Tekil Değer Ayrışımı Tabanlı Yeni Bir İmge Kimliklendirme Yöntemi

İmgelerde kimlik doğrulama için kırılgan damgalama yöntemleri yaygın olarak kullanılmaktadır. Kullanılan kırılgan damgalama yöntemlerinde genellikle eşitlik biti, sır paylaşımı ve özet fonksiyonu gibi yöntemler kullanarak damganın kırılganlığı arttırılmaktadır. Bu makalede tekil değer ayrışımı (TDA) ve blok tabanlı yeni bir veri gizleme tekniğiyle imge kimlik doğrulama işlemi önerilmiştir. Önerilen yöntemde blok genişliği kullanıcıya bağlıdır. Bu uygulama da 2 x 2, 4 x 4 ve 8 x 8 boyutunda bloklar kullanılmıştır. Her bir bloktan TDA kullanılarak özellikler elde edilmiştir. Elde edilen özellikler blok büyüklüğüne göre basamaklandırılmış ve bloğa gömülmüştür. Bu yöntem ön işlem, özellik çıkarımı, basamaklama ve veri gizleme aşamalarından oluşmaktadır. Veri çıkarma aşamasında veri çıkarma ile veri doğrulama ve saldırı tespiti aşamaları yer almaktadır. Yöntemin görsel kalitesi tepe sinyal gürültü oranı (TPGO -  PSNR) ile ölçülmüştür. Deneysel sonuçlar önerilen metodun başarılı olduğunu göstermiştir.

___

  • X. Ma, Z. Pan, S. Hu, L. Wang, Reversible data hiding scheme for VQ indices based on modified locally adaptive coding and double-layer embedding strategy, J. Vis. Commun. Image R. 28, 60–70, 2015.
  • T. Furon, A survey of watermarking security International workshop on digital watermarking, Lecture notes on computer science, Vol. 3710, Springer, 201–215, 2005.
  • J. Fridrich, Steganography in digital media: Principles, algorithms, and applications, Cambridge University Press, 2005.
  • C.H. Yang, Y.C. Lin, Fractal curves to improve the reversible data embedding for VQ-indexes based on locally adaptive coding, J. Vis. Commun. Image Represent. 21 (4), 334–342, 2010.
  • V. Bhat, I. Sengupta, A. Das, An adaptive audio watermarking based on the singular value decomposition in the wavelet domain, Digital Signal Processing, 20, 1547–155, 2010.
  • J. Daemen, V. Rijmen, The Design of Rijndael: AES-the Advanced Encryption Standard, Springer, 2002.
  • A. Said, W.A. Pearlman, A new, fast, and efficient image codec based on set partitioning in hierarchical trees IEEE Trans Circuits Syst Video Technol, 6, 243–250, 1996.
  • J. Shropshire, M. Warkentin, S. Sharma, Personality, attitudes, and intentions: Predicting initial adoption of information security behavior, Computers & Security, Volume 49, 177-191, 2015.
  • B. Lavanya, Y. Smruthi, S. R. Elisala, Data hiding in audio by using image steganography technique, IJETTCS, Volume 2, Issue 6, November – December 2013.
  • B. Chen, “Design and analysis of digital watermarking, information embedding, and data hiding systems,” Ph.D. dissertation, MIT, Cambridge, MA, June 2000.
  • M.U. Celik, G. Sharma, A.M. Tekalp, E. Sable, Lossless generalized-LSB data embedding, IEEE Trans. Image Process. 14 (2), 253–266, 2005.
  • Y. K. Lin, A data hiding scheme based upon DCT coefficient modification, Computer Standards & Interfaces, Volume 36, Issue 5, 855-862, 2014.
  • Y. Liu, J. Zhao, A new video watermarking algorithm based on 1D DFT and Radon transform, Signal Processing, Volume 90, Issue 2, 626-639, February 2010.
  • S. H. Lee, DWT based coding DNA watermarking for DNA copyright protection, Information Sciences, 273, 263-286, 2014.
  • D. Vaishnavi, T.S. Subashini, Robust and Invisible Image Watermarking in RGB Color Space Using SVD, Procedia Computer Science, Volume 46, 1770-1777, 2015.
  • M. Yu, J. Wang, G. Jiang, Z. Peng, F. Shao, T. Luo, New fragile watermarking method for stereo image authentication with localization and recovery, AEU - International Journal of Electronics and Communications, Volume 69, Issue 1, 361-370, January 2015.
  • C.-C. Chang, K.-N. Chen, C.-F. Lee, L.-J. Liu, A secure fragile watermarking scheme based on chaos-and-hamming code, Journal of Systems and Software, Volume 84, Issue 9, 1462-1470, September 2011.
  • M. Bottaa, D. Cavagninoa, V. Pomponiu, A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection, AEU - International Journal of Electronics and Communications, Volume 69, Issue 1, 242-245, January 2015,
  • H. M. Al-Otum, Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique, Journal of Visual Communication and Image Representation, Volume 25, Issue 5, 1064-1081 July 2014.
  • L. Teng, X. Wang, X. Wang, Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme, AEU - International Journal of Electronics and Communications, Volume 67, Issue 6, 540-547, June 2013.
  • D. Caragata, J. A. Mucarquer, M. Koscina, S. E. Assad, Cryptanalysis of an improved fragile watermarking scheme, International Journal of Electronics and Communications, Volume 70, 777-785, 2016.
  • C.C. Lin, W.H. Tsai, Secret image sharing with steganography and authentication, Journal of Systems and Software, 73, 405-414, 2004.
  • C.N. Yang, T.S. Chen, K.H. Yu, C.C. Wang, Improvements of image sharing with steganography and authentication, Journal of Systems and Software, 80, 1070-1076, 2007.
  • C. C. Chang, Y. P. Hsieh and C. H. Lin, Sharing secrets in stego images with authentication, Pattern Recognition, vol. 41, no. 10, 3130-3137, 2008.
  • Z. Eslami, J.Z. Ahmadabadi, Secret image sharing with authentication-chaining and dynamic embedding, Journal of Systems and Software, 84,803-809, 2011.
  • C.N. Yang, J.F. Ouyang, L. Harn, Steganography and authentication in image sharing without parity bits, Optics Communications, 285, 1725-1735, 2012.
  • University of Southern California, Signal and Image Processing Institute, SIPI Image Dataset, http:// http://sipi.usc.edu/database/ (05.01.2016)
  • A. Tanchenko, Visual-PSNR measure of image quality, J. Vis. Commun. Image R. 25,874–878, 2014.
  • M. M. A-Eldayem, A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine, Egyptian Informatics Journal, 14,1–13, 2013.
  • C. C. Wang, Y. F. Chang, C. C. Chang, J. K. Jan, C. C. Lin, A high capacity data hiding scheme for binary images based on block patterns, The Journal of Systems and Software 93, 152–162, 2014.
Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi-Cover
  • ISSN: 1300-1884
  • Yayın Aralığı: Yılda 4 Sayı
  • Başlangıç: 1986
  • Yayıncı: Oğuzhan YILMAZ