Authentication/Secret Message Transformation Through

Download Report

Transcript Authentication/Secret Message Transformation Through

47th Annual National Convention
of the Computer Society of India
First International Conference on
Intelligent Infrastructure
CSI 2012
(1st to 2nd December, 2012
Science City, Kolkata, India)
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
1
Self Authentication of image
through Daubechies
Transform technique (SADT)
Madhumita Sengupta & J.K. Madal
7/17/2015
Department of Computer Science and
Engineering, The University of
Kalyani, Kalyani, Nadia – 741235,
West Bengal, India
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
2
PREVIOUS REALITY NOW BECOME MYTH
Historical fact
WYSIWYG
(WHAT YOU SEE IS WHAT YOU GET)
this truth become fake
BECAUSE OF DIGITAL STEGANOGRAPHY
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
3
STEGANOGRAPHY
Steganography Is a way of
writing/Storing Information
In such a Way that hides the
Existence of Information.
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
4
EXAMPLE
OF STEGANOGRAPHY / DATA
HIDING
Cover Image
7/17/2015
Stego - Image
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
5
OWNERSHIP PROTECTION& VERIFICATION
Problem in
Quality of
Stego Image
7/17/2015
Sender Side madhumita.sngpt@gmail.com, jkm.cse@gmail.comSecret Code
6
Legal Document/Content Authentication
Technique
to
Authenticate
Indian. We are
We are Indian.
We are
proud for our country. We
always like to look ahead
with positive attitude and
giving maximum effort to
growth our country. We are
so much strong in science
and Technology.
7/17/2015
We are
proud for our country. We
always like to look ahead
with negative
attitude and
Transmitted
through network
giving minimum effort to
growth our country. We are
so much weak in science
and Technology.
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
7
SADT Technique
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
8
Encryption Technique
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
9
Decryption Technique
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
10
Discrete Daubechies Transform
Technique
Daubechies wavelet has no explicit function
expression. The scaling functions and wavelet
functions are defined by the following two
equations (1) and (2) respectively.
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
11
Coefficients of Discrete Daubechies
Transform Technique
h[0] = (1+SQRT (3))/ (4*SQRT (2)),
h[1] = (3+SQRT (3))/ (4*SQRT (2)),
h[2] = (3-SQRT (3))/ (4*SQRT (2)),
h[3] = (1-SQRT (3))/ (4*SQRT (2)),
g[0] = h[3], g[1] = -h[2], g[2] = h[1] and
g[3]= -h[0].
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
12
Frequency Coefficient groups
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
13
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
14
Secret Message Computation
Two sets of secret messages are generated in SADT.
Set-1 having average of all the coefficients after FDT in a 4 x 4
mask by Set1 eq. Set-2 having average of only lower frequency
band that is of 2 x 2 by Set2 eq.
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
15
Hiding Technique
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
16
Hash function
A hash function is used to embed the secret bits
in 3rd coefficients of every subband in each
mask.
Hash computation formula H is used.
H = (((column + row * 4) + total no of bits per
band per mask) % maximum position allowed
for embedding from LSB)
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
17
RESULT IN IMAGE
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
18
Cover Images of dimension 512x512
(a) Baboon
(b) Boat
(e) Elaine
(f) Jet
(j)Truck
(i)Tank
7/17/2015
(c) Clock
(g) Map
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
(d) Couple
(h) Space
19
Statistical Data On Applying SADT Over 10 Images
Cover Image
512 x 512
(a) Baboon
(b) Boat
(c) Clock
(d) Couple
(e) Elaine
(f) Jet
(g) Map
(h) Space
(i) Tank
(j) Truck
MSE
1.339035
1.313438
1.358120
4.275150
1.329784
1.427063
1.316666
1.299934
1.308537
1.333218
PSNR
46.862884
46.946706
46.801422
41.821290
46.892991
46.586372
46.936049
46.991589
46.962945
46.881793
