Skip to main content

Content-Based Image Watermarking Via Public-Key Cryptosystems

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4705))

Abstract

Digital watermarking is a technique to insert an information-carrying digital signature into a digital media so that the signature can be extracted for variety of purposes including ownership authentication and content verification. We examine the weaknesses against common watermarking attacks of blockwise independent and content-based watermarking algorithms for image integrity verification, and implement a new and more secure invisible fragile public-key watermarking algorithm for color or grayscale images that increases the message digest size from the proposed 64 to 128 bits using the same small-size blocks and maintaining high-quality watermarked images and accurate localization of image changes. Our watermarking technique is capable to detect any changes made to the image since the time it was stamped, any changes to the pixel values and also to the dimensions of the image will be automatically detected and localized. Our scheme consists of a watermark-insertion process that uses a private key to embed a watermark image into a cover image, and a watermark-extraction process that uses a public key to extract the watermark from the watermarked image. The embedded watermark can only be extracted by someone who has possession of a proper verification key.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Federal Information Processing Standards Publication 180-2. Secure Hash Standard. National Institute of Standards and Technology (August 2002)

    Google Scholar 

  2. Barreto, P.S.L.M., Kim, H.Y.: Pitfalls in public key watermarking. In: Proceedings of the XII Brazilian Symposium on Computer Graphics and Image Processing, pp. 241–242 (October 1999)

    Google Scholar 

  3. Barreto, P.S.L.M., Kim, H.Y., Rijmen, V.: Toward secure public-key blockwise fragile authentication watermarking. Image and Signal Processing 149(2), 57–62 (2002)

    Article  Google Scholar 

  4. Cox, I.J., Kilian, J., Leighton, F.T., Shammon, T.: Secure spread spectrum watermarking for multimedia. In: Proceedings of the IEEE Transactions on Image Processing, vol. 6(12), pp. 1673–1687. IEEE Computer Society, Los Alamitos (1997)

    Google Scholar 

  5. Dobbertin, H., Bosselaers, A., Preneel, B.: RIPEMD-160: a strengthened version of RIPEMD. In: Proceedings of the Third International Workshop on Fast Software Encryption, London, UK, pp. 71–82. Springer-Verlag, Heidelberg (1996)

    Google Scholar 

  6. Holliman, M., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. In: Proceedings of the IEEE Transactions on Image Processing, vol. 9(3), pp. 432–441. IEEE Computer Society, Los Alamitos (2000)

    Google Scholar 

  7. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)

    Google Scholar 

  8. Li, C.T., Lou, D.C., Chen, T.H.: Image authentication and integrity verification via content-based watermarks and a public key cryptosystem. In: Proceedings of the International Conference on Image Processing, vol. 3, pp. 694–697. IEEE Computer Society, Los Alamitos (2000)

    Google Scholar 

  9. Memon, N., Wong, P.W.: Protecting digital media content. Communications of the ACM 41(7), 35–43 (1998)

    Article  Google Scholar 

  10. Menezes, A.J., van Oorshot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton, USA (1997)

    MATH  Google Scholar 

  11. Mintzer, F., Braudaway, G.W., Yeung, M.: Effective and ineffective digital watermarks. In: Proceedings of the International Conference on Image Processing, vol. 3, pp. 9–12. IEEE Computer Society, Los Alamitos (1997)

    Chapter  Google Scholar 

  12. Nishimura, K., Sibuya, M.: Probability to meet in the middle. Journal of Cryptology 2(1), 13–22 (1990)

    Article  MATH  Google Scholar 

  13. Rivest, R.L.: The MD5 message digest algorithm. Technical Report (1992)

    Google Scholar 

  14. Rivest, R.L., Shamir, A., Adleman, L.: A method of obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MATH  Google Scholar 

  15. Wolfgang, R.B., Delp, E.J.: A watermark for digital images. In: Proceedings of the International Conference on Image Processing, vol. 3, pp. 219–222. IEEE Computer Society, Los Alamitos (1996)

    Google Scholar 

  16. Wong, P.W.: A public key watermarking for image verification. In: Proceedings of the International Conference on Image Processing, vol. 1, pp. 455–459. IEEE Computer Society Press, Los Alamitos (1998)

    Google Scholar 

  17. Wong, P.W., Memon, N.: Secure and public key image watermarking schemes for image authentication and ownership verification. In: Proceedings of the IEEE Transactions on Image Processing, vol. 10(10), pp. 1593–1601. IEEE Computer Society, Los Alamitos (2001)

    Google Scholar 

  18. Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proceedings of the International Conference on Image Processing, vol. 2, pp. 680–683. IEEE Computer Society Press, Los Alamitos (1997)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Osvaldo Gervasi Marina L. Gavrilova

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dai, H.K., Yeh, C.T. (2007). Content-Based Image Watermarking Via Public-Key Cryptosystems. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4705. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74472-6_76

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74472-6_76

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74468-9

  • Online ISBN: 978-3-540-74472-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics