Browse > Article

A Study on Semi-fragile Watermarking for Robust Authentication on Image Compression  

Ahn, Sung-Cheol ((주)디티브이인터랙티브)
Lee, Kyoung-Hak (광운대학교 전자통신공학과 영상처리연구실)
Park, Hwa-Bum (광운대학교 전자통신공학과 영상처리연구실)
Ko, Hyung-Hwa (광운대학교 전자통신공학과 영상처리연구실)
Abstract
The rapid progress of the software has enabled individuals to copy and remark digital contents, which was only done by professionals. As a solution for the problems, contents producer needs to have certification and inspection of its contents and hold the proprietary right. A fragile watermarking method is able to detect the distortion and damage of watermarked image, but the watermark is also fragile on standardized image compression. That is the problem of fragile watermarking technique. We propose semi-fragile watermarking technique that is robust in the image processing such as JPEG compression used on computer, but it is fragile on the addition of noise and other attacks. In the proposed method, we can generate the watermarks of an image from the relationship between two block coefficients, also the generated watermark is inserted into insensible part of HVS(Human Visual System) after processing DCT(Discrete Cosine Transform) and using quantization. As a result, on the spatial domain, high detection of distortion has been possible even in slight changes, and could detect the corrupted blocks on image. Therefore, it is simple to judge the pixels at which some location has been changed in the space.
Keywords
Watermarking; DCT; Semi-fragile; Block-reordering; JPEG;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R.J. Anderson and F. Petitcolas, 'On the Limits of Steganography,' IEEE J. Select Areas Commun., Vol. 16, pp. 474-481, May 1998   DOI   ScienceOn
2 Gary L. Friedman, 'The Trustworthy Digital Camera Restoring Credibility to the Photographic Image,' IEEE Trans. on Consumer Electronics, Vol. 39, No.4, November 1993
3 I.J. Cox, J. Kilian, T. Leighton and T. Shamoon, 'Secure Spread Spectrum Watermarking for Multimedia,' IEEE Trans. on Image Processing, Vol. 6, No. 12, pp. 1673-1687, December 1997   DOI   ScienceOn
4 C.Y. Lin and S.F. Chang, 'Semi-Fragile Watermarking for Authentication JPEG Visual Content,' SPIE ICSQMCII, Vol. 3971, No. 13, EI '00, 2000
5 J.J.K. O Ruanaidh, W.J. Dowling, and F.M. Boland, 'Watermarking Digital Images for Copyright Protection,' IEE Proc. vis. Image Signal Process. Vol. 143, No.4, pp.250-256, August 1996   DOI   ScienceOn
6 I.J. Cox and M.L. Miller, 'A Review of Watermarking and the Importance of Perceptual Modeling,' Proc. SPIE Conf. on H.V. Electronic Imaging II, Vol. 3-16, pp. 92-99, February 1997
7 P.W. Wong 'A Public Key Watermark for Image Authentication,' ICIP 98. Proceedings Vol. 2, pp.437-441
8 J. Fridrich, M. Goljan and R. Du, 'Invertible Authentication,' in Proc. SPIE, San Jose CA, January 23-26, 2001
9 R.B. Wolfgang and E.J. Delp, 'A Watermarking Teclnique for Digital Imagery : Further Studies,' Video and Imaging Processing Laboratory, Proceeding of the International Conf. on Imaging Science, pp.279-287, 1997
10 D. Kundur and D. Hatzinakos, 'Digital Watermarking for Telltale Tamper Proofmg and Authentication,' Proc. of the IEEE Identification and Protection of Multimedia Information, Vol. 87(7), pp. 1167-1180, July 1999
11 Nikolaidis, N., and Pitas, I., 'Digital Image Watermarking: An Overview,' IEEE IICMCS, Florence, Italy, 1999
12 P.S.M. Barreto, H.Y. Kim, and V. Rijmen, 'Toward Secure Public-key Blockwise Fragile Authentication Watermarking,' in IEEE Proc. V.I.S.P, Vol. 148, No.2, pp.57-62, April 2002
13 M. Wu and B. Liu, 'Watermarking for Image Authentication,' IEEE National Conf. on Image Processing, 1998
14 N. F. Johnson, Z. Duric and S. Jajodia, 'Information Hiding: Steganography and Watermarking - Attacks and Countermeasures,' Kluwer Academic Publishers, pp.22-29, 2001
15 C.K. Ho and C.T. Li, 'Semi-fragile Watermarking Scheme for Authentication of JPEG Image,' in Proc. IEEE ICIT LV, USA, April 2004