A class of authentication digital watermarks for secure multimedia communication

A new approach to digital signatures for imaging, which adapts well to multimedia communications in lossy channels is introduced. Rather than attaching the signature's bit-string as a file-header, it is invisibly etched into the image using a new watermarking algorithm. The watermark is "nonfragile," tolerating small distortions but not malicious tampering aimed at modifying the image's content. In particular, the rank-order relationship in local areas throughout the lowest level of the DWT is exploited to encode the watermark. An edge-based message digest is used. The signature is in the form of binary data and the wavelet decomposition coefficients are modified according to this binary sequence. The signature is also embedded and tested within the SPIHT compression algorithm. The information capacity is studied and the experimental results confirm a logarithm relation between the bit rate and the quantization level, which is similar to the Shannon's capacity theorem. Experiments are performed to examine the signature's transparency and robustness.

[1]  C.E. Shannon,et al.  Communication in the Presence of Noise , 1949, Proceedings of the IRE.

[2]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[3]  Jessica J. Fridrich Visual hash for oblivious watermarking , 2000, Electronic Imaging.

[4]  Deepa Kundur,et al.  Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[5]  William A. Pearlman,et al.  A new, fast, and efficient image codec based on set partitioning in hierarchical trees , 1996, IEEE Trans. Circuits Syst. Video Technol..

[6]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[7]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[8]  Jerome M. Shapiro,et al.  Embedded image coding using zerotrees of wavelet coefficients , 1993, IEEE Trans. Signal Process..

[9]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[10]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[11]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[12]  Anil K. Jain Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.

[13]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[14]  Richard E. Blahut,et al.  Digital transmission of information , 1990 .

[15]  Jiri Fridrich,et al.  Robust bit extraction from images , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[16]  Gonzalo R. Arce,et al.  A blind wavelet based digital signature for image authentication , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).