Digital fragile watermarking scheme for authentication of JPEG images

被引:54
作者
Li, CT [1 ]
机构
[1] Univ Warwick, Dept Comp Sci, Coventry CV4 7AL, W Midlands, England
来源
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING | 2004年 / 151卷 / 06期
关键词
D O I
10.1049/ip-vis:20040812
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is a common practice in transform-domain fragile watermarking schemes for authentication purposes to watermark some selected transform coefficients so as to minimise embedding distortion. The author points out that leaving most of the coefficients unmarked results in a wide-open security gap for attacks to be mounted on them. A fragile watermarking scheme is proposed to implicitly watermark all the coefficients by registering the zero-valued coefficients with a key-generated binary sequence to create the watermark and involving the unwatermarkable coefficients during the embedding process of the embeddable ones. Non-deterministic dependence is established by involving some of the unwatermarkable coefficients selected according to the watermark from a nine-neighbourhood system in order to thwart different attacks, such as cover-up, vector quantisation and transplantation. No hashing is needed in establishing the non-deterministic dependence.
引用
收藏
页码:460 / 466
页数:7
相关论文
共 20 条
[1]   Toward secure public-key blockwise fragile authentication watermarking [J].
Barreto, PSLM ;
Kim, HY ;
Rijmen, V .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2002, 149 (02) :57-62
[2]  
CELIK MU, 2001, P IEEE INT C IM PROC, V2, P502
[3]  
Cox I.J., 2002, DIGITAL WATERMAKING
[4]   Further attacks on Yeung-Mintzer fragile watermarking scheme [J].
Fridrich, A ;
Goljan, M ;
Memon, N .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 :428-437
[5]   Invertible authentication watermark for JPEG images [J].
Fridrich, J ;
Goljan, M ;
Du, R .
INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, PROCEEDINGS, 2001, :223-227
[6]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[7]  
Kalker T, 2000, IEEE IMAGE PROC, P434, DOI 10.1109/ICIP.2000.900988
[8]   One-dimensional neighborhood forming strategy for fragile watermarking [J].
Li, CT ;
Yang, FM .
JOURNAL OF ELECTRONIC IMAGING, 2003, 12 (02) :284-291
[9]   Image authentication and integrity verification via content-based watermarks and a public key cryptosystem [J].
Li, CT ;
Lou, DC ;
Chen, TH .
2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2000, :694-697
[10]  
LI CT, 2002, P IEEE INT C AC SPEE, V6, P3445