IF
0.999928
0.999931
0.999964
0.999744
0.999936
0.999954
0.999961
0.999924
0.999928
0.999890
Average: - 1.6300945 46.368404 0.999916
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
20
Comparison of PSNR
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
21
Comparison of PSNR for SADT
Technique
Yuancheng
Method [5]
Li’s
SCDFT [6]
SADCT [2]
Region-Based [7]
IAHTSSDCT [3]
AWTDHDS [4]
SAWT [1]
SADT (set-1)
SADT(set-1+set-2)
7/17/2015
Capacity
(bytes)
Size of
cover
image
bpB
(Bits per
bytes)
PSNR
in dB
1089
257 * 257
0.13
28.68
3840
8192
16384
16384
16384
131072
16384
32768
512 * 512
512 * 512
512 * 512
512 * 512
512 * 512
512 * 512
512 * 512
512 * 512
0.12
0.08
0.5
0.5
0.5
1.3
0.5
1.0
30.10
56.63
40.79
47.48
44.87
36.62
49.69
46.36
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
22
Result
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
23
BENCHMARK IMAGES
Allan G. Weber, The USC-SIPI Image
Database: Version 5, Original release:
October 1997, Signal and Image
Processing Institute, University of
Southern California, Department of
Electrical Engineering.
http://sipi.usc.edu/database/
(accessed on 25th January, 2010).
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
24
REFERENCES
1. Madhumita Sengupta, J.K. Mandal, “Self Authentication of Color image through
Wavelet Transformation Technique (SAWT)”, pp- 151-154, ISBN 93-80813-01-5,
ICCS 2010.
2. Madhumita Sengupta, J. K. Mandal, “Self Authentication of Color Images through
Discrete Cosine Transformation (SADCT)”, IEEE catalog no : CFP1122P-CDR,
ICRTIT, Anna University, Chennai, ISBN No-: 978-1-4577-0589-2, 3rd-5th June 2011.
3. Madhumita Sengupta, J. K. Mandal “Image Authentication using Hough Transform
generated Self Signature in DCT based Frequency Domain (IAHTSSDCT)”,IEEE,
ISED- 2011, Kochi, Kerala, pp- 324-328, DOI 10.1109/ISED.2011.43, 2011.
4. Madhumita Sengupta, J. K. Mandal, “Authentication in Wavelet Transform Domain
through Hough Domain Signature (AWTDHDS)” UGC-Sponsored National
Symposium on Emerging Trends in Computer Science (ETCS 2012), ISBN number
978-81-921808-2-3, pp 61-65, 2012.
5. Li Yuancheng, Xiaolei Wang, “A watermarking method combined with Radon
transformand 2D-wavelet transform”, IEEE, Proceedings of the 7th World Congress on
Intelligent Control and Automation, June 25 - 27, Chongqing, China, 2008.
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
25
REFERENCES
6. T. T. Tsui, X. –P. Zhang, and D. Androutsos, Color Image Watermarking Usimg
Multidimensional Fourier Transfomation, IEEE Trans. on Info. Forensics and Security,
vol. 3, no. 1, pp. 16-28, 2008.
7. A. Nikolaidis, I. Pitas, “Region-Based Image Watermarking”, IEEE Transactions on
Image Processing, Vol. 10, NO. 11, pp. 1721-1740, November 2001.
8. J. K. Mandal, Madhumita Sengupta, “Authentication /Secret Message Transformation
Through Wavelet Transform based Subband Image Coding (WTSIC)”, IEEE,
International Symposium on Electronic System Design 2010, pp 225-229, ISBN 9780-7695-4294-2, Bhubaneswar, India, Print ISBN: 978-1-4244-8979-4, DOI
10.1109/ISED.2010.50, Dec, 20th -22nd, 2010.
9. Allan G. Weber, The USC-SIPI Image Database: Version 5, Original release: October
1997, Signal and Image Processing Institute, University of Southern California,
Department of Electrical Engineering. http://sipi.usc.edu/database/ (Last accessed on
25th May, 2011).
10. M. Kutter , F. A. P. Petitcolas, A fair benchmark for image watermarking systems,
Electronic Imaging '99. Security and Watermarking of Multimedia Contents, vol. 3657,
Sans Jose, CA, USA, January 1999. The International Society for Optical Engineering,
http://www.petitcolas.net/fabien/publications/ei99-benchmark.pdf. (Last accessed on
25th March, 2012).
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
26
ACKNOWLEDGMENT
The authors express deep sense of gratuity
towards the Dept of CSE University of
Kalyani and the, DST, PURSE (Govt. of
India), for providing computational recourses.
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
27
QUESTIONS AND
COMMENTS…
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
28
7/17/2015
madhumita.sngpt@gmail.com, jkm.cse@gmail.com
29