Abstract
In this paper, we propose a novel DWT-based fragile watermarking scheme by exploiting the characteristics of the human visual system (HVS). Multi-resolution tamper detection and image fusion are applied to watermark detection and accurate tamper region location. To distinguish between incidental and malicious modifications, some effective rules are presented. Mathematical morphology operations are used to improve the detection performance. Experiment results demonstrate that the watermark is fragile to malicious tamper and robust against high quality lossy image compression.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Fridrich, J.: Methods for Tamper Detection in Digital Images. Proc. of the ACM Workshop on Multimedia and Security, Orlando (1999) 19–23
Lin, E.T., Delp, E.J.: A Review of Fragile Image Watermarks. Proc. of the Multimedia and Security Workshop, Orlando (1999) 25–29
Yeung, M., Mintzer, F.: An Invisible Watermarking Technique for Image Verification. Proc. of the IEEE Int. Conf. on Image Processing, vol.2. Santa Barbaa (1997) 680–683
Memon, N., Shende, S. and Wong, P.: On the Security of the Yeung-Mintzer Authentication Watermark. Proc. of the IS&T PICS Symposium, Savannah (1999) 301–306
Fridrich, J., Memon, N. and Yeung, M.: Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme. Proc. of the SPIE Electronic Imaging, San Jose (2000) 428–437
Fridrich, J., Goljan, M. et al.: New Fragile Authentication Watermark for Images. Proc. of the IEEE Int. Conf. on Image Processing (ICIP), Vol.1. Vancouver (2000) 446–449
Lin C-Y, Chang S-F: Semi-Fragile Watermarking for Authentication Jpeg Visual Content. SPIE Security and Watermarking of Multimedia Content II, San Jose (2000) 140–151
Kundur, D., Hatzinakos, D.: Towards a Telltale Watermark Techniques for Tamper-Proofing. Proc. of the IEEE Int. Conf. on Image Processing (ICIP), Vol.2. Chicago (1998) 409–413
Watson, B., Yang, G.Y., et al.: Visibility of Wavelet Quantization Noise. IEEE Trans. On Image Processing, Vol.6. (1997) 1164–1175
Lin, C.-Y., Chang, S.-F.: A Robust Image Authentication Method Surviving JPEG Lossy Compression. SPIE Storage and Retrieval of Image/Video Databases, San Jose (1998) 296–307
Bartolini, F., Tefas, A., Barni, M. and Pitas, I.: Image authentication techniques for surveillance applications. Proc. of the IEEE, Vol. 89(10). (2001) 1403–1418
Costantini, M., Farina, A.: The Fusion of Different Resolution SAR Images. Proc. of the IEEE, Vol.85. (1997) 139–146
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hu, J., Huang, J., Huang, D., Shi, Y.Q. (2003). A DWT-Based Fragile Watermarking Tolerant of JPEG Compression. In: Kim, H.J. (eds) Digital Watermarking. IWDW 2002. Lecture Notes in Computer Science, vol 2613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36617-2_15
Download citation
DOI: https://doi.org/10.1007/3-540-36617-2_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-01217-7
Online ISBN: 978-3-540-36617-1
eBook Packages: Springer Book Archive