Abstract
Authentication watermarking schemes using block-wise watermarks for tamper localization are vulnerable to the Holliman–Memon attack. In this paper, we propose a novel method based on the Wong’s localization scheme (Proceedings of the IS&T PIC, Portland) to resist this attack. A unique image index scheme is used for computing the authentication signature that is embedded in the least significant bit-plane of the block. The informed detector estimates the correct image index by using the side information about the watermarked image. The image index estimation from the fake image can definitely be an alternative to keeping a directory of image indices. So it is not necessary to manage the database of image indices for the verification purpose. The authenticity measure is defined to quantify the attack severity by taking the connectivity among possible authentic blocks into consideration. There are more blocks verified as authentic when this measure is high for a fake image constructed using this attack. As such, the blocks for a fake image can be chosen from a reduced number of database images. The blocks from any such image are to be connected with each other to maximize the authenticity measure. Thus, the attacker’s task to generate a fake image of reasonable perceptual quality becomes increasingly difficult. With the proposed method there is no loss or ambiguity in localization after the Holliman–Memon attack and content tampering in an image. The localization accuracy in the proposed method is demonstrated by the simulation results and is equal to the chosen block size, similar to the Wong’s scheme.
Similar content being viewed by others
References
Swanson M.D., Kobayashi M., Tewfik A.H. (1998) Multimedia data-embedding and watermarking technologies. Proc. IEEE 86(6): 1064–1087
Cox I.J., Miller M.L. (1999) A review of watermaking and the importance of perceptual modeling. Proc. SPIE 3016: 92–99
Menezes A., van Oorchot P., Vanstone S. (1997) Handbook of Applied Cryptography. CRC, Boca Raton, FL
Wong, P.: A Watermark for image integrity and ownership verification. In: Proceedings at the IS& T PIC, Portland, OR (1998)
Wong, P.: A public key watermark for image verification and authentication. In: Proceedings at the IEEE International Conference Image Processing, Chicago, pp. 425–429 (1998)
Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proc. IEEE International Confernece Image Processing, Santa Barbara, pp. 680–683 (1997)
Fridrich J. (2002) Security of fragile authentication watermarks with localization. Proc. SPIE 4675(75): 691–700
Holliman M., Memon N. (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process. 9(3): 432–441
Wong P.W., Memon N. (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10(10): 1593–1601
Fridrich, J., Goljan, M., Baldoza, A.C.: New fragile authentication watermark for images. In: Proceedings of the IEEE International Conference on Image Processing, Vancouver, pp. 446–449 (2000)
Celik M.U., Sharma G., Saber E., Tekalp A.M. (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. 11(6): 585–595
Gonzalez R.C., Woods R.E. (2002) Digital Image Processing. 2nd Edn. Prentice Hall, Englewood Cliffs
Rivest, R.L.: RFC 1321: the MD5 Message-Digest Algorithm. Internet Activities Board (1992)
Anderson D., Sweeney D.J., Williams T.A. (1981) Introduction to Statistics: An Applications Approach. West Publishing Company, New York
Image database: www.petitcolas.net/fabien/watermarking/ image_database/index. html
The USC-SIPI image database: http://sipi.usc.edu/database/ index.html
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Puhan, N.B., Ho, A.T.S. Secure authentication watermarking for localization against the Holliman–Memon attack. Multimedia Systems 12, 521–532 (2007). https://doi.org/10.1007/s00530-006-0068-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-006-0068-3