Spatial watermark for image content authentication

This paper is focused on digital image authentication, considered as the process of evaluating the integrity of image con- tents relatively to the original picture and being able to detect, in an automatic way, malevolent content modifications. A computationally efficient spatial watermarking technique for authentication of visual information, robust to small distortions caused by compression, is described. In essence, content-dependent authentication data are embedded into the picture, by modifying the relationship of image projections throughout the entire image. To obtain a secure data embedding and extraction procedure, directions onto which image parts are projected depend on a secret key. In order to guarantee minimum visibility of the embedded data, the insertion process is used in conjunction with perceptual models, exploiting spatial do- main masking effects. The viability of the method as a means of protecting the content is assessed under JPEG compression and semantic content modifications. With the present system, robust- ness to JPEG compression up to compression factors of about 1:10 can be achieved, maintaining the subjective image quality after wa- termark insertion. At the same time, it is possible to detect and lo- calize small image manipulations. © 2002 SPIE and IS&T.

[1]  Lisa M. Marvel,et al.  Compression-compatible fragile and semifragile tamper detection , 2000, Electronic Imaging.

[2]  Min Wu,et al.  Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[3]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[4]  Deepa Kundur,et al.  Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[5]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[6]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[7]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[8]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[9]  Tiago Rosa Maria Paula Queluz Authentication of digital images and video: Generic models and a new contribution , 2001, Signal processing. Image communication.

[10]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[11]  Gonzalo R. Arce,et al.  Joint wavelet compression and authentication watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[12]  B. Prasada,et al.  Adaptive quantization of picture signals using spatial masking , 1977, Proceedings of the IEEE.

[13]  Tiago Rosa Maria Paula Queluz Towards robust, content based techniques for image authentication , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[14]  Tiago Rosa Maria Paula Queluz,et al.  Spatial watermark for image verification , 2000, Electronic Imaging.

[15]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[16]  Edward J. Delp,et al.  Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.

[17]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[18]  Tiago Rosa Maria Paula Queluz Content-based integrity protection of digital images , 1999, Electronic Imaging.

[19]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.