• 沒有找到結果。

- fiagile watermarking and robust watermarking

N/A
N/A
Protected

Academic year: 2022

Share "- fiagile watermarking and robust watermarking"

Copied!
4
0
0

加載中.... (立即查看全文)

全文

(1)

Embedded Signature-based Authentication by

Channel Statistics Using Watermarking Techniques$

Zhi-Fang Yang and Wen-Hsiang Tsai Department of Computer and Information Science

National Chiao Tung University Hsinchu, Taiwan 300, R. 0. C.

E-mail: gis82504@cis.nctu.edu.tw ; whtsai@?ds .nctu.edu.tw

AbsbrrcCTbis study examines tbe feasibility of using channel statistics to perform embedded signaturebased authentication. Doing so is an attempt to new a referenee watermark embedded with signature as side information. The reference watermark is exiracted to determine channel statistics, based on the Bayes theorem, and used to extract the embedded signature. Tbe reliability of the exiracted signature and the uncertainty of the channel status are also measured.

Experimental results demonstrate that the reliability and uncertainty measures based on channel statisti- are meaningful, and that the embedded signahue can survive highquality JPEG compression and manipulation such as negation.

I. INTRODUCTION

In the last decade, copyright marking has attracted extensive interest for tackling unauthorized copying and distribution of digital multimedia data [2, 51. Approaches to watermarking-based authentication fall into two categories

-

fiagile watermarking and robust watermarking [I]. The forma is usually applied at the pixel-level and is good for low-level authentication. The latter type of watermark is typically a signature of the host, so that high-level authentication can be easily performed. The reliability of embedding many signature data in hosts is therefore the key to successful authentication. Research into the latter category is still in its infancy [I]. Generally, more data in the signature imply more accuracy. However, more data hidden in the host imply lower robustness. A compromise is to determine the capacity of the host, but the problem remains unsolved because of an inability to model arbitrary manipulations [ 1,4].

This study uses a reference watermark embedded, with the signature, in the host, to compute channel statistics. Channel statistics are used to tackle issues concerning reliability of the extracted signature at the receiver site. Doing so is an attempt to provide a mechanism for detecting the reliability of the transmitted signature. This perspective goes beyond using side information to increase the visual quality in the embedding stage or utilize cover data to improve fidelity at

the receiver site. The aim is to use channel statistics to realize transmission conditions.

The rest of this paper is organized as follows. Section 2 explains the view of the authentication problem as communications

with

side information. Section 3 describes the proposed approach. Section 4 offers some experimental results. Conclusions and areas for future research are fnally made in Section 5.

11. VIEWING AUTHENTICATION AS COMMUNICATIONS WITH SIDE INFORMATION According to Fig. 1, a commnnication system encodes a message using an encoder, sends it through a channel, and decodes it using a decoder. The side information is used at both the encoder and the decoder.

Mcusgc ~ ~ / ~ ~ ~ ~ e s s a g e

Si& Infor"

Figure 1, A commwication model with side information.

Fig. 2 depicts the proposed approach. The signature is embedded into the host, with a reference watermark. After being transmitted through the channel, the embedded reference watermark is extracted first and used to compute channel statistics. The signature is then detected to authenticate the transmitted host data.

U".,.,.A

Figure 2. The modcl of the proposed approach.

In this work, the side information, a reference watermark, is obtained at both the watermark embedder at the sender site

'

This work WBS SugPoIted by the Ministy of Education under the Projecl of Excellency No. 89-E-FAO4-1-4.

0-7803-7713-3/02/$17.00 0 2002 IEEE 328

Authorized licensed use limited to: National Chiao Tung University. Downloaded on March 14, 2009 at 02:07 from IEEE Xplore. Restrictions apply.

(2)

and the watermark extractor at the receiver site. The channel statistics are given to the signature extractor using the side information. The above mapping naturally leads to an example of communication models with side information, Fig.

3.

, ... ~

L

...

I

i

R e d -1 j

L

ws-t

-

i ... sua& , Figure 3. The paposed approach viewed BS communications with side information.

Two assumptions are made witbout a loss of generality.

The first is that manipulations of the channel cannot distinguish between the embedded signature and the embedded reference watermark the second is that the manipulations on the host are locally consistent. Thus, local channel statistics can be analyzed using both a designed reference watermark and the corresponding extracted reference watermark.

III. PROPOSED APPROACH A. Wafermark Design . .

A binary bit stream is used as the reference watermark. It is used to detect channel statistics based on the two assumptions conceming manipulations stated above. The signature is generated by thresholding the host image according to a predefined threshold. Such a design avoids the difficulty of summarizing information contained in the host data. Other kinds of signatures are also suitable.

The watermark is wholly composed of the signature and the reference Watermark. It cannot be so large as to destroy the transparency of the image. Moreover, the number of reference watermark bits cannot be too sparse with respect to the number of Signature bits, so the computed channel statistics are reliable in the local area. The signature and the reference watermark are randomly permuted using a permutation key to increase security and distribute the reference watermark bits as uniformly as possible.

