原(tamper recovery)能力的影像認證技術在近年來逐漸成為學者們關注的焦點之一。本論文提出一兼具有竄改偵測與竄改復原功能的彩色影像認證技術,此項技術不但能夠成功地從偽造影像中偵測並定位出受竄改的區塊位置,且能進一步利用隱藏在其他區塊的回復資料,將被竄改過的區塊復原。此外,本論文亦設計一連串的偽造攻擊模擬來驗證此項技術之竄改偵測與竄改復原功能的可行性與可靠性。
This dissertation addresses copyright protection and content authentication for digital images. In this context, we first propose a copyright protection scheme based on visual cryptography (VC) technique. Unlike most of conventional copyright protection schemes embedding a watermark into a host image directly that inevitable causes some permanent distortion, the proposed scheme conceals a binary watermark to two shares, according to the features of the host image and a predefined VC codebook, without modifying any pixel value of the host image. Therefore, the visual quality of the host image can be completely retained. In addition, the proposed scheme can use a binary image of arbitrary size as the watermark regardless of the size of host images. It is shown that the hidden watermark can be successfully revealed by the proposed scheme, even if the visual quality of protected images has undergone severe attacks, e.g., JPEG compression, noise addition and filtering.
To further save the extra storage space required to store the codebook, another VC-based copyright protection scheme that conceals the watermark to two shares without resorting to any codebook is proposed. The enhanced scheme provides stronger robustness against several image processing operations when compared with the existing copyright protection schemes. Moreover, the experimental results demonstrate that it is difficult for malicious attackers to break the security of the proposed scheme.
To ensure the integrity and authenticity of digital images, a wide variety of block-wise authentication schemes have been proposed in the literature. An effective authentication scheme should provide sufficient robustness to thwart any possible attacks with accurate tamper localization accuracy. However, most of the existing schemes either fail to address this issue or sacrifice tamper localization accuracy to withstand counterfeiting attacks, such as vector quantization (VQ) attack. For this reason, a novel block-wise authentication scheme based on fuzzy c-means (FCM) clustering is proposed for securely verifying the integrity of digital images and for identifying tampered image blocks. The proposed scheme successfully utilizes the FCM clustering technique to solve the security problem related to independent block-wise authentication schemes and at the same time preserves superior tamper localization accuracy.
Furthermore, an image authentication scheme with tamper recovery capability is desirable, as it will save additional bandwidth to retransmit the original images if the authenticator can directly remedy the tampered ones. Accordingly, we propose a novel block-wise color image authentication scheme, which can not only detect and determine the locations where the tampering occurred, but also approximately recover the tampered blocks by the recovery data hidden in other blocks. To verify the validity of the proposed scheme, the tamper localization capability and tamper recovery capability of the scheme under different counterfeiting attacks are studied and quantified in this dissertation.
[1] I. Cox, M. Miller, and J. Bloom, Digital Watermarking. San Francisco, CA: Morgan Kauffman Publishers, 2002.
[2] M. Arnold, S. D. Wolthusen, and M. Schmucker, Techniques and Applications of Digital Watermarking and Content Protection. Norwood, MA: Artech House Publishers, 2003.
[3] J. Seitz, Digital Watermarking for Digital Media. Hershey, PA: Information Science Publishing, 2005.
[4] R. J. Anderson and F. A. P. Petitcolas, "On the limits of steganography," IEEE Journal on Selected Areas in Communications, vol. 16, pp. 474-481, 1998.
[5] L. M. Marvel, C. G. Boncelet, and C. T. Retter, "Spread spectrum image steganography," IEEE Transactions on Image Processing, vol. 8, pp. 1075-1083, 1999.
[6] J. Fridrich and M. Goljan, "Digital image steganography using stochastic modulation," in Proceedings of the SPIE: Security and Watermarking of Multimedia Contents V, 2003, pp. 191-202.
[7] S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung, "On the invertibility of invisible watermarking techniques," in Proceedings of the IEEE International Conference on Image Processing, 1997, pp. 540-543.
[8] S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung, "Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications," IEEE Journal on Selected Areas in Communications, vol. 16, pp. 573-586, 1998.
[9] J. R. Hernandez and F. Perez-Gonzalez, "Statistical analysis of watermarking schemes for copyright protection of images," in Proceedings of the IEEE, 1999, pp. 1142-1166.
[10] W. Zeng and B. Liu, "A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images," IEEE Transactions on Image Processing, vol. 8, pp. 1534-1548, 1999.
[11] D. Kundur and D. Hatzinakos, "Digital watermarking for telltale tamper proofing and authentication," in Proceedings of the IEEE, 1999, pp. 1167-1180.
[12] P. W. Wong, "A public key watermark for image verification and authentication," in Proceedings of the IEEE International Conference on Image Processing, 1998, pp. 455-459.
[13] M. Wu and B. Liu, "Watermarking for image authentication," in Proceedings of the IEEE International Conference on Image Processing, 1998, pp. 437-441.
[14] W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu, "Anti-collusion fingerprinting for multimedia," IEEE Transactions on Signal Processing, vol. 51, pp. 1069-1087, 2003.
[15] Z. J. Wang, M. Wu, H. V. Zhao, W. Trappe, and K. J. R. Liu, "Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation," IEEE Transactions on Image Processing, vol. 14, pp. 804-821, 2005.
[16] S. He and M. Wu, "Joint coding and embedding techniques for Multimedia Fingerprinting," IEEE Transactions on Information Forensics and Security, vol. 1, pp. 231-247, 2006.
[17] G. Depovere, T. Kalker, J. Haitsma, M. Maes, L. De Strycker, P. Termont, J. Vandewege, A. Langell, C. Alm, P. Norman, G. O'Reilly, B. Howes, H. Vaanholt, R. Hintzen, P. Donnelly, and A. Hudson, "The VIVA project: digital watermarking for broadcast monitoring," in Proceedings of the IEEE International Conference on Image Processing, 1999, pp. 202-205.
[18] P. Termont, L. De Strycker, J. Vandewege, J. Haitsma, T. Kalker, M. Maes, G. Depovere, A. Langell, C. Alm, and P. Norman, "Performance measurements of a real-time digital watermarking system for broadcast monitoring," in Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999, pp. 220-224.
[19] P. Termont, L. De Stycker, J. Vandewege, M. Op de Beeck, J. Haitsma, T. Kalker, M. Maes, and G. Depovere, "How to achieve robustness against scaling in a real-time digital watermarking system for broadcast monitoring," in Proceedings of the IEEE International Conference on Image Processing, 2000, pp. 407-410.
[20] B. Perry, B. MacIntosh, and D. Cushman, "Digimarc MediaBridge: the birth of a consumer product from concept to commercial application," in Proceedings of the SPIE Conference on Security and Watermarking of Multimedia Contents IV, 2002, pp. 118-123.
[21] H. Sonnet, T. Isenberg, J. Dittmann, and T. A. S. T. Strothotte, "Illustration watermarks for vector graphics," in Proceedings of the IEEE 11th Pacific Conference on Computer Graphics and Applications, 2003, pp. 73-82.
[22] Y. Rytsar, S. Voloshynovskiy, F. Ehrler, and T. Pun, "Interactive segmentation with hidden object-based annotations: toward smart media," in Proceedings of the SPIE Conference on Storage and Retrieval Methods and Applications for Multimedia, 2004, pp. 29-37.
[23] V. Claus and S. Maik, "Image annotation watermarking: nested object embedding using hypergraph model," in Proceeding of the 8th workshop on Multimedia and security, 2006, pp. 182-189.
[24] F. Mintzer, G. W. Braudaway, and A. E. Bell, "Opportunities for watermarking standards," Communications of the ACM, vol. 41, pp. 57-64, 1998.
[25] M. L. Miller, I. J. Cox, and J. A. Bloom, "Watermarking in the real world: an application to DVD," in Proceedings of the 33rd Asilomar Conference on Signals, Systems, and Computers, 1999, pp. 1496-1502.
[26] I. J. Cox, M. L. Miller, and J. A. Bloom, "Watermarking applications and their properties," in Proceedings of the IEEE International Conference on Information Technology: Coding and Computing, 2000, pp. 6-10.
[27] M.-S. Wang and W.-C. Chen, "Digital image copyright protection scheme based on visual cryptography and singular value decomposition," Optical Engineering, vol. 46, pp. 067006-8, 2007.
[28] M.-S. Wang and W.-C. Chen, "Robust copyright protection scheme based on discrete cosine transform and secret sharing techniques," To be appeared in Journal of Electronic Imaging
[29] W.-C. Chen and M.-S. Wang, "A fuzzy c-means clustering-based fragile watermarking scheme for image authentication," To be appeared in Expert Systems with Applications.
[30] M.-S. Wang and W.-C. Chen, "A majority-voting based watermarking scheme for color image tamper detection and recovery," Computer Standards & Interfaces, vol. 29, pp. 561-570, 2007.
[31] H. Kinoshita, "An image digital signature system with ZKIP for the graph isomorphism," in Proceedings of the IEEE International Conference on Image Processing, 1996, pp. 247-250.
