Browse > Article

An Efficient Watermarking for Tamper Localization Proofing  

Woo, Chan-Il (Dept. of Information and Communication Engineering, Seoil College)
Jeon, Se-Gil (Korea Highway Corporation HTTI(Highway & Transportation Technology Institute))
Publication Information
전자공학회논문지 IE / v.43, no.2, 2006 , pp. 87-92 More about this Journal
Abstract
Many watermarking methods for protecting the intellectual property right and authentication multimedia data have been proposed in recent years. In image authentication watermarking, watermark is inserted into an image to detect any malicious alteration. So, watermark for authentication and integrity should be erased easily when the image is changed by scaling or cropping etc. We propose in this paper a fragile watermarking algorithm for image integrity verification and tamper localization proofing using special hierarchical structure. In the proposed method, the image to be watermarked is divided into blocks in a multi-level hierarchy and calculating block digital signatures in thus hierarchy. At each level of the hierarchy, a digital signature for each block is calculated using the seven most significant bit(MSBs)-plane values of all pixels within the block. And the resulting signature is incorporated into the LSBs of selected pixels within the block. We provide experimental results to demonstrate the effectiveness of the proposed method.
Keywords
Fragile watermarking; Authentication; Digital signature;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M.P. Queluz, 'Content-based integrity protection of digital images,' Proc. of SPIE, vol. 3657, Jan, pp. 85-93, 1999
2 R.B.Wolfgang, J.D.Edward, 'Fragile Watermarking Using VW2D Watermark,' Proc. of SPIE, Vol. 3657, Jan, pp. 204-213, 1999
3 P.W.Wong, 'A Public Key Watermark for Image Verification and Authentication,' in Proc. IEEE Int. Conf. Image Processing, pp. 425-429, 1998
4 M.U.Celik, G.Sharma, A.M.Tekalp, E.Saber, 'Localized Lossless Authentication Watermark (LAW),' Proc. of SPIE-IS&T Electronic Imaging, Vol. 5020, pp. 689-698, 2003
5 William Stallings, Network and Internetwork Security, Prentice Hall, 1995
6 L. Qian and K. Nahrstedt, 'Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights,' Pre-print, 1998
7 D.Kundur, D.Hatzinakos, 'A Robust Digital Image Watermarking Method using Wavelet-Based Fusion,' Proc. IEEE ICIP, Santa Barbara, California, Vol.1, pp. 544-547, Oct, 1997
8 K.S.NG and L.M.CHENG 'Selective block assignment approach for robust digital image watermarking,' Proc. of SPIE, Vol. 3657, Jan, pp. 14-20, 1999
9 Katzenbeisser, Petitcolas, Information Hiding techniques for steganography and digital watermarking, Artech House, 1999
10 M.U.Celik, G.Sharma, E.Saber, A.M.Tekalp, 'Hierarchical Watermarking for Secure Image Authentication with Localization,' IEEE Trans. on Image Processing, Vol. 11, No. 6, pp. 585-595, June, 2002   DOI   ScienceOn