Research Article
BibTex RIS Cite

A New Watermarking Algorithm Based on Visual Cryptography and Secret Sharing for Color Image Authentication and Tamper Detection

Year 2017, Volume: 1 Issue: 1, 1 - 8, 30.06.2017

Abstract

Digital forensics is a multi-disciplinary structure that is standardized on the collection, storage, compilation and analysis of evidence, usually obtained as data, through information systems. Digital forensics is not contrary to what is supposed to be a special field, it is a wide field discipline. In this article, a new fragile watermarking method is presented instead of cryptographic hash functions which are frequently used in digital forensics applications. The hash functions cannot detect the region where the attack is made, so we proposed fragile watermarking for authentication in digital data. The best way to make a fragile watermark is to use secret sharing algorithms. In this article, authentication and tamper detection for RGB images are performed using Wu and Chen's visual secret sharing algorithm. The proposed fragile watermarking algorithm is an algorithm with high visual quality, fragile, reliable and high data hiding capacity. Owing to Wu and Chen’s visual secret sharing algorithm, a new fragile watermarking method that is sensitive to angular attacks is proposed.

References

  • [1] Z. Ni, Y.-Q. Shi, N. Ansari, W. Su, Reversible Data Hiding, IEEE Transactions On Circuits And Systems For Video Technology, 16 (3), 2006.
  • [2] M. B. Begum, Y. Venkataramani, LSB Based Audio Steganography Based On Text Compression, Procedia Engineering, 30, 703-710, 2012.
  • [3] F. Perez-Gonzlez F. Balado, Quantized projection data hiding, inProc. IEEE Int. Conf. Image Process., 2, 889–892, 2002.
  • [4] Y. Q. Shi, Z. Ni, D. Zou, C. Liang, Lossless data hiding: fundamentals, algorithms and applications, IEEE Int. Symp. Circuits Syst., 33–36, 2004.
  • [5] Q. Mao, A fast algorithm for matrix embedding steganography, Digital Signal Processing, 25, 248-254, 2014.
  • [6] L. Von Ahn and N. J. Hopper, Public-key steganography, in Advances in Cryptology-Eurocrypt, Berlin, Germany: Springer-Verlag, 3027, 323–341, 2004.
  • [7] G.S. Lin, Y.T. Chang, W.N. Lie, A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm, IEEE Trans. Multimedia, 12 (5), 345–357, 2010.
  • [8] C. Cachin, An information-theoretic model for steganography, Information and Computation, 192 (1), 41-56, 2004.
  • [9] Y.-H. Yu, C.-C. Chang, A new edge detection approach based on image context analysis, Image and Vision Computing, 24 (10), 1090–1102, 2006.
  • [10] A. Westfeld, Detecting low embedding rates, In: Proceedings of information hiding workshop. LNCS, 2578, 324-339., 2003.
  • [11] X. Qi, X. Xin, A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization, Journal of Visual Communication and Image Representation, 30 (2015), 312-327, 2015.
  • [12] M. Botta, D. Cavagnino, V. Pomponiu, A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection, International Journal of Electronics and Communications (AEÜ), 69 (1), 242-245, 2015.
  • [13] M. Yu, J. Wang, G. Jiang, Z. Peng, F. Shao, T. Luo, New fragile watermarking method for stereo image authentication with localization and recovery, International Journal of Electronics and Communications (AEÜ), 69 (1), 361-370, 2015.
  • [14] S.K. Ghosal, J. K.Mandal, Binomial transform based fragile watermarking for image authentication, Journal of Information Security and Applications, 19 (4&5), 272-281, 2014.
  • [15] X. Tong, Y. Liu, M. Zhang, Y. Chen, A novel chaos-based fragile watermarking for image tampering detection and self-recovery, Signal Processing: Image Communication, 28 (3), 301-308, 2013.
  • [16] S.Tu, C. Hsu, Protecting secret documents via a sharing and hiding scheme, Information Sciences, 279 (20), 52-59, 2014.
  • [17] C. Lee, W. Tsai, A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding, Signal Processing, 93 (7), 2010-2025, 2013.
  • [18] Vassil Roussev, An evaluation of forensic similarity hashes, Digital Investigation, Volume 8, Supplement, August 2011, Pages S34-S41
  • [19] Ç. Koç, (2009). Cryptographic Engineering, Springer-Verlag.
  • [20] J. Kartz, Y. Lindell, (2008). Introduction to modern cryptography : principles and protocols, Chapman & Hall.
  • [21] C. Paar, J. Pelzl, (2010). Understanding Cryptography A Textbook for Student and Practitioners, Springer.
  • [22] K. Kırkıl, A. B. Özer, F. Özkaynak, (2012). Kaos Tabanlı Kriptolojik Özetleme Fonksiyonları, Akıllı Sistemlerde Yenilikler ve Uygulamaları Sempozyumu, Trabzon.
  • [23] A. Menezes, P. Van Oorschot, S Vanstone. (1996). Handbook of Applied Cryptography. CRC Press.
  • [24] B. Preneel, (1993). Analysis and Design of Cryptographic Hash Functions. PhD thesis, Katholieke Universiteit Leuven.
  • [25] M. Naor, A. Shamir, (1995)Visual Cryptography, EUROCRYPT’94 – Springer.
  • [26] C.C. Wu, L.H. Chen, A study on visual cryptography, Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.
  • [27] H.-C. Wu, C.-C. Chang, Sharing visual multi-secrets using circle shares, Comput. Stand. Interfaces 134 (28) (2005) 123–135.
  • [28] J. Guo, P. Zheng, J. Huang, Secure watermarking scheme against watermark attacks in the encrypted domain, Journal of Visual Communication and Image Representation, Volume 30, July 2015, Pages 125-135.
  • [29] M. Tanha, S. D. S. Torshizi, M. T. Abdullah, F. Hashim, An overview of attacks against digital watermarking and their respective counter measures. Paper presented at Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on, Kuala Lumpur, 265–70, 26–28 June 2012.
  • [30] P. P. Thulasidharan, M. S. Nair, QR code based blind digital image watermarking with attack detection code, International Journal of Electronics and Communications (AEÜ), In Press, Uncorrected Proof, Available online 11 April 2015.

