Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Perceptible content retrieval in DCT domain and semi-fragile watermarking technique for perceptible content authentication

Published: 01 November 2008 Publication History

Abstract

Digital watermarking was commenced to copyright protection and ownership verification of multimedia data. However the evolution of the watermark focused on different security aspects of multimedia data such as integrity and authenticity. Fragile and semi-fragile watermarking schemes were introduced to accomplish these requirements. In this paper, we propose semi-fragile watermarking scheme to authenticate visual content of the image. The proposed method is carried out in DCT domain and authenticating the particular number of low frequency coefficient, it achieves the integrity of the image. Since low frequency coefficients carry the essence of the visual data, authenticating only the low frequency data is adequate. Therefore the proposed technique is efficient than the others, which are processing in all DCT coefficients. Digital signature is generated by following the definition of elliptic curve digital signature algorithm (ECDSA). Thus, the scheme is faster than RSA based authentication definition and it provides high level of security and availability. Additionally our scheme localizes the compromised area of the image. Embedded and visual data are protected from quantization of JPEG by altering the quantization table. However the degradation of compression ratio due to alternation in quantization table has been evaluated. Experimental results show that the watermark does not make any visual artifact in original data and it gives evidence that compression ratio degradation is ignorable for average JPEG quality factors.

References

[1]
Lin E T, Delp E J. A review of fragile image watermarks. Multimedia and Security Workshop (ACM Multimedia'99), Orlando, 1999, pp. 25-29.
[2]
Min Wu, Bede Liu, Watermarking for Image Authentication. International Conference on Image Processing (ICIP), 1998, pp. 437-441.
[3]
Hyuncheol Park, Kwangjo Kim, Visible Watermarking using Verifiable Digital Seal Image, Symposium on Cryptography and Information Security, Japan, 2001, pp. 103-108.
[4]
J.J. Eggers, and B. Girod, Blind watermarking applied to image authentication, IEEE International Conference on Acoustics, Speech and Signal Processing, Vol. 3, 2002, pp. 1977 - 1980.
[5]
Ming-Shing Hsieh, Din-Chang Tseng, Perceptual Digital Watermarking for Image Authentication in Electronic Commerce, Kluwer Academic Publishers Norwell, MA, USA, 2004, Vol. 4, pp. 157 - 170.
[6]
Eugene T. Lin, Christine I. Podilchuk, Edward J. Delp, Detection of image alterations using semi-fragile watermarks, SPIE proceedings series, San Jose, 2000., Vol. 3971, pp. 152-163.
[7]
Jessica, Fridrich, Security of fragile authentication watermarks with localization, SPIE proceedings series, Bellingham, 2002, Vol. 4675, pp. 691-700.
[8]
Wallace, G.K., The JPEG still picture compression standard. IEEE Transactions on Consumer Electronics, 1992, Vol. 38, pp. xviii - xxxiv.
[9]
L. Weng, B. Preneel, On encryption and authentication of the DC DCT coefficient, International Conference on Signal Processing and Multimedia Applications, 2007.
[10]
Certicom, The Elliptic Curve Cryptosystem, http://www.comms.scitech.susx.ac.uk/fft/crypt o/EccWhite3.pdf, 2000.
[11]
Keylength.com, http://www.keylength.com/en/compare/
[12]
Ching-Tang Hsieh, Yeh-Kuang Wu, A Watermarking System Based on Complementary Quantization, Proceedings of the 6th WSEAS International Conference on Signal, Speech and Image Processing, Lisbon, Portugal, September 22-24, 2006, pp. 7-10.
[13]
XUN WANG, YI OU-YANG, AND HUAMAO GU, A remote sensing image self-adaptive blind watermarking algorithm based on wavelet transformation, Proceedings of the 7th WSEAS International Conference on Signal, Speech and Image Processing, Beijing, China, September 15-17, 2007.
[14]
KITAE YOON, SINHYUK CHOI, SEUNGSOO BAE, HUIGON KIM, JINSEON YOUN, TANAM THANG, JUNRIM CHOI, Adaptive Block Watermarking and its SOC implementation Based on JPEG2000 DWT, Proceedings of the 7th WSEAS International Conference on Signal, Speech and Image Processing, Beijing, China, September 15-17, 2007.
[15]
Ali Sasan, M. Shamim Baig, Parallel Implementation of Spread Spectrum Based Oblivious Visual Watermarking Using Efficient DWT. Proceedings of the 6th WSEAS International Conference on Applied Computer Science, Tenerife, Canary Island, Spain, December 16-18, 2006.
[16]
A. N. Pisarchik, N. J. Flores-Carmona, Computer Algorithms for Direct Encryption and Decryption of Digital Images for Secure Communication, Proceedings of the 6th WSEAS International Conference on Applied Computer Science, Tenerife, Canary Island, Spain, December 16-18, 2006.

Cited By

View all
  • (2018)A novel blind digital watermarking technique for Stegano-encrypting information using nine-ac-coefficient prediction algorithm with an innovative security strategyWSEAS Transactions on Signal Processing10.5555/1853844.18538455:11(359-368)Online publication date: 14-Dec-2018

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image WSEAS Transactions on Signal Processing
WSEAS Transactions on Signal Processing  Volume 4, Issue 11
November 2008
30 pages
ISSN:1790-5052
EISSN:2224-3488
Issue’s Table of Contents

Publisher

World Scientific and Engineering Academy and Society (WSEAS)

Stevens Point, Wisconsin, United States

Publication History

Published: 01 November 2008

Author Tags

  1. JPEG
  2. discrete cosine transformation
  3. elliptic curve digital signature algorithm
  4. image authentication
  5. imperceptibility
  6. public key cryptography
  7. semi-fragile watermarking

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2018)A novel blind digital watermarking technique for Stegano-encrypting information using nine-ac-coefficient prediction algorithm with an innovative security strategyWSEAS Transactions on Signal Processing10.5555/1853844.18538455:11(359-368)Online publication date: 14-Dec-2018

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media