Semifragile watermarking for authenticating JPEG visual content
نویسندگان
چکیده
In this paper, we propose a semi-fragile watermarking technique that accepts JPEG lossy compression on the watermarked image to a pre-determined quality factor, and rejects malicious attacks. The authenticator can identify the positions of corrupted blocks, and recover them with approximation of the original ones. In addition to JPEG compression, adjustments of the brightness of the image within reasonable ranges, are also acceptable using the proposed authenticator. The security of the proposed method is achieved by using the secret block mapping function which controls the signature generating/embedding processes. Our authenticator is based on two invariant properties of DCT coeÆcients before and after JPEG compressions. They are deterministic so that no probabilistic decision is needed in the system. The rst property shows that if we modify a DCT coeÆcient to an integral multiple of a quantization step, which is larger than the steps used in later JPEG compressions, then this coeÆcient can be exactly reconstructed after later acceptable JPEG compression. The second one is the invariant relationships between two coeÆcients in a block pair before and after JPEG compression. Therefore, we can use the second property to generate authentication signature, and use the rst property to embed it as watermarks. There is no perceptible degradation between the watermarked image and the origianl. In additional to authentication signatures, we can also embed the recovery bits for recovering approximate pixel values in corrupted areas. Our authenticator utilizes the compressed bitstream, and thus avoids rounding errors in reconstructing DCT coeÆcients. Experimental results showed the e ectiveness of this system. The system also guarantees no false alarms, i.e., no acceptable JPEG compression is rejected.
منابع مشابه
Performance Comparison of Semifragile Watermarking Methods for Image Authentication
Data authentication is one of the primary requisites in present day communication systems. In image processing, data authentication is implemented by using watermarking techniques. The specific interest in semifragile watermarking algorithms arises from the multitude of practical and commercial applications, where content needs to be strictly protected, but the exact representation during excha...
متن کاملPerceptible Content Retrieval in DCT Domain and Semi-Fragile Watermarking Technique for Perceptible Content Authentication
Digital watermarking was commenced to copyright protection and ownership verification of multimedia data. However the evolution of the watermark focused on different security aspects of multimedia data such as integrity and authenticity. Fragile and semi-fragile watermarking schemes were introduced to accomplish these requirements. In this paper, we propose semi-fragile watermarking scheme to a...
متن کاملComparative evaluation of semifragile watermarking algorithms
Semifragile watermarking techniques aim to prevent tampering and fraudulent use of modified images. A semifragile watermark monitors the integrity of the content of the image but not its numerical representation. Therefore, the watermark is designed so that the integrity is proven if the content of the image has not been tampered with, despite some mild processing on the image. However, if part...
متن کاملPermutation-Based Semi-Fragile Watermark Scheme
Tamper proofing is a crucial problem in the watermarking application. Aiming at the credibility of multimedia, we present a semi-fragile watermark based on the image permutation. Watermarking detection is performed without resorting to the host image and it is only controlled by secrete keys, thus the whole scheme does not have certain security gaps. The simulation experiments show that it can ...
متن کاملComparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication
Technology has no limits today; we have lots of software available in the market by which we can alter any image. People usually copies image from the internet and after some changes they claim that these are their own properties. Insuring digital image integrity has therefore become a major issue. Over the past few years, watermarking has emerged as the leading candidate to solve problems of o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000