Digital watermarking scheme exploiting nondeterministic dependence for image authentication

Watermarking schemes for authentication purposes are characterized by three factors: security, resolution of tamper localization, and embedding distortion. Since the requirements of high security, high localization resolution, and low distortion cannot be fulfilled simultaneously, the relative importance of a particular factor is application-dependent. Moreover, blockwise dependence is recognized as a key requirement for fragile watermarking schemes to thwart the Holliman-Memon counterfeiting attack. However, it has also been observed that deterministic dependence is still susceptible to transplantation attack or even simple cover-up attack. This work proposes a fragile watermarking scheme for image authentication, which exploits nondeterministic dependence and provides the users with freedom of making trade-offs among the three factors according to the needs of their applications.

[1]  I Pitas,et al.  Image watermarking using block site selection and DCT domain constraints. , 1998, Optics express.

[2]  Nasir D. Memon,et al.  Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.

[3]  Jessica J. Fridrich,et al.  Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.

[4]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[5]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[6]  P. Barreto,et al.  Toward secure public-key blockwise fragile authentication watermarking , 2002 .

[7]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[8]  Deepa Kundur,et al.  Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance , 2005, IEEE Transactions on Multimedia.

[9]  Chang-Tsun Li Digital fragile watermarking scheme for authentication of JPEG images , 2004 .

[10]  Minerva M. Yeung,et al.  Invisible watermarking for image verification , 1998, J. Electronic Imaging.

[11]  Chang-Tsun Li,et al.  One-dimensional neighborhood forming strategy for fragile watermarking , 2003, J. Electronic Imaging.

[12]  Abdelkader H. Ouda,et al.  Localization and security enhancement of block-based image authentication , 2005, IEEE International Conference on Image Processing 2005.

[13]  Jiri Fridrich,et al.  New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[14]  Nasir D. Memon,et al.  Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.

[15]  Chang-Tsun Li,et al.  Image authentication and integrity verification via content-based watermarks and a public key cryptosystem , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[16]  Der-Chyuan Lou,et al.  Highly robust watermarking scheme based on surrounding mean value relationship , 2005 .

[17]  Der-Chyuan Lou,et al.  Copyright protection scheme based on chaos and secret sharing techniques , 2005 .