Browse > Article
http://dx.doi.org/10.3745/KIPSTB.2005.12B.4.421

Semi-Fragile Image Watermarking for Authentication Using Wavelet Packet Transform Based on The Subband Energy  

Park, Sang-Ju (홍익대학교 전자전기공학부)
Kwon, Tae-Hyeon (삼성전기 중앙연구소 ASIC 센터)
Abstract
A new method of Semi-fragile image watermarking which ensures the integrity of the contents of digital image is presented. Proposed watermarking scheme embeds watermark in the form of quantization noise on the wavelet transform coefficients in a specific mid frequency subbands selected from a wavelet packet decomposition based on energy distribution of wavelet transform coefficients. By controlling the strength of embedded watermark using HVS (Human Visual System) characteristic, it is imperceptible by a human viewer while robust against non-malicious attack such as compression for storage and/or transmission. When an attack is applied on the original image, it is highly probable that wavelet transform coefficients not only at the exact attack positions but also the neighboring ones are modified. Therefore, proposed authentication method utilizes whether both current coefficient and its neighbors are damaged. together. So it can efficiently detect and accurately localize attacks inflicted on the content of original image. Decision threshold for authentication can be user controlled for different application areas as needed.
Keywords
Semi-fragile Watermarking; Authentication; Wavelet Transform; Wavelet Packet Transform;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Alexander H. paquet, Rabab K. Ward, 'Wavelet-Based Digital Watermarking For Image Authentication,' IEEE CCECE, Vol.2, pp.879-884, May, 2002   DOI
2 E. T. Lin, C. I. Podilchuk, and E. J. Delp, 'Detection of image alterations using semi-fragile watermarks,' Proceedings of the SPIE International Conf. Vol.3971, January, 2000   DOI
3 J. Fridrich, 'Security of Fragile Authentication Watermarks with Localization,' Proc. SPIE, Vol.4675, pp.691-700, January, 2002   DOI
4 D. Kunder, D. Hatzinakos, 'Digital Watermarking for Telltale Tamper Proofing and Authentication,' IEEE Proceedings. Vol.87, pp.1167-1180, July, 1999   DOI   ScienceOn
5 Han Ho Koh, and Sang Ju Park, 'Semi-Fragile Watermarking for Telltale Tamper Proofing and Authenticating,' Proc. of ITC-CSCC 2002, Vol.1 No.1, pp.623-626, July, 2002   과학기술학회마을
6 Yi-Ta Wu, Frank Y. Shih, 'An adjusted-purpose digital watermarking technique,' Pattern Recognition, Vol.37, No.12, pp.2349-2359, Dec., 2004   DOI
7 Chi Kin Ho, Chang -Tsun Li, 'Semi-fragile watermarking scheme for authentication of JPEG images,' Proc. ITCC 2004, Vol.1, pp.7-11, Apr., 2004   DOI
8 Ingemar J. Cox and Joe Kilian, 'Secure Spread Spectrum Watermarking for Multimedia,' IEEE Trans. on Image Processing, Vol.6, No.12, pp.1673-1687, Dec.. 1997   DOI   ScienceOn
9 A.S. Lewis, G. Knowles, 'Image compression using the 2-D wavelet transform', IEEE Trans. on Image Processing, Vol.1, No.2, pp.244-250, April, 1992   DOI
10 노상윤, 박상주 'HVS 특성을 이용한 Wavelet 변환 공간에서의 효과적인 워터마킹 기법에 관한 연구' 한국 통신학회 논문지, Vol.27, No.4A, pp.336-334, April, 2002   과학기술학회마을
11 I. J. Cox, M. L. Miller and J. A. Bloom, 'Watermarking applications and their properties' IEEE Conf. on Information Technology, pp.6-10, 2000   DOI
12 Gerhard C. Langelaar and Iwan Setyawan, 'Watermarking digital image and video data,' IEEE Signal Processing Magazine, pp.20-46, Sep., 2000   DOI   ScienceOn
13 B. Coskun, U. Naci, O. Ekici, B. Sankur, 'A Comparative Assessment of Semi-Fragile Watermarking Methods', SPIE Conf. Vol.4518, 2001
14 J. J. Eggers, J. K. Su, B. Girod, 'A blind watermarking scheme based on structured codebooks,' lEE Conf. Secure Images and Image Authentication, pp.4/1-4/21, 2000
15 C.Y. Lin, S.F. Chang, 'A Robust image authentication method distinguishing JPEG compression from malicious manipulation', IEEE Transactions on, CSVT Vol.11, No.2, pp.153-168, February, 2001   DOI   ScienceOn