160 likes | 172 Views
Explore a method for near-lossless compression & watermarking of images for authentication and tamper location, utilizing robust security measures. Authors use Fridrich’s method with LSB embedding. Experimental results show efficacy in preventing attacks.
E N D
Joint near-lossless compression and watermarking of still images for authentication and tamper location Authors: Roberto Caldelli, Francesco Filippini, Mauro Barni Source: Science Direct, Signal Process: Image Communication 21 (2006) 890-903 Speaker: Wei Chun, Lin
Outline • Introduction • Encoding phase • Watermark detection • Security issue • Experimental results • Conclusions
Introduction • Watermark approaches • Fragile watermarking • Accomplished by inserting within the image a watermark that is readily altered or destroyed as soon as the host image undergoes any manipulations. • Robust watermarking • The watermark is not affected by image manipulation.
Introduction • In this paper, authors use Fridrich’s method, which embeds the least significant bits(LSB) of the host image. • Reason: • its security feathers • its good localization capabilities
Encoding phase • JPEG-LS prediction context Ix: the brightness of the current pixel Ra, Rb, Rc, Rd: neighbor pixels Rd : used only for context modelling (regular mode: Neighbours not very alike)
Encoding phase • Rx = Px + Q R min(Ra, Rb) if Rc ≧ max(Ra, Rb), • Px = max(Ra, Rb)if Rc ≦ min(Ra, Rb), Ra + Rb –Rc otherwise. • E = Ix – Px • Δ= (MAX) differ from original pixel by up to a preset amount • Q E=
Security issue • Multiple stego-image attack • Counterfeiter is making changes that detector cannot reveal or gain knowledge about the secret keys used by the scheme. • Verification device attack • Counterfeiter is making changes also accessing to the verification device and using it to check the integrity of any images he likes.
Security issue • Cover-image attack • Counterfeiter accesses to the image before authentication or uses an estimate of the original which can be performed. Then he has multiple pairs of original and authenticated images. • Chosen cover-image attack • Counterfeiter has the authentication device and he can submit his images to the authentication process to violate the secrets of the system.
Further improvements • Block size 8X16 16X16
Conclusion • Using JPEG-LS can easy to achieve the image compression in this paper.