Reference Hub1
Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications

Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications

ISBN13: 9781605668369|ISBN10: 1605668362|EISBN13: 9781605668376
DOI: 10.4018/978-1-60566-836-9.ch008
Cite Chapter Cite Chapter

MLA

Zhao, Xi, and Anthony T.S. Ho. "Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications." Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, edited by Chang-Tsun Li, IGI Global, 2010, pp. 176-203. https://doi.org/10.4018/978-1-60566-836-9.ch008

APA

Zhao, X. & Ho, A. T. (2010). Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications. In C. Li (Ed.), Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions (pp. 176-203). IGI Global. https://doi.org/10.4018/978-1-60566-836-9.ch008

Chicago

Zhao, Xi, and Anthony T.S. Ho. "Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications." In Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, edited by Chang-Tsun Li, 176-203. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-60566-836-9.ch008

Export Reference

Mendeley
Favorite

Abstract

With the tremendous growth and use of digital cameras and video devices, the need to verify the collected digital content for law enforcement applications such as crime scene investigations and traffic violations, becomes paramount if they are to be used as evidence in courts. Semi-fragile watermarking has become increasingly important within the past few years as it can be used to verify the content of images by accurately localising the tampered area and tolerating some non-malicious manipulations. There have been a number of different transforms used for semi-fragile image watermarking. In this chapter, we present two novel transforms for semi-fragile watermarking, using the Slant transform (SLT) as a block-based algorithm and the wavelet-based contourlet transform (WBCT) as a non-block based algorithm. The proposed SLT is compared with existing DCT and PST semi-fragile watermarking schemes. Experimental results using standard test images and simulated law enforcement images indicate that the SLT is more accurate for copy and paste attacks with non-malicious manipulations, such as additive Gaussian noise. For the proposed WBCT method, watermarking embedding is performed by modulating the parent-children relationship in the contourlet domain. Again, experimental results using the same test images have demonstrated that our proposed WBCT method achieves good performances in localising the tampered regions, even when the image has been subjected to non-malicious manipulations such as JPEG/JPEG2000 compressions, Gaussian noise, Gaussian filtering, and contrast stretching. The average miss detection rate is found to be approximately 1% while maintaining an average false alarm rate below 6.5%.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.