Skip to main content

A DWT-Based Fragile Watermarking Tolerant of JPEG Compression

  • Conference paper
  • First Online:
Digital Watermarking (IWDW 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2613))

Included in the following conference series:

Abstract

In this paper, we propose a novel DWT-based fragile watermarking scheme by exploiting the characteristics of the human visual system (HVS). Multi-resolution tamper detection and image fusion are applied to watermark detection and accurate tamper region location. To distinguish between incidental and malicious modifications, some effective rules are presented. Mathematical morphology operations are used to improve the detection performance. Experiment results demonstrate that the watermark is fragile to malicious tamper and robust against high quality lossy image compression.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fridrich, J.: Methods for Tamper Detection in Digital Images. Proc. of the ACM Workshop on Multimedia and Security, Orlando (1999) 19–23

    Google Scholar 

  2. Lin, E.T., Delp, E.J.: A Review of Fragile Image Watermarks. Proc. of the Multimedia and Security Workshop, Orlando (1999) 25–29

    Google Scholar 

  3. Yeung, M., Mintzer, F.: An Invisible Watermarking Technique for Image Verification. Proc. of the IEEE Int. Conf. on Image Processing, vol.2. Santa Barbaa (1997) 680–683

    Google Scholar 

  4. Memon, N., Shende, S. and Wong, P.: On the Security of the Yeung-Mintzer Authentication Watermark. Proc. of the IS&T PICS Symposium, Savannah (1999) 301–306

    Google Scholar 

  5. Fridrich, J., Memon, N. and Yeung, M.: Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme. Proc. of the SPIE Electronic Imaging, San Jose (2000) 428–437

    Google Scholar 

  6. Fridrich, J., Goljan, M. et al.: New Fragile Authentication Watermark for Images. Proc. of the IEEE Int. Conf. on Image Processing (ICIP), Vol.1. Vancouver (2000) 446–449

    Google Scholar 

  7. Lin C-Y, Chang S-F: Semi-Fragile Watermarking for Authentication Jpeg Visual Content. SPIE Security and Watermarking of Multimedia Content II, San Jose (2000) 140–151

    Google Scholar 

  8. Kundur, D., Hatzinakos, D.: Towards a Telltale Watermark Techniques for Tamper-Proofing. Proc. of the IEEE Int. Conf. on Image Processing (ICIP), Vol.2. Chicago (1998) 409–413

    Google Scholar 

  9. Watson, B., Yang, G.Y., et al.: Visibility of Wavelet Quantization Noise. IEEE Trans. On Image Processing, Vol.6. (1997) 1164–1175

    Article  Google Scholar 

  10. Lin, C.-Y., Chang, S.-F.: A Robust Image Authentication Method Surviving JPEG Lossy Compression. SPIE Storage and Retrieval of Image/Video Databases, San Jose (1998) 296–307

    Google Scholar 

  11. Bartolini, F., Tefas, A., Barni, M. and Pitas, I.: Image authentication techniques for surveillance applications. Proc. of the IEEE, Vol. 89(10). (2001) 1403–1418

    Google Scholar 

  12. Costantini, M., Farina, A.: The Fusion of Different Resolution SAR Images. Proc. of the IEEE, Vol.85. (1997) 139–146

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hu, J., Huang, J., Huang, D., Shi, Y.Q. (2003). A DWT-Based Fragile Watermarking Tolerant of JPEG Compression. In: Kim, H.J. (eds) Digital Watermarking. IWDW 2002. Lecture Notes in Computer Science, vol 2613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36617-2_15

Download citation

  • DOI: https://doi.org/10.1007/3-540-36617-2_15

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-01217-7

  • Online ISBN: 978-3-540-36617-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics