[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Protecting the content integrity of digital imagery with fidelity preservation

Published: 02 September 2011 Publication History

Abstract

Fragile watermarking is applied to protect the content integrity of digital images. The main concerns related to watermarking include retaining the quality of the watermarked image and retaining the ability to detect whether any manipulation has occurred. Because recent watermarking techniques seriously distort the quality of the protected image after embedding the authentication code into the image content, attention has been drawn to how to satisfy both the need for image fidelity and detection ability. To account for the influence from both essentials, a novel algorithm is proposed in this article. The new scheme utilizes a weighted-sum function to embed (n + 1) authentication bits into a block with 2n pixels by modifying only one original pixel with (±1). With fewer authentication codes, the new process can protect the content of the image. The experimental results demonstrate that the approach can guarantee the fidelity of the watermarked image while retaining tamper-proof functionality.

References

[1]
Chan, C. S. and Chang, C. C. 2007. An efficient image authentication method based on hamming code. Patt. Recogn. 40, 2, 681--690.
[2]
Chang, C. C., Hu, Y. S., and Lu, T. C. 2006. A watermarking-based image ownership and tampering authentication scheme. Patt. Recogn. Lett. 27, 5, 439--446.
[3]
Chang, C. C., Lin, P. Y., and Chuang, J. C. 2007. A fragile watermarking scheme for digital images authentication using pixel-difference. Imaging Sci. J. 55, 3, 140--147.
[4]
Chang, C. K. and Jiang, T. M. 1989. A binary single-key-lock system for access control. IEEE Trans. Computers 38, 10, 1462--1466.
[5]
Cheddad, A., Condell, J., Curran, K., and Kevitt, P. M. 2009. A secure and improved self-embedding algorithm to combat digital document forgery. Signal Process. 89, 12, 2324--2332.
[6]
Chuhong, F., Kundur, D., and Kwong, R. H. 2006. Analysis and design of secure watermark-based authentication systems. IEEE Trans. Inf. Forensics Security 1, 1, 43--55.
[7]
Fridrich, J., Goljan, M., and Memon, N. 2000. Further attacks on Yeung-Mintzer fragile watermarking scheme. In Proceedings of the SPIE Conference on Security and Watermarking of Multimedia Contents. vol. 3971, 428--437.
[8]
Giakoumaki, A., Pavlopoulos, S., and Koutsouris, D. 2006. Multiple image watermarking applied to health information management. IEEE Trans. Inf. Technol. Biomed.10, 4, 722--732.
[9]
Ho, T. S., Zhu, X., Shen, J., and Marziliano, P. 2008. Fragile watermarking based on encoding of the zeroes of the z-transform. IEEE Trans. Inf. Forensic Security. 3, 3, 567--569.
[10]
Holliman, M. and Memon, N. 2000. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process. 9, 3, 432--441.
[11]
Hsu, C. T. and Wu, J. L. 1998. Multiresolution watermarking for digital images. IEEE Trans. Circuits Syst. II: Analog Digital Signal Process. 45, 8, 1097--1101.
[12]
Kundur, D. and Hatzinakos, D. 1999. Digital watermarking for telltale tamper proofing and authentication. IEEE Proc. 87, 7, 1167--1180.
[13]
Lankerd, T. Brandy rose. Copyright@ photo T. Lankerd, http://www.petitcolas.net/fabien/watermarking/image_database.
[14]
Lin, C. C. and Tsai, W. H. 2004. Secret image sharing with steganography and authentication. J. Syst. Softw. 73, 3, 405--414.
[15]
Lu, C. S. and Liao, H. Y. 2003. Structural digital signature for image authentication: An incidental distortion resistant scheme. IEEE Trans. Multimedia 5, 2, 161--173.
[16]
Makoto, M. 1998. Objective picture quality scale (PQS) for image coding. IEEE Trans. Comm. 46, 9, 1215--1226.
[17]
Phan, R. C. W. 2008. Tampering with a watermarking-based image authentication scheme. Patt. Recogn. 41, 11, 3493--3496.
[18]
Rey, C. and Dugelay, J. L. 2002. A survey of watermarking algorithms for image authentication. EURASIP J. Appl. Signal Process. 6, 613--621.
[19]
Stallings, W. 2006. Cryptography and Network Security: Principles and Practices 4th Ed., Prentice-Hall, Englewood Cliffs, NJ.
[20]
Suthaharan, S. 2004. Fragile image watermarking using a gradient image for improved localization and security. Patt. Recogn. Lett. 25, 16, 1893--1903.
[21]
Thien, C. C. and Lin, J. C. 2003. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Patt. Recogn.36, 12, 2875--2881.
[22]
Tsai, P., Hu, Y. C., and Chang, C. C. 2003. Using set partitioning in hierarchical trees to authenticate digital images. Signal Process. Image Comm. 18, 9, 813--822.
[23]
Wang, S. J. 2005. Steganography of capacity required using modulo operator for embedding secret image. Appl. Math. Comput. 164, 1, 99--116.
[24]
Wang, Z., Bovik, A. C., Sheikh, H. R., and Simoncelli, E. P. 2004. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process.13, 4, 600--612.
[25]
Wong, P. W. and Memon, N. 2001. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10, 10, 1593--1601.
[26]
Wu, M. and Hwang, T. 1984. Access control with single-key-lock. IEEE Trans. Softw. Eng.10, 2, 185--191.
[27]
Yeung, M. and Mintzer, F. 1997. An invisible watermarking technique for image verification. In Proceedings of the IEEE International Conference on Image Processing, IEEE, Los Alamitos, CA, 680--683.
[28]
Yang, H. and Kot, A. C. 2007. Pattern-based data hiding for binary image authentication by connectivity-preserving. IEEE Trans. Multimedia 9, 3, 475--486.
[29]
Zhang, W., Zhang, X. and Wang, S. 2007. A double layered “plus-minus one” data embedding scheme. IEEE Signal Process. Lett. 14, 11, 848--851.
[30]
Zhang, X. and Wang, S. 2007. Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process. Lett. 14, 10, 727--730.
[31]
Zhang, X. and Wang, S. 2009. Fragile watermarking scheme using hierarchical mechanism. Signal Process. 89, 4, 675--679.

Cited By

View all
  • (2025)Multifunctional adversarial examples: A novel mechanism for authenticatable privacy protection of imagesSignal Processing10.1016/j.sigpro.2024.109816230(109816)Online publication date: May-2025
  • (2023)Predicting perceived music emotions with respect to instrument combinationsProceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial Intelligence10.1609/aaai.v37i13.26910(16078-16086)Online publication date: 7-Feb-2023
  • (2023)Adversarial data hiding with only one pixelInformation Processing and Management: an International Journal10.1016/j.ipm.2022.10322260:2Online publication date: 1-Mar-2023
  • Show More Cited By

Index Terms

  1. Protecting the content integrity of digital imagery with fidelity preservation

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 7, Issue 3
    August 2011
    117 pages
    ISSN:1551-6857
    EISSN:1551-6865
    DOI:10.1145/2000486
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 September 2011
    Accepted: 01 January 2010
    Revised: 01 November 2009
    Received: 01 April 2009
    Published in TOMM Volume 7, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Authentication
    2. fragile watermarking
    3. integrity protection
    4. key-lock-pair system
    5. weighted-sum function

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)12
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 03 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Multifunctional adversarial examples: A novel mechanism for authenticatable privacy protection of imagesSignal Processing10.1016/j.sigpro.2024.109816230(109816)Online publication date: May-2025
    • (2023)Predicting perceived music emotions with respect to instrument combinationsProceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial Intelligence10.1609/aaai.v37i13.26910(16078-16086)Online publication date: 7-Feb-2023
    • (2023)Adversarial data hiding with only one pixelInformation Processing and Management: an International Journal10.1016/j.ipm.2022.10322260:2Online publication date: 1-Mar-2023
    • (2022)Music Emotion Recognition Based on Bilayer Feature ExtractionWireless Communications & Mobile Computing10.1155/2022/78325482022Online publication date: 1-Jan-2022
    • (2022)A Multimodal Framework for Large-Scale Emotion Recognition by Fusing Music and Electrodermal Activity SignalsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/349068618:3(1-23)Online publication date: 4-Mar-2022
    • (2022)Multi-label feature selection based on label correlations and feature redundancyKnowledge-Based Systems10.1016/j.knosys.2022.108256241(108256)Online publication date: Apr-2022
    • (2022)Separable reversible data hiding in encrypted images based on Paillier cryptosystemMultimedia Tools and Applications10.1007/s11042-022-12684-881:13(18807-18827)Online publication date: 1-May-2022
    • (2021)Robust Color Images Watermarking Using New Fractional-Order Exponent MomentsIEEE Access10.1109/ACCESS.2021.30682119(47425-47435)Online publication date: 2021
    • (2021)Commutative encryption and authentication for OpenEXR high dynamic range imagesMultimedia Tools and Applications10.1007/s11042-021-11002-y80:18(27807-27828)Online publication date: 1-Jul-2021
    • (2020)Reversible Fragile Watermarking for Multichannel Images with High Redundancy ChannelsMultimedia Tools and Applications10.1007/s11042-020-08986-479:35-36(26427-26445)Online publication date: 1-Sep-2020
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media