Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Secure private fragile watermarking scheme with improved tampering localisation accuracy

Secure private fragile watermarking scheme with improved tampering localisation accuracy

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In some applications, such as surveillance cameras, it is essential that images acquired with the same device be deemed distinct. To fulfil this requirement, many fragile watermarking methods need to employ a different key for every single image. Keeping track of the correct key associated with each image may become a challenging task as the number of images increases. An existing image index-based scheme as a suitable solution for this problem is revisited, and its security limitations in applications are highlighted where higher localisation accuracy is required. Then, a new fragile watermarking scheme that enhances the localisation accuracy is proposed, while hindering brute force attacks. Experiments demonstrate that the proposed scheme outperforms the state-of-the-art private fragile watermarking methods.

References

    1. 1)
      • Zeng, W., Liu, B., Lei, S.: `Extraction of multiresolution watermark images for resolving rightful ownership', Proc. SPIE – Security and Watermarking of Multimedia Contents, 1999, 3657, p. 404–414.
    2. 2)
      • M.H. DeGroot , M.J. Schervish . (2001) Probability and statistics.
    3. 3)
      • M.U. Celik , G. Sharma , E. Saber , A.M. Tekalp . Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. , 6 , 585 - 595
    4. 4)
      • Fridrich, J.: `Security of fragile authentication watermarks with localization', Proc. SPIE – The Int. Society for Optical Engineering, 2002, CA, USA, 4675, p. 691–700.
    5. 5)
      • M. Holliman , N. Memon . Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process. , 3 , 432 - 441
    6. 6)
      • B. Schneier . (1996) Applied cryptography: protocols, algorithms, and source code in C.
    7. 7)
      • C.T. Li , H. Si . Wavelet-based fragile watermarking scheme for image authentication. J. Electron. Imaging , 1 , 1 - 9
    8. 8)
      • Ouda, A.H., El-Sakka, M.R.: `Localization and security enhancement of block-based image authentication', Proc. ICIP – IEEE Int. Conf. on Image Processing, 2005, p. 673–676.
    9. 9)
      • N. Memon , P.W. Wong . A buyer-seller watermarking protocol. IEEE Trans. Image Process. , 4 , 643 - 649
    10. 10)
      • B.B. Zhu , M.D. Swanson , A.H. Tewfik . When seeing isn't believing. IEEE Signal Process. Mag. , 2 , 40 - 49
    11. 11)
      • S. Suthaharan . Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognit. Lett. , 16 , 1893 - 1903
    12. 12)
      • I.J. Cox , M.L. Miller , J.A. Bloom , J. Fridrich , T. Kalker . (2008) Digital watermarking and steganography.
    13. 13)
      • He, H., Zhang, J., Tai, H.M.: `A wavelet-based fragile watermarking scheme for secure image authentication', Proc. IWDW – Int. Workshop on Digital Watermarking, NCS, 2006, 4283, p. 422–432.
    14. 14)
      • Barreto, P.S.L.M., Kim, H.Y., Rijmen, V.: `Toward secure public-key blockwise fragile authentication watermarking', IEE Proc. Vision, Image and Signal Processing, 2002, 149, p. 57–62.
    15. 15)
      • P.L. Lin , C.K. Hsieh , P.W. Huang . A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognit. , 12 , 2519 - 2529
    16. 16)
      • Secure Hash Standard. Washington: National Institute of Standards and Technology; 2002. Federal Information Processing Standard 180-2. Available from: http://csrc.nist.gov/publications/fips/.
    17. 17)
      • Fridrich, J., Goljan, M., Baldoza, A.C.: `New fragile authentication watermark for images', Proc. ICIP – IEEE Int. Conf. on Image Processing, 2000, Vancouver, BC, 1, p. 446–449.
    18. 18)
      • C. Rey , J.L. Dugelay . A survey of watermarking algorithms for image authentication. Eurasip J. Appl. Signal Process. , 6 , 613 - 621
    19. 19)
      • Kundur, D., Hatzinakos, D.: `Towards a telltale watermarking technique for tamper-proofing', Proc. ICIP – IEEE Int. Conf. on Image Processing, 1998, Chicago, IL, USA, 2, p. 409–413.
    20. 20)
      • M.U. Celik , G. Sharma , A.M. Tekalp . Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans. Image Process. , 4 , 1042 - 1049
    21. 21)
      • Ouda, A.H., El-Sakka, M.R.: `A practical version of wong's watermarking technique', Proc. ICIP Int. Conf. on Image Processing, 2004, p. 2615–2618.
    22. 22)
      • Fridrich, J., Goljan, M., Memon, N.: `Further attacks on Yeung–Mintzer fragile watermarking scheme', Proc. SPIE – The Int. Society for Optical Engineering, 2000, CA, USA, 3971, p. 428–437.
    23. 23)
      • Bravo, S., Gan, L., Nandi, A.K., Aburdene, M.F.: `Fragile logo watermarking for public authentication', Proc. ICASSP – IEEE Int. Conf. on Acoustics, Speech and Signal Processing, 2008, Las Vegas, NV, USA, p. 1669–1672.
    24. 24)
      • Celik, M.U., Sharma, G., Saber, E., Takalp, A.M.: `A hierarchical image authentication watermark with improved localization and security', Proc. IEEE Int. Conf. on Image Processing, 2001, 2, p. 502–505.
    25. 25)
      • P.W. Wong , N. Memon . Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. , 10 , 1593 - 1601
    26. 26)
      • Wu, M., Liu, B.: `Watermarking for image authentication', IEEE Int. Conf. on Image Processing, 1998, Chicago, IL, USA, 2, p. 437–441.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2009.0141
Loading

Related content

content/journals/10.1049/iet-ifs.2009.0141
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address