Nothing Special   »   [go: up one dir, main page]

Skip to main content

We’re sorry, something doesn't seem to be working properly.

Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Log in

Secure authentication watermarking for localization against the Holliman–Memon attack

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

Authentication watermarking schemes using block-wise watermarks for tamper localization are vulnerable to the Holliman–Memon attack. In this paper, we propose a novel method based on the Wong’s localization scheme (Proceedings of the IS&T PIC, Portland) to resist this attack. A unique image index scheme is used for computing the authentication signature that is embedded in the least significant bit-plane of the block. The informed detector estimates the correct image index by using the side information about the watermarked image. The image index estimation from the fake image can definitely be an alternative to keeping a directory of image indices. So it is not necessary to manage the database of image indices for the verification purpose. The authenticity measure is defined to quantify the attack severity by taking the connectivity among possible authentic blocks into consideration. There are more blocks verified as authentic when this measure is high for a fake image constructed using this attack. As such, the blocks for a fake image can be chosen from a reduced number of database images. The blocks from any such image are to be connected with each other to maximize the authenticity measure. Thus, the attacker’s task to generate a fake image of reasonable perceptual quality becomes increasingly difficult. With the proposed method there is no loss or ambiguity in localization after the Holliman–Memon attack and content tampering in an image. The localization accuracy in the proposed method is demonstrated by the simulation results and is equal to the chosen block size, similar to the Wong’s scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Swanson M.D., Kobayashi M., Tewfik A.H. (1998) Multimedia data-embedding and watermarking technologies. Proc. IEEE 86(6): 1064–1087

    Article  Google Scholar 

  2. Cox I.J., Miller M.L. (1999) A review of watermaking and the importance of perceptual modeling. Proc. SPIE 3016: 92–99

    Article  Google Scholar 

  3. Menezes A., van Oorchot P., Vanstone S. (1997) Handbook of Applied Cryptography. CRC, Boca Raton, FL

    MATH  Google Scholar 

  4. Wong, P.: A Watermark for image integrity and ownership verification. In: Proceedings at the IS& T PIC, Portland, OR (1998)

  5. Wong, P.: A public key watermark for image verification and authentication. In: Proceedings at the IEEE International Conference Image Processing, Chicago, pp. 425–429 (1998)

  6. Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proc. IEEE International Confernece Image Processing, Santa Barbara, pp. 680–683 (1997)

  7. Fridrich J. (2002) Security of fragile authentication watermarks with localization. Proc. SPIE 4675(75): 691–700

    Article  Google Scholar 

  8. Holliman M., Memon N. (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process. 9(3): 432–441

    Article  Google Scholar 

  9. Wong P.W., Memon N. (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10): 1593–1601

    Article  Google Scholar 

  10. Fridrich, J., Goljan, M., Baldoza, A.C.: New fragile authentication watermark for images. In: Proceedings of the IEEE International Conference on Image Processing, Vancouver, pp. 446–449 (2000)

  11. Celik M.U., Sharma G., Saber E., Tekalp A.M. (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. 11(6): 585–595

    Article  Google Scholar 

  12. Gonzalez R.C., Woods R.E. (2002) Digital Image Processing. 2nd Edn. Prentice Hall, Englewood Cliffs

    Google Scholar 

  13. Rivest, R.L.: RFC 1321: the MD5 Message-Digest Algorithm. Internet Activities Board (1992)

  14. Anderson D., Sweeney D.J., Williams T.A. (1981) Introduction to Statistics: An Applications Approach. West Publishing Company, New York

    Google Scholar 

  15. Image database: www.petitcolas.net/fabien/watermarking/ image_database/index. html

  16. The USC-SIPI image database: http://sipi.usc.edu/database/ index.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Niladri B. Puhan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Puhan, N.B., Ho, A.T.S. Secure authentication watermarking for localization against the Holliman–Memon attack. Multimedia Systems 12, 521–532 (2007). https://doi.org/10.1007/s00530-006-0068-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-006-0068-3

Keywords

Navigation