Abstract
In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small number of cryptography-based secure authentication methods are available for binary images. This paper proposes a new authentication watermarking method for binary images. It can detect any visually significant alteration while maintaining good visual quality for virtually all types of binary images (possibly excluding dispersed-dot halftones). As usual, the security of the algorithm lies only on the secrecy of a secret- or private-key. This paper also presents a variation of the proposed scheme that can locate the modified region with good spatial resolution. A possible application of the proposed technique is in Internet fax transmission, i.e. for legal authentication of documents routed outside the phone network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Baharav, Z., Shaked, D.: Watermarking of Dither Halftone Images, Hewlett- Packard Labs. Tech. Rep. HPL-98-32 (1998)
Barreto, P.S.L.M., Kim, H.Y.: Pitfalls in Public KeyWatermarking. In: Sibgrapi – Brazilian Symp. Computer Graphics and Image Processing, pp. 241–242 (1999)
Barreto, P.S.L.M., Kim, H.Y., Rijmen, V.: Toward a Secure Public-Key Blockwise Fragile Authentication Watermarking. IEE Proc. Vision, Image and Signal Processing 149(2), 57–62 (2002)
Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)
Celik, M.U., Sharma, G., Saber, E., Tekalp, A.M.: Hierarchical Watermarking for Secure Image Authentication with Localization. IEEE Trans. Image Processing 11(6), 585–595 (2002)
Chen, Y.-Y., Pan, H.-K., Tseng, Y.-C.: A Secure Data Hiding Scheme for Binary Images. In: IEEE Symposium on Computers and Communications, pp. 750–755 (2000)
Chun, I.G., Ha, S.: A Robust Printed Image Watermarking Based on Iterative Halftoning Method. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 200–211. Springer, Heidelberg (2004)
de Queiroz, R., Fleckenstein, P.: Object Modification for Data Embedding through Template Ranking. Xerox Invention Proposal (1999)
Deseilligny, M.P., Le Men, H.: An Algorithm for Digital Watermarking of Binary Images, Application to Map and Text Images (1998), available at, http://www-ima.enst.fr/maitre/tatouage/MPdSHK.ps
Fu, M.S., Au, O.C.: Data Hiding by Smart Pair Toggling for Halftone Images. IEEE Int. Conf. Acoustics, Speech and Signal Processing 4, 2318–2321 (2000)
Fu, M.S., Au, O.C.: Data Hiding Watermarking for Halftone Images. IEEE Trans. Image Processing 11(4), 477–484 (2002)
Hel-Or, H.Z.: Watermarking and Copyright Labeling of Printed Images. Journal of Electronic Imaging 10(3), 794–803 (2001)
Holliman, M., Memon, N.: Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes. IEEE Trans. Image Processing 9(3), 432–441 (2000)
Kim, H.Y., Afif, A.: Secure Authentication Watermarking for Binary Images. In: Proc. Sibgrapi – Brazilian Symp. on Comp. Graph. and Image Proc., pp. 199–206 (2003)
Kim, H.Y., Afif, A.: Secure Authentication Watermarking for Halftone and Binary Images. Int. J. Imaging Systems and Technology (to appear)
Knox, K.T., Wang, S.: Digital Watermarks Using Stochastic Screens, Color Imaging: Device-Independent Color, Color Hard Copy, and Graphic Arts II. In: SPIE Proc., February 1997, vol. 3018, pp. 316–322 (1997)
Li, C.T., Lou, D.C., Chen, T.H.: Image Authentication and Integrity Verification via Content-Based Watermarks and a Public Key Cryptosystem. In: IEEE Int. Conf. Image Processing, vol. 3, pp. 694–697 (2000)
Maxemchuk, N.F., Low, S.: Marking Text Documents. In: Int. Conf. Image Processing, vol. 3, pp. 13–17 (1997)
Pei, S.C., Guo, J.M.: Hybrid Pixel-Based Data Hiding and Block-Based Watermarking for Error-Diffused Halftone Images. IEEE Trans. on Circuits and Systems for Video Technology 13(8), 867–884 (2003)
Schneier, B.: Applied Cryptography. John Wiley & Sons, Chichester (1996)
Tseng, Y.-C., Chen, Y.-Y., Pan, H.-K.: A Secure Data Hiding Scheme for Binary Images. IEEE Trans. on Communications 50(8), 1227–1231 (2002)
Wong, P.W.: AWatermark for Image Integrity and Ownership Verification. IS&T PIC Conference (Portland, OR) (May 1998), also available as Hewlett-Packard Labs. Tech. Rep. HPL-97-72 (May 1997)
Wong, P.W.: A Public Key Watermark for Image Verification and Authentication. In: IEEE Int. Conf. Image Processing, vol. 1, pp. 455–459 (1998), (MA11.07)
Wong, P.W., Memon, N.: Secret and Public Key ImageWatermarking Schemes for Image Authentication and Ownership Verification. IEEE Trans. Image Processing, 10(10), 1593–1601 (2001)
Wu, M., Tang, E., Liu, B.: Data Hiding in Digital Binary Image. In: IEEE Int. Conf. Multimedia and Expo., ICME 2000, New York, USA (2000)
Yeung, M.M., Mintzer, F.: An Invisible Watermarking Technique for Image Verification. In: IEEE Int. Conf. Image Processing, vol. 1, pp. 680–683 (1997)
Zhao, J., Koch, E.: Embedding Robust Labels into Images for Copyright Protection. In: Proc. Int. Cong. Intellectual Property Rights, Knowledge and New Technologies, pp. 242–251 (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, H.Y., de Queiroz, R.L. (2005). Alteration-Locating Authentication Watermarking for Binary Images. In: Cox, I.J., Kalker, T., Lee, HK. (eds) Digital Watermarking. IWDW 2004. Lecture Notes in Computer Science, vol 3304. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31805-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-540-31805-7_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24839-2
Online ISBN: 978-3-540-31805-7
eBook Packages: Computer ScienceComputer Science (R0)