Watermarking on CNN‐UM for image and video authentication

In this paper a new approach to fragile watermarking technique is introduced. This problem is particularly interesting in the field of modern multimedia applications, when image and video authentication are required. The approach exploits the cellular automata suitability to work as pseudorandom pattern generators and extends the related algorithms under the framework of the cellular non-linear networks (CNNs). The result is a novel way to perform watermarking generation in real time, using the presently available CNN-universal chip prototypes. In this paper, both the CNN algorithms for fragile watermarking as well as on-chip experimental results are reported, confirming the suitability of CNNs to successfully act as real-time watermarking generators. The availability of CNN-based visual microprocessors allows to have powerful algorithms to watermark in real time images or videos for efficient smart camera applications. Copyright © 2004 John Wiley & Sons, Ltd.

[1]  Ángel Rodríguez-Vázquez,et al.  CMOS design of focal plane programmable array processors , 2001, ESANN.

[2]  Tamás Roska,et al.  The CNN universal machine: an analogic array computer , 1993 .

[3]  Ángel Rodríguez-Vázquez,et al.  Toward visual microprocessors , 2002, Proc. IEEE.

[4]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[5]  Gonzalo R. Arce,et al.  Joint wavelet compression and authentication watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[6]  Lin-Bao Yang,et al.  Cellular neural networks: theory , 1988 .

[7]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[8]  Leon O. Chua,et al.  Pseudo-random sequence generation using the CNN universal machine with applications to cryptography , 1996, 1996 Fourth IEEE International Workshop on Cellular Neural Networks and their Applications Proceedings (CNNA-96).

[9]  Edward J. Delp,et al.  Fragile watermarking using the VW2D watermark , 1999, Electronic Imaging.

[10]  Donald Ervin Knuth,et al.  The Art of Computer Programming, Volume II: Seminumerical Algorithms , 1970 .

[11]  Joos Vandewalle,et al.  Fragile watermarking and unkeyed hash function implementation for image authentication on CNN-UM , 2002, Proceedings of the 2002 7th IEEE International Workshop on Cellular Neural Networks and Their Applications.

[12]  Stephen Wolfram,et al.  Cellular Automata And Complexity , 1994 .

[13]  Valeri Mladenov,et al.  Cellular Neural Networks: Theory And Applications , 2004 .

[14]  Pieter Retief Kasselman,et al.  Analysis and design of cryptographic hash functions , 1999 .

[15]  L.O. Chua,et al.  Cellular neural networks , 1993, 1988., IEEE International Symposium on Circuits and Systems.

[16]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.

[17]  Howard C. Card,et al.  Cellular automata-based pseudorandom number generators for built-in self-test , 1989, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[18]  Joos Vandewalle,et al.  High speed calculation of cryptographic hash functions by CNN chips , 1998, 1998 Fifth IEEE International Workshop on Cellular Neural Networks and their Applications. Proceedings (Cat. No.98TH8359).

[19]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[20]  I. Szatmari,et al.  Image processing library for the Aladdin Visual Computer , 2002, Proceedings of the 2002 7th IEEE International Workshop on Cellular Neural Networks and Their Applications.

[21]  Joos Vandewalle,et al.  Watermarking for the authentication of video on CNN-UM , 2002, Proceedings of the 2002 7th IEEE International Workshop on Cellular Neural Networks and Their Applications.

[22]  Ton Kalker,et al.  Digital watermarking for DVD video copy protection , 2000 .

[23]  Ángel Rodríguez-Vázquez,et al.  ACE4k: An analog I/O 64×64 visual microprocessor chip with 7-bit analog accuracy , 2002, Int. J. Circuit Theory Appl..

[24]  Minerva M. Yeung,et al.  Invisible watermarking for image verification , 1998, J. Electronic Imaging.

[25]  Anastasios Tefas,et al.  Image authentication techniques for surveillance applications , 2001, Proc. IEEE.

[26]  Iwan Setyawan,et al.  Watermarking digital image and video data. A state-of-the-art overview , 2000 .

[27]  Donald Ervin Knuth,et al.  The Art of Computer Programming , 1968 .

[28]  Marco Tomassini,et al.  On the Generation of High-Quality Random Numbers by Two-Dimensional Cellular Automata , 2000, IEEE Trans. Computers.

[29]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[30]  Parimal Pal Chaudhuri,et al.  A class of two-dimensional cellular automata and their applications in random pattern testing , 1994, J. Electron. Test..

[31]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[32]  Leon O. Chua,et al.  Efficient implementation of neighborhood logic for cellular automata via the Cellular Neural Network Universal Machine , 1997 .

[33]  Ángel Rodríguez-Vázquez,et al.  ACE4k: An analog I/O 64×64 visual microprocessor chip with 7-bit analog accuracy: Research Articles , 2002 .

[34]  Ákos Zarándy ACE Box: High-performance Visual Computer based on the ACE4k Analogic Array Processor Chip , 2001 .

[35]  Shujian Zhang,et al.  Minimal cost one-dimensional linear hybrid cellular automata of degree through 500 , 1995, J. Electron. Test..

[36]  Min Wu,et al.  Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[37]  S. Zöld,et al.  The computational infrastructure of analogic CNN computing. I. The CNN-UM chip prototyping system , 1999 .

[38]  Nasir D. Memon,et al.  Protecting digital media content , 1998, CACM.

[39]  Ángel Rodríguez-Vázquez,et al.  ACE16k: A 128x128 Focal Plane Analog Processor with Digital I/O , 2003, Int. J. Neural Syst..

[40]  Ton Kalker,et al.  Digital Watermarking for DVD Video Copy Protection What Issues Play a Role in Designing an Effective System ? , 2000 .