skip to main content
research-article

Protecting the content integrity of digital imagery with fidelity preservation

Published:02 September 2011Publication History
Skip Abstract Section

Abstract

Fragile watermarking is applied to protect the content integrity of digital images. The main concerns related to watermarking include retaining the quality of the watermarked image and retaining the ability to detect whether any manipulation has occurred. Because recent watermarking techniques seriously distort the quality of the protected image after embedding the authentication code into the image content, attention has been drawn to how to satisfy both the need for image fidelity and detection ability. To account for the influence from both essentials, a novel algorithm is proposed in this article. The new scheme utilizes a weighted-sum function to embed (n + 1) authentication bits into a block with 2n pixels by modifying only one original pixel with (±1). With fewer authentication codes, the new process can protect the content of the image. The experimental results demonstrate that the approach can guarantee the fidelity of the watermarked image while retaining tamper-proof functionality.

References

  1. Chan, C. S. and Chang, C. C. 2007. An efficient image authentication method based on hamming code. Patt. Recogn. 40, 2, 681--690. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Chang, C. C., Hu, Y. S., and Lu, T. C. 2006. A watermarking-based image ownership and tampering authentication scheme. Patt. Recogn. Lett. 27, 5, 439--446. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Chang, C. C., Lin, P. Y., and Chuang, J. C. 2007. A fragile watermarking scheme for digital images authentication using pixel-difference. Imaging Sci. J. 55, 3, 140--147.Google ScholarGoogle Scholar
  4. Chang, C. K. and Jiang, T. M. 1989. A binary single-key-lock system for access control. IEEE Trans. Computers 38, 10, 1462--1466. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Cheddad, A., Condell, J., Curran, K., and Kevitt, P. M. 2009. A secure and improved self-embedding algorithm to combat digital document forgery. Signal Process. 89, 12, 2324--2332. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Chuhong, F., Kundur, D., and Kwong, R. H. 2006. Analysis and design of secure watermark-based authentication systems. IEEE Trans. Inf. Forensics Security 1, 1, 43--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Fridrich, J., Goljan, M., and Memon, N. 2000. Further attacks on Yeung-Mintzer fragile watermarking scheme. In Proceedings of the SPIE Conference on Security and Watermarking of Multimedia Contents. vol. 3971, 428--437.Google ScholarGoogle ScholarCross RefCross Ref
  8. Giakoumaki, A., Pavlopoulos, S., and Koutsouris, D. 2006. Multiple image watermarking applied to health information management. IEEE Trans. Inf. Technol. Biomed.10, 4, 722--732. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ho, T. S., Zhu, X., Shen, J., and Marziliano, P. 2008. Fragile watermarking based on encoding of the zeroes of the z-transform. IEEE Trans. Inf. Forensic Security. 3, 3, 567--569. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Holliman, M. and Memon, N. 2000. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process. 9, 3, 432--441. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Hsu, C. T. and Wu, J. L. 1998. Multiresolution watermarking for digital images. IEEE Trans. Circuits Syst. II: Analog Digital Signal Process. 45, 8, 1097--1101.Google ScholarGoogle ScholarCross RefCross Ref
  12. Kundur, D. and Hatzinakos, D. 1999. Digital watermarking for telltale tamper proofing and authentication. IEEE Proc. 87, 7, 1167--1180.Google ScholarGoogle ScholarCross RefCross Ref
  13. Lankerd, T. Brandy rose. Copyright@ photo T. Lankerd, http://www.petitcolas.net/fabien/watermarking/image_database.Google ScholarGoogle Scholar
  14. Lin, C. C. and Tsai, W. H. 2004. Secret image sharing with steganography and authentication. J. Syst. Softw. 73, 3, 405--414. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Lu, C. S. and Liao, H. Y. 2003. Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Trans. Multimedia 5, 2, 161--173. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Makoto, M. 1998. Objective picture quality scale (PQS) for image coding. IEEE Trans. Comm. 46, 9, 1215--1226.Google ScholarGoogle ScholarCross RefCross Ref
  17. Phan, R. C. W. 2008. Tampering with a watermarking-based image authentication scheme. Patt. Recogn. 41, 11, 3493--3496. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Rey, C. and Dugelay, J. L. 2002. A survey of watermarking algorithms for image authentication. EURASIP J. Appl. Signal Process. 6, 613--621. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Stallings, W. 2006. Cryptography and Network Security: Principles and Practices 4th Ed., Prentice-Hall, Englewood Cliffs, NJ.Google ScholarGoogle Scholar
  20. Suthaharan, S. 2004. Fragile image watermarking using a gradient image for improved localization and security. Patt. Recogn. Lett. 25, 16, 1893--1903. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Thien, C. C. and Lin, J. C. 2003. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Patt. Recogn.36, 12, 2875--2881.Google ScholarGoogle ScholarCross RefCross Ref
  22. Tsai, P., Hu, Y. C., and Chang, C. C. 2003. Using set partitioning in hierarchical trees to authenticate digital images. Signal Process. Image Comm. 18, 9, 813--822.Google ScholarGoogle ScholarCross RefCross Ref
  23. Wang, S. J. 2005. Steganography of capacity required using modulo operator for embedding secret image. Appl. Math. Comput. 164, 1, 99--116.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Wang, Z., Bovik, A. C., Sheikh, H. R., and Simoncelli, E. P. 2004. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process.13, 4, 600--612. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Wong, P. W. and Memon, N. 2001. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10, 10, 1593--1601. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Wu, M. and Hwang, T. 1984. Access control with single-key-lock. IEEE Trans. Softw. Eng.10, 2, 185--191.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Yeung, M. and Mintzer, F. 1997. An invisible watermarking technique for image verification. In Proceedings of the IEEE International Conference on Image Processing, IEEE, Los Alamitos, CA, 680--683.Google ScholarGoogle Scholar
  28. Yang, H. and Kot, A. C. 2007. Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans. Multimedia 9, 3, 475--486. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Zhang, W., Zhang, X. and Wang, S. 2007. A double layered “plus-minus one” data embedding scheme. IEEE Signal Process. Lett. 14, 11, 848--851.Google ScholarGoogle ScholarCross RefCross Ref
  30. Zhang, X. and Wang, S. 2007. Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process. Lett. 14, 10, 727--730.Google ScholarGoogle ScholarCross RefCross Ref
  31. Zhang, X. and Wang, S. 2009. Fragile watermarking scheme using hierarchical mechanism. Signal Process. 89, 4, 675--679. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Protecting the content integrity of digital imagery with fidelity preservation

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!