Abstract
A new fragile watermarking scheme, which exploits the perturbation in reverse processing, is proposed to enhance the tampering localizability of multimedia authentication. In verifying data integrity or authenticating signatures, the new method performs the reverse processing of watermark embedding. Typically, it solves an embedding equation or de-filters the distributed version instead of really extracting the watermark. If any tampering happened, the output of the method perturbs because the manipulated data, which can be regarded as the observation error, is drastically enlarged by such processing. The perturbed values indicate the degree of the tampering, and their positions directly draw the shapes of the manipulated areas. Compared with the mostly used block-based fragile watermarking, the new method localizes the tampering almost sample-wise other than block-wise. It also supports the adaptive embedding, which does not evenly scale the watermark, and avoids the vulnerabilities resulting from the block-based approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Nahrstedt, K., Dittmann, J., Wohlmacher, P.: Approaches to multimedia and security. In: Proc. of IEEE Intern. Conf. on Multimedia and Expo, New York, August 2000, vol. 3, pp. 1275–1278 (2000)
Lin, E.T., Delp, E.J.: A review of fragile image watermarks. In: Proc. of Multimedia and Security Workshop at ACM Multimedia, Orlando, Florida, October 25–29 (1999)
Barreto, P.S., Kim, H.Y.: Pitfalls in public key watermarking. In: Proc. of 12th IEEE Brazilian Symposium on Computer Graphics and Image Processing, São Paulo, Brazil, October 1999, pp. 241–242 (1999)
Kundur, D., Hatzinakos, D.: Towards a telltale watermarking technique for tamperproofing. In: Proc. of IEEE Intern. Conf. on Image Processing, Chicago, Illinois, October 1998, vol. 2, pp. 409–413 (1998)
Lin, C.Y., Chang, S.F.: Semi-fragile watermarking for authenticating JPEG visual content. In: SPIE Proc. of Security and Watermarking of Multimedia Contents II, San Jose, California, January 2000, vol. 3971, pp. 140–151 (2000)
Wong, P.W.: A public key watermarking for image verification and authentication. In: Proc. of IEEE Intern. Conf. on Image Processing, Chicago, Illinois, October 1998, vol. 1, pp. 455–459 (1998)
Cox, I.J., Miller, M.I.: A review of watermarking and the importance of perceptual modeling. In: SPIE Proc. of Human Vision and Electronic Imaging II, San Jose, California, June 1997, vol. 3016, pp. 92–99 (1997)
Podilchuk, C.I., Zeng, W.: Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications 16(4), 525–539 (1998)
Kirsch, A.: An Introduction to the Mathematical Theory of Inverse Problems. Springer, Heidelberg (1996)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Lancaster, P., Tismenetsky, M.: The Theory of Matrix, 2nd edn. Academic Press, Orlando (1985)
Burden, R.L., Faires, J.D.: Numerical Analysis, 7th edn. Thomson Learning, Stamford, Connecticut (2001)
Castleman, K.R.: Digital Image Processing, 2nd edn. Prentice Hall, Englewood Cliffs (1997)
Wu, D.C., Tsai, W.H.: Embedding of any type of data in images based on a human visual model and multiple-based number conversion. Pattern Recognition Letters 20(14), 1511–1517 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhao, X., Wang, W., Chen, K. (2003). Multimedia Tampering Localization Based on the Perturbation in Reverse Processing. In: Dong, G., Tang, C., Wang, W. (eds) Advances in Web-Age Information Management. WAIM 2003. Lecture Notes in Computer Science, vol 2762. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45160-0_47
Download citation
DOI: https://doi.org/10.1007/978-3-540-45160-0_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40715-7
Online ISBN: 978-3-540-45160-0
eBook Packages: Springer Book Archive