Preview

Proceedings of Telecommunication Universities

Advanced search

THE USAGE OF 3-BIT QUANTIZATION METHOD FOR SELECTIVE IMAGE AUTHENTICATION ALGORITHM ROBUST TO JPEG COMPRESSION

Abstract

The advantage of watermarking usage is it does not require to store of metadata in extra memory space. However, JPEG algorithm, being a common method for image compression, leads to break-in of strict image authentication. An improved algorithm of selective image authentication tolerant to JPEG compression is presented. Proposed method is based on central finite differences and 3-bit quantization of the feature vector. The experimental results show that algorithm has strong resistance to JPEG compression with quality factor Q ≥ 8, the high probability of malicious tampering detection and low order of calculation complexity comparing with the previous presented. A visual quality (PSNR) of the watermarked image is higher than 40 dB.

About the Authors

A. Zhuvikin
Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича
Russian Federation


V. Korzhik
Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича
Russian Federation


References

1. Menezes A. A. J., Van Oorschot P., and Vanstone, S. Handbook of Applied Crytography // Discrete Mathematics and Its Applications Series. Crc Press. 1997.

2. Lee M. H., Korzhik V. I., Morales-Luna G., Lusse S., and Kurbatov E. Image authentication based on modular embedding. IEICE Transactions 89-D. 2006. N 4. PP. 1498–1506.

3. Goljan M., Fridrich J. J., and Du R. Distortion-free data embedding for images // In Proceedings of the 4th International Workshop on Information Hiding. IHW '01. Springer-Verlag, London, UK. 2001. PP. 27–41.

4. Fridrich J., Goljan M., and Du R. Invertible authentication watermark for JPEG images / In ITCC (2004-01-26). IEEE Computer Society. PP. 223–227.

5. Ni Z., Shi Y., Ansari N., and Su W. Reversible data hiding // IEEE Trans. Circuits Syst. Video Techn. 2006. 16, 3. PP. 354–362.

6. Korzhik V., Zhuvikin A., and Morales-Luna G. Selective image authentication tolerant to JPEG compression // In 6th IISA 2015. IEEE, 06–08.

7. Eberly D. Derivative approximation by finite differences. Tech. rep. 2008.

8. Zivic N. Robust Image Authentication in the Presence of Noise. Springer International Publishing, 2015. 187 p.

9. Porwik P. and Lisowska A. The Haar wavelet transform in digital image processing: its status and achievements // Int. Journal Machine Graphics & Vision. 2004. V. 13. N 1. PP. 79–98.


Review

For citations:


Zhuvikin A., Korzhik V. THE USAGE OF 3-BIT QUANTIZATION METHOD FOR SELECTIVE IMAGE AUTHENTICATION ALGORITHM ROBUST TO JPEG COMPRESSION. Proceedings of Telecommunication Universities. 2016;2(1):52-57. (In Russ.)

Views: 200


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1813-324X (Print)
ISSN 2712-8830 (Online)