B. Watermark Embedding

The embedding method is basically the quantization-based method developed by Knndur and Hatzinakos [3]: the host image is transformed using a wavelet transform, and the watermark is embedded hit by hit in the randomly chosen detail coefficients. Two modifications are made to improve robustness: one is not to embed watermark bits at the highest

resolution; the other is to set the quantization parameter as a constant.

Thus, for each watermark bit w(i), a wavelet coefficient,

f*,/ (m, n), is randomly selected, where k = h, v, and d denote

“horizontal’, ‘tertical”, and “diagonal” detail coefficients, respectively; 1 = 1, 2, .._, L specifies.a resolution, and (m, n) represents a spatial location. Each wavelet coefficient can be chosen only once. The embedding rules are as follows:

C. Wafermark Extraction and Aufhenficafion

The wavelet coefficient selection key is used to locate the positions of the embedded wavelet coefficients, and the permutation key is used to separate the embedded signature bits *om the embedded reference watermark bits. Then, the reference watermark bits in an N x N neighborhood of each signature bit, b, are used to determine conditional probabilities, pg, (where i is the value of the extracted reference watermark bit and j is the value of the corresponding original reference watermark bit) according to the following equation:

where @ represents the XOR operator, e ~~ an extracted reference watermark bit at position (p, q ) in the N x N neighborhood, and rp,.rl the original reference watermark bit embedded at the same position at the sender site.

PO and P I are set to 0.5 without a loss of generality. The estimated bit value, b’

,

of the extracted signature bit, b, is then computed using the Bayes theorem:

(unreliable otherwise

329

Authorized licensed use limited to: National Chiao Tung University. Downloaded on March 14, 2009 at 02:07 from IEEE Xplore. Restrictions apply.

(3)

where T is a predefined threshold with a value of 0.8, established by experiment. The extracted signature bit, 6’ , is classified into the “reliable” class if one of the a posteriori probabilities pass the test; otherwise,bit b’ is classified into the “unreliable” class and marked as “unreliable”. Then, a reliability measure, R, of the extracted signature is defined as follows:

I ,

c(l-4

Ob, )

4

for bi is in the “reliable” class, (5)

= t-r.

where L, is the length of the signature stream. Furthermore, an entropy measure H i s computed as follows:

where the joint probabilities,pii, are computed as follows:

with e,, and rp,4 indicate an extracted reference watermark bit and the corresponding correct bit at position (p, q ) in the tested

N

x N neighborhood, respectively. The entropy measure, If, is used to represent the uncertainty status of the chanuel. Finally, the watermarked image is compared to the extracted signature visually, by typical matching techniques, or by ad hoc methods, to classify various manipulations.

IV. RESULTS AND DISCUSSION

Is the channel statistics-based reliability measure R reliable? Two experiments were performed to answer the question. One compared the reliability measure R with the hit ratio. The hit ratio A is computed as follows:

x ( 1 - 4 @ b 7 ,

A = WJ. forb, is in the“reliab1e“class , (8)

z4

ntrr,

where b,. is a reliable bit and the ith bit of the extracted signature, and b; is the ith bit of the original signature stream.

This hit ratio A is the percentage of reliable signature bits that are correct. If reliability R is non-zero at a large hit ratio, then the signature bits detected as reliable really include a high fiaction of correct bits. The other experiment compared the reliability, R, with the uncertainty, H. When a reliability

measure, R, is non-zero at a low entropy value, the detected signature bits recognized as reliable are quite certain.

The 512x512 image, Airplane, is utilized. The signature is generated using a threshold value of 185, and then reduced to a size of 128x128. The Haar wavelet transform is used and resolution level is three. The length of the reference watermark is set to a quarter of the signature size. After the permutations, the watermark is embedded into the transformed images using a quantization parameter, 23. The PSNRs calculated fiom [3] are all between 40 and 50. At the receiver site, the channel statistics are analyzed in a 21 x 21 neighborhood around each signature bit. Finally, the computed signatures are visually compared to the transmitted images.

A series of P E G images, with lost data percentages ranging from 3% to 98%, are used. These images undergo various degrees of distortion, as therefore do the embedded signatures. Fig. 4 shows some examples of signatures extracted fiom these P E G images.

(a) (b) (4 (d) (e)

Figure 4. Examples of emacted r i p t u e s from P E G images. The reliable

“ a c t e d signature bits are represented by black and white pixels, which indicate bit values 0 and 1, respectively. The unreliable signahue bits are representedbypypixels: (a)original;@)R=0.52andH= 1.24;(c)R=

0.43 andH= 1.72; (d)R = 0.24 MdH= 1.78; ( e ) R = 0.03 andH= 1.87.

Fig. 5 shows that higher hit ratios are associated with higher reliability measures. In particular, the hit ratios exceed 90% when the reliability measures exceed 0.5, and under such circumstances, the percentage of lost data in the JPEG images can reach 60%. If the lost data percentages rise greatly, then the reliability measures approach zero, meaning that the distortions caused by JPEG compression so severely damaged the images that very few or no extracted signature bits can be considered to be reliable. Hit ratios are smaller than 0.5 or are zero under such circumstances. Notably, values of the reliable signature bits equal randomly chosen values if the corresponding hit ratio is 50%.

