An Invisible Watermarking Technique for Image Verification
نویسندگان
چکیده
In this papel; we propose a new method for invisibly watermarking high-quality color and gray-scale images. This method is intendedfor use in image ver$cation applications, where one is interested in knowing whether the content of an image has been altered since some earlier time, perhaps because of the act of a malicious party. It consists of both a watermark stamping process which embeds a watermark in a source image, and a watermark extraction process which extracts a Watermark from a stamped image. The extracted watermark can be used to determine whether the image has been altered. The processing used in the stamping and extraction processes is presented in the papel: We also discuss some advantages of this technique over other invisible watermarking techniques for the veri$cation application; these include a high degree of invisibility, color preservation, ease of decoding, and a high degree of protection against retention of the Watermark after unauthorized alterations. nipulation of the least significant bit (LSB). Walton[3] described techniques to embed long strings of binary bits at a set of randomly generated addresses where the LSB of pixels were changed to match the corresponding bit in the string. The watermarking techniques in which the information is stamped onto the LSB of the image pixel values are unlikely to produce visual artifacts in the image. If an image is altered, the LSB is likely to be changed such that the verification will be able to determine the modification. Such LSB manipulation, however, is not secure against malicious attacks: it is relatively easy to create a system that alters the visual content of an image without changing the LSB of every pixel value, to a degree that the whole image can be modified while the LSB is kept intact. Verification based on the LSB then fails to detect the alterations. Another limitation of some existing techniques is that they cannot determine the exact regions of modification in the verification process; instead, they can only provide a binary answer of whether an image has been modified or not. Such information may be valuable for better security measures. 1. IMAGE VERIFICATlON 2. THE PROPOSED TECHNIQUE As the Internet and the World Wide Web have gained great popularity, it has become commonplace to make collections of images, stored on Internet-attached servers, accessible to vast number of others through the Internet. However, making the images accessible to others through the Internet has also created opportunities for malicious parties to replace images on Internet servers with forgeries, or to intercept and replace images that have been transmitted to others. In addition, with the sophisticated image editing software now available, many have the tools to alter the content of digital images with ease, and with results that mimic the work of the professionals in the traditional photographic medium. To address these concerns, we need to develop techniques that can protect digital images against malicious attacks and intentional alterations. Several invisible watermarking techniques have been reported for data hiding, the embedding of robust watermarks for copyright protection, or the insertion of fragile watermarks for image verification. We shall focus on invisible watermarking techniques for image verification here. Friedman proposed the Trustworthy Digital Camera[ 11 in which a watermarking scheme was incorporated to determine whether a digital photo had been modified using public-key encryption technology. Schyndel et al.[2] discussed coding undetectable digital signatures onto an image through the ma0-8186-8183-7/97 $10.00
منابع مشابه
Fpga Based Image Security and Authentication in Digital Camera Using Invisible Watermarking Technique
For effective digital rights management (DRM) of multimedia in the framework of embedded systems, both watermarking and cryptography are necessary. Here, we present a novel system in the form of a digital camera that embeds biometric data into an image. Incorporation of encryption and watermarking together in the digital camera will assist in protecting and authenticating image files and Waterm...
متن کاملVerification watermarks on fingerprint recognition and retrieval
Current “invisible” watermarking techniques aim at producing watermarked data that suffer no or little quality degradation and perceptually identical to the original versions. The most common utility of a watermarked image is (1) for image viewing and display, and (2) for extracting the embedded watermark in subsequent copy protection applications. The issue is often centered on the robustness ...
متن کاملA Watermarking Technique Using Discrete Curvelet Transform for Security of Multiple Biometric Features
The robustness and security of the biometric watermarking approach can be improved by using a multiple watermarking. This multiple watermarking proposed for improving security of biometric features and data. When the imposter tries to create the spoofed biometric feature, the invisible biometric watermark features can provide appropriate protection to multimedia data. In this paper, a biometric...
متن کاملA Watermarking Technique for Digital Imagery: Further Studies
The growth of networked multimedia systems has created a need for the copyright protection of digital images. Copyright protection involves the authentication of image ownership and the identification of illegal copies of a (possibly forged) image. One approach is to mark an image by adding an invisible structure known as a digital watermark. In this paper we further study techniques for markin...
متن کاملOn Resolving Rightful Ownership's of Digital Images by Invisible Watermarks
Digital watermarking has been recently proposed as the mean for copyright protection of multimedia data. This paper rst discusses some scenarios in which many current watermarking schemes fail to resolve the rightful ownership of an image. We then identify the key problems and discuss some crucial requirements for a valid invisible watermark detection. In particular, we argue that, for the part...
متن کامل