Skip to main content

Fragile Watermarking Scheme for Accepting Image Compression

  • Conference paper
  • 502 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3824))

Abstract

As images are commonly transmitted or stored in compressed form such as JPEG lossy compression, image authentication demands techniques that can distinguish incidental modifications (e.g., compression) from malicious ones. In this paper, we propose an effective technique for image authentication which can prevent malicious manipulations but allow JPEG compression. An image is divided into blocks in the spatial domain, each block is divided into two parts by randomly selecting pixels, and average gray values for the parts are calculated. The average value is compared with that of the adjoining block to obtain an authentication signature. The extracted authentication information becomes the fragile watermark to be inserted into the image’s frequency domain DCT block. The experimental results show that this is an effective technique of image authentication.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneider, M., Chang, S.F.: A robust content based digital signature for image authentication. In: Proc. IEEE ICIP, pp. 227–230 (1996)

    Google Scholar 

  2. Lin, C.Y., Chang, S.F.: A robust image authentication method surviving JPEG lossy compression. In: Proc. SPIE Storage and Retrieval of Image/Video Database, San Jose (1998)

    Google Scholar 

  3. Bhattacharjee, S., Kutter, M.: Compression tolerant image authentication. In: Proc. IEEE Int. Conf. on Image Processing, pp. 435–439 (1998)

    Google Scholar 

  4. Lu, C.S., Liao, H.M.: Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme. In: Proc. ACM Multimedia and Security Workshop at the 8th ACM Int. Conf. on Multimedia, Los Angeles, California, USA, pp. 115–118 (2000)

    Google Scholar 

  5. Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. In: Proc. IEEE ICIP, pp. 1167–1180 (1997)

    Google Scholar 

  6. Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proc. IEEE Int. Conf. on Image Processing, pp. 680–683 (1997)

    Google Scholar 

  7. Wu, M., Liu, B.: Watermarking for image authentication. In: Proc. IEEE Int. Conf. on Image Processing, pp. 437–441 (1998)

    Google Scholar 

  8. Wong, P.W.: A public key watermark for image verification and authentication. In: Proc. IEEE Int. Conf. on Image Processing, pp. 455–459 (1998)

    Google Scholar 

  9. Zou, D., Wu, C.W., Xuan, G., Shi, Y.Q.: A content-based image authentication system with lossless data hiding. In: Proc. ICME Int. Conf. on Multimedia and Expo., pp. 213–216 (2003)

    Google Scholar 

  10. Lin, C.Y., Chang, S.F.: A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. on Circuits and Sys. of Video Tech., 153–168 (2001)

    Google Scholar 

  11. Lu, C.S.: Multimedia Security. IGP, Hershey, London (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, MA., Yoo, KS., Lee, WH. (2005). Fragile Watermarking Scheme for Accepting Image Compression. In: Yang, L.T., Amamiya, M., Liu, Z., Guo, M., Rammig, F.J. (eds) Embedded and Ubiquitous Computing – EUC 2005. EUC 2005. Lecture Notes in Computer Science, vol 3824. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596356_93

Download citation

  • DOI: https://doi.org/10.1007/11596356_93

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30807-2

  • Online ISBN: 978-3-540-32295-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics