Abstract
In general reversible watermarking algorithms, the convention is to reject the entire cover image at the receiver end if it fails authentication, since there is no way to detect the exact locations of tampering. This feature may be exploited by an adversary to bring about a form of DoS attack. Here we provide a solution to this problem in form of a tamper localization mechanism for reversible watermarking algorithms, which allows selective rejection of distorted cover image regions in case of authentication failure, thus avoiding rejection of the complete image. Additionally it minimizes the bandwidth requirement of the communication channel.
- Bausys, R. and Kriukovas, A. 2006. Reversible watermarking scheme for image authentication in frequency domain. In Proceedings of the 48th International Symposium on Multimedia Signal Processing and Communications (ELMAR'06). 53--56.Google Scholar
- Bhaskaran, V. and Konstantinides, K. 1995. Image and Video Compression Standards: Algorithms and Applications 2nd Ed., Kluwer, Norwell, MA.Google Scholar
- Celik, M. U., Sharma, G., Tekalp, A. M., and Saber, E. 2005. Lossless generalized-lsb data embedding. IEEE Trans. Image Process. 14, 253--266. Google ScholarDigital Library
- Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., and Kalker, T. 2008. Digital Watermarking and Steganography. Morgan Kaufmann Publishers, San Fransisco, CA. Google ScholarDigital Library
- Crystal, T. H., Nielsen, A. S., and Marsh, E. 2002. Speech in noisy environments (spine) adds new dimension to speech recognition R and D. In Proceedings of the 2nd International Conference on Human Language Technology Research. 212--216. Google ScholarDigital Library
- Cvg--Ugr Image Database. Computer vision group, University of Granada. http://decsai.ugr.es/cvg/dbimagenes/.Google Scholar
- Elias, P. 1995. Coding for noisy channelss. IRE Convention Rec. 3, 37--46.Google Scholar
- Feng, J. B., Lin, I. C., Tsai, C. S., and Chu, Y. P. 2006. Reversible watermarking: Current status and key issues. Int. J. Netw. Secur. 2, 161--171.Google Scholar
- Hu, Y., Lee, H. K., and Li, J. 2009. DE--based reversible data hiding with improved overflow location map. IEEE Trans. Circ. Syst. Video Technol. 19, 250--260. Google ScholarDigital Library
- Lee, S., Suh, Y., and Ho, Y. 2006. Reversible image authentication based on watermarking. In Proceedings of the IEEE International Conference on Multimedia and Expo (ICME'06). 1321--1324.Google Scholar
- Lin, S. and Costello, D. J. 2004. Error Control Coding 2nd Ed., Prentice Hall. Google ScholarDigital Library
- Luo, L., Chen, Z., Chen, M., Zeng, X., and Xiong, Z. 2010. Rreversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Secur. 5, 187--193. Google ScholarDigital Library
- Ni, Z., Shi, Y. Q., Ansari, N., and Su, W. 2006. Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol. 16, 354--362. Google ScholarDigital Library
- Playboy Magazine. 1972. Lena image. Playboy.Google Scholar
- Reed, A. and Hopkinson, J. N. 1990. Data transmission system with automatic repeat request. U.S. Patent No. 4939731.Google Scholar
- Rivest, R. 1992. The MD5 message--digest algorithm. Network Working Group, Request for Comments (RFC) 1321. Google ScholarDigital Library
- Singh, R., Seltzer, M. L., Raj, B., and Stern, R. M. 2001. Speech in noisy environments: Robust automatic segmentation, feature extraction, and hypothesis combination. In Proceedings of the IEEE Conference on Acoustics, Speech and Signal Processing. 273--276.Google Scholar
- Sobolewski, J. 2003. Cyclic redundancy check. In Encyclopedia of Computer Science, John Wiley and Sons Ltd.Google Scholar
- Tian, J. 2003. Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video Technol. 13, 890--896. Google ScholarDigital Library
- Tsai, H. M. and Chang, L. W. 2010. Secure reversible visible image watermarking with authentication. Signal Process. Image Comm. 25, 10--17. Google ScholarDigital Library
- Wang, N. and Men, C. 2012. Reversible fragile watermarking for 2--D vector map authentication with localization. Comput.-Aided Des. 44, 320--330. Google ScholarDigital Library
- Weng, S., Zhao, Y., Pan, J. S., and Ni, R. 2007. A novel reversible watermarking based on an integer transform. In Proceedings of the International Conference on Image Processing. 241--244.Google Scholar
- Wu, X. 2007. Reversible semi--fragile watermarking based on histogram shifting of integer wavelet coefficients. In Proceedings of the Inaugural IEEE-IES Digital EcoSystems and Technologies Conference (DEST'07). 501--505.Google ScholarCross Ref
- Yan, Y., Cao, W., and Li, S. 2009. High capacity reversible image authentication based on difference image watermarking. In Proceedings of the IEEE International Workshop on Imaging Systems and Techniques. 183--186.Google Scholar
- Yang, B., Schmucker, M., Funk, W., Busch, C., and Sun, S. 2004. Integer dct--based reversible watermarking technique for images using companding technique. Proc. SPIE. 5306, 405--415.Google ScholarCross Ref
Index Terms
- A generalized tamper localization approach for reversible watermarking algorithms
Recommendations
Block-based Reversible Fragile Watermarking for 2D Vector Map Authentication
In this paper, the authors propose a block-based reversible watermarking method for 2D vector map authentication. In the scheme, they divide the features of a vector map into different categories of blocks, calculate an authentication watermark for each ...
Reversible fragile watermarking for 2-D vector map authentication with localization
A 2-D vector map is very important data in the surveying and mapping fields. It is considered to be content for which verification of integrity and authenticity are urgently required. Several reversible fragile watermarking schemes based on lossless ...
Prediction Error Expansion (PEE) based Reversible polygon mesh watermarking scheme for regional tamper localization
AbstractThis paper proposes a block based semi-fragile reversible authentication scheme that achieves regional localization for different classes of geometry and topology based mesh attacks. First of all, the model bounding volume is spatially partitioned ...
Comments