Secure hybrid robust watermarking resistant against tampering and copy attack

Digital watermarking appears today as an efficient mean of securing multimedia documents. Several application scenarios in the security of digital watermarking have been pointed out, each of them with different requirements. The three main identified scenarios are: copyright protection, i.e. protecting ownership and usage rights; tamper proofing, aiming at detecting malicious modifications; and authentication, the purpose of which is to check the authenticity of the originator of a document. While robust watermarks, which survive to any change or alteration of the protected documents, are typically used for copyright protection, tamper proofing and authentication generally require fragile or semi-fragile watermarks in order to detect modified or faked documents. Further, most of robust watermarking schemes are vulnerable to the so-called copy attack, where a watermark can be copied from one document to another by any unauthorized person, making these schemes inefficient in all authentication applications. In this paper, we propose a hybrid watermarking method joining a robust and a fragile or semi-fragile watermark, and thus combining copyright protection and tamper proofing. As a result this approach is at the same time resistant against copy attack. In addition, the fragile information is inserted in a way which preserves robustness and reliability of the robust part. The numerous tests and the results obtained according to the Stirmark benchmark demonstrate the superior performance of the proposed approach.

[1]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[2]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[3]  Gregory W. Wornell,et al.  Digital watermarking and information embedding using dither modulation , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[4]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..

[5]  P. Barreto,et al.  Toward secure public-key blockwise fragile authentication watermarking , 2002 .

[6]  Edward J. Delp,et al.  Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.

[7]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[8]  B. Girod,et al.  A blind watermarking scheme based on structured codebooks , 2000 .

[9]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[10]  Edward J. Delp,et al.  Fragile watermarking using the VW2D watermark , 1999, Electronic Imaging.

[11]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[12]  Jiri Fridrich A hybrid watermark for tamper detection in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).

[13]  Thierry Pun,et al.  Content adaptive watermarking based on a stochastic multiresolution image modeling , 2000, 2000 10th European Signal Processing Conference.

[14]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[15]  Nasir D. Memon,et al.  Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.

[16]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[17]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[18]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[19]  PunThierry,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998 .

[20]  Andrew C. Singer,et al.  Turbo equalization: principles and new results , 2002, IEEE Trans. Commun..

[21]  Thierry Pun,et al.  Capacity-security analysis of data hiding technologies , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[22]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[23]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[24]  Minerva M. Yeung,et al.  Fragile imperceptible digital watermark with privacy control , 1999, Electronic Imaging.

[25]  Thierry Pun,et al.  Robust digital watermarking with channel state estimation: Part II Applied robust watermarking , 2003 .

[26]  Gonzalo R. Arce,et al.  Joint wavelet compression and authentication watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[27]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[28]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[29]  Thierry Pun,et al.  A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.

[30]  Thierry Pun,et al.  Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.

[31]  Thierry Pun,et al.  Multibit digital watermarking robust against local nonlinear geometrical distortions , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[32]  Xuejia Lai,et al.  A Proposal for a New Block Encryption Standard , 1991, EUROCRYPT.

[33]  Gabriela Csurka,et al.  A Bayesian approach to spread spectrum watermark detection and secure copyright protection for digital image libraries , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).

[34]  Feng Lin,et al.  Representations that uniquely characterize images modulo translation, rotation, and scaling , 1996, Pattern Recognit. Lett..

[35]  Edward J. Delp,et al.  Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.

[36]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[37]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[38]  Alain Glavieux,et al.  Reflections on the Prize Paper : "Near optimum error-correcting coding and decoding: turbo codes" , 1998 .

[39]  Fernando Pérez-González,et al.  The impact of channel coding on the performance of spatial watermarking for copyright protection , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[40]  A. Murat Tekalp,et al.  A hierarchical image authentication watermark with improved localization and security , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[41]  Ton Kalker,et al.  Video watermarking system for broadcast monitoring , 1999, Electronic Imaging.

[42]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[43]  Dirk Fox,et al.  Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.

[44]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[45]  Jiri Fridrich,et al.  New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[46]  Yacov Hel-Or,et al.  Geometric hashing techniques for watermarking , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[47]  R. Koetter,et al.  Turbo equalization , 2004, IEEE Signal Processing Magazine.

[48]  Robert G. Gallager,et al.  Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.

[49]  I.J. Cox,et al.  Watermarking in the real world: an application to DVD , 1999, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020).

[50]  Nasir D. Memon,et al.  Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.

[51]  Jessica J. Fridrich,et al.  Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.

[52]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[53]  Min Wu,et al.  Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[54]  Alex Biryukov,et al.  Data Encryption Standard (DES) , 2005, Encyclopedia of Cryptography and Security.

[55]  Gabriela Csurka,et al.  Template based recovery of Fourier-based watermarks using log-polar and log-log maps , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[56]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[57]  M. Tomlinson New automatic equaliser employing modulo arithmetic , 1971 .

[58]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[59]  Adnan M. Alattar Smart Images using Digimarc's watermarking technology , 2000, Electronic Imaging.

[60]  H. Miyakawa,et al.  Matched-Transmission Technique for Channels With Intersymbol Interference , 1972, IEEE Trans. Commun..

[61]  H. Y. Kim,et al.  Toward a secure public-key blockwise fragile authentication watermarking , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[62]  Nasir D. Memon,et al.  Further attacks on Yeung-Mintzer fragile watermarking scheme , 2000, Electronic Imaging.

[63]  Jessica J. Fridrich Visual hash for oblivious watermarking , 2000, Electronic Imaging.

[64]  J. O'Ruanaidh,et al.  Rotation, Translation and Scale Invariant Digital Image Watermarking , 1997 .