Advertisement

Semi Fragile Watermarking Based on Wavelet Transform

  • Y. Nakai
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2195)

Abstract

Watermarking schemes are traditionally classified into two classes, robust watermarking and fragile watermarking. Recently a third type of watermarking called semi fragile watermarking has been proposed. Using semi fragile watermarking a user can determine whether the image is tampered with or not for individual applications. For this purpose semi fragile watermarking should indicate the degree of tampering correctly. Most semi fragile watermarking schemes can indicate the position of tampering for localized alteration. Most of them, however, cannot indicate the degree correctly for lossy compression such as JPEG, since lossy compression changes almost all pixels’ values. In this paper we will propose a new semi fragile watermarking technique based on the wavelet transform. The proposed scheme embeds multi-valued watermarks to wavelet coefficients for evaluating the degree of tampering for each pixel. It is proven that the proposed scheme can evaluate the degree of JPEG correctly for a wide range of SN ratios.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    S. Bhattacharjee, M. Kutter: Compression Tolerant Image Authentication. Proc. of IEEE Int. Conf. On Image Processing, Chicago, Illinois, Vol. 1, pp. 435–439, October 1998.Google Scholar
  2. 2.
    E. T. Lin, C. I. Podilchuk, and E. J. Delp: Detection of Image Alterations Using Semi-Fragile Watermarks. Proc. of the SPIE International Conference on Security and Watermarking of Multimedia Contents II, Vol. 3971, January 23–28, 2000, San Jose, CA.Google Scholar
  3. 3.
    R. B. Wolfgang and E. J. Delp: Fragile Watermarking Using the VW2D Watermark. Proc. of the SPIE/IS& T International Conference on Security and Watermarking of Multimedia Contents, Vol. 3657, January 25–27, 1999, San Jose, CA, pp. 204–213.Google Scholar
  4. 4.
    D. Kundur and D. Hatzinakos: Towards a Telltale Watermarking Technique for Tamper-Proofing. Proc. IEEE Int. Conf. On Image Processing, Chicago, Illinois,Vol. 2, pp. 409-13, October 1998.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Y. Nakai
    • 1
  1. 1.Akashi College of TechnologyAkashi, HyogoJAPAN

Personalised recommendations