[32] R. G. Van Schyndel, A. Z. Tirkel, and C. F. Osborne, "A digital watermark," in Proceedings of the IEEE International Conference on Image Processing, 1994, pp. 86-90.
[33] R. B. Wolfgang and E. J. Delp, "A watermark for digital images," in Proceedings of the IEEE International Conference on Image Processing, 1996, pp. 219-222.
[34] I. Pitas and T. H. Kaskalis, "Applying signatures on digital images," in Proceedings of the IEEE International Workshop on Nonlinear Signal and Image Processing, 1995, pp. 460-463.
[35] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM System Journal, vol. 35, pp. 313-336, 1996.
[36] I. Pitas, "A method for signature casting on digital images," in Proceedings of the IEEE International Conference on Image Processing, 1996, pp. 215-218.
[37] J. J. K. O. Ruanaidh and T. Pun, "Rotation, scale and translation invariant spread spectrum digital image watermarking," Signal Processing, vol. 66, pp. 303-317, 1998.
[38] C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui, "Rotation, scale, and translation resilient watermarking for images," IEEE Transactions on Image Processing, vol. 10, pp. 767-782, 2001.
[39] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, vol. 6, pp. 1673-1687, 1997.
[40] C.-T. Hsu and J.-L. Wu, "Hidden digital watermarks in images," IEEE Transactions on Image Processing, vol. 8, pp. 58-68, 1999.
[41] G. C. Langelaar and R. L. Lagendijk, "Optimal differential energy watermarking of DCT encoded images and video," IEEE Transactions on Image Processing, vol. 10, pp. 148-158, 2001.
[42] M. Barni, F. Bartolini, and A. Piva, "Improved wavelet-based watermarking through pixel-wise masking," IEEE Transactions on Image Processing, vol. 10, pp. 783-791, 2001.
[43] M.-J. Tsai, K.-Y. Yu, and Y.-Z. Chen, "Joint wavelet and spatial transformation for digital watermarking," IEEE Transactions on Consumer Electronics, vol. 46, pp. 241-245, 2000.
[44] K.-L. Chung, C.-H. Shen, and L.-C. Chang, "A novel SVD- and VQ-based image hiding scheme," Pattern Recognition Letters, vol. 22, pp. 1051-1058, 2001.
[45] R. Liu and T. Tan, "An SVD-based watermarking scheme for protecting rightful ownership," IEEE Transactions on Multimedia, vol. 4, pp. 121-128, 2002.
[46] F. Huang and Z.-H. Guan, "A hybrid SVD-DCT watermarking method based on LPSNR," Pattern Recognition Letters, vol. 25, pp. 1769-1775, 2004.
[47] C.-C. Chang, P. Tsai, and C.-C. Lin, "SVD-based digital image watermarking scheme," Pattern Recognition Letters, vol. 26, pp. 1577-1586, 2005.
[48] X.-P. Zhang and K. Li, "Comments on - An SVD-based watermarking scheme for protecting rightful Ownership," IEEE Transactions on Multimedia, vol. 7, pp. 593-594, 2005.
[49] J. Tian, "Reversible data embedding using a difference expansion," IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp. 890-896, 2003.
[50] C. De Vleeschouwer, J. F. Delaigle, and B. Macq, "Circular interpretation of bijective transformations in lossless watermarking for media asset management," IEEE Transactions on Multimedia, vol. 5, pp. 97-105, 2003.
[51] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless generalized-LSB data embedding," IEEE Transactions on Image Processing, vol. 14, pp. 253-266, 2005.
[52] C.-C. Wang, S.-C. Tai, and C.-S. Yu, "Repeating image watermarking technique by the visual cryptography," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E83-A, pp. 1589-1598, 2000.
[53] C.-C. Chang and J.-C. Chuang, "An image intellectual property protection scheme for gray-level images using visual secret sharing strategy," Pattern Recognition Letters, vol. 23, pp. 931-941, 2002.
[54] S. L. Hsieh and B. Y. Huang, "A copyright protection scheme for gray-level images based on image secret sharing and wavelet transformation," in Proceedings of International Computer Symposium, 2004, pp. 661-666.
[55] D.-C. Lou, J.-M. Shieh, and H.-K. Tso, "Copyright protection scheme based on chaos and secret sharing techniques," Optical Engineering, vol. 44, pp. 117004-8, 2005.
[56] C.-S. Hsu and Y.-C. Hou, "Copyright protection scheme for digital images using visual cryptography and sampling methods," Optical Engineering, vol. 44, pp. 077003-10, 2005.
[57] M. Naor and A. Shamir, "Visual cryptography," Advances in Cryptology-EUROCRYPT'94, Lecture Notes in Computer Science, Springer-Verlag, vol. 950, pp. 1-12, 1995.
[58] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC Press, 1996.
[59] S. Bhattacharjee and M. Kutter, "Compression tolerant image authentication," in Proceedings of the IEEE International Conference on Image Processing 1998, pp. 435-439.
[60] C. Y. Lin and S. F. Chang, "Semi-fragile watermarking for authenticating JPEG visual content," in Proceedings of the SPIE Conference on Security and Watermarking of Multimedia Contents II, 2000, pp. 140-151.
[61] E. T. Lin, C. I. Podilchuk, and E. J. Delp, "Detection of image alterations using semi-fragile watermarks," in Proceedings of the SPIE Conference on Security and Watermarking of Multimedia Contents II, 2000, pp. 152-163.
[62] J. J. Eggers and B. Girod, "Blind watermarking applied to image authentication," in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, 2001, pp. 1977-1980.
[63] R. Sun, H. Sun, and T. Yao, "A SVD- and quantization based semi-fragile watermarking technique for image authentication," in Proceedings of the IEEE International Conference on Signal Processing, 2002, pp. 1592-1595.
[64] S. Walton, "Information authentication for a slippery new age," Dr. Dobbs Journal, vol. 20, pp. 18-26, 1995.
[65] M. M. Yeung and F. Mintzer, "An invisible watermarking technique for image verification," in Proceedings of the IEEE International Conference on Image Processing, 1997, pp. 680-683.
[66] M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, vol. 9, pp. 432-441, 2000.
[67] J. Fridrich, M. Goljan, and A. C. Baldoza, "New fragile authentication watermark for images," in Proceedings of the IEEE International Conference on Image Processing, 2000, pp. 446-449.
[68] P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Transactions on Image Processing, vol. 10, pp. 1593-1601, 2001.
[69] M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, "Hierarchical watermarking for secure image authentication with localization," IEEE Transactions on Image Processing, vol. 11, pp. 585-595, 2002.
[70] S. Suthaharan, "Fragile image watermarking using a gradient image for improved localization and security," Pattern Recognition Letters, vol. 25, pp. 1893-1903, 2004.
[71] C.-T. Li and F.-M. Yang, "One-dimensional neighborhood forming strategy for fragile watermarking," Journal of Electronic Imaging, vol. 12, pp. 284-291, 2003.
[72] C.-T. Li and Y. Yuan, "Digital watermarking scheme exploiting nondeterministic dependence for image authentication," Optical Engineering, vol. 45, pp. 127001-6, 2006.
[73] C.-C. Chang, Y.-S. Hu, and T.-C. Lu, "A watermarking-based image ownership and tampering authentication scheme," Pattern Recognition Letters, vol. 27, pp. 439-446, 2006.
[74] J. Fridrich and M. Goljan, "Protection of digital images using self embedding," in Proceedings of NJIT Symposium on Content Security and Data Hiding in Digital Media, 1999.
[75] H.-C. Wu and C.-C. Chang, "Detection and restoration of tampered JPEG compressed images," Journal of Systems and Software, vol. 64, pp. 151-161, 2002.
[76] P. L. Lin, C.-K. Hsieh, and P.-W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, vol. 38, pp. 2519-2529, 2005.
[77] V. C. Klema and A. J. Laub, "The singular value decomposition: Its computation and some applications," IEEE Transactions on Automatic Control, vol. 25, pp. 164-176, 1980.
[78] Z.-Q. Hong, "Algebraic feature extraction of image for recognition," Pattern Recognition, vol. 24, pp. 211-219, 1991.
[79] P. S. L. M. Barreto, H. Y. Kim, and V. Rijmen, "Toward a secure public-key blockwise fragile authentication watermarking," in Proceedings of the IEEE International Conference on Image Processing, 2001, pp. 494-497.
[80] J. Fridrich, M. Goljan, and N. Memon, "Further attacks on Yeung-Mintzer fragile watermarking scheme," in Proceedings of the SPIE Conference on Security and Watermarking of Multimedia Contents, 2000, pp. 428-437.
[81] J. C. Bezdek, Pattern Recognition with Fuzzy Objective Function Algorithms. New York: Plenum Press, 1981.
[82] D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain, "FVC2000: fingerprint verification competition," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, pp. 402-412, 2002.
[83] W. Stallings, Cryptography and Network Security: Principles and Practice, 3rd ed. Englewood Cliff, NJ: Prentice-Hall, 2002.
[84] O. Ekici, B. Sankur, B. Coskun, U. Naci, and M. Akcay, "Comparative evaluation of semifragile watermarking algorithms," Journal of Electronic Imaging, vol. 13, pp. 209-219, 2004.