330

Authorized licensed use limited to: National Chiao Tung University. Downloaded on March 14, 2009 at 02:07 from IEEE Xplore. Restrictions apply.

(4)

-

8 7 6-11 1.4 792 DAY9 8 0 n2w* *.I mIxi3 ’),.I ’)I5 m 91093.BP16 pl.7969p1.3

~ n r p ~ d m m m d l ~ r ~ m i m & u h ~ ~ ~ ~ h a ~ e ~ % )

Figure 6. Values of reliability, R, and entropy, H, across a series of P E G images.

Fig. 6 compares the entropy values of signatures. A higher reliability is associated with lower entropy. That is, the uncertainty in the information is quite low for computed reliable signature hits. Therefore, using the reliability measure based on channel statistics is meaningfkl. When the reliability measures are about zero, the corresponding entropy values are still rather high. (The maximum entropy value is two in the experiments.) That is, the uncertainty in the information is high under such circumstances. The validity of using the channel statistics-based measure is again confumed.

Moreover, the shape of the entropy value curve is rather symmetrical; that is, entropy values are low at both smaller and larger degrees of distortion. Therefore, the channel statistics are highly certain in these two situations.

(a) @) (4 ( 4

Figure 7. Example of negation attack (a) the original host image Airplane;

@) negation of the watermarked image; (c) dirntb Rhacted signature without applying the pmposed mechanism based on channel statistics: cd) signame extracted by the pmposed approach.

Fig. 7 presents some experimental results pertaining to authentication. Fig. 7(a) shows the original image - Airplane.

M e r the watermark is embedded, the host image is manipulated using the negation operation. As shown in Fig.

7(b), the airplane seems to be imaged at night. In Fig. 7(c), the extracted signature is obtained by directly retrieving the bit values stored in the signature positions, and the airplane can still be seen to fly at night. However, after the proposed approach based on channel-statistics, is applied to detect the embedded signature, the result is correct: the airplane actually flies under the sun.

V. CONCLUSIONS

Authentication based on embedded signatures is a growing field of research. This study develops a novel approach based on channel statistics, which provide useful information for authentication, including a measnre of the reliability of the extracted signature and of the uncertainty of the channel status.

The experimental results concerning hit ratios and uncertainties showed that such a method based on channel statistics can be used to describe "ably the channel status.

Future research may be aimed at developing more robust embedding methods, deriving the optimal size of the neighborhood used to authenticate the signature, and generating more representative signatures.

REFERENCES

[ 1) F. Bartohi, k Tefas, M. Bami, and L Pitas, “Image authentication techniques fm sweillmce applications,” Pmceedings o/ the IEEE, Vol. 89,” 10, pp. 1403-1418, On 2001.

121 F. HarNng and M KURU, ‘Multiruedin watemnrhg techniques,”

Proceedings ofthelEEE, VoL 87, No. 7 , p p 1079-1107, July. 1999.

131 D. Kundur and D. Hafdnakos, “Digital watermarbug for telltale tamper proofing and authatication,” Proceedings of the IEEE, Vol. 87, No. 7, pp. 1167-1 180, July. 1999.

[4] P. Moulin, ‘The mle of information theary in watamarking and its application to image,” Signal Procersing, VoL 81, No. 6, pp. 1121- 1139, June. 2001.

[5] F. k P. Petitcolas, RI. Andenon, and M.G. Kuhs “ a t i o n hiding

-

a survey,” Proceedings of the IEEE, Vol. 87, No. 7, pp.

1062-1078, July 1999.

331

Authorized licensed use limited to: National Chiao Tung University. Downloaded on March 14, 2009 at 02:07 from IEEE Xplore. Restrictions apply.

數據

Figure  1,  A commwication model  with  side information.
Fig.  5  shows  that  higher  hit  ratios  are  associated  with  higher reliability measures
Figure 6. Values of reliability, R,  and entropy,  H,  across  a  series of P E G   images

參考文獻

相關文件

– Set the corresponding bits in TCCRnX(n=1,2,3 X=A,B) re gisters for mode selection and timer prescaler. – Set OCRnX for “frequency”(OCRnA) or

– Maintain a heavy path: Instead of recalculate all ances tors' value, only the corresponding overlapping subpa th will be recalculated. It cost O(1) time for each verte x, and

• Each row corresponds to one truth assignment of the n variables and records the truth value of φ under that truth assignment. • A truth table can be used to prove if two

An n×n square is called an m–binary latin square if each row and column of it filled with exactly m “1”s and (n–m) “0”s. We are going to study the following question: Find

Reading Task 6: Genre Structure and Language Features. • Now let’s look at how language features (e.g. sentence patterns) are connected to the structure

Numerical experiments are done for a class of quasi-convex optimization problems where the function f (x) is a composition of a quadratic convex function from IR n to IR and

A subgroup N which is open in the norm topology by Theorem 3.1.3 is a group of norms N L/K L ∗ of a finite abelian extension L/K.. Then N is open in the norm topology if and only if

The space of total positive matrices mod GL(n) is finite But the number of Ising networks is infinite. Ising networks are secretly dual to each other though local duality