Abstract
In this paper, we propose a novel method for secure tamper localization in binary document images using erasable watermarks. For binary images, watermarking with pixel flipping approach is a difficult task, because it can bring noticeable visual distortion. In localization, finding sufficient number of low-distortion pixels in a block to embed the cryptographic signature and their blind detection is more difficult. Also, an imperceptible watermark cannot be embedded in white regions of the document image, making such regions insecure against hostile attacks. In the proposed new method, an erasable watermark is embedded in each block of a document image independently for secure localization. The embedding process introduces some background noise; however the content in the document can be read or understood by the user, because human vision has the inherent capability to recognize various patterns in the presence of noise. After verifying the content of each block, the exact copy of original image can be restored at the blind detector for further analysis. In the proposed method, the tamper localization accuracy is significantly improved as compared to the method proposed by Kim and Queiroz. Simulation results show that an erasable watermark of necessary data length can be embedded in individual blocks of various document images to attain cryptographic security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Swanson, M.D., Kobayashi, M., Tewfik, A.H.: Multimedia Data-Embedding and Watermarking Technologies. Proc. of the IEEEÂ 86(6) (1998)
Yeung, M., Mintzer, F.: An Invisible Watermarking Technique for Image Verification. In: Proc. IEEE Int. Conf. Image Processing, Santa Barbara, CA, pp. 680–683 (1997)
Wong, P.W.: A Public Key Watermark for Image Verification and Authentication. In: Proc. IEEE Int. Conf. Image Processing, Chicago, IL, pp. 425–429 (1998)
Wu, M., Tang, E., Liu, B.: Data hiding in digital binary images. In: Proc. IEEE Int. Conf. on Multimedia and Expo., New York, July 31-August 2 (2000)
Ho, A.T.S., Puhan, N.B., Marziliano, P., Makur, A., Guan, Y.L.: Perception Based Binary Image Watermarking. In: IEEE International Symposium on Circuits and Systems (ISCAS), Vancouver, Canada, May 23-26 (2004)
Kim, H.Y., de Queiroz, R.L.: Alteration-Locating Authentication Watermarking for Binary Images. In: Proc. Int. Workshop on Digital Watermarking, Seoul. LNCS, vol. 2939 (2004)
Wong, P.: A Watermark for Image Integrity and Ownership Verification. In: Proc. IS&T PIC, Portland, Oregon (1998)
Fridrich, J., Goljan, M., Du, M.: Invertible Authentication. In: Proc. of SPIE, Security and Watermarking of Multimedia Contents (2001)
Holliman, M., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Processing 9(3), 432–441 (2000)
Rivest, R.L.: RFC 1321: The MD5 Message-Digest Algorithm. Internet Activities Board (1992)
Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Processing 10(10) (October 2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Puhan, N.B., Ho, A.T.S. (2005). Secure Tamper Localization in Binary Document Image Authentication. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3684. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11554028_38
Download citation
DOI: https://doi.org/10.1007/11554028_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28897-8
Online ISBN: 978-3-540-31997-9
eBook Packages: Computer ScienceComputer Science (R0)