Skip to main content

Secure Tamper Localization in Binary Document Image Authentication

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3684))

Abstract

In this paper, we propose a novel method for secure tamper localization in binary document images using erasable watermarks. For binary images, watermarking with pixel flipping approach is a difficult task, because it can bring noticeable visual distortion. In localization, finding sufficient number of low-distortion pixels in a block to embed the cryptographic signature and their blind detection is more difficult. Also, an imperceptible watermark cannot be embedded in white regions of the document image, making such regions insecure against hostile attacks. In the proposed new method, an erasable watermark is embedded in each block of a document image independently for secure localization. The embedding process introduces some background noise; however the content in the document can be read or understood by the user, because human vision has the inherent capability to recognize various patterns in the presence of noise. After verifying the content of each block, the exact copy of original image can be restored at the blind detector for further analysis. In the proposed method, the tamper localization accuracy is significantly improved as compared to the method proposed by Kim and Queiroz. Simulation results show that an erasable watermark of necessary data length can be embedded in individual blocks of various document images to attain cryptographic security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Swanson, M.D., Kobayashi, M., Tewfik, A.H.: Multimedia Data-Embedding and Watermarking Technologies. Proc. of the IEEE 86(6) (1998)

    Google Scholar 

  2. Yeung, M., Mintzer, F.: An Invisible Watermarking Technique for Image Verification. In: Proc. IEEE Int. Conf. Image Processing, Santa Barbara, CA, pp. 680–683 (1997)

    Google Scholar 

  3. Wong, P.W.: A Public Key Watermark for Image Verification and Authentication. In: Proc. IEEE Int. Conf. Image Processing, Chicago, IL, pp. 425–429 (1998)

    Google Scholar 

  4. Wu, M., Tang, E., Liu, B.: Data hiding in digital binary images. In: Proc. IEEE Int. Conf. on Multimedia and Expo., New York, July 31-August 2 (2000)

    Google Scholar 

  5. Ho, A.T.S., Puhan, N.B., Marziliano, P., Makur, A., Guan, Y.L.: Perception Based Binary Image Watermarking. In: IEEE International Symposium on Circuits and Systems (ISCAS), Vancouver, Canada, May 23-26 (2004)

    Google Scholar 

  6. Kim, H.Y., de Queiroz, R.L.: Alteration-Locating Authentication Watermarking for Binary Images. In: Proc. Int. Workshop on Digital Watermarking, Seoul. LNCS, vol. 2939 (2004)

    Google Scholar 

  7. Wong, P.: A Watermark for Image Integrity and Ownership Verification. In: Proc. IS&T PIC, Portland, Oregon (1998)

    Google Scholar 

  8. Fridrich, J., Goljan, M., Du, M.: Invertible Authentication. In: Proc. of SPIE, Security and Watermarking of Multimedia Contents (2001)

    Google Scholar 

  9. Holliman, M., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Processing 9(3), 432–441 (2000)

    Article  Google Scholar 

  10. Rivest, R.L.: RFC 1321: The MD5 Message-Digest Algorithm. Internet Activities Board (1992)

    Google Scholar 

  11. Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Processing 10(10) (October 2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Puhan, N.B., Ho, A.T.S. (2005). Secure Tamper Localization in Binary Document Image Authentication. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3684. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11554028_38

Download citation

  • DOI: https://doi.org/10.1007/11554028_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28897-8

  • Online ISBN: 978-3-540-31997-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics