Lossless watermarking for image authentication: A new framework and an implementation

被引:215
作者
Celik, MU
Sharma, G
Tekalp, AM
机构
[1] Univ Rochester, Dept Elect & Comp Engn, Rochester, NY 14627 USA
[2] Koc Univ, Coll Engn, Istanbul, Turkey
关键词
forgery detection; invertible authentication; lossless compression; reversible data embedding; tamper localization;
D O I
10.1109/TIP.2005.863053
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We present a novel framework for lossless (invertible) authentication watermarking, which enables zero-distortion reconstruction of the un-watermarked images upon verification. As opposed to earlier. lossless authentication methods that required reconstruction of the original image prior to validation, the new framework allows validation of the watermarked images before recovery of the original image. This reduces computational requirements in situations when either the verification step fails or the zero-distortion reconstruction is not needed. For verified images, integrity of the reconstructed image is ensured by the uniqueness of the reconstruction procedure. The framework also enables public(-key) authentication without granting access to the perfect original and allows for efficient tamper localization. Effectiveness of the framework is demonstrated by implementing the framework using hierarchical image authentication along with lossless generalized-least significant bit data embedding.
引用
收藏
页码:1042 / 1049
页数:8
相关论文
共 23 条
  • [1] [Anonymous], 2002, CRYPTOGRAPHY THEORY
  • [2] Barton J. M., 1997, United States Patent, Patent No. [5646997, US5646997A]
  • [3] Lossless generalized-LSB data embedding
    Celik, MU
    Sharma, G
    Tekalp, AM
    Saber, E
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (02) : 253 - 266
  • [4] Localized lossless authentication watermark (LAW)
    Celik, MU
    Sharma, G
    Tekalp, AM
    Saber, E
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 689 - 698
  • [5] Hierarchical watermarking for secure image authentication with localization
    Celik, MU
    Sharma, G
    Saber, E
    Tekalp, AM
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) : 585 - 595
  • [6] Circular interpretation of histogram for reversible watermarking
    De Vleeschouwer, C
    Delaigle, JF
    Macq, B
    [J]. 2001 IEEE FOURTH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 2001, : 345 - 350
  • [7] Watermarking protocols for authentication and ownership protection based on timestamps and holograms
    Dittmann, J
    Steinebach, M
    Ferri, LC
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 240 - 251
  • [8] Security of fragile authentication watermarks with localization
    Fridrich, J
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 691 - 700
  • [9] Lossless data embedding - New paradigm in digital watermarking
    Fridrich, J
    Goljan, M
    Du, R
    [J]. EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2002, 2002 (02) : 185 - 196
  • [10] Invertible authentication
    Fridrich, J
    Gojan, M
    Du, R
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 : 197 - 208