Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.2.113

Multi-Watermarking for Image Authentication Based on DWT Coefficients  

Lee Hye-Ran (Pukyong National University)
Rhee Kyung-Hyune (Pukyong National University)
Abstract
In this paper, we propose a multi-watermarking algorithm to satisfy two purposes: fragility against malicious attacks and robustness against non-malicious attacks. The algorithm can be used for image authentication using coefficients of Discrete Wavelet Transform(DWT). In the proposed method, watermarks are generated by combining binary image with some features extracted from the subband LL3, and then they are embedded into both the spatial and frequency domain. That is, on the spatial domain they are embedded into the Least Significant Bit(LSB) of all pixels of image blocks, and on the frequency domain the coefficients of the subband LH2 and HL2 are adjusted according to the watermarks. Thus the algorithm not only resists malicious attack but also permits non-malicious attacks such as blurring, sharpening, and JPEG compression.
Keywords
Semi-fragile Watermarking; dual-watermark; DWT; Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. W. Wong, 'A watermark for ima ge integrity and ownership verification,' Proceedings of IEEE Int. Conf. Image Processing, pp. 455-459, 1998
2 J. M. Shapiro, 'Embedded image coding using zerotrees of wavelet coefficients,' IEEE Trans. signal Processing, Vol. 41, No. 12, pp.3444-34 63, Dec. 1993
3 C. C. Chien, K. C. Fan, and S. W. Wang, 'A wavelet-based public key image authentication watermarking' Proceedings of IEEE 37th Annual 2003 Int. Carnahan Conf. pp. 321- 324, 2003
4 M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, 'Hierarchical watermarking for secure image authentication with localization,' IEEE Trans. Image Processing, Vol. 11, No. 6, pp. 585-595, 2002   DOI   ScienceOn
5 김종원, 신동환, 신승원, 최종욱, '디지털 워터마킹 기술의 산업적 응용' 한국정보보호학회 , 정보보호학회지, 12권 1호 pp.11-18, 2002
6 M. M. Yeung, and F. Mintzer, 'An invisible watermarking technique for image verification' Proceedings of IEEE Int. Conf. Image Processing, pp. 680-683, 1997
7 M. Holliman, and N. Memon, 'Counterfeiting attacks on oblivious block- wise independent invisible watermarking schemes', IEEE Trans. Image Processing, pp.432-441, 2000
8 J. Dittmann, A. Steinmetz, and R. Steinmetz, 'Content-based digital signature for motion pictures authentication and content-fragile watermarking, ' Int. Conf. Multimedia Computing and systems, pp. 209-213, 1999
9 J. Fridrich, M. Goljan, and A. C. Baldoza, 'New fragile authentication watermark for images,' Proc. IEEE Int. Conf. Image Processing, Vanco uver, BC, Canada, Sept. 10-13, 2000
10 R. M. Rao, A. S. Bopardikar, Wavelet transforms introduction to theory and applications, Addison-Wesley, 1998
11 C. T. Li, D. C. Lou, and T. H. Chen, 'Image authentication and integrity verification via content-based watermarks and a public key cryptosystem,' Proceedings of IEEE Int. Conf. Image Processing, pp. 694-697, 2000
12 P. S. L. M. Barreto, H. Y. Kim and V. Rijmen, 'Toward secure public- key blockwise fragile authentication watermarking,' IEE Proc.-Vis. Image Signal Processing, Vol, 149, No. 2, pp.57-62, 2002