Watermarking Approaches for Images Authentication in Applications with Time Constraints Musab Qassem Al-Ghadi
Total Page:16
File Type:pdf, Size:1020Kb
Watermarking approaches for images authentication in applications with time constraints Musab Qassem Al-Ghadi To cite this version: Musab Qassem Al-Ghadi. Watermarking approaches for images authentication in applications with time constraints. Cryptography and Security [cs.CR]. Université de Bretagne occidentale - Brest, 2018. English. NNT : 2018BRES0029. tel-01967625 HAL Id: tel-01967625 https://tel.archives-ouvertes.fr/tel-01967625 Submitted on 1 Jan 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THESE DE DOCTORAT DE L'UNIVERSITE DE BRETAGNE OCCIDENTALE COMUE UNIVERSITE BRETAGNE LOIRE ECOLE DOCTORALE N° 601 Mathématiques et Sciences et Technologies de l'Information et de la Communication Spécialité : Informatique Par Musab Qassem AL-GHADI Approches de tatouage pour l’authentification de l’image dans des applications à contraintes temporelles Thèse présentée et soutenue à l’Université de Bretagne Occidentale, le 18 juin 2018 Unité de recherche : Laboratoire des Sciences et Techniques de l’Information, de la Communication et de la Connaissance (Lab-STICC / UMR CNRS 6285) Rapporteurs avant soutenance : Composition du Jury : Ismaïl BISKRI, Professeur, Université du Québec à Trois-Rivières Ismaïl BISKRI, Professeur, Université du Québec à Trois- Philippe CARRÉ, Professeur, Université de Poitiers Rivières Philippe CARRÉ, Professeur des Universités, Université de Poitiers Gouenou COATRIEUX, Professeur, IMT Atlantique, Président Caroline FONTAINE, Chargée de Recherche, CNRS, IMT Atlantique Kamel KAROUI, Maître de Conférences, Université de Carthage Lamri LAOUAMER, Maître de Conférences, Université de Al-Qassim, Co-encadrant de thèse Laurent NANA, Professeur des Universités, Université de Brest, Directeur de thèse Anca PASCU, Maître de Conférences HDR Emérite, Université de Brest, Co-directrice de thèse ACKNOWLEDGMENT I would like to express my sincere gratitude to my thesis supervisors Laurent Nana, Anca Pascu and Lamri Laouamer. Thank you very much for the high quality and remarkable supervision during 4 years. Thank you for reviewing my work and giving me valuable guidances and advices. I have learned a lot from you not only about research and academic but also about attitude in life. I present my thanks to Ismaïl Biskri and Philipe Carré for taking their time to review my dissertation. I also thank Caroline Fontaine, Gouenou Coatrieux and Kamel Karoui for accepting to be examiners. It was an honor to have you as jury members. Your attentions and comments really help me to improve the quality of the dissertation. My sincere thanks also goes to Ismaïl Biskri, who provided me an opportunity for a mobility stage and gave access to the laboratory and research facilities at the Université du Québec à Trois-Rivieres. I also expresses thanks to T. Moulahi, S. Zidi, J. Eleuchi, A. Elomri, M. Yehya and R. Anshasi for encouraging me and supporting everything I did. I would like to present my thanks to all of my colleagues at Lab-STICC and Université de Bretagne Occidentale. In particular, I would like to thank M. Jab- noun, A. Benzerbadj and H. Aissaoua for their generous help when I arrived in Brest. Furthermore, I present my thank to D. Massé who I have an opportunity to work with. I also want to send my thanks to my friends and colleges in Brest: Amine, Ay- oub, Farid, Hamza, Libey, Maeen, Massinissa, Mohammed Bey, Molham, Mourad, Zakaria. Thank you very much for all the events, trips and memories that we have together. I really appreciate your help during the preparation of my de- fense. Last but not least, I present my deepest gratitude to my mother Nahlah alMo- mani, my father Qassem alGhadi, my sisters (Um Qais, Um Anas, Um Karam, Eng. Tasneem, Esra’a, Ala’a and Batool) and my brothers (Dr.Muath, Eng.Mohammed and Baraa) for supporting and encouraging me since the beginning. I would like to thank my wife Ala’a and my son Qassem for always staying by my side, for their love and caring over these years. PUBLICATIONS Journals 1. Musab Ghadi, Lamri Laouamer, Laurent Nana, Anca Pascu. (2018) A Novel Blind Spatial Domain-Based Image Watermarking Using Texture Analysis and Association Rules Mining. Submitted to Journal of Multimedia Tools and Applications, Springer. 2. Musab Ghadi, Lamri Laouamer, Laurent Nana, Anca Pascu. (2016) A Novel Zero-Watermarking Approach of Medical Images based on Jacobian Matrix Model. Security and Communication Networks, Wiley, 9(18):5203-5218. doi: 10.1002/sec.1690. 3. Musab Ghadi, Lamri Laouamer, Tarek Moulahi. (2016) Securing Data Ex- change in Wireless Multimedia Sensor Networks: Perspectives and Chal- lenging. Multimedia Tools and Applications, Springer, 75(6):3425-3451. doi: 10.1007/s11042-014-2443-y. 4. Musab Ghadi, Lamri Laouamer, Tarek Moulahi. (2015) Enhancing Digital Image Integrity by Exploiting JPEG BitStream Attributes. Journal of Innova- tion in Digital Ecosystems, Elsevier, 2(1-2):20-31. doi: https://doi.org/10.1016/j.jides.2015.10.003. International Conferences 1. Musab Ghadi, Lamri Laouamer, Laurent Nana, Anca Pascu. (2017) A Robust Watermarking Technique in Spatial Domain using Closeness Coefficients of Texture. In Proceedings of the 8th International Conference on Information, In- telligence, Systems and Applications, Cyprus. doi: 10.1109/IISA.2017.8316393. 2. Musab Ghadi, Lamri Laouamer, Laurent Nana, Anca Pascu. (2017) A Joint Spatial Texture Analysis/Watermarking System for Digital Image Authen- tication. In Proceedings of the 12th IEEE International Workshop on Signal Pro- cessing Systems, Lorient, France. doi: 10.1109/SiPS.2017.8109968. 3. Musab Ghadi, Lamri Laouamer, Laurent Nana, Anca Pascu. (2017) A Ro- bust Watermarking System Based on Formal Concept Analysis and Texture Analysis. In Proceedings of the 30th International FLAIRS Conference. Marco Is- land, Florida, USA: 682-687. doi: https://aaai.org/ocs/index.php/FLAIRS/FLAIRS17/paper/view/15484. 4. Musab Ghadi, Lamri Laouamer, Laurent Nana, Anca Pascu. (2016) A Robust Associative Watermarking Technique Based on Frequent Pattern Mining and Texture Analysis. In Proceedings of the 8th International ACM Conference on Management of computational and collective IntElligence in Digital EcoSys- tems. Hendaye, France: 73-81. doi: 10.1145/3012071.3012101. 5. Musab Ghadi, Lamri Laouamer, Laurent Nana, Anca Pascu. (2017) Fuzzy Rough Set Based Image Watermarking Approach. In Proceedings of the 2nd International Springer Conference on Advanced Intelligent Systems and Informat- ics, AISI 2016, Cairo, Egypt, 533:234-245. doi: 10.1007/978-3-319-48308-5_23. 6. Musab Ghadi, Lamri Laouamer, Laurent Nana, Anca Pascu. (2015) JPEG Bit- stream Based Integrity with Lightweight Complexity of Medical Image in WMSNS Environment. In Proceedings of the 7th International ACM Conference on Management of computational and collective IntElligence in Digital EcoSys- tems. Caraguatatuba, Sao Paulo, Brazil: 53-58. doi: 10.1145/2857218.2857227. Book Chapter 1. Musab Ghadi, Lamri Laouamer, Laurent Nana, Anca Pascu. (2018) Robust Image Watermarking Based on Multiple-Criteria Decision-Making (MCDM). In: (S. Ramakrishnan, Ed.). CRC Press, Taylor and Francis Group. 2. Musab Ghadi, Lamri Laouamer, Laurent Nana, Anca Pascu. (2018) Rough Set Theory Based Robust Image Watermarking. In: Hassanien A., Oliva D. (eds) Advances in Soft Computing and Machine Learning in Image Processing. Studies in Computational Intelligence. Springer, Cham, 730:627-659. doi: 10.1007/978-3-319-63754-9_28. CONTENTS Introduction 1 i background 7 1 digital image processing fundamentals 9 1.1 Introduction . 9 1.2 Conception of Digital Image . 10 1.3 Digital Image Representation . 13 1.4 Digital Image Characteristics . 16 1.5 Intelligent Methods and Techniques in Digital Image Processing . 20 1.6 Digital Image Processing Tools . 22 1.7 Conclusion . 23 2 digital image watermarking 25 2.1 Introduction . 25 2.2 Motivations for Digital Watermarking . 26 2.3 Digital Watermarking Requirements . 27 2.4 Digital Watermarking Framework . 28 2.4.1 Watermark generation . 29 2.4.2 Watermark embedding . 29 2.4.3 Watermark extraction . 29 2.5 Digital Watermarking Classification . 30 2.5.1 Data type based categorizations . 31 2.5.2 Human perception based categorizations . 31 2.5.3 Robustness based categorizations . 32 2.5.4 Extraction based categorizations . 32 2.5.5 Reversibility based classification . 33 2.6 Digital Image Watermarking Techniques . 34 2.6.1 Spatial domain techniques . 34 2.6.2 Transform domain techniques . 36 2.6.3 Spread-spectrum domain . 43 2.7 Attacks on Digital Images . 43 2.7.1 Removal Attacks . 44 2.7.2 Geometric Attacks . 45 2.7.3 Property Attacks . 47 2.7.4 Cryptographic Attacks . 48 2.8 Digital Image Watermarking Performance Metrics . 48 2.8.1 Imperceptibility . 48 2.8.2 Robustness . 49 2.8.3 Embedding Rate Measures . 50 2.9 Digital Image Watermarking Benchmark . 51 2.10 Conclusion . 51 3 literature reviews 53 3.1 Introduction . 53 3.2 Zero-Watermarking Based Approaches . 54 3.3 Image Watermarking Approaches Using Spatial Pixels/Transformed Coefficients . 61 3.3.1 Medical Image Watermarking Approaches . 62 3.3.2 Human Visual System Based Image Watermarking Approaches 67 3.3.3 Intelligent Techniques and Human Visual System Based Image Watermarking Approaches . 73 3.4 Conclusion . 82 ii contribution 83 4 zero-watermarking approach for medical images based on jacobian matrix 85 4.1 Introduction . 85 4.2 Jacobian Matrix . 87 4.3 Proposed Zero-Watermarking approach . 87 4.3.1 Extracting the quantization matrix from JPEG Bitstream . 88 4.3.2 Key (k) Extraction . 89 4.3.3 Sending Process . 92 4.3.4 Receiving Process . 93 4.4 Experiment Results .