Renkli İmgelerde Kimlik Doğrulaması ve Saldırı Tespiti için Görsel Sır Paylaşım Tabanlı Yeni Bir Kırılgan Damgalama Algoritması

Year 2017, Volume: 1 Issue: 1, 1 - 8, 30.06.2017

Abstract

Adli
bilişim, bilişim sistemleri üzerinden genellikle veri olarak elde edilen
delillerin toplanması, saklanması, derlenmesi ve analizi konusunda standartları
oluşturulan çok disiplinli bir yapıdır. Adli bilişim sanılan aksine özel bir
alan değil, geniş alan disiplinidir. Bu makalede adli bilişim uygulamalarında
sıklıkla kullanılan özet fonksiyonlarının yerine kırılgan damgaların
kullanılması önerilmiştir. Özet fonksiyonları saldırının yapıldığı bölgeyi
tespit edemezler bu sebepten dolayı sayısal verilerde kimlik doğrulama için
kırılgan damgaların kullanılması önerilmiştir. Bir damgayı kırılgan hale
getirebilmenin en iyi yolu sır paylaşım tabanlı algoritmaları kullanmaktır. Bu
makalede Wu ve Chen’ in görsel sır paylaşımı algoritması kullanılarak, RGB imgeler
için kimlik doğrulama ve saldırı tespiti yapılmıştır. Önerilen kırılgan
damgalama algoritması yüksek görsel kaliteye sahip, kırılgan, güvenilir ve
yüksek veri gizleme kapasitesine sahip bir algoritmadır. Wu ve Chen görsel sır
paylaşımı algoritması sayesinde açısal ataklara karşı hassas, yeni bir kırılgan
damgalama sistemi önerilmiştir. 

