Abstract
Fragile watermarking is applied to protect the content integrity of digital images. The main concerns related to watermarking include retaining the quality of the watermarked image and retaining the ability to detect whether any manipulation has occurred. Because recent watermarking techniques seriously distort the quality of the protected image after embedding the authentication code into the image content, attention has been drawn to how to satisfy both the need for image fidelity and detection ability. To account for the influence from both essentials, a novel algorithm is proposed in this article. The new scheme utilizes a weighted-sum function to embed (n + 1) authentication bits into a block with 2n pixels by modifying only one original pixel with (±1). With fewer authentication codes, the new process can protect the content of the image. The experimental results demonstrate that the approach can guarantee the fidelity of the watermarked image while retaining tamper-proof functionality.
- Chan, C. S. and Chang, C. C. 2007. An efficient image authentication method based on hamming code. Patt. Recogn. 40, 2, 681--690. Google Scholar
Digital Library
- Chang, C. C., Hu, Y. S., and Lu, T. C. 2006. A watermarking-based image ownership and tampering authentication scheme. Patt. Recogn. Lett. 27, 5, 439--446. Google Scholar
Digital Library
- Chang, C. C., Lin, P. Y., and Chuang, J. C. 2007. A fragile watermarking scheme for digital images authentication using pixel-difference. Imaging Sci. J. 55, 3, 140--147.Google Scholar
- Chang, C. K. and Jiang, T. M. 1989. A binary single-key-lock system for access control. IEEE Trans. Computers 38, 10, 1462--1466. Google Scholar
Digital Library
- Cheddad, A., Condell, J., Curran, K., and Kevitt, P. M. 2009. A secure and improved self-embedding algorithm to combat digital document forgery. Signal Process. 89, 12, 2324--2332. Google Scholar
Digital Library
- Chuhong, F., Kundur, D., and Kwong, R. H. 2006. Analysis and design of secure watermark-based authentication systems. IEEE Trans. Inf. Forensics Security 1, 1, 43--55. Google Scholar
Digital Library
- Fridrich, J., Goljan, M., and Memon, N. 2000. Further attacks on Yeung-Mintzer fragile watermarking scheme. In Proceedings of the SPIE Conference on Security and Watermarking of Multimedia Contents. vol. 3971, 428--437.Google Scholar
Cross Ref
- Giakoumaki, A., Pavlopoulos, S., and Koutsouris, D. 2006. Multiple image watermarking applied to health information management. IEEE Trans. Inf. Technol. Biomed.10, 4, 722--732. Google Scholar
Digital Library
- Ho, T. S., Zhu, X., Shen, J., and Marziliano, P. 2008. Fragile watermarking based on encoding of the zeroes of the z-transform. IEEE Trans. Inf. Forensic Security. 3, 3, 567--569. Google Scholar
Digital Library
- Holliman, M. and Memon, N. 2000. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process. 9, 3, 432--441. Google Scholar
Digital Library
- Hsu, C. T. and Wu, J. L. 1998. Multiresolution watermarking for digital images. IEEE Trans. Circuits Syst. II: Analog Digital Signal Process. 45, 8, 1097--1101.Google Scholar
Cross Ref
- Kundur, D. and Hatzinakos, D. 1999. Digital watermarking for telltale tamper proofing and authentication. IEEE Proc. 87, 7, 1167--1180.Google Scholar
Cross Ref
- Lankerd, T. Brandy rose. Copyright@ photo T. Lankerd, http://www.petitcolas.net/fabien/watermarking/image_database.Google Scholar
- Lin, C. C. and Tsai, W. H. 2004. Secret image sharing with steganography and authentication. J. Syst. Softw. 73, 3, 405--414. Google Scholar
Digital Library
- Lu, C. S. and Liao, H. Y. 2003. Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Trans. Multimedia 5, 2, 161--173. Google Scholar
Digital Library
- Makoto, M. 1998. Objective picture quality scale (PQS) for image coding. IEEE Trans. Comm. 46, 9, 1215--1226.Google Scholar
