A Fragile Watermarking Scheme for Image Authentication with Tamper Detection and Localization

In this paper, we develop a watermarking scheme for image authentication and verification. The watermarking scheme for tamper detection of an image is fragile and block-based. Such a scheme has good tamper localization and high tamper detection rate. The security of our scheme depends on a secret key, even though the attacker got the original watermark pattern and watermarking algorithm. The watermark extraction process does not need the original image and original watermark. The proposed scheme provides higher level of security and high performance with low computational complexity. This scheme is secure, fast, and able to detect and localize tampered areas against the well-known vector quantization attack. Experimental results indicate the effectiveness and efficiency of the algorithm.

[1]  Y. Hasan,et al.  Fragile blockwise image authentication thwarting vector quantization attack , 2004, Proceedings of the Fourth IEEE International Symposium on Signal Processing and Information Technology, 2004..

[2]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[3]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[4]  P.K. Rajan,et al.  TIAMAT: a new fragile watermarking technique for image authentication , 2006, 2006 Proceeding of the Thirty-Eighth Southeastern Symposium on System Theory.

[5]  R. A. Fisher,et al.  Statistical Tables for Biological, Agricultural and Medical Research , 1956 .

[6]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[7]  L. Tippett Statistical Tables: For Biological, Agricultural and Medical Research , 1954 .

[8]  Yiwei Wang,et al.  A wavelet-based watermarking algorithm for ownership verification of digital images , 2002, IEEE Trans. Image Process..

[9]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[10]  Ping Wah Wong,et al.  A Watermark for Image Integrity and Ownership Verification , 1998, PICS.

[11]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).