References

  • [1] Z. Ni, Y.-Q. Shi, N. Ansari, W. Su, Reversible Data Hiding, IEEE Transactions On Circuits And Systems For Video Technology, 16 (3), 2006.
  • [2] M. B. Begum, Y. Venkataramani, LSB Based Audio Steganography Based On Text Compression, Procedia Engineering, 30, 703-710, 2012.
  • [3] F. Perez-Gonzlez F. Balado, Quantized projection data hiding, inProc. IEEE Int. Conf. Image Process., 2, 889–892, 2002.
  • [4] Y. Q. Shi, Z. Ni, D. Zou, C. Liang, Lossless data hiding: fundamentals, algorithms and applications, IEEE Int. Symp. Circuits Syst., 33–36, 2004.
  • [5] Q. Mao, A fast algorithm for matrix embedding steganography, Digital Signal Processing, 25, 248-254, 2014.
  • [6] L. Von Ahn and N. J. Hopper, Public-key steganography, in Advances in Cryptology-Eurocrypt, Berlin, Germany: Springer-Verlag, 3027, 323–341, 2004.
  • [7] G.S. Lin, Y.T. Chang, W.N. Lie, A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm, IEEE Trans. Multimedia, 12 (5), 345–357, 2010.
  • [8] C. Cachin, An information-theoretic model for steganography, Information and Computation, 192 (1), 41-56, 2004.
  • [9] Y.-H. Yu, C.-C. Chang, A new edge detection approach based on image context analysis, Image and Vision Computing, 24 (10), 1090–1102, 2006.
  • [10] A. Westfeld, Detecting low embedding rates, In: Proceedings of information hiding workshop. LNCS, 2578, 324-339., 2003.
  • [11] X. Qi, X. Xin, A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization, Journal of Visual Communication and Image Representation, 30 (2015), 312-327, 2015.
  • [12] M. Botta, D. Cavagnino, V. Pomponiu, A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection, International Journal of Electronics and Communications (AEÜ), 69 (1), 242-245, 2015.
  • [13] M. Yu, J. Wang, G. Jiang, Z. Peng, F. Shao, T. Luo, New fragile watermarking method for stereo image authentication with localization and recovery, International Journal of Electronics and Communications (AEÜ), 69 (1), 361-370, 2015.
  • [14] S.K. Ghosal, J. K.Mandal, Binomial transform based fragile watermarking for image authentication, Journal of Information Security and Applications, 19 (4&5), 272-281, 2014.
  • [15] X. Tong, Y. Liu, M. Zhang, Y. Chen, A novel chaos-based fragile watermarking for image tampering detection and self-recovery, Signal Processing: Image Communication, 28 (3), 301-308, 2013.
  • [16] S.Tu, C. Hsu, Protecting secret documents via a sharing and hiding scheme, Information Sciences, 279 (20), 52-59, 2014.
  • [17] C. Lee, W. Tsai, A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding, Signal Processing, 93 (7), 2010-2025, 2013.
  • [18] Vassil Roussev, An evaluation of forensic similarity hashes, Digital Investigation, Volume 8, Supplement, August 2011, Pages S34-S41
  • [19] Ç. Koç, (2009). Cryptographic Engineering, Springer-Verlag.
  • [20] J. Kartz, Y. Lindell, (2008). Introduction to modern cryptography : principles and protocols, Chapman & Hall.
  • [21] C. Paar, J. Pelzl, (2010). Understanding Cryptography A Textbook for Student and Practitioners, Springer.
  • [22] K. Kırkıl, A. B. Özer, F. Özkaynak, (2012). Kaos Tabanlı Kriptolojik Özetleme Fonksiyonları, Akıllı Sistemlerde Yenilikler ve Uygulamaları Sempozyumu, Trabzon.
  • [23] A. Menezes, P. Van Oorschot, S Vanstone. (1996). Handbook of Applied Cryptography. CRC Press.
  • [24] B. Preneel, (1993). Analysis and Design of Cryptographic Hash Functions. PhD thesis, Katholieke Universiteit Leuven.
  • [25] M. Naor, A. Shamir, (1995)Visual Cryptography, EUROCRYPT’94 – Springer.
  • [26] C.C. Wu, L.H. Chen, A study on visual cryptography, Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.
  • [27] H.-C. Wu, C.-C. Chang, Sharing visual multi-secrets using circle shares, Comput. Stand. Interfaces 134 (28) (2005) 123–135.
  • [28] J. Guo, P. Zheng, J. Huang, Secure watermarking scheme against watermark attacks in the encrypted domain, Journal of Visual Communication and Image Representation, Volume 30, July 2015, Pages 125-135.
  • [29] M. Tanha, S. D. S. Torshizi, M. T. Abdullah, F. Hashim, An overview of attacks against digital watermarking and their respective counter measures. Paper presented at Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on, Kuala Lumpur, 265–70, 26–28 June 2012.
  • [30] P. P. Thulasidharan, M. S. Nair, QR code based blind digital image watermarking with attack detection code, International Journal of Electronics and Communications (AEÜ), In Press, Uncorrected Proof, Available online 11 April 2015.
There are 30 citations in total.

