You are here

İkili imgeler için blok tabanlı yeni bir kimlik doğrulama yöntemi

A Novel Block Based Authentication Method for Binary Images

Journal Name:

Publication Year:

Author NameUniversity of Author
Abstract (2. Language): 
Digital watermarking techniques have been commonly used for binary image authentication. The digital watermarking techniques for binary images are different from other watermarking techniques because the pixel values of the binary images are 0 and 1. Digital watermarking techniques for binary images is more difficult than watermarking in graylevel or colored images, because the human vision system can perceive small changes in binary images. In this article, a new fragile watermarking method is proposed for authentication for binary images. In this paper, a new fragile block based watermarking method for binary images authentication is proposed. The proposed method consists of dividing into blocks, determining embeddable blocks, feature extraction, data hiding, data extraction, data verification and tamper detection steps. Firstly, the binary image is divided into blocks. According to rules, embeddable blocks are determined. Embeddable blocks are divided into 4 sub-blocks which are 3 feature extraction blocks and a data hiding block. The feature value is obtained by using the feature extraction blocks. Watermark embedding location (index) and authentication bit is calculated by using feature value. The pixel values of the data hiding blocks are determined by using feature and these values modified with authentication bits. In watermark extraction phase, feature values are calculated by using feature extraction. If the feature value of the block is the same as the value of the pixel, the authentication process is completed. Otherwise, the attack is detected. Blocks in variable sizes are used to measure the performance of the proposed method. Experimental results have shown that the proposed method has high visual quality, capacity and this method can be used in practice. Authentication bit generation and watermark embedding steps are given below. Step 1: Obtain image. Step 2: Determine block size Step 3: Divide image to sub-blocks by using nonoverlapping blocks. Step 4: Determine embeddable blocks. Pixels of embeddable blocks which are not all 0 and 1. In the proposed method, feature extractor blocks and data hiding block are used. Step 4: I used Eq. 1-7 to generate embeddable bit and data hiding indices. To extract feature, Eq. 1-7 are used. Step 5: The obtained authentication bit and index are used for data hiding. Data hiding process is described in Eq. 8. Data extraction and tamper detection steps are given below. Step 1: Use Eq. 1-7 for feature extraction. Step 2: If determined pixel value is equal to authentication bit, image authentication is successful. Step 3: If determined pixel value is not equal to authentication bit, go to tamper detection. In this method, 2M x 2N sized blocks are used for image authentication. 4 M x N sized blocks are obtained from 2M x 2N blocks. The first 3 blocks are used for feature extraction. The last block is used for data hiding. In the proposed method, 4 x 4, 6 x 6, 8 x 8 and 10 x 10 sized macro blocks are used for performance testing. 2 x 2, 3 x 3, 4 x 4 and 5 x 5 size blocks are also used for feature extraction and data hiding in these macro blocks. The characteristics of the proposed method are given below. The proposed method can extract authentication bits without any map or data. This method is blind watermarking and image authentication method. In a macro block, blocks are divided into feature extraction blocks and data hiding block. Authentication bit and its index are determined by using feature extraction blocks. Execution cost of the proposed method is low. The proposed method is an extensible method. (The users can define different features.) The proposed method can use sub-blocks in various sizes. The key is obtained by using embeddable pixels. The proposed method has tamper detection ability by using the key. The proposed method has high visual quality and high payload capacity. Visual quality and data hiding capacity are used for performance test. PSNR (Peak Signal Noise-to Ratio) and payload capacity are used in this test. Experimental results showed that the proposed method resulted successfully and the proposed method obtained higher capacity and visual quality than previously proposed methods in the literature.
Abstract (Original Language): 
İkili imge kimlik doğrulamada genellikle sayısal damgalama teknikleri kullanılmaktadır. İkili imgelerin için önerilen sayısal damgalama teknikleri diğer damgalama tekniklerinden farklıdır çünkü ikili imgelerin piksel değerleri 0 ve 1’dir. İnsan görme sisteminin ikili imgelerde yapılan küçük değişimleri algılayabilmesinden dolayı, ikili imgelerde damgalama gri seviyeli veya renkli imgelerde damgalamadan daha zordur. Bu makalede ikili imgelerde kimlik doğrulama için yeni bir kırılgan damgalama yöntemi önerilmiştir. Önerilen kırılgan damgalama yöntemi bloklara bölme, gömülebilir blok belirleme, özellik çıkarma, veri gizleme, veri çıkarma, veri doğrulama ve saldırı tespiti aşamalarından oluşmaktadır. Öncelikle, ikili görüntü bloklara bölünür. Kurallara göre yerleştirilebilir bloklar belirlenir. Gömülebilir bloklar, 3 öznitelik çıkarma blokları ve bir veri gizleme bloğu olmak üzere 4 alt bloğa ayrılmıştır. Özellik değeri, özellik çıkarma blokları kullanılarak elde edilir. Filigran gömme yeri (indis) ve doğrulama biti, özellik değeri kullanılarak hesaplanır. Veri gizleme bloklarının piksel değerleri, özellik kullanılarak belirlenir ve bu değerler, kimlik doğrulama bitleriyle değiştirilir. Filigran çıkarma aşamasında, özellik değerleri, özellik çıkarımı kullanılarak hesaplanır. Bloğun özellik değeri pikselin değeri ile aynı ise, kimlik doğrulama işlemi tamamlanır. Aksi halde saldırı tespit yapılır. Önerilen yöntemin performansını ölçmek için değişken boyuttaki bloklar, kullanılmıştır. Deneysel sonuçlar, önerilen yöntemin yüksek görsel kalite, kapasiteye sahip olduğunu ve bu yöntemin pratikte kullanılabileceğini göstermektedir.
525
534

REFERENCES

References: 

Fridrich, J., (2005). Steganography in digital media:
Principles, algorithms, and applications,
Cambridge University Press, 2005.
Furon, T., (2005). A survey of watermarking security
International workshop on digital watermarking,
Lecture notes on computer science, Vol. 3710,
Springer, 201–215.
Guo M., Zhang H., (2010). High Capacity Data
Hiding for Binary Image Authentication,
International Conference on Pattern Recognition,.
Kim H., (2005). A new public-key authentication
watermarking for binary document images
resistant to parity checks, in: Proc: IEEE
International Conferences on Image Processing
(ICIP), vol. 2, pp. 1074–1077.
Kim, H., Afif, A., (2003). Secure authentication
watermarking for binary images, in: Proc.
Brazilian Symposium on Computer Graphics and
Image Processing, pp. 199–206.
Kim, H., Afif, A., (2004). A secure authentication
watermarking for halftone and binary images,
International Journal of Imaging Systems and
Technology 14 (4), 147–152.
Lavanya, B., Smruthi, Y., Elisala, S. R., (2013). Data
hiding in audio by using image steganography
technique, IJETTCS, Volume 2, Issue 6.
Lee, Y., Hur, J., Kim, H., Park, Y., Yoon H., (2007).
A new binary image authentication scheme with
small distortion and low false negative rates,
IEICE Transactions on Communications E90-B
(11) 3259–3261.
Liu, Y. Zhao, J., (2010). A new video watermarking
algorithm based on 1D DFT and Radon transform,
Signal Processing, Volume 90, Issue 2, 626-639.
Ma, X., Pan, Z., Hu, S., Wang, L., (2015). Reversible
data hiding scheme for VQ indices based on
modified locally adaptive coding and double-layer
embedding strategy, J. Vis. Commun. Image R.
28, 60–70.
Shropshire, J., Warkentin, M., Sharma, S., (2015).
Personality, attitudes, and intentions: Predicting
initial adoption of information security behavior,
Computers & Security, Volume 49, 177-191.
Tanchenko A., (2014). Visual-PSNR measure of
image quality, J. Vis. Commun. Image R. 25,874–
878.
Tseng, H.W., Wu, F.R., Hsieh, C.P., (2007). Data
hiding for binary images using weight mechanism,
IIHMSP, pp. 307–310.
Tuncer, T., Avcı, D., Avcı, E., (2016). İkili imgeler
için mayın tarlası oyunu tabanlı yeni bir veri
gizleme algoritması, Journal of the Faculty of
Engineering and Architecture of Gazi University
31:4, 951-959.
Tzeng, C., Tsai, W., (2003). A new approach to
authentication of binary images for multimedia
communication with distortion reduction and
security enhancement, IEEE Communications
Letters 7 (9) 443–445.
Venkatesan, M., Meenakshidevi, P., Duraiswamy, K.,
Thiagarajah, K., (2007). A new data hiding
scheme with quality control for binary images
using block parity,in: 3rd Inter. Symposium on
Information Assurance and Security, pp. 468–471.
Wu, M., Liu, B., (2004). Data hiding in binary images
for authentication and annotation, IEEE
Transactions on Multimedia 6 (4), 528–538.
Wu, M.,Liu, B., (2004). Data Hiding in Binary Image
for Authentication and Annotation, IEEE
Transactions on Multimedia, Vol 6, No 4.
Yang, H. Kot, A. C., (2006). Binary Image
Authentication With Tampering Localization by
Embedding Cryptographic Signature and Block
Identifier, IEEE Signal Processıng Letters, Vol.
13, no. 12.
Yang, H., Kot, A.C., (2007). Pattern-based data
hiding for binary image authentication by
connectivity-preserving, IEEE Transactions on
Multimedia 9 (3), 475–486.
Yung, K.H., Yoo, K.Y., (2014). Data hiding method
in binary images based on block masking for key
authentication, Information Sciences, 277, pp.
188-196, 2014.

Thank you for copying data from http://www.arastirmax.com