Quantifying the Visual Content Perceived in DCT Coefficients and PKI based Semi-Fragile Watermarking for Visual Content Authentication of Images

被引:1
作者
Atupelage, Chamidu [1 ]
Harada, Koichi [1 ]
机构
[1] Hiroshima Univ, Dept Informat Engn, Hiroshima, Japan
来源
WCECS 2008: ADVANCES IN ELECTRICAL AND ELECTRONICS ENGINEERING - IAENG SPECIAL EDITION OF THE WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, PROCEEDINGS | 2009年
关键词
Discrete cosine transformation; Elliptic curve digital signature algorithm; Image authentication; Human Visual System; JPEG; Public key cryptography;
D O I
10.1109/WCECS.2008.41
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Multimedia data is always exposed for the security threats, because these data can be easily alter by using multimedia data processing tools. Therefore content owners always endure of copyright protection and ownership verification of their digital assets. Digital watermarking is the technology introduces to overcome these limitations. There are different watermarking technologies which focusing different security aspects. Proving the authenticity of digital multimedia data, the watermarking concept was commenced called Fragile Watermarking. However, evolution of the fragile watermark derives a prospective watermarking concept called semi-fragile watermark, which overcomes several limitations of fragile watermarking such as fragility for trusted image manipulations. Multimedia data consisted huge amount of information; however, most of them are not in the perceptible region of Human Visual System (HVS). In this paper, we presented an experiment that quantifies the perceptible information perceived in DCT domain and a new PM (Public Key Infrastructure) based semi-fragile watermarking technique that quantitatively authenticates perceptible content of the digital images. Additionally, our definition localizes the compromised regions of the image. The proposed method inherits all security features in public key authentication system. In practice, visual distortions are acceptable up to some extent in digital multimedia applications. Therefore, distortions due to the watermark should be minimized. Moreover, this paper presents a critical analysis of the parameterization of watermark embedding technique and its analysis matrices (graphs & tables), which can be used to optimize the watermarking method according to the user's requirements.
引用
收藏
页码:275 / 286
页数:12
相关论文
共 21 条
[11]  
QUEIROZ R, 1999, OBJECT MODIFICATION
[12]  
Rao K. R., 2001, The Electrical Engineering and Signal Processing Series
[13]  
RAYMOND WB, 1996, P 1996 INT C IM PROC, V3, P219
[14]  
*US DEP COMM, 1998, FIPS PUB, V1861
[15]  
VATOLIN D, 2007, MPEG 4 AVC H 264 VID
[16]   THE JPEG STILL PICTURE COMPRESSION STANDARD [J].
WALLACE, GK .
COMMUNICATIONS OF THE ACM, 1991, 34 (04) :30-44
[17]  
Wang Z., MODERN IMAGE QUALITY
[18]   Fragile watermarking using the VW2D watermark [J].
Wolfgang, RB ;
Delp, EJ .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 :204-213
[19]  
Wong PW, 1998, IMAGE PROCESSING IMAGE QUALITY IMAGE CAPTURE SYSTEMS CONFERENCE, P374
[20]  
Wu M, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, P437, DOI 10.1109/ICIP.1998.723413