Skip to main content

Zero-Distortion Authentication Watermarking

  • Conference paper
Information Security (ISC 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2851))

Included in the following conference series:

Abstract

This paper proposes a zero-distortion authentication watermarking to produce a watermarked signal. Without a designated decoder/player, the watermarked signal can be shown with the same quality as the original one. To this end, the scheme replaces the original signal with its equivalence in the embedding process. As an exemplary application, this concept is employed to authenticate palette images by regulating their palettes. Because the visual appearance of the watermarked image is not modified, there is no need to reconstruct the original image at all. The idea is also used to provide the software integrity protection by re-arranging the software instructions or modules to embed the authentication message. Because the software control flow and data flow remain unchanged, the watermarked software is equivalent to the original software. On the other hand, the instruction positions in the watermarked software represent the authentication message used for verification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing 6(12), 1673–1687 (1997)

    Article  Google Scholar 

  2. Wong, P.W., Memon, N.: Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification. IEEE Transactions on Image Processing 10, 1593–1601 (2001)

    Article  MATH  Google Scholar 

  3. Domingo-Ferrer, J., Sebe, F.: Invertible spread-spectrum watermarking for image authentication and multilevel access to precision-critical watermarked images. In: International Conference on Information Technology: Coding and Computing, pp. 152–157 (2002)

    Google Scholar 

  4. Goljan, M., Fridrich, J., Rui, D.: Distortion-free Data Embedding. In: 4th Information Hiding Workshop (2001)

    Google Scholar 

  5. Fridrich, J., Goljan, M., Rui, D.: Lossless Authentication Watermark for JPEG Images. In: IEEE International Conference on Information Technology: Coding and Computing, pp. 223–227 (2001)

    Google Scholar 

  6. Wu, Y., Xu, C., Bao, F.: Counterfeiting Attack on a Lossless Authentication Watermarking Scheme, ACS series conference in Research and Practice in Information Technology (2002), http://www.i2r.a-star.edu.sg/icsd/

  7. Fridrich, J., Goljan, M., Rui, D.: Lossless Data Embedding - New Paradigm in Digital Watermarking, Special Issue on Emerging Applications of Multimedia Data Hiding, 185–196 (2002)

    Google Scholar 

  8. Tian, J.: Wavelet-based Reversible Watermarking for Authentication, SPIE Security and Watermarking of Multimedia Content IV 4675, 679–690 (2002)

    Google Scholar 

  9. Goljan, M., Rui, D.: Invertible Authentication, SPIE Photonics West, vol. 3971, Security and Watermarking of Multimedia Contents III, 197–208 (2001)

    Google Scholar 

  10. Celik, M., Sharma, G., Tekalp, A.M., Saber, E.: Reversible Data Hiding. In: International Conference on Image Processing (2002)

    Google Scholar 

  11. Celik, M., Sharma, G., Tekalp, A.M., Saber, E.: Localized Lossless Authentication Watermark (LAW). SPIE: Security and Watermarking of Multimedia Contents V 5020(70) (2003)

    Google Scholar 

  12. Kwan, M.: Gifshuffle, http://www.darkside.com.au/gifshuffle/description.html

  13. Fridrich, J., Goljan, M., Rui, D.: Lossless Data Embedding For All Image Formats. SPIE Photonics West, Security and Watermarking of Multimedia Contents, 572–583 (2002)

    Google Scholar 

  14. Yang, Y., Bao, F.: An Invertible Watermarking Schemes for Authentication of Electronic Clinical Brain Atlas, ICASSP, III 533–536 (2003)

    Google Scholar 

  15. Collberg, C., Thomborson, C.: Software Watermarking: Models and Dynamic Embeddings. Principles of Programming Languages (1999)

    Google Scholar 

  16. Palsberg, J., Krishnaswamy, S., Kwon, M., Ma, D., Shao, Q., Zhang, Y.: Experience with Software Watermarking. In: 16th Annual Computer Security Applications Conference, pp. 308–316 (2000)

    Google Scholar 

  17. Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.-J.: Robust Object Watermarking: Application to Code. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 368–378. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  18. Davidson, R.L., Myhrvold, N.: Method and System for Generating and Auditing a Signature for a Computer Program. US Patent 5,559,884, Assignee: Microsoft Corp (1996)

    Google Scholar 

  19. Vleeschouwer, C.D., Delaigle, J.F., Macq, B.: Circular Interpretation of Bijective Transformations in Lossless Watermarking for Media Asset Management. IEEE Trans. on Multimedia 5(1), 97–105 (2003)

    Article  Google Scholar 

  20. CompuServe Incorporated, Graphics Interchange Format (sm), http://members.aol.com/royalef/gif89a.txt

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wu, Y. (2003). Zero-Distortion Authentication Watermarking. In: Boyd, C., Mao, W. (eds) Information Security. ISC 2003. Lecture Notes in Computer Science, vol 2851. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10958513_25

Download citation

  • DOI: https://doi.org/10.1007/10958513_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20176-2

  • Online ISBN: 978-3-540-39981-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics