[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Compensated Signature Embedding for Multimedia Content Authentication

Published: 01 December 2009 Publication History

Abstract

One of the main goals of digital content authentication and preservation techniques is to guarantee the originality and quality of the information. In this article, robust watermarking is used to embed content-based fragile signatures in multimedia signals to achieve efficient authentication without requiring any third-party reference or side information. To overcome the signature alteration caused by the embedding perturbation and other possible encoding operations, a closed-form compensation technique is proposed for ensuring signature consistency by employing a Lagrangian-based approach. A minimum distortion criterion is used to ensure signal quality. The effectiveness of the proposed approach is investigated with simulations of examples of image authentication in which signatures are designed to reveal tamper localization. Results using quantitative performance criteria show successful authentication over a range of robustness in embedding watermarks using both QIM-DM and spread-spectrum techniques. A comparison with two iterative compensation schemes is also presented.

References

[1]
Ababneh, S., Ansari, R., and Khokhar, A. 2008a. A set-theoretic approach for compensated signature embedding using projections onto convex sets. In Proceedings of the SPIE/IST International Conference Visual Communication and Image Processing.
[2]
Ababneh, S., Ansari, R., and Khokhar, A. 2008b. Improved image authentication using closed-form compensation and spread-spectrum watermarking. In Proceedings of the IEEE International Conference on Acoustics Speech and Signal Processing. IEEE, 204--213.
[3]
Ababneh, S., Khokhar, A., and Ansari, R. 2007. Compensated signature embedding based multimedia content authentication system. In Proceedings of the IEEE International Conference on Image Processing. IEEE, 393--396.
[4]
Bhattacharjee, S. and Kutter, M. 1998. Compression tolerant image authentication. In Proceedings of the IEEE International Conference on Image Processing. IEEE, 435--439.
[5]
Celik, M., Sharma, G., Saber, E., and Tekalp, A. 2001. A hierarchical image authentication watermark with improved localization and security. In Proceedings of the IEEE International Conference on Image Processing. IEEE, 502--505.
[6]
Chen, B. and Wornell, G. 2001. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Image Proc. 47, 4, 1423--1443.
[7]
Chu, Y., Zhang, Y., Zhang, S., and Ye, X. 2006. Region of interest fragile watermarking for image authentication. In Proceedings of the IEEE 1st International Multi-Symposiums on Computer and Computational Sciences. IEEE, 726--731.
[8]
Cox, I., Kilian, J., Leighton, F., and Shamoon, T. 1997. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Proc. 6, 12, 1673--1687.
[9]
Cox, I., Miller, M., and Bloom, J. 2002. Digital Watermarking. Morgan Kaufmann, San Francisco, CA.
[10]
Dugad, R., Ratakonda, K., and Ahuja, N. 1998. A new wavelet-based scheme for watermarking images. In Proceedings of the IEEE International Conference on Image Processing. ACM, 419--423.
[11]
Hasan, Y. and Hassan, A. 2004. Fragile blockwise image authentication thwarting vector quantization attack. In Proceedings of the 4th IEEE International Symposium on Signal Proceedings and Information Technology. IEEE, 530--533.
[12]
Lin, C. Y. and Chang, S. F. 2000. Semi-Fragile watermarking for authenticating jpeg visual content. In Proceedings of the SPIE Conference on Security and Watermarking of Multimedia Content. SPIE, 140--151.
[13]
Lin, P., Huang, P., and Peng, A. 2004. A fragile watermarking scheme for image authentication with localization and recovery. In Proceedings of the 6th IEEE International Symposium on Multimedia Software Engineering. IEEE, 146--153.
[14]
Liu, H., Lin, J., and Huang, J. 2005. Image authentication using content base watermark. In Proceedings of the IEEE International Symposium on Circuits and Systems. IEEE, 4014--4017.
[15]
Maniatis, P., Roussopoulos, M., Giuli, T., Rosenthal, D., and Baker, M. 2005. The LOCKSS peer-to-peer digital preservation system. ACM Trans. Comput. Syst. 23, 1, 2--50.
[16]
Piva, A., Barni, M., Bartolini, F., and Cappellini, V. 1997. DCT-Based watermark recovering without resorting to the uncorrupted original image. In Proceedings of the IEEE International Conference on Image Processing. ACM, 520--523.
[17]
Rey, C. and Dugelay, J. 2002. A survey of watermarking algorithms for image authentication. EURASIP J. Appl. Signal Process. 1, 613--621.
[18]
Roy, S. and Sun, Q. 2007. Robust hash for detecting and localizing image tampering. In Proceedings of the IEEE International Conference on Image Processing. IEEE, 117--120.
[19]
Safabakhsh, R., Zaboli, S., and Tabibiazar, A. 2004. Digital watermarking on still images using wavelet transform. In Proceedings of the IEEE International Conference on Information Technology Coding and Computing. IEEE, 671--675.
[20]
Safavi-Naini, W., Uehara, R., and Li, T. W. 2004. A scalable and oblivious digital watermarking for images. In Proceedings of the 7th IEEE International Conference on Signal Processing. IEEE, 2338--2341.
[21]
Schlauweg, M., Profrock, D., and Muller, E. 2006. JPEG2000-Based secure image authentication. In Proceedings of the 8th Workshop on Multimedia and Security. ACM, 62--67.
[22]
Stark, H. and Yang, Y. 1998. Vector Space Projections A Numerical Approach to Signal and Image Processing Neural Nets and Optics. John Wiley and Sons.
[23]
Thangavel, P. and Kumaran, T. 2007. Fragile watermark for tamper detection using structural distortion. In Proceedings of the IEEE International Symposium on Industrial Electronics. IEEE, 1755--1760.
[24]
Wang, Z., Wu, G., Sheikh, H., Simoncelli, E., and Yang, E. 2006. Quality-Aware images. IEEE Trans. Image Process. 15, 6, 1680--1689.
[25]
Wolfgang, R. B. and Delp, E. J. 1999. Fragile watermarking using the vw2d watermark. In Proceedings of the SPIE/IST International Conference Security and Watermarking of Multimedia Contents. SPIE, 204--213.
[26]
Yuan, H. and Zhang, X. 2006. Multiscale fragile watermarking based on the Gaussian mixture model. IEEE Trans. Image Process. 15, 10, 3189--3200.

Cited By

View all
  • (2023)An Improved Encryption–Compression-based Algorithm for Securing Digital ImagesJournal of Data and Information Quality10.1145/353278315:2(1-16)Online publication date: 22-Jun-2023
  • (2012)A joint layered scheme for reliable and secure mobile JPEG-2000 streamingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/2240136.22401438:3(1-23)Online publication date: 6-Aug-2012

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of Data and Information Quality
Journal of Data and Information Quality  Volume 1, Issue 3
December 2009
109 pages
ISSN:1936-1955
EISSN:1936-1963
DOI:10.1145/1659225
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 2009
Accepted: 01 February 2009
Revised: 01 January 2009
Received: 01 April 2008
Published in JDIQ Volume 1, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Content authentication
  2. compensated signature embedding
  3. watermarking

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)An Improved Encryption–Compression-based Algorithm for Securing Digital ImagesJournal of Data and Information Quality10.1145/353278315:2(1-16)Online publication date: 22-Jun-2023
  • (2012)A joint layered scheme for reliable and secure mobile JPEG-2000 streamingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/2240136.22401438:3(1-23)Online publication date: 6-Aug-2012

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media