In this paper, we propose a semi-fragile watermarking technique that accepts JPEG lossy compression on the watermarked image to a pre-determined quality factor, and rejects malicious attacks. The authenticator can identify the positions of corrupted blocks, and recover them with approximation of the original ones. In addition to JPEG compression, adjustments of the brightness of the image within reasonable ranges, are also acceptable using the proposed authenticator. The security of the proposed method is achieved by using the secret block mapping function which controls the signature generating/embedding processes. Our authenticator is based on two invariant properties of DCT coefficients before and after JPEG compressions. They are deterministic so that no probabilistic decision is needed in the system. The first property shows that if we modify a DCT coefficient to an integral multiple of a quantization step, which is larger than the steps used in later JPEG compressions, then this coefficient can be exactly reconstructed after later acceptable JPEG compression. The second one is the invariant relationships between two coefficients in a block pair before and after JPEG compression. Therefore, we can use the second property to generate authentication signature, and use the first property to embed it as watermarks. There is no perceptible degradation between the watermarked image and the original. In additional to authentication signatures, we can also embed the recovery bits for recovering approximate pixel values in corrupted areas. Our authenticator utilizes the compressed bitstream, and thus avoids rounding errors in reconstructing DCT coefficients. Experimental results showed the effectiveness of this system. The system also guaranies no false alarms, i.e., no acceptable JPEG compression is rejected.
[1]
Sushil K. Bhattacharjee,et al.
Compression tolerant image authentication
,
1998,
Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[2]
Min Wu,et al.
Watermarking for image authentication
,
1998,
Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[3]
Shih-Fu Chang,et al.
Issues and solutions for authenticating MPEG video
,
1999,
Electronic Imaging.
[4]
Minerva M. Yeung,et al.
An invisible watermarking technique for image verification
,
1997,
Proceedings of International Conference on Image Processing.
[5]
B. Zhu,et al.
Transparent robust authentication and distortion measurement technique for images
,
1996,
1996 IEEE Digital Signal Processing Workshop Proceedings.
[6]
Shih-Fu Chang,et al.
A robust image authentication method distinguishing JPEG compression from malicious manipulation
,
2001,
IEEE Trans. Circuits Syst. Video Technol..
[7]
Shih-Fu Chang,et al.
A robust content based digital signature for image authentication
,
1996,
Proceedings of 3rd IEEE International Conference on Image Processing.
[8]
Jiri Fridrich,et al.
Image watermarking for tamper detection
