Multiresolution fragile watermarking using complex chirp signals for content authentication

This paper proposes a wavelet-domain multiresolution fragile watermarking scheme using an improved quantization-index-modulation (QIM) embedding technique. A secure embedding zone is exploited in our proposed scheme to reduce the false detection rate of Kundur's scheme. The frequency modulated (FM) complex chirp signal is employed as watermark. Both the real and the imaginary parts of the chirp signal are embedded simultaneously in a hierarchical manner. Unlike the conventional schemes, the proposed scheme does not require the original watermark for content integrity verification and quality assessment for the distorted watermarked content. The blind authentication process allows embedding of arbitrary FM chirp watermarks.

[1]  Jiri Fridrich,et al.  Robust Digital Watermarking Based on Key-Dependent Basis Functions , 1998, Information Hiding.

[2]  Gonzalo R. Arce,et al.  Joint wavelet compression and authentication watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[3]  Tiago Rosa Maria Paula Queluz Content-based integrity protection of digital images , 1999, Electronic Imaging.

[4]  Min Wu,et al.  Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[5]  Alessandro Neri,et al.  Blind quality assessment system for multimedia communications using tracing watermarking , 2003, IEEE Trans. Signal Process..

[6]  Bülent Sankur,et al.  Comparative evaluation of semifragile watermarking algorithms , 2004, J. Electronic Imaging.

[7]  Ping Wah Wong,et al.  A Watermark for Image Integrity and Ownership Verification , 1998, PICS.

[8]  John G. Proakis,et al.  Introduction to Digital Signal Processing , 1988 .

[9]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[10]  Steve McLaughlin,et al.  Comparative study of textural analysis techniques to characterise tissue from intravascular ultrasound , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[11]  Edward J. Delp,et al.  Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.

[12]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[13]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[14]  Nasir Memon,et al.  Authentication techniques for multimedia content , 1999, Other Conferences.

[15]  A. S. Kayhan Representation and analysis of complex chirp signals , 1998, Signal Process..

[16]  Yo-Sung Ho,et al.  Analysis of quantization watermarking in the wavelet transform domain , 2003, Seventh International Symposium on Signal Processing and Its Applications, 2003. Proceedings..

[17]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[18]  Deepa Kundur,et al.  Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[19]  Rodger E. Ziemer,et al.  Introduction to digital communication , 1992 .

[20]  Martin S. Roden Analog and Digital Communication Systems , 1979 .

[21]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[22]  B. Girod,et al.  A blind watermarking scheme based on structured codebooks , 2000 .

[23]  Edward J. Delp,et al.  A Review of Fragile Image Watermarks , 2007 .

[24]  Lisa M. Marvel,et al.  Compression-compatible fragile and semifragile tamper detection , 2000, Electronic Imaging.

[25]  Alfred Mertins,et al.  Signal Analysis: Wavelets, Filter Banks, Time-Frequency Transforms and Applications , 1999 .

[26]  Minerva M. Yeung,et al.  Invisible watermarking for image verification , 1998, J. Electronic Imaging.

[27]  Russell M. Mersereau,et al.  Video Error Correction Using Steganography , 2002, EURASIP J. Adv. Signal Process..

[28]  Ahmed H. Tewfik,et al.  Fraud detection and self embedding , 1999, MULTIMEDIA '99.