Blind watermarking applied to image authentication

To prevent image manipulations and fraudulent use of modified images, the embedding of semi-fragile digital watermarks into image data has been proposed. The watermark should survive modifications introduced by random noise or compression, but should not be detectable from non-authentic regions of the image The original image cannot be used by the watermark detector to verify the authenticity of the image. In this paper, we investigate the application of a recently developed quantization based watermarking scheme to image authentication. The watermarking technology, called Scalar Costa Scheme (SCS), allows reliable blind watermark detection from a small number of pixels, and thus enables the detection of local modifications to the image content.

[1]  Bernd Girod,et al.  Robustness of a blind image watermarking scheme , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[2]  Gregory W. Wornell,et al.  Preprocessed and postprocessed quantization index modulation methods for digital watermarking , 2000, Electronic Imaging.

[3]  Bernd Girod,et al.  Watermark Detection after Quanization Attacks , 1999, Information Hiding.

[4]  B. Girod,et al.  A blind watermarking scheme based on structured codebooks , 2000 .

[5]  Bernd Girod,et al.  Analysis of digital watermarks subjected to optimum linear filtering and additive noise , 2001, Signal Process..

[6]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[7]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[8]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[9]  Edward J. Delp,et al.  Perceptual watermarks for digital images and video , 1999, Electronic Imaging.