Skip to main content

Alteration-Locating Authentication Watermarking for Binary Images

  • Conference paper
Digital Watermarking (IWDW 2004)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3304))

Included in the following conference series:

Abstract

In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small number of cryptography-based secure authentication methods are available for binary images. This paper proposes a new authentication watermarking method for binary images. It can detect any visually significant alteration while maintaining good visual quality for virtually all types of binary images (possibly excluding dispersed-dot halftones). As usual, the security of the algorithm lies only on the secrecy of a secret- or private-key. This paper also presents a variation of the proposed scheme that can locate the modified region with good spatial resolution. A possible application of the proposed technique is in Internet fax transmission, i.e. for legal authentication of documents routed outside the phone network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baharav, Z., Shaked, D.: Watermarking of Dither Halftone Images, Hewlett- Packard Labs. Tech. Rep. HPL-98-32 (1998)

    Google Scholar 

  2. Barreto, P.S.L.M., Kim, H.Y.: Pitfalls in Public KeyWatermarking. In: Sibgrapi – Brazilian Symp. Computer Graphics and Image Processing, pp. 241–242 (1999)

    Google Scholar 

  3. Barreto, P.S.L.M., Kim, H.Y., Rijmen, V.: Toward a Secure Public-Key Blockwise Fragile Authentication Watermarking. IEE Proc. Vision, Image and Signal Processing 149(2), 57–62 (2002)

    Article  Google Scholar 

  4. Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Celik, M.U., Sharma, G., Saber, E., Tekalp, A.M.: Hierarchical Watermarking for Secure Image Authentication with Localization. IEEE Trans. Image Processing 11(6), 585–595 (2002)

    Article  Google Scholar 

  6. Chen, Y.-Y., Pan, H.-K., Tseng, Y.-C.: A Secure Data Hiding Scheme for Binary Images. In: IEEE Symposium on Computers and Communications, pp. 750–755 (2000)

    Google Scholar 

  7. Chun, I.G., Ha, S.: A Robust Printed Image Watermarking Based on Iterative Halftoning Method. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 200–211. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. de Queiroz, R., Fleckenstein, P.: Object Modification for Data Embedding through Template Ranking. Xerox Invention Proposal (1999)

    Google Scholar 

  9. Deseilligny, M.P., Le Men, H.: An Algorithm for Digital Watermarking of Binary Images, Application to Map and Text Images (1998), available at, http://www-ima.enst.fr/maitre/tatouage/MPdSHK.ps

  10. Fu, M.S., Au, O.C.: Data Hiding by Smart Pair Toggling for Halftone Images. IEEE Int. Conf. Acoustics, Speech and Signal Processing 4, 2318–2321 (2000)

    Google Scholar 

  11. Fu, M.S., Au, O.C.: Data Hiding Watermarking for Halftone Images. IEEE Trans. Image Processing 11(4), 477–484 (2002)

    Article  Google Scholar 

  12. Hel-Or, H.Z.: Watermarking and Copyright Labeling of Printed Images. Journal of Electronic Imaging 10(3), 794–803 (2001)

    Article  Google Scholar 

  13. Holliman, M., Memon, N.: Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes. IEEE Trans. Image Processing 9(3), 432–441 (2000)

    Article  Google Scholar 

  14. Kim, H.Y., Afif, A.: Secure Authentication Watermarking for Binary Images. In: Proc. Sibgrapi – Brazilian Symp. on Comp. Graph. and Image Proc., pp. 199–206 (2003)

    Google Scholar 

  15. Kim, H.Y., Afif, A.: Secure Authentication Watermarking for Halftone and Binary Images. Int. J. Imaging Systems and Technology (to appear)

    Google Scholar 

  16. Knox, K.T., Wang, S.: Digital Watermarks Using Stochastic Screens, Color Imaging: Device-Independent Color, Color Hard Copy, and Graphic Arts II. In: SPIE Proc., February 1997, vol. 3018, pp. 316–322 (1997)

    Google Scholar 

  17. Li, C.T., Lou, D.C., Chen, T.H.: Image Authentication and Integrity Verification via Content-Based Watermarks and a Public Key Cryptosystem. In: IEEE Int. Conf. Image Processing, vol. 3, pp. 694–697 (2000)

    Google Scholar 

  18. Maxemchuk, N.F., Low, S.: Marking Text Documents. In: Int. Conf. Image Processing, vol. 3, pp. 13–17 (1997)

    Google Scholar 

  19. Pei, S.C., Guo, J.M.: Hybrid Pixel-Based Data Hiding and Block-Based Watermarking for Error-Diffused Halftone Images. IEEE Trans. on Circuits and Systems for Video Technology 13(8), 867–884 (2003)

    Article  Google Scholar 

  20. Schneier, B.: Applied Cryptography. John Wiley & Sons, Chichester (1996)

    MATH  Google Scholar 

  21. Tseng, Y.-C., Chen, Y.-Y., Pan, H.-K.: A Secure Data Hiding Scheme for Binary Images. IEEE Trans. on Communications 50(8), 1227–1231 (2002)

    Article  Google Scholar 

  22. Wong, P.W.: AWatermark for Image Integrity and Ownership Verification. IS&T PIC Conference (Portland, OR) (May 1998), also available as Hewlett-Packard Labs. Tech. Rep. HPL-97-72 (May 1997)

    Google Scholar 

  23. Wong, P.W.: A Public Key Watermark for Image Verification and Authentication. In: IEEE Int. Conf. Image Processing, vol. 1, pp. 455–459 (1998), (MA11.07)

    Google Scholar 

  24. Wong, P.W., Memon, N.: Secret and Public Key ImageWatermarking Schemes for Image Authentication and Ownership Verification. IEEE Trans. Image Processing,  10(10), 1593–1601 (2001)

    Google Scholar 

  25. Wu, M., Tang, E., Liu, B.: Data Hiding in Digital Binary Image. In: IEEE Int. Conf. Multimedia and Expo., ICME 2000, New York, USA (2000)

    Google Scholar 

  26. Yeung, M.M., Mintzer, F.: An Invisible Watermarking Technique for Image Verification. In: IEEE Int. Conf. Image Processing, vol. 1, pp. 680–683 (1997)

    Google Scholar 

  27. Zhao, J., Koch, E.: Embedding Robust Labels into Images for Copyright Protection. In: Proc. Int. Cong. Intellectual Property Rights, Knowledge and New Technologies, pp. 242–251 (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, H.Y., de Queiroz, R.L. (2005). Alteration-Locating Authentication Watermarking for Binary Images. In: Cox, I.J., Kalker, T., Lee, HK. (eds) Digital Watermarking. IWDW 2004. Lecture Notes in Computer Science, vol 3304. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31805-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31805-7_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24839-2

  • Online ISBN: 978-3-540-31805-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics