Skip to main content

A Feature-Watermarking Scheme for JPEG Image Authentication

  • Conference paper
  • 1109 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2939))

Abstract

Feature-based watermark is a special kind of watermark, which reflects the features of the content, and these features are deliberately chosen in the way that they will keep invariant during “content preserving” modifications while being sensitive to “malicious” attacks. In this paper, a novel approach to content authentication for JPEG images is proposed. The image authentication method is based on partial energy relation between groups of 8(8 DCT blocks as features, while the strategies of watermark embedding and extraction is based on improved DEW algorithm. Our proposed scheme has the capability of differentiating “content preserving” modifications from “malicious” attacks and so can ascertain and locate the “malicious” attacks. Experimental results show the feasibility of the proposed scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dai, Y., Thiemert, S., Steinbach, M., Hauer, E., Dittmann, J.: Featurebased watermarking scheme for MPEG-I/II video authentication. In: Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, part of the IS&T/SPIE Symposium on Electronic Imaging 2004, San Jose, CA USA, January 18-22 (2004) (has been accepted)

    Google Scholar 

  2. Fridrich, J.: Security of Fragile Authentication Watermarks with Localization. In: Proc. SPIE Photonic West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, January 2002, vol. 4675, pp. 691–700 (2002)

    Google Scholar 

  3. Lin, C.-Y., Chang, S.-F.: Semi-Fragile Watermarking for Authenticating JPEG Visual Content. In: SPIE Security and Watermarking of Multimedia Contents II, EI 2000, San Jose, CA (January 2000)

    Google Scholar 

  4. Celik, M.U., Sharma, G., Murat Tekalp, A., Saber, E.: Video authentication with self-recovery. In: Video Authentication with Self-Recovery, Proceedings of SPIE, Security and Watermarking of Multimedia Contents IV (January 2002)

    Google Scholar 

  5. Lin, C.-Y., Chang, S.-F.: Issues and Solutions for Authenticating MPEG Video. In: SPIE Security and Watermarking of Multimedia Contents, EI 1999, San Jose, CA (January 1999)

    Google Scholar 

  6. Maeno, K., Sun, Q., Chang, S.-F., Suto, M.: New semi-fragile image authentication watermarking techniques using random bias and non-uniform quantization. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents IV, January 2002, vol. 4675, pp. 659–670 (2002)

    Google Scholar 

  7. Setyawan, I., Lagendijk, R.L.: Low bit-rate video watermarking using temporally extended differential energy watermarking (DEW) algorithm. In: Proceedings of the SPIE. SPIE Security and Watermarking of Multimedia Contents III, San Jose, January 21- 26 (2001)

    Google Scholar 

  8. Hanjalic, G.C., Langelaar, P.M.B., van Roosmalen, J., Biemond, R.L.: Image and video databases: restoration, watermarking and retrieval, 1st edn., Netherlands ISBN: 0444505024

    Google Scholar 

  9. Dittmann, J., Stabenau, M., Steinmetz, R.: Robust MEG Video Watermarking Technologies. In: Proceedings of ACM Multimedia 1998, The 6th ACM International Multimedia Conference, Bristol, England, pp. 71–80 (1998)

    Google Scholar 

  10. Dittmann, J., Mukherjee, A., Steinebach, M.: Media-independent Watermarking Classification and the need for combining digital video and audio watermarking for media authentication. In: Proceedings of the International Conference on Information Technology: Coding and Computing, Las Vegas, Nevada, USA, March 27–29, pp. 62–67. IEEE Computer Society, Los Alamitos (2000) ISBN 0 - 7695 - 0540–6

    Chapter  Google Scholar 

  11. Dittmann, J., Steinbach, M.: Joint watermarking of audio-visual data. In: 2001 IEEE Fourth Workshop on Multimedia Signal Processing, Cannes France, October 3-5, pp. 601–606. IEEE, Piscataway (2001) ISBN 0-7803-7025-2

    Google Scholar 

  12. Mobasseri, B.G., Evans, A.T.: Content-dependent video authentication by selfwatermarking in color space. In: Proceedings of the SPIE. SPIE Security and Watermarking of Multimedia Contents III, San Jose, January 21-26 (2001)

    Google Scholar 

  13. Marvel, L.M., Hartwig Jr., G.W., Boncelet Jr., C.: Compressioncompatible fragile and semi-fragile tamper detection. In: Proceedings of the SPIE. SPIE Security and Watermarking of Multimedia Contents III, San Jose, January 21-26 (2001)

    Google Scholar 

  14. Lin, E.T., Podilchuk, C.I., Delp, E.J.: Detection of image alterations using semi-fragile watermarks. In: Proceedings of the SPIE. International Conference on Security and Watermarking of Multimedia Contents II, San Jose, CA, January 23-28, vol. 3971 (2000)

    Google Scholar 

  15. C.-s. Liu, H.-Y.M., Liao, C.-J.: Combined watermarking for image authentication and protection. In: Proc. 1st IEEE Int. Conf. on Multimedia and Expo, New York City, NY, USA, July 30 - August 2, vol. III, pp. 1415–1418 (2000)

    Google Scholar 

  16. Coltue, D., Bolon, P., Chassery, J.-M.: Fragile and robust watermarking by histogram specification. In: Proc. SPIE Photonic West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, January, 2002, vol. 4675, pp. 701–710 (2002)

    Google Scholar 

  17. Tang, C.-w., Hang, H.-m.: An image feature based robust digital watermarking scheme. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents, Januaruy 2002, vol. 4675, pp. 584–595 (2002)

    Google Scholar 

  18. Wong, P.W., Memon, N.: Secret and public key authentication watermarking schemes that resist vector quantization attack. In: Proceedings of SPIE, Security and watermarking of multimedia contents II, pp. 417–427 (2000)

    Google Scholar 

  19. Yeung, M.M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proceedings of ICIP (October 1997)

    Google Scholar 

  20. Yin, P., Yu, H.H.: Classification of video tampering methods and countermeasures using digital watermarking. Invited paper for SPIE’s International Symposium: ITCOM 2001, Denver, Colorado, USA (2001)

    Google Scholar 

  21. Schneier, B.: Applied cryptography—protocols, algorithms, and source code in C. John Wiley & Sons, Inc., Chichester (1996)

    MATH  Google Scholar 

  22. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. An Imprint of Academic Press (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, J., Dai, Y., Thiemert, S., Wang, Z. (2004). A Feature-Watermarking Scheme for JPEG Image Authentication. In: Kalker, T., Cox, I., Ro, Y.M. (eds) Digital Watermarking. IWDW 2003. Lecture Notes in Computer Science, vol 2939. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24624-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24624-4_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-21061-0

  • Online ISBN: 978-3-540-24624-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics