Digital Watermarking Methods for Authentication, Tamper Localization and Lossless Recovery

نویسندگان

  • Mehmet Utku Çelik
  • Murat Tekalp
  • Gaurav Sharma
چکیده

This thesis addresses authentication watermarking and compression of digital images under zero-distortion and maximum-per-sample-distortion constraints. In this context, a hierarchical authentication watermark is proposed for securely verifying the source and integrity of digital images and for determining altered image regions when the integrity verification fails. The proposed approach eliminates the security problems associated with previous independent block-based authentication watermarks, while sustaining their superior tamper localization properties. Insertion of the authentication watermark induces a small, bounded, yet permanent loss of image fidelity, which is often undesirable. A novel lossless data embedding method remedies this problem and enables zero-distortion reconstruction of unmarked images upon extraction of the embedded payload. The reconstruction is achieved by compressing portions of the image data that are susceptible to watermarking distortion—such as the least significant image levels— and transmitting the compressed descriptions as a part of the embedded payload. An algorithm that utilizes the remainder of the image data as side-information is proposed for efficient compression of the least significant image levels. This algorithm exploits both spatial and inter-level correlations within the image and achieves excellent compression—consequently, lossless data embedding—performance. The algorithm serves also as the basis for a new level-embedded image compression method, which generates a scalable bit-stream, truncation of which corresponds to bit-plane truncation in the pixel domain. Security and tamper localization capability of the hierarchical scheme are combined with the zero-distortion reconstruction property of the lossless data embedding method in a flexible framework to obtain a lossless authentication watermark. As opposed to earlier lossless authentication methods that required recovery of the original image prior to validation, the new framework allows validation of the watermarked images before the reconstruction step. For verified images, integrity of the reconstructed image is ensured by the uniqueness of the recovery procedure. As a result, the framework offers computational efficiency, improved tamper-localization accuracy, and implementation flexibility.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities

Region of interest (ROI) is the most informative part of a medical image and mostly has been used as a major part of watermark. Various shapes ROIs selection have been reported in region-based watermarking techniques. In region-based watermarking schemes an image region of non-interest (RONI) is the second important part of the image and is used mostly for watermark encapsulation. In online hea...

متن کامل

Institutional Repository Tampering with a watermarking - based image authentication scheme

We analyse a recent image authentication scheme designed by Chang et al. [Chang, C.-C., Hu, Y.-S., Lu, T.-C., 2006, A watermarkingbased image ownership and tampering authentication scheme. Pattern Recognition Letters. 27, 439-446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Maniccam, S.S., Bourbakis, N., 2004, Lossless compression and information hiding in imag...

متن کامل

Authentication and Data Hiding Using a Reversible ROI-based Watermarking Scheme for DICOM Images

In recent years image watermarking has become an important research area in data security, confidentiality and image integrity. Many watermarking techniques were proposed for medical images. However, medical images, unlike most of images, require extreme care when embedding additional data within them because the additional information must not affect the image quality and readability. Also the...

متن کامل

Effective management of medical information through ROI-lossless fragile image watermarking technique

In this article, we have proposed a blind, fragile and Region of Interest (ROI) lossless medical image watermarking (MIW) technique, providing an all-in-one solution tool to various medical data distribution and management issues like security, content authentication, safe archiving, controlled access retrieval, and captioning. The proposed scheme combines lossless data compression and encrypti...

متن کامل

Joint near-lossless compression and watermarking of still images for authentication and tamper localization

A system is presented to jointly achieve image watermarking and compression. The watermark is a fragile one being intended for authentication purposes. The watermarked and compressed images are fully compliant with the JPEG-LS standard, the only price to pay being a slight reduction of compression efficiency and an additional distortion that can be anyway tuned to grant a maximum preset error. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004