This invention relates in general to the field of signal authentication and more particularly to the embedding of signatures in an audio-visual signal for authentication of images and video.
The success of digital imaging and video has lead to a wide use of this technology in many fields of everyday life. Technology to edit, alter or modify digital images or video sequences is commercially available and allows modifications of the contents of these audio-visual signals without leaving traces. For a variety of applications, such as evidential imaging in law enforcement, medical documentation, damage assessment for insurance purposes, etc., it is necessary to ensure that an image or video has not been modified and is congruent with the image or video originally taken. This led to the development of image or video authentication systems for which an example is shown in
The amount of signature bits being embeddable is determined in that the audio-visual signal with a signature embedded shall be visually indistinguishable from the original audio-visual signal. Embeddability is often determined by a human visual model and with a perceptual threshold it is defined whether a desired payload is embeddable, i.e. the audio-visual signal with a signature embedded is visually indistinguishable from the original audio-visual signal, or if the payload is unembeddable, i.e. the audio-visual signal with a signature embedded is visually distinguishable from the original audio-visual signal.
Authentication of an audio-visual signal in this context is defined as validating the authenticity of an audio-visual signal, i.e. to verify the perceptual contents of an audio-visual signal such as a digital image or video as being congruent with that of the audio-visual signal originally captured.
Audio-visual signals such as digital images or video to be authenticated may contain smooth regions with flat contents, i.e. regions with little or no image characteristics such as edges, textures or the like. No payload is embeddable in such smooth regions as any changes within a smooth region will be perceivable as a modification or distortion within the smooth region. Therefore it is not possible to embed signature bits in smooth regions. However, a need exists to validate the authenticity of images containing smooth regions with flat contents as it is desired to be able to accurately detect and localise tampering within an audio-visual signal, i.e. even of regions with flat contents.
Fragile watermarking techniques for authentication operate by embedding a watermark into all areas of the audio-visual signal. Regions in which the presence of the watermark can later be detected are judged as authentic, and areas where the watermark cannot be detected are declared as having been altered. The flaw with this approach is caused by regions with flat content. Under the proviso that the watermark should be invisible, it is virtually impossible to embed enough watermark energy into flat regions to enable them to be authenticated, as mentioned above. This is particularly true if the image undergoes allowable operations, such as compression or noise removal, between watermark embedding and authenticity verification.
Furthermore, if a forger replaces in an apparently authentic audio-visual signal, such as a digital image, true content by flat content, there is no way to tell whether watermark detection failure in an image region occurs because the image content was originally flat, or because the true image content has been replaced by flat content. Therefore, any such tampering cannot be detected by a fragile watermarking approach. Authentication schemes that are based upon embedding a signature typically comprise the following steps:
Flat image regions cause this approach the same problems as for fragile watermarking: Firstly, it is not possible to successfully embed and extract signature bits from blocks containing flat content. Secondly, it is not possible to distinguish whether an area from which no signature bits can be extracted was originally flat content, or if the flat content is the result of tampering.
A small step is made in the direction of solving the above problems in M. Wu, B. Liu, “Watermarking For Image Authentication”, Proc. ICIP '98, Chicago, October 1998, wherein each signature bit is embedded in a digital image in two spatially separate locations by ‘backup embedding’. The backup embedding location is identified deterministically and has a fixed spatial relation to the original embedding location. Thus, when both chosen embedding locations contain flat content, the block's signature bits cannot be extracted when validating the authenticity of the digital image. Furthermore, in case that a region of the image containing the backup block for a smooth area is tampered, the smooth area can no longer be authenticated, thus tampering of one are of an image prevents authentication of a completely different area. The problems caused by flat content as outlined above are therefore not solved by the cited disclosure.
Thus, the problem to be solved by the invention is defined as how to provide reliable authentication of audio-visual signals containing areas with flat contents.
The present invention overcomes the above-identified deficiencies in the art and solves the above problems by providing watermark embedding by which each signature bit is spread over the whole image, or at least over a large area of it, according to the appended independent claims. The signature derives bits from all image regions, including areas with flat or otherwise un-watermarkable content, thus enabling authentication of all image regions. The embedding of the watermark is done so as to achieve the best trade-off between payload size, robustness, and visibility. The technical effect thus achieved is that signature bits of all image areas can be extracted, even if the original content is flat or has been replaced by tampering. Moreover, the embedding method becomes independent of the signature generation.
According to embodiments of the invention, a method, an apparatus, and a computer-readable medium for authenticating an audio-visual signal are disclosed whereby a signature is generated for at least a first region of an audio-visual signal. Said signature is embedded in said audio-visual signal by spreading bits of said signature over a portion of said audio-visual signal, said portion being larger than said first region.
Preferred embodiments of the present invention will be described in the following detailed disclosure, reference being made to the accompanying drawings, in which
In a preferred embodiment of the invention according to
Alternatively to embedding the signature bits by a spread spectrum watermark, the signature bits might be embedded in another embodiment by embedding each signature bit multiple times in different locations, whereby the locations need not to have a fixed relationship to each other or to the original location of the region containing flat contents. The locations are preferably determined based on the contents of the audio-visual signal and signature bits are embedded preferably in regions with sufficient image characteristics such as edges, textures or the like, in order to ensure that the audio-visual signal with a signature embedded is as less visually distinguishable from the original audio-visual signal as possible. The authenticity of flat regions is verified by the signature bits for such regions which are correctly extracted if a spread spectrum watermarking technique such as JAWS is used. If signature bits are embedded back into the block they were derived from, and invisibility maintained, then in flat blocks the signature bits cannot be reliably extracted. It is then not known whether the signature errors are due to tampering or the original content being flat. Thus it is detected and proven tampered when a forger has replaced original content in an area of an audio-visual signal with flat content.
Each signature bit is preferably spread over as much of the image as possible. This makes the use of spread spectrum watermarking techniques eminently suitable for embedding signatures. In addition, spread spectrum watermarks, such as the above-mentioned Philips' JAWS technique also have good robustness. As long as a sufficient portion of the image remains untampered, then such a technique permits the recovery of the signature bits from the watermark.
In another embodiment of the invention according to
A further embodiment of the invention is illustrated in
Applications and use of the above described signal authentication according to the invention are various and include exemplary fields such as
The present invention has been described above with reference to specific embodiments. However, other embodiments than the preferred above are equally possible within the scope of the appended claims, e.g. different field patterns than those described above, performing the above method by hardware or software, etc.
Furthermore, the term “comprising” does not exclude other elements or steps, the terms “a” and “an” do not exclude a plurality and a single processor or other unit may fil the functions of several of the units or circuits recited in the claims.
Number | Date | Country | Kind |
---|---|---|---|
1020955 | Jun 2002 | NL | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/IB03/02629 | 6/12/2003 | WO | 12/16/2004 |