Abstract
Digital watermarking is a technique to insert an information-carrying digital signature into a digital media so that the signature can be extracted for variety of purposes including ownership authentication and content verification. We examine the weaknesses against common watermarking attacks of blockwise independent and content-based watermarking algorithms for image integrity verification, and implement a new and more secure invisible fragile public-key watermarking algorithm for color or grayscale images that increases the message digest size from the proposed 64 to 128 bits using the same small-size blocks and maintaining high-quality watermarked images and accurate localization of image changes. Our watermarking technique is capable to detect any changes made to the image since the time it was stamped, any changes to the pixel values and also to the dimensions of the image will be automatically detected and localized. Our scheme consists of a watermark-insertion process that uses a private key to embed a watermark image into a cover image, and a watermark-extraction process that uses a public key to extract the watermark from the watermarked image. The embedded watermark can only be extracted by someone who has possession of a proper verification key.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Federal Information Processing Standards Publication 180-2. Secure Hash Standard. National Institute of Standards and Technology (August 2002)
Barreto, P.S.L.M., Kim, H.Y.: Pitfalls in public key watermarking. In: Proceedings of the XII Brazilian Symposium on Computer Graphics and Image Processing, pp. 241–242 (October 1999)
Barreto, P.S.L.M., Kim, H.Y., Rijmen, V.: Toward secure public-key blockwise fragile authentication watermarking. Image and Signal Processing 149(2), 57–62 (2002)
Cox, I.J., Kilian, J., Leighton, F.T., Shammon, T.: Secure spread spectrum watermarking for multimedia. In: Proceedings of the IEEE Transactions on Image Processing, vol. 6(12), pp. 1673–1687. IEEE Computer Society, Los Alamitos (1997)
Dobbertin, H., Bosselaers, A., Preneel, B.: RIPEMD-160: a strengthened version of RIPEMD. In: Proceedings of the Third International Workshop on Fast Software Encryption, London, UK, pp. 71–82. Springer-Verlag, Heidelberg (1996)
Holliman, M., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. In: Proceedings of the IEEE Transactions on Image Processing, vol. 9(3), pp. 432–441. IEEE Computer Society, Los Alamitos (2000)
Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)
Li, C.T., Lou, D.C., Chen, T.H.: Image authentication and integrity verification via content-based watermarks and a public key cryptosystem. In: Proceedings of the International Conference on Image Processing, vol. 3, pp. 694–697. IEEE Computer Society, Los Alamitos (2000)
Memon, N., Wong, P.W.: Protecting digital media content. Communications of the ACM 41(7), 35–43 (1998)
Menezes, A.J., van Oorshot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton, USA (1997)
Mintzer, F., Braudaway, G.W., Yeung, M.: Effective and ineffective digital watermarks. In: Proceedings of the International Conference on Image Processing, vol. 3, pp. 9–12. IEEE Computer Society, Los Alamitos (1997)
Nishimura, K., Sibuya, M.: Probability to meet in the middle. Journal of Cryptology 2(1), 13–22 (1990)
Rivest, R.L.: The MD5 message digest algorithm. Technical Report (1992)
Rivest, R.L., Shamir, A., Adleman, L.: A method of obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Wolfgang, R.B., Delp, E.J.: A watermark for digital images. In: Proceedings of the International Conference on Image Processing, vol. 3, pp. 219–222. IEEE Computer Society, Los Alamitos (1996)
Wong, P.W.: A public key watermarking for image verification. In: Proceedings of the International Conference on Image Processing, vol. 1, pp. 455–459. IEEE Computer Society Press, Los Alamitos (1998)
Wong, P.W., Memon, N.: Secure and public key image watermarking schemes for image authentication and ownership verification. In: Proceedings of the IEEE Transactions on Image Processing, vol. 10(10), pp. 1593–1601. IEEE Computer Society, Los Alamitos (2001)
Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proceedings of the International Conference on Image Processing, vol. 2, pp. 680–683. IEEE Computer Society Press, Los Alamitos (1997)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dai, H.K., Yeh, C.T. (2007). Content-Based Image Watermarking Via Public-Key Cryptosystems. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4705. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74472-6_76
Download citation
DOI: https://doi.org/10.1007/978-3-540-74472-6_76
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74468-9
Online ISBN: 978-3-540-74472-6
eBook Packages: Computer ScienceComputer Science (R0)