Abstract
A fragile watermarking scheme is proposed for authentication of images. We exploit singular values of singular value decomposition( SVD) of images to check the integrity of images. In order to make authentication data, the singular values are changed to the binary bits using modular arithmetic. The binary bits, authentication data, are inserted into the least significant bits(LSBs) of the original image. The pixels to be changed are randomly selected in the original image. The advantages of this scheme are that i) we can detect any modification of watermarked images, ii) the quality of watermarked images is very high because only a few bits of authentication data are embedded. We also propose an extension algorithm to provide localization. Experimental results show that the proposed fragile watermarking scheme can be applied to the authentication applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cox, I., Miller, M., Bloom, J.: Digital watermarking. Morgan Kaufmann Publishers (2001)
Podilchuk, C., Delp, E.: Digital watermarking: algorithms and applications. IEEE Signal Processing Magazine, vol. 18 (2001) 33–46
Lee, S., Jung, S.: A survey of watermarking techniques applied to multimedia. Proc. IEEE International Symposium on Industrial Electronics, vol. 1 (2001) 272–277
Friedman, G.: The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Trans. Consumer Electron., vol. 39 (1993) 905–910
Yeung, M., Mintzer, F.: Invisible watermarking technique for image verification. Proc. ICIP vol. 2 (1997) 680–683
Lin, C., Chang S.: A robust image authentication method surviving JPEG lossy compression. Proc. SPIE, vol. 3312 (1998) 296–307
Wong, P., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Processing, vol. 10 (2001) 1593–1601
Fridrich, J., Goljan, M., Du, R: Invertible authentication watermark for JPEG images. Proc. Information Technology: Coding and Computing (2001), 223–227
Liu, R., Tan, T: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimedia, vol. 4 (2002) 121–128
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Byun, SC., Lee, SK., Tewfik, A.H., Ahn, BH. (2003). A SVD-Based Fragile Watermarking Scheme for Image Authentication. In: Kim, H.J. (eds) Digital Watermarking. IWDW 2002. Lecture Notes in Computer Science, vol 2613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36617-2_14
Download citation
DOI: https://doi.org/10.1007/3-540-36617-2_14
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-01217-7
Online ISBN: 978-3-540-36617-1
eBook Packages: Springer Book Archive