Watermarking JBIG2 text region for image authentication

An authentication watermarking technique (AWT) inserts hidden data into an image in order to detect any accidental or malicious alteration to the image. AWT usually computes, using a secret-key, the message authentication code (MAC) of the image, and somehow inserts MAC into the image itself. The authentication verification is performed using the same secret-key used in the insertion. JBIG2 is an international standard for lossy and lossless binary image compression. It decomposes the image into several regions (text, halftone, line-art) and encodes each one using the most appropriate method. This paper proposes a novel data-hiding technique to embed the data into the text region of a JBIG2 file. We, then, use it to create an AWT for a JBIG2-encoded image. The embedded data can be extracted from either the JBIG2 file itself or the binary image obtained by decoding the JBIG2 file.

[1]  Hae Yong Kim,et al.  Alteration-Locating Authentication Watermarking for Binary Images , 2004, IWDW.

[2]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[3]  H. Y. Kim,et al.  Toward a secure public-key blockwise fragile authentication watermarking , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[4]  Hae Yong Kim,et al.  A secure authentication watermarking for halftone and binary images , 2004, Int. J. Imaging Syst. Technol..

[5]  Hae Yong Kim,et al.  A public-key authentication watermarking for binary images , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[6]  Yu-Chee Tseng,et al.  A secure data hiding scheme for binary images , 2002, IEEE Trans. Commun..

[7]  Soo-Chang Pei,et al.  Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images , 2003, IEEE Trans. Circuits Syst. Video Technol..

[8]  Oscar C. Au,et al.  Data hiding watermarking for halftone images , 2002, IEEE Trans. Image Process..

[9]  P. Barreto,et al.  Toward secure public-key blockwise fragile authentication watermarking , 2002 .

[10]  Min Wu,et al.  Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.

[11]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[12]  Pamela C. Cosman,et al.  Symbol dictionary design for the JBIG2 standard , 2000, Proceedings DCC 2000. Data Compression Conference.

[13]  Faouzi Kossentini,et al.  The emerging JBIG2 standard , 1998, IEEE Trans. Circuits Syst. Video Technol..

[14]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[15]  Pamela C. Cosman,et al.  Dictionary design for text image compression with JBIG2 , 2001, IEEE Trans. Image Process..

[16]  Min Wu,et al.  Data hiding in digital binary image , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).