Wavelet packets-based digital watermarking for image verification and authentication

被引:56
作者
Paquet, AH
Ward, RK
Pitas, I
机构
[1] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
[2] Univ British Columbia, Inst Comp Informat & Cognit Syst, Vancouver, BC V6T 1Z4, Canada
[3] Aristotle Univ Thessaloniki, Dept Informat, Thessaloniki 54206, Greece
基金
加拿大自然科学与工程研究理事会;
关键词
image authentication; digital watermarking; wavelet packets; tamper proofing; digital security;
D O I
10.1016/S0165-1684(03)00171-3
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we present a novel watermarking scheme to ensure the authenticity of digital images. Our authentication technique is able to detect malicious tampering of images even if they have been incidentally distorted by basic image processing operations. The image protection is achieved by the insertion of a secret author's identification key in the image wavelet coefficients by their selective quantization. Our system uses characteristics of the human visual system to maximize the embedding weights while keeping good perceptual transparency. We develop an image-dependent method to evaluate, in the wavelet domain, the optimal quantization step allowing the tamper proofing of the image. The nature of multiresolution discrete wavelet decomposition allows the spatial and frequency localization of image tampering. Experimental results are presented to demonstrate the capacity of our system to detect unauthorized modification of images, to show its robustness to image compression and high security levels and to compare it with publicly available image authentication software. (C) 2003 Elsevier B.V. All rights reserved.
引用
收藏
页码:2117 / 2132
页数:16
相关论文
共 26 条
[1]   QUANTIZING CHARACTERISTICS FOR SIGNALS HAVING LAPLACIAN AMPLITUDE PROBABILITY DENSITY-FUNCTION [J].
ADAMS, WC ;
GIESLER, CE .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1978, 26 (08) :1295-1297
[2]  
[Anonymous], 1990 CBMS NSF C WAV
[3]   Watermark embedding: Hiding a signal within a cover image [J].
Barni, M ;
Podilchuk, CI ;
Bartolini, F ;
Delp, EJ .
IEEE COMMUNICATIONS MAGAZINE, 2001, 39 (08) :102-108
[4]   Image authentication techniques for surveillance applications [J].
Bartolini, F ;
Tefas, A ;
Barni, M ;
Pitas, I .
PROCEEDINGS OF THE IEEE, 2001, 89 (10) :1403-1418
[5]  
Bhattacharjee S, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 1, P435, DOI 10.1109/ICIP.1998.723518
[6]  
Cox I. J., 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), P6, DOI 10.1109/ITCC.2000.844175
[7]  
Cox I. J., 2002, DIGITAL WATERMARKING, V53
[8]  
Cox IJ, 1996, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, P243, DOI 10.1109/ICIP.1996.560429
[9]   Multimedia watermarking techniques [J].
Hartung, F ;
Kutter, M .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1079-1107
[10]   SIGNAL COMPRESSION BASED ON MODELS OF HUMAN PERCEPTION [J].
JAYANT, N ;
JOHNSTON, J ;
SAFRANEK, R .
PROCEEDINGS OF THE IEEE, 1993, 81 (10) :1385-1422