Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Digital fragile watermarking scheme for authentication of JPEG images

Digital fragile watermarking scheme for authentication of JPEG images

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IEE Proceedings - Vision, Image and Signal Processing — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

It is a common practice in transform-domain fragile watermarking schemes for authentication purposes to watermark some selected transform coefficients so as to minimise embedding distortion. The author points out that leaving most of the coefficients unmarked results in a wide-open security gap for attacks to be mounted on them. A fragile watermarking scheme is proposed to implicitly watermark all the coefficients by registering the zero-valued coefficients with a key-generated binary sequence to create the watermark and involving the unwatermarkable coefficients during the embedding process of the embeddable ones. Non-deterministic dependence is established by involving some of the unwatermarkable coefficients selected according to the watermark from a nine-neighbourhood system in order to thwart different attacks, such as cover-up, vector quantisation and transplantation. No hashing is needed in establishing the non-deterministic dependence.

References

    1. 1)
      • C.Y. Lin , S.F. Chang . A robust image authentication method surviving JPEG lossy compression. Proc. SPIE–Int. Soc. Opt. Eng. , 296 - 307
    2. 2)
      • Wu, M., Liu, B.: `Watermarking for image authentication', Proc. IEEE Int. Conf. on Image Processing, Chicago, IL, USA, October 1998, II, p. 437–441.
    3. 3)
      • L. Xie , G.R. Arce . A class of authentication digital watermarks for secure multimedia communication. IEEE Trans. Image Process. , 11 , 1754 - 1764
    4. 4)
      • D.A. Winne , H.D. Knowles , D.R. Bull , C.N. Canagarajah . Digital watermarking in wavelet domain with predistortion for authenticaticity verification and localization. Proc. SPIE–Int. Soc. Opt. Eng. , 349 - 356
    5. 5)
    6. 6)
      • Li, C.-T., Yang, F.M., Lee, C.S.: `Oblivious fragile watermarking scheme for image authentication', Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, Orlando, FL, USA, May 2002, VI, p. 3445–3448.
    7. 7)
      • Kalker, T., Haitsma, J.: `Efficient detection of a spatial spread-spectrum watermark in MPEG vedio streams', Proc. IEEE Int. Conf. on Image Processing, Vancouver, Canada, Sept. 2000, I, p. 434–437.
    8. 8)
      • Wong, P.W.: `A public key watermark for image verification and authentication', Proc. IEEE Int. Conf. on Image Processing, Chicago, IL, USA, October 1998, I, p. 455–459.
    9. 9)
      • Yeung, M., Mintzer, F.: `An invisible watermarking technique for image verification', Proc. IEEE Int. Conf. on Image Processing, Santa Barbara, CA, USA, October 1997, 1, p. 680–683.
    10. 10)
      • P.S.L.M. Barreto , H.Y. Kim , V. Rijmen . Toward secure public-key blockwise fragile authentication watermarking. IEE Proc. Vis. Image Signal Process. , 2 , 57 - 62
    11. 11)
      • W. Stallings . (1998) Cryptography and network security principles and practice.
    12. 12)
    13. 13)
      • Li, C.-T., Lou, D.C., Chen, T.H.: `Image authenticity and integrity verification via content-based watermarks and a public key cryptosystem', Proc. IEEE Int. Conf. on Image Processing, Vancouver, Canada, Sept. 2000, III, p. 694–697.
    14. 14)
      • I.J. Cox , M. Miller , B. Jeffrey . (2002) Digital watermarking: principles and practice.
    15. 15)
      • J. Fridrich , M. Goljan , N. Memon . Further attack on Yeung–Mintzer watermarking scheme. Proc. SPIE–Int. Soc. Opt. Eng. , 428 - 437
    16. 16)
      • P.W. Wong , N. Memon . Secret and public key authentication watermarking schemes that resist vector quantization attack. Proc. SPIE–Int. Soc. Opt. Eng.
    17. 17)
      • C.S. Lu , S.K. Huang , C.J. Sze , H.Y. Liao . Cocktail watermarking for digital image protection. IEEE Trans. Multimed. , 4 , 209 - 224
    18. 18)
      • Fridrich, J., Goljan, M., Du, R.: `Invertible authentication watermark for JPEG images', Proc. IEEE Int. Conf. on Information Technology, Las Vegas, NV, USA, April 2001, p. 223–227.
    19. 19)
      • Celik, M.U., Sharma, G., Saber, E., Tekalp, A.M.: `A hierarchical image authentication watermark with improved localization and security', Proc. IEEE Int. Conf. on Image Processing, Thessaloniki, Greece, October 2001, II, p. 502—505.
    20. 20)
      • Memon, N., Shende, S., Wong, P.W.: `On the security of the Yeung–Mintzer authentication watermark', Proc. IS & T PICS Symp. Savannah, GA, USA, March 1999.
http://iet.metastore.ingenta.com/content/journals/10.1049/ip-vis_20040812
Loading

Related content

content/journals/10.1049/ip-vis_20040812
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address