Abstract
This paper proposes a wavelet-based fragile watermarking scheme for secure image authentication. In the proposed scheme, the embedded watermark is generated using the discrete wavelet transform (DWT), and then the improved security watermark by scrambling encryption is embedded into the least significant bit (LSB) of the host image. The proposed algorithm not only possesses excellent tamper localization properties and greater security against many attacks, but also demonstrates a new useful feature that can indicate whether the modification made to the image is on the contents or the embedded watermark. If only the watermark is modified, the authenticity of the image is assured, instead of being declared as a counterfeit. Experimental results illustrate the effectiveness of our method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Yeung, M.M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proc. IEEE Int. Conf. Image Processing, vol. 2, pp. 680–683 (1997)
Wong, P.: A public key watermark for image verification and authentication. In: Proc. IEEE Int. Conf. Image Processing, Chicago, IL, pp. 425–429 (1998)
Barreto, P., Kim, H., Rijmen, V.: Toward secure public-key block-wise fragile authentication watermarking. IEE Proceedings-Vision, Image and Signal Processing (149), 57–62 (2002)
Holliman, M., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Processing 9(3), 432–441 (2000)
Fridrich, J.: Security of fragile authentication watermarks with localization. In: Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, pp. 691–700 (January 2002)
Deguillaume, F., Voloshynovskiy, S., Pun, T.: Secure hybrid robust watermarking resistant against tampering and copy attack. Signal Processing 83, 2133–2170 (2003)
Wong, P., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Processing 10, 1593–1601 (2001)
Suthaharan, S.: Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognition Letters (25), 1893–1903 (2004)
Yuan, Y., Li, C.-T.: Fragile Watermarking Scheme Exploiting Non-deterministic Block-wise Dependency. In: Proceeding of 17th International Conference on Pattern Recognition (ICPR 2004) (2004)
Justin, K.R., Choi, H., et al.: Bayesian Tree-structured image modeling using wavelet-domain hidden markov models. IEEE Transactions on Image Processing 10(7), 1056–1068 (2001)
Gonzalez, R.C., Woods, R.E.: Digital image processing, 2nd edn. Publishing House of Electronics Industry, Beijing (2003) (in Chinese)
Yuqi, L.: The Theory of Probability and Statistics. National Defense Industry Press, Beijing (2001) (in Chinese)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
He, H., Zhang, J., Tai, HM. (2006). A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication. In: Shi, Y.Q., Jeon, B. (eds) Digital Watermarking. IWDW 2006. Lecture Notes in Computer Science, vol 4283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_34
Download citation
DOI: https://doi.org/10.1007/11922841_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48825-5
Online ISBN: 978-3-540-48827-9
eBook Packages: Computer ScienceComputer Science (R0)