Content-adaptive semi-fragile image authentication based on JPEG2000 compression

In this paper, a new system is presented for authenticating image content using digital watermark embedding in the DWT-domain of JPEG2000. A semi-fragile signature, generated from the host signal, is embedded into the image for content verification. Generation as well as embedding of the signature is adapted to the image content for performance improvement. The system is tested extensively and performance results are compared to those of methods proposed by other authors. We show that our new system outperforms the methods compared to. Our semi-fragile authentication is robust against non-malicious modifications, such as lossy compression, noise, image blurring and sharpening, changes of luminance and contrast as well as scaling. But in contrast to other methods, our authentication is secure at the same time, which we proof by different forgery attacks.

[1]  Dima Pröfrock,et al.  JPEG2000-based secure image authentication , 2006, MM&Sec '06.

[2]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[3]  Jean-Luc Dugelay,et al.  A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..

[4]  Fernando Pérez-González,et al.  Rational dither modulation: a novel data-hiding method robust to value-metric scaling attacks , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..

[5]  Dima Pröfrock,et al.  Avoiding Hard Decisions in Adaptive Watermarking , 2007, 2007 IEEE International Conference on Image Processing.

[6]  Yun Q. Shi,et al.  A unified authentication framework for JPEG2000 , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[7]  Shih-Fu Chang,et al.  A secure and robust digital signature scheme for JPEG2000 image authentication , 2005, IEEE Transactions on Multimedia.

[8]  Bülent Sankur,et al.  Comparative evaluation of semifragile watermarking algorithms , 2004, J. Electronic Imaging.

[9]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.

[10]  Bin Zhu,et al.  When Seeing Isn’t Believing – Current Multimedia Authentication Technologies and Their Applications , 2004 .

[11]  Huang Daren,et al.  A DWT-based image watermarking algorithm , 2001, IEEE International Conference on Multimedia and Expo, 2001. ICME 2001..

[12]  Van Buskirk Em When seeing isn't believing. , 1997, Journal of glaucoma.