Skip to main content

Content-Based Watermarking for Image Authentication

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1768))

Abstract

This paper is focused on digital image authentication, considered as the process of evaluating the integrity of image contents relatively to the original picture and of being able to detect, in an automatic way, malevolent content modifications. A computationally efficient watermarking technique for image authentication, robust to small distortions caused by compression is proposed and described. In essence, a content-dependent authentication data is embedded into the picture by exploiting the rank order relationship of image projections throughout the entire image. The viability of the proposed method as a means of protecting the content is assessed under JPEG compression and semantic content modifications.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Trans. on Information Theory 22(6), 644–654 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  2. Friedman, G.L.: The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image. IEEE Transactions on Consumer Electronics 39(4), 905–910 (1993)

    Article  Google Scholar 

  3. Fridrich, J.: Image Watermarking for Tamper Detection. In: Proc. ICIP, September 1998, pp. 404–408 (1998)

    Google Scholar 

  4. Kundur, D., Hatzinakos, D.: Towards a Telltale Watermarking Technique for Tamper-Proofing. In: Proc. ICIP, September 1998, pp. 409–413 (1998)

    Google Scholar 

  5. Lin, C.-Y., Chang, S.-F.: A Robust Image Authentication Method Surviving JPEG Lossy Compression. In: Proc. of IS&T/SPIE Symposium on Electronics Imaging, San Jose, USA (January 1998)

    Google Scholar 

  6. Queluz, M.P.: Towards Robust, Content Based Techniques for Image Authentication. In: Proc. IEEE 2nd– Worshop on Multimedia Signal Processing, Los Angeles, CA, December 1998, pp. 297–302 (1998)

    Google Scholar 

  7. Queluz, M.P.: Content-based Integrity Protection of Digital Images. In: Proc. SPIE - Security and Watermarking of Multimedia Contents, San Jose, CA, January 1999, pp. 85–93 (1999)

    Google Scholar 

  8. Schneider, M., Chang, S.-F.: A Robust Content Based Digital Signature for Image Authentication. In: Proc. ICIP, September 1996, pp. 227–230 (1996)

    Google Scholar 

  9. Xie, L., Arce, G.: Joint Wavelet Compression and Authentication Watermarking. In: Proc. ICIP, October 1998, pp. 427–431 (1998)

    Google Scholar 

  10. Xie, L., Arce, G.: A Blind Wavelet Based Digital Signature for Image Authentication. In: Proc. EUSIPCO (September 1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lamy, P., Martinho, J., Rosa, T., Queluz, M.P. (2000). Content-Based Watermarking for Image Authentication. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_14

Download citation

  • DOI: https://doi.org/10.1007/10719724_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67182-4

  • Online ISBN: 978-3-540-46514-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics