THE USAGE OF 3-BIT QUANTIZATION METHOD FOR SELECTIVE IMAGE AUTHENTICATION ALGORITHM ROBUST TO JPEG COMPRESSION
Abstract
The advantage of watermarking usage is it does not require to store of metadata in extra memory space. However, JPEG algorithm, being a common method for image compression, leads to break-in of strict image authentication. An improved algorithm of selective image authentication tolerant to JPEG compression is presented. Proposed method is based on central finite differences and 3-bit quantization of the feature vector. The experimental results show that algorithm has strong resistance to JPEG compression with quality factor Q ≥ 8, the high probability of malicious tampering detection and low order of calculation complexity comparing with the previous presented. A visual quality (PSNR) of the watermarked image is higher than 40 dB.
About the Authors
A. ZhuvikinRussian Federation
V. Korzhik
Russian Federation
References
1. Menezes A. A. J., Van Oorschot P., and Vanstone, S. Handbook of Applied Crytography // Discrete Mathematics and Its Applications Series. Crc Press. 1997.
2. Lee M. H., Korzhik V. I., Morales-Luna G., Lusse S., and Kurbatov E. Image authentication based on modular embedding. IEICE Transactions 89-D. 2006. N 4. PP. 1498–1506.
3. Goljan M., Fridrich J. J., and Du R. Distortion-free data embedding for images // In Proceedings of the 4th International Workshop on Information Hiding. IHW '01. Springer-Verlag, London, UK. 2001. PP. 27–41.
4. Fridrich J., Goljan M., and Du R. Invertible authentication watermark for JPEG images / In ITCC (2004-01-26). IEEE Computer Society. PP. 223–227.
5. Ni Z., Shi Y., Ansari N., and Su W. Reversible data hiding // IEEE Trans. Circuits Syst. Video Techn. 2006. 16, 3. PP. 354–362.
6. Korzhik V., Zhuvikin A., and Morales-Luna G. Selective image authentication tolerant to JPEG compression // In 6th IISA 2015. IEEE, 06–08.
7. Eberly D. Derivative approximation by finite differences. Tech. rep. 2008.
8. Zivic N. Robust Image Authentication in the Presence of Noise. Springer International Publishing, 2015. 187 p.
9. Porwik P. and Lisowska A. The Haar wavelet transform in digital image processing: its status and achievements // Int. Journal Machine Graphics & Vision. 2004. V. 13. N 1. PP. 79–98.
Review
For citations:
Zhuvikin A., Korzhik V. THE USAGE OF 3-BIT QUANTIZATION METHOD FOR SELECTIVE IMAGE AUTHENTICATION ALGORITHM ROBUST TO JPEG COMPRESSION. Proceedings of Telecommunication Universities. 2016;2(1):52-57. (In Russ.)