Cross Ref
- Phan, R. C. W. 2008. Tampering with a watermarking-based image authentication scheme. Patt. Recogn. 41, 11, 3493--3496. Google Scholar
Digital Library
- Rey, C. and Dugelay, J. L. 2002. A survey of watermarking algorithms for image authentication. EURASIP J. Appl. Signal Process. 6, 613--621. Google Scholar
Digital Library
- Stallings, W. 2006. Cryptography and Network Security: Principles and Practices 4th Ed., Prentice-Hall, Englewood Cliffs, NJ.Google Scholar
- Suthaharan, S. 2004. Fragile image watermarking using a gradient image for improved localization and security. Patt. Recogn. Lett. 25, 16, 1893--1903. Google Scholar
Digital Library
- Thien, C. C. and Lin, J. C. 2003. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Patt. Recogn.36, 12, 2875--2881.Google Scholar
Cross Ref
- Tsai, P., Hu, Y. C., and Chang, C. C. 2003. Using set partitioning in hierarchical trees to authenticate digital images. Signal Process. Image Comm. 18, 9, 813--822.Google Scholar
Cross Ref
- Wang, S. J. 2005. Steganography of capacity required using modulo operator for embedding secret image. Appl. Math. Comput. 164, 1, 99--116.Google Scholar
Digital Library
- Wang, Z., Bovik, A. C., Sheikh, H. R., and Simoncelli, E. P. 2004. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process.13, 4, 600--612. Google Scholar
Digital Library
- Wong, P. W. and Memon, N. 2001. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10, 10, 1593--1601. Google Scholar
Digital Library
- Wu, M. and Hwang, T. 1984. Access control with single-key-lock. IEEE Trans. Softw. Eng.10, 2, 185--191.Google Scholar
Digital Library
- Yeung, M. and Mintzer, F. 1997. An invisible watermarking technique for image verification. In Proceedings of the IEEE International Conference on Image Processing, IEEE, Los Alamitos, CA, 680--683.Google Scholar
- Yang, H. and Kot, A. C. 2007. Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans. Multimedia 9, 3, 475--486. Google Scholar
Digital Library
- Zhang, W., Zhang, X. and Wang, S. 2007. A double layered “plus-minus one” data embedding scheme. IEEE Signal Process. Lett. 14, 11, 848--851.Google Scholar
Cross Ref
- Zhang, X. and Wang, S. 2007. Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process. Lett. 14, 10, 727--730.Google Scholar
Cross Ref
- Zhang, X. and Wang, S. 2009. Fragile watermarking scheme using hierarchical mechanism. Signal Process. 89, 4, 675--679. Google Scholar
Digital Library
Index Terms
Protecting the content integrity of digital imagery with fidelity preservation
Recommendations
Protecting the Content Integrity of Digital Imagery with Fidelity Preservation: An Improved Version
Fragile watermarking has attracted a lot of attention in the last decade. An interesting approach, presented in 2011 by Lin et al., results in very high quality of the watermarked images. However, after a thorough examination of the paper, a few ...
A Reversible and Fragile Watermarking Algorithm Based on DCT
AICI '09: Proceedings of the 2009 International Conference on Artificial Intelligence and Computational Intelligence - Volume 01A reversible and fragile watermarking algorithm based on DCT is proposed for the authentication of digital products. According to the characteristics of high-frequency coefficients of DCT, when the watermarking bit 1 is embedded in an image block, fixed ...
Authentication and Tamper Detection of Digital Holy Quran Images
ISBAST '13: Proceedings of the 2013 International Symposium on Biometrics and Security TechnologiesThis paper introduces a novel fragile watermarking method for digital Quran image authentication and tamper identification. The presented scheme utilizes discrete wavelet transform (DWT) and can locate the pixels of malicious tampering if present. The ...






Comments