skip to main content
research-article

A generalized tamper localization approach for reversible watermarking algorithms

Published:03 July 2013Publication History
Skip Abstract Section

Abstract

In general reversible watermarking algorithms, the convention is to reject the entire cover image at the receiver end if it fails authentication, since there is no way to detect the exact locations of tampering. This feature may be exploited by an adversary to bring about a form of DoS attack. Here we provide a solution to this problem in form of a tamper localization mechanism for reversible watermarking algorithms, which allows selective rejection of distorted cover image regions in case of authentication failure, thus avoiding rejection of the complete image. Additionally it minimizes the bandwidth requirement of the communication channel.

References

  1. Bausys, R. and Kriukovas, A. 2006. Reversible watermarking scheme for image authentication in frequency domain. In Proceedings of the 48th International Symposium on Multimedia Signal Processing and Communications (ELMAR'06). 53--56.Google ScholarGoogle Scholar
  2. Bhaskaran, V. and Konstantinides, K. 1995. Image and Video Compression Standards: Algorithms and Applications 2nd Ed., Kluwer, Norwell, MA.Google ScholarGoogle Scholar
  3. Celik, M. U., Sharma, G., Tekalp, A. M., and Saber, E. 2005. Lossless generalized-lsb data embedding. IEEE Trans. Image Process. 14, 253--266. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., and Kalker, T. 2008. Digital Watermarking and Steganography. Morgan Kaufmann Publishers, San Fransisco, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Crystal, T. H., Nielsen, A. S., and Marsh, E. 2002. Speech in noisy environments (spine) adds new dimension to speech recognition R and D. In Proceedings of the 2nd International Conference on Human Language Technology Research. 212--216. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cvg--Ugr Image Database. Computer vision group, University of Granada. http://decsai.ugr.es/cvg/dbimagenes/.Google ScholarGoogle Scholar
  7. Elias, P. 1995. Coding for noisy channelss. IRE Convention Rec. 3, 37--46.Google ScholarGoogle Scholar
  8. Feng, J. B., Lin, I. C., Tsai, C. S., and Chu, Y. P. 2006. Reversible watermarking: Current status and key issues. Int. J. Netw. Secur. 2, 161--171.Google ScholarGoogle Scholar
  9. Hu, Y., Lee, H. K., and Li, J. 2009. DE--based reversible data hiding with improved overflow location map. IEEE Trans. Circ. Syst. Video Technol. 19, 250--260. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Lee, S., Suh, Y., and Ho, Y. 2006. Reversible image authentication based on watermarking. In Proceedings of the IEEE International Conference on Multimedia and Expo (ICME'06). 1321--1324.Google ScholarGoogle Scholar
  11. Lin, S. and Costello, D. J. 2004. Error Control Coding 2nd Ed., Prentice Hall. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Luo, L., Chen, Z., Chen, M., Zeng, X., and Xiong, Z. 2010. Rreversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Secur. 5, 187--193. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Ni, Z., Shi, Y. Q., Ansari, N., and Su, W. 2006. Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol. 16, 354--362. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Playboy Magazine. 1972. Lena image. Playboy.Google ScholarGoogle Scholar
  15. Reed, A. and Hopkinson, J. N. 1990. Data transmission system with automatic repeat request. U.S. Patent No. 4939731.Google ScholarGoogle Scholar
  16. Rivest, R. 1992. The MD5 message--digest algorithm. Network Working Group, Request for Comments (RFC) 1321. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Singh, R., Seltzer, M. L., Raj, B., and Stern, R. M. 2001. Speech in noisy environments: Robust automatic segmentation, feature extraction, and hypothesis combination. In Proceedings of the IEEE Conference on Acoustics, Speech and Signal Processing. 273--276.Google ScholarGoogle Scholar
  18. Sobolewski, J. 2003. Cyclic redundancy check. In Encyclopedia of Computer Science, John Wiley and Sons Ltd.Google ScholarGoogle Scholar
  19. Tian, J. 2003. Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video Technol. 13, 890--896. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Tsai, H. M. and Chang, L. W. 2010. Secure reversible visible image watermarking with authentication. Signal Process. Image Comm. 25, 10--17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Wang, N. and Men, C. 2012. Reversible fragile watermarking for 2--D vector map authentication with localization. Comput.-Aided Des. 44, 320--330. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Weng, S., Zhao, Y., Pan, J. S., and Ni, R. 2007. A novel reversible watermarking based on an integer transform. In Proceedings of the International Conference on Image Processing. 241--244.Google ScholarGoogle Scholar
  23. Wu, X. 2007. Reversible semi--fragile watermarking based on histogram shifting of integer wavelet coefficients. In Proceedings of the Inaugural IEEE-IES Digital EcoSystems and Technologies Conference (DEST'07). 501--505.Google ScholarGoogle ScholarCross RefCross Ref
  24. Yan, Y., Cao, W., and Li, S. 2009. High capacity reversible image authentication based on difference image watermarking. In Proceedings of the IEEE International Workshop on Imaging Systems and Techniques. 183--186.Google ScholarGoogle Scholar
  25. Yang, B., Schmucker, M., Funk, W., Busch, C., and Sun, S. 2004. Integer dct--based reversible watermarking technique for images using companding technique. Proc. SPIE. 5306, 405--415.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A generalized tamper localization approach for reversible watermarking algorithms

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM Transactions on Multimedia Computing, Communications, and Applications
              ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 9, Issue 3
              June 2013
              121 pages
              ISSN:1551-6857
              EISSN:1551-6865
              DOI:10.1145/2487268
              Issue’s Table of Contents

              Copyright © 2013 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 3 July 2013
              • Accepted: 1 January 2013
              • Revised: 1 November 2012
              • Received: 1 July 2012
              Published in tomm Volume 9, Issue 3

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader