Skip to main content

A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication

  • Conference paper
Book cover Digital Watermarking (IWDW 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4283))

Included in the following conference series:

Abstract

This paper proposes a wavelet-based fragile watermarking scheme for secure image authentication. In the proposed scheme, the embedded watermark is generated using the discrete wavelet transform (DWT), and then the improved security watermark by scrambling encryption is embedded into the least significant bit (LSB) of the host image. The proposed algorithm not only possesses excellent tamper localization properties and greater security against many attacks, but also demonstrates a new useful feature that can indicate whether the modification made to the image is on the contents or the embedded watermark. If only the watermark is modified, the authenticity of the image is assured, instead of being declared as a counterfeit. Experimental results illustrate the effectiveness of our method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yeung, M.M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proc. IEEE Int. Conf. Image Processing, vol. 2, pp. 680–683 (1997)

    Google Scholar 

  2. Wong, P.: A public key watermark for image verification and authentication. In: Proc. IEEE Int. Conf. Image Processing, Chicago, IL, pp. 425–429 (1998)

    Google Scholar 

  3. Barreto, P., Kim, H., Rijmen, V.: Toward secure public-key block-wise fragile authentication watermarking. IEE Proceedings-Vision, Image and Signal Processing (149), 57–62 (2002)

    Google Scholar 

  4. Holliman, M., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Processing 9(3), 432–441 (2000)

    Article  Google Scholar 

  5. Fridrich, J.: Security of fragile authentication watermarks with localization. In: Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, pp. 691–700 (January 2002)

    Google Scholar 

  6. Deguillaume, F., Voloshynovskiy, S., Pun, T.: Secure hybrid robust watermarking resistant against tampering and copy attack. Signal Processing 83, 2133–2170 (2003)

    Article  MATH  Google Scholar 

  7. Wong, P., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Processing 10, 1593–1601 (2001)

    Article  MATH  Google Scholar 

  8. Suthaharan, S.: Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognition Letters (25), 1893–1903 (2004)

    Google Scholar 

  9. Yuan, Y., Li, C.-T.: Fragile Watermarking Scheme Exploiting Non-deterministic Block-wise Dependency. In: Proceeding of 17th International Conference on Pattern Recognition (ICPR 2004) (2004)

    Google Scholar 

  10. Justin, K.R., Choi, H., et al.: Bayesian Tree-structured image modeling using wavelet-domain hidden markov models. IEEE Transactions on Image Processing 10(7), 1056–1068 (2001)

    Article  Google Scholar 

  11. Gonzalez, R.C., Woods, R.E.: Digital image processing, 2nd edn. Publishing House of Electronics Industry, Beijing (2003) (in Chinese)

    Google Scholar 

  12. Yuqi, L.: The Theory of Probability and Statistics. National Defense Industry Press, Beijing (2001) (in Chinese)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

He, H., Zhang, J., Tai, HM. (2006). A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication. In: Shi, Y.Q., Jeon, B. (eds) Digital Watermarking. IWDW 2006. Lecture Notes in Computer Science, vol 4283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_34

Download citation

  • DOI: https://doi.org/10.1007/11922841_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48825-5

  • Online ISBN: 978-3-540-48827-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics