Skip to main content

Invertible Watermarking Scheme for Authentication and Integrity

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3768))

Abstract

In this paper, we propose a new method for authentication, integrity and invertibility of digital images using invertible watermarking. While all watermarking schemes introduce some small amount of non-invertible distortion in the image, the new method is invertible in the sense that, if the image is deemed authentic, the distortion on the extraction procedure can be removed to obtain the original image data. Authentication data is produced from XOR operation between watermark signal and binary bits obtained from a hash function of one block image. If the unmodified watermarked image is used, the extraction process will return the correct watermark signal and exact original image The techniques provide new assurance tools for integrity protection of sensitive imagery such as medical images

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing 6(12), 1673–1687 (1997)

    Article  Google Scholar 

  2. Yeung, M., Mintzer, F.: An Invisible Watermarking Technique for Image Verification. In: Proc. ICIP, Santa Barbara, CA, vol. 2, pp. 680–683 (1997)

    Google Scholar 

  3. Memon, N., Shende, S., Wong, P.: On the Security of the Yeung-Mintzer Authentication Watermark. In: Proc. Of the IS and TPICS Symposium, Savannah, Georgia (2000)

    Google Scholar 

  4. Wong, P., Memon, N.: Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification. IEEE Trans. on Image Processing 10, 1593–1601 (2001)

    Article  MATH  Google Scholar 

  5. Byun, S., Lee, S., Tewfik, A., Ahn, B.: A SVD-Based Fragile Watermarking Scheme for Image Authentication. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, pp. 170–178. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Fridrich, J., Goljan, M., Rui, D.: Lossless Data Embedding For All Image Formats. SPIE Photonics West, Security and Watermarking of Multimedia Contents, 572–583 (2002)

    Google Scholar 

  7. Barton, J.M.: Method and apparatus for embedding authentication information within digital data. United States Patent 5, 646–997 (1997)

    Google Scholar 

  8. Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Reversible data hiding. In: Proc. of International Conference on Image Processing, vol. II, September 2002, pp. 157–160 (2002)

    Google Scholar 

  9. Fridrich, J., Goljan, M., Du., R.: Lossless data embedding - new paradigm in digital watermarking. EURASIP Journal on Applied Signal Processing, 185–196 (February 2002)

    Google Scholar 

  10. Yang, Y., Bao, F.: An Invertible Watermarking Schemes for Authentication of Electronic Clinical Brain Atlas. In: ICASSP (2003)

    Google Scholar 

  11. Goljan, M., Fridrich, J.J., Du, R.: Distortion-Free Data Embedding for Images. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 27–41. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  12. Rivest, R.L.: The MD5 message digest algorithm, Tech. Rep. (1992)

    Google Scholar 

  13. Katzenbeisser, S., Fabien, A.P.: Petttcolas: Information hiding techniques for steg-anography and digital watermarking, pp. 128–129. Artech House, Boston (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yoo, KS., Kim, MA., Lee, WH. (2005). Invertible Watermarking Scheme for Authentication and Integrity. In: Ho, YS., Kim, HJ. (eds) Advances in Multimedia Information Processing - PCM 2005. PCM 2005. Lecture Notes in Computer Science, vol 3768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11582267_33

Download citation

  • DOI: https://doi.org/10.1007/11582267_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30040-3

  • Online ISBN: 978-3-540-32131-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics