IMAGE AUTHENTICATION USING HIERARCHICAL SEMI-FRAGILE WATERMARKS

Yuan-liang Tang, Chun-Hung Chen

Abstract

In this paper, a semi-fragile watermarking technique operating in the wavelet domain is proposed. A hierarchy of the image blocks is constructed and the image features are extracted such that relationships among image blocks are established in order to enhance the security and robustness of the system. With such a hierarchy, the image can be authenticated at different levels of resolution, hence providing a good property of tamper localization. In addition, by varying certain parameters, the system is able to control the degree of robustness against non-malicious attacks. The proposed algorithm thus provides a fine trade-off between security and localization, and is also robust to common image processing operations.

References

  1. Bartolini, F., Tefas, A., Barni, M., and Pitas, I. (2001) “Image authentication techniques for surveillance applications,” Proc. IEEE, vol. 89, no. 10, pp. 1403-1418.
  2. Bhattacharjee, S. and Kutter, M. (1998) “Compression tolerant image authentication,” Int. Conf. Image Processing, vol. 1, pp. 435-439.
  3. Celik, M.U., Sharma, G., Saber, E., and Tekalp, A.M. (2002), “Hierarchical watermarking for secure image authentication with localization,” IEEE Trans. Image Processing, vol. 11, no. 6, pp. 585-595.
  4. Chotikakamthorn, N. and Sangiamkun, W. (2001) “Digital watermarking technique for image authentication by neighbouring block similarity measure,” Int. Conf. Electrical and Electronic Technology, vol. 2, pp. 743-747.
  5. El-Din, S.N. and Moniri, M. (2002) “Fragile and semi-fragile image authentication based on image self-similarity,” Int. Conf. Image Processing, vol. 2, pp. 897-900.
  6. Fridrich, J., Goljan, M., and Du, R. (2001) “Invertible authentication watermark for JPEG images,” Int. Conf. Coding and Computing, pp. 223-227.
  7. Holliman, M. and Memon, N. (2000) “Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes,” IEEE Trans. Image Processing, vol. 9, pp. 432-441.
  8. Kundur, D. and Hatzinakos, D. (1999) “Digital watermarking for telltale tamper proofing and authentication,” Proceedings of the IEEE, vol. 87, pp. 1167-1180.
  9. Lin, E.T. and Delp, E.J. (1999) “A review of fragile image watermarks,” Multimedia and Security Workshop (ACM Multimedia 7899) Multimedia Contents, pp. 25-29.
  10. Lin, E.T., Podilchuk, C.I., and Delp, E.J. (2000) “Detection of image alteration using semi-fragile watermarks. SPIE Conf. Security and Watermarking of Multimedia Content II, vol. 3971, pp. 152-163.
  11. Queluz, M.P. (1999) “Content-based integrity protection of digital images,” SPIE Conf. Security and Watermarking of Multimedia Contents, vol. 3657, pp. 88-93.
  12. Sun, Q. and Chang, S.-F. (2002) “Semi-fragile image authentication using generic wavelet domain features and ECC,” Int. Conf. Image Processing, vol. 2, pp. 901-904.
  13. Wong, P.W. (1999) “A watermark for image integrity and ownership verification,” IS&T Image Processing, Image Quality, Image Capture, Systems Conference, pp. 374-379.
  14. Yeung, M. and Mintzer, F. (1997) “An invisible watermarking technique for image verification,” Int. Conf. Image Processing, vol. 2, pp.680-683.
  15. Yu, G.J., Lu, C.S., Liao, H.Y. Mark, and Sheu, J.P. (2000) “Mean quantization blind watermarking for image authentication,” Int. Conf. Image Processing, vol. 3, pp. 706-709.
Download


Paper Citation


in Harvard Style

Tang Y. and Chen C. (2004). IMAGE AUTHENTICATION USING HIERARCHICAL SEMI-FRAGILE WATERMARKS . In Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 3: ICETE, ISBN 972-8865-15-5, pages 284-289. DOI: 10.5220/0001380902840289


in Bibtex Style

@conference{icete04,
author={Yuan-liang Tang and Chun-Hung Chen},
title={IMAGE AUTHENTICATION USING HIERARCHICAL SEMI-FRAGILE WATERMARKS},
booktitle={Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 3: ICETE,},
year={2004},
pages={284-289},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001380902840289},
isbn={972-8865-15-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 3: ICETE,
TI - IMAGE AUTHENTICATION USING HIERARCHICAL SEMI-FRAGILE WATERMARKS
SN - 972-8865-15-5
AU - Tang Y.
AU - Chen C.
PY - 2004
SP - 284
EP - 289
DO - 10.5220/0001380902840289