A secure hierarchical fragile watermarking method with tamper localization

被引:2
作者
Zhang, Xianhai [1 ]
Yang, Yongtian [1 ]
Zhu, Yan [2 ]
机构
[1] Harbin Engn Univ, Sch Comp Sci & Technol, Harbin 150001, Peoples R China
[2] Peking Univ, Inst Comp Sci & Technol, Beijing 100871, Peoples R China
来源
FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2 | 2006年
关键词
fragile watermarking; hierarchical structure; image authentication; tamper detection; tamper localization;
D O I
10.1109/IMSCCS.2006.168
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Several image authentication schemes are either vulnerable to attacks or sacrifice localization accuracy to improve security. In this paper, we proposed a scheme that not only thwarts all kinds of-attacks such as vector quantization (VQ) and oracle attack in order to satisfy the security but also ensures superior accuracy of tamper localization. It is effective because the detection is based on a hierarchical structure so that the accuracy of tamper localization can be ensured. That is, if a tampered pixel is not detected in level-4, it will be detected in level 3, level 2 or level I with a probability of nearly 1. The method can detect any tampered pixel and the size of 2 x 2 pixel block with a missing rate less than 0.78% and 0.19% respectively, and the missing rate of more than or equal the size of 4 x 4 pixel block is approximately close to 0. Experimental results demonstrate that the proposed scheme is highly sensitive to intentional tampering and the embedding watermarking is imperceptive.
引用
收藏
页码:69 / +
页数:2
相关论文
共 13 条
[1]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[2]  
EGGERS J, 2001, P IEEE ICASSP SALT L
[3]  
FRIDRICH J, 2002, P SPIE SECURITY WATE, V4, P691
[4]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[5]   Digital watermarking for telltale tamper proofing and authentication [J].
Kundur, D ;
Hatzinakos, D .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1167-1180
[6]   A hierarchical digital watermarking method for image tamper detection and recovery [J].
Lin, PL ;
Hsieh, CK ;
Huang, PW .
PATTERN RECOGNITION, 2005, 38 (12) :2519-2529
[7]  
WALTON S, 1995, DR DOBBS J, V20, P18
[8]  
Wong P. W., 2000, P SPIE, V3971
[9]  
Wong PW, 2001, IEEE T IMAGE PROCESS, V10, P1593, DOI 10.1109/83.951543
[10]  
Wong PW, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 1, P455, DOI 10.1109/ICIP.1998.723526