Skip to main content
Log in

A digital authentication watermarking scheme for JPEG images with superior localization and security

  • Published:
Science in China Series F: Information Sciences Aims and scope Submit manuscript

Abstract

The drawbacks of the current authentication watermarking schemes for JPEG images, which are inferior localization and the security flaws, are firstly analyzed in this paper. Then, two counterferiting attacks are conducted on them. To overcome these drawbacks, a new digital authentication watermarking scheme for JPEG images with superior localization and security is proposed. Moreover, the probabilities of tamper detection and false detection are deduced under region tampering and collage attack separately. For each image block, the proposed scheme keeps four middle frequency points fixed to embed the watermark, and utilizes the rest of the DCT coefficients to generate 4 bits of watermark information. During the embedding process, each watermark bit is embedded in another image block that is selected by its corresponding secret key. Since four blocks are randomly selected for the watermark embedding of each block, the non-deterministic dependence among the image blocks is established so as to resist collage attack completely. At the receiver, according to judging of the extracted 4 bits of watermark information and the corresponding 9-neighbourhood system, the proposed scheme could discriminate whether the image block is tampered or not. Owing to the diminishing of false detection and the holding of tamper detection, we improve the accuracy of localization in the authentication process. Theoretic analysis and simulation results have proved that the proposed algorithm not only has superior localization, but also enhances the systematic security obviously.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Cox I J, Miller M L. Review of watermarking and the importance of perceptual modeling. In: Bernice E R, Thrasyvoulos N P, eds. Human Vision and Electronic Imaging II, Vol. 3016. Bellingham: SPIE Press, 1997. 92–99

    Google Scholar 

  2. Liu R Z, Tan T N. Watermarking for digital images. In: Proceedings of ICSP’98, Beijing, China, February. 1998. 944–947

  3. Sun Z W, Feng D G. A multiplicative watermark detection algorithm for digital images in the DCT Domains. J Softw, 2005, 16(10): 1798–1804

    Article  Google Scholar 

  4. Jin C, Peng J X. A robust detection method of blind digital watermark based on image projective sequence. J Softw, 2005, 16(2): 295–302

    Article  MathSciNet  Google Scholar 

  5. Ho C K, Li C T. Semi-fragile watermarking scheme for authentication of JPEG images. In: Proceedings of ITCC’2004, 2004, 2: 7–11

    Google Scholar 

  6. Lin C Y, Chang S F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans Circ Syst Video Tech, 2001, 11(2): 153–168

    Article  MathSciNet  Google Scholar 

  7. Li C-T. Digital fragile watermarking scheme for authentication of JPEG images. IEE Proceedings-Vision, Image, and Signal Processing, December, 2004, 460–466

  8. Fridrich J, Goljan M, Du R. Invertible authentication watermark for JPEG images. In: Proceedings of ITCC’2001, Las Vegas, NV, USA, April, 2001. 446–449

  9. Matthew H, Nasir M. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. on Image Processing, March, 2000. 432–441

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu Miao.

Additional information

Supported by the National Natural Science Foundation of China (Grant No. 60572027), the Program for New Century Excellent Talents in University of China (Grant No. NCET-05-0794), the Sichuan Youth Science & Technology Foundation (Grant No. 03ZQ026-033), the National Defense Pre-research Foundation of China (Grant No. 51430804QT2201) and the Application Basic Foundation of Sichuan Province, China (Grant No. 2006 J13-10)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yu, M., He, H. & Zhang, J. A digital authentication watermarking scheme for JPEG images with superior localization and security. SCI CHINA SER F 50, 491–509 (2007). https://doi.org/10.1007/s11432-007-0024-7

Download citation

  • Received:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-007-0024-7

Keywords

Navigation