Skip to main content

RST-Invariant Semi-fragile Image Authentication Based on DWT-Coefficient Quantization

  • Conference paper
Advances in Multimedia Information Processing - PCM 2009 (PCM 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5879))

Included in the following conference series:

  • 1767 Accesses

Abstract

In this paper, we propose an image moment-based geometric nor malization to be applied before embedding and extracting a digital watermark in the DWT-domain of JPEG2000. A semi-fragile signature, generated from the normalized host signal, afterwards, is embedded for image authentication. The new system is tested extensively and per formance results are compared to those of methods proposed by other authors. Our new semi-fragile image authentica tion is robust against non-malicious modifications, such as lossy compression, noise, image blurring and sharpening, changes of luminance and contrast as well as scaling, rotation, translation, and shearing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schlauweg, M., Müller, E.: Content-adaptive semi-fragile image authentication based on JPEG2000 compression. In: Proc. of 16th IEEE International Conference on Digital Signal Processing, Santorini, Greeece (2009)

    Google Scholar 

  2. Dong, P., Brankov, J.G., Galatsanos, N.P., Yang, Y., Davoine, F.: Digital watermarking robust to geometric distortions. IEEE Transactions on Image Processing 14(12), 2140–2150 (2005)

    Article  Google Scholar 

  3. Chen, B., Wornell, G.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47(4), 1423–1443 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  4. Pérez-González, F., Mosquera, C., Barni, M., Abrardo, A.: Rational dither modulation: a novel data hiding method robust to value-metric scaling attacks. In: Proc. of 6th IEEE Workshop on Multimedia Signal Processing, Siena, Italy, pp. 139–142 (2004)

    Google Scholar 

  5. Ekici, Ö., Sankur, B., Coşkun, B., Naci, U., Akcay, M.: Comparative evaluation of semifragile watermarking algorithms. Journal of Electronic Imaging 13(1), 209–216 (2004)

    Article  Google Scholar 

  6. Zhu, B.B., Swanson, M.D., Tewfik, A.H.: When seeing isn’t believing. IEEE Transaction on Signal Processing 21, 40–49 (2004)

    Google Scholar 

  7. Rey, C., Dugelay, J.-L.: A survey of watermarking algorithms for image authentication. EURASIP Journal of Applied Signal Processing 6, 613–621 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Schlauweg, M., Müller, E. (2009). RST-Invariant Semi-fragile Image Authentication Based on DWT-Coefficient Quantization. In: Muneesawang, P., Wu, F., Kumazawa, I., Roeksabutr, A., Liao, M., Tang, X. (eds) Advances in Multimedia Information Processing - PCM 2009. PCM 2009. Lecture Notes in Computer Science, vol 5879. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10467-1_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10467-1_55

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10466-4

  • Online ISBN: 978-3-642-10467-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics