Watermarking approach to embedded signature- based authentication by channel statistics

Embedded signature-based authentication is a highly promis- ing watermarking method for solving high-level authentication problems. This work proposes such a watermarking approach using channel sta- tistics evaluated from a reference watermark. The basic concept is to consider the problem to be an example of communications with side information, which is the reference watermark embedded in the host with the signature at the sender site. At the receiver site, the reference wa- termark is first extracted to determine channel statistics, which are used to generate information about signature reliability. Three kinds of infor- mation are derived, including a reliability measure, an entropy measure, and an authenticated signature. Experimental results establish that the measures of reliability and uncertainty are meaningful, and that the em- bedded signature can survive high-quality JPEG compression and ma- nipulations such as negation, cropping, replacement, and modification. © 2003 Society of Photo-Optical Instrumentation Engineers.

[1]  Anastasios Tefas,et al.  Image authentication techniques for surveillance applications , 2001, Proc. IEEE.

[2]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[3]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[4]  Keinosuke Fukunaga,et al.  Introduction to statistical pattern recognition (2nd ed.) , 1990 .

[5]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[6]  Pierre Moulin,et al.  The role of information theory in watermarking and its application to image watermarking , 2001, Signal Process..

[7]  Deepa Kundur,et al.  Diversity and attack characterization for improved robust watermarking , 2001, IEEE Trans. Signal Process..

[8]  Thierry Pun,et al.  Optimal adaptive diversity watermarking with channel state estimation , 2001, IS&T/SPIE Electronic Imaging.

[9]  Johannes B. Huber,et al.  Channel model for watermarks subject to desynchronization attacks , 2002, IS&T/SPIE Electronic Imaging.

[10]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[11]  Shih-Fu Chang,et al.  Issues and solutions for authenticating MPEG video , 1999, Electronic Imaging.

[12]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[13]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).