Comparative evaluation of semifragile watermarking algorithms

Semifragile watermarking techniques aim to prevent tam- pering and fraudulent use of modified images. A semifragile water- mark monitors the integrity of the content of the image but not its numerical representation. Therefore, the watermark is designed so that the integrity is proven if the content of the image has not been tampered with, despite some mild processing on the image. How- ever, if parts of the image are replaced with the wrong key or are heavily processed, the watermark information should indicate evi- dence of forgery. We compare the performance of eight semifragile watermarking algorithms in terms of their miss probability under forgery attack, and in terms of false alarm probability under nonma- licious signal processing operations that preserve the content and quality of the image. We propose desiderata for semifragile water- marking algorithms and indicate the promising algorithms among existing ones. © 2004 SPIE and IS&T. (DOI: 10.1117/1.1633285)

[1]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[2]  Tiago Rosa Maria Paula Queluz Spatial watermark for image content authentication , 2002, J. Electronic Imaging.

[3]  Gonzalo R. Arce,et al.  Approximate image message authentication codes , 2001, IEEE Trans. Multim..

[4]  Minerva M. Yeung,et al.  Invisible watermarking for image verification , 1998, J. Electronic Imaging.

[5]  Edward J. Delp,et al.  Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.

[6]  Alok Aggarwal,et al.  Compression tolerant watermarking for image verification , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[7]  Jang-Ping Sheu,et al.  Mean quantization blind watermarking for image authentication , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[8]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[9]  Chin-Chen Chang,et al.  Secure discrete-cosine-transform-based technique for recoverable tamper proofing , 2001 .

[10]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[11]  Jessica J. Fridrich,et al.  Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.

[12]  Umut Naci,et al.  Comparative assessment of semifragile watermarking techniques , 2001, SPIE ITCom.

[13]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[14]  Ahmed H. Tewfik,et al.  Fraud detection and self embedding , 1999, MULTIMEDIA '99.

[15]  Deepa Kundur,et al.  Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[16]  Lisa M. Marvel,et al.  Compression-compatible fragile and semifragile tamper detection , 2000, Electronic Imaging.

[17]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[18]  Jiri Fridrich,et al.  Robust Digital Watermarking Based on Key-Dependent Basis Functions , 1998, Information Hiding.

[19]  Jessica Fridrich Combining low-frequency and spread-spectrum watermarking , 1998, Optics & Photonics.

[20]  Chun-Shien Lu,et al.  Mean-quantization-based fragile watermarking for image authentication , 2001 .

[21]  Giovanni Di Crescenzo,et al.  Approximate Message Authentication Codes for$N$-ary Alphabets , 2006, IEEE Transactions on Information Forensics and Security.

[22]  Tiago Rosa Maria Paula Queluz Content-based integrity protection of digital images , 1999, Electronic Imaging.

[23]  Russell M. Mersereau,et al.  Video Error Correction Using Steganography , 2002, EURASIP J. Adv. Signal Process..

[24]  Bülent Sankur,et al.  Strict integrity control of biomedical images , 2001, IS&T/SPIE Electronic Imaging.

[25]  Mohamed F. Mansour,et al.  Robust high capacity data embedding , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[26]  Tiago Rosa Maria Paula Queluz,et al.  Spatial watermark for image verification , 2000, Electronic Imaging.

[27]  Fabien A. P. Petitcolas,et al.  Fair evaluation methods for image watermarking systems , 2000, J. Electronic Imaging.

[28]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[29]  Jiri Fridrich A hybrid watermark for tamper detection in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).

[30]  Tiago Rosa Maria Paula Queluz Authentication of digital images and video: Generic models and a new contribution , 2001, Signal processing. Image communication.

[31]  Bernd Girod,et al.  Blind watermarking applied to image authentication , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[32]  B. Girod,et al.  A blind watermarking scheme based on structured codebooks , 2000 .