Details

Subjects Engineering
Journal Section Articles
Authors

Turker Tuncer This is me

Engin Avcı This is me

Publication Date June 30, 2017
Submission Date June 15, 2017
Published in Issue Year 2017 Volume: 1 Issue: 1

Cite

APA Tuncer, T., & Avcı, E. (2017). A New Watermarking Algorithm Based on Visual Cryptography and Secret Sharing for Color Image Authentication and Tamper Detection. International Journal of Innovative Engineering Applications, 1(1), 1-8.
AMA Tuncer T, Avcı E. A New Watermarking Algorithm Based on Visual Cryptography and Secret Sharing for Color Image Authentication and Tamper Detection. IJIEA. June 2017;1(1):1-8.
Chicago Tuncer, Turker, and Engin Avcı. “A New Watermarking Algorithm Based on Visual Cryptography and Secret Sharing for Color Image Authentication and Tamper Detection”. International Journal of Innovative Engineering Applications 1, no. 1 (June 2017): 1-8.
EndNote Tuncer T, Avcı E (June 1, 2017) A New Watermarking Algorithm Based on Visual Cryptography and Secret Sharing for Color Image Authentication and Tamper Detection. International Journal of Innovative Engineering Applications 1 1 1–8.
IEEE T. Tuncer and E. Avcı, “A New Watermarking Algorithm Based on Visual Cryptography and Secret Sharing for Color Image Authentication and Tamper Detection”, IJIEA, vol. 1, no. 1, pp. 1–8, 2017.
ISNAD Tuncer, Turker - Avcı, Engin. “A New Watermarking Algorithm Based on Visual Cryptography and Secret Sharing for Color Image Authentication and Tamper Detection”. International Journal of Innovative Engineering Applications 1/1 (June 2017), 1-8.
JAMA Tuncer T, Avcı E. A New Watermarking Algorithm Based on Visual Cryptography and Secret Sharing for Color Image Authentication and Tamper Detection. IJIEA. 2017;1:1–8.
MLA Tuncer, Turker and Engin Avcı. “A New Watermarking Algorithm Based on Visual Cryptography and Secret Sharing for Color Image Authentication and Tamper Detection”. International Journal of Innovative Engineering Applications, vol. 1, no. 1, 2017, pp. 1-8.
Vancouver Tuncer T, Avcı E. A New Watermarking Algorithm Based on Visual Cryptography and Secret Sharing for Color Image Authentication and Tamper Detection. IJIEA. 2017;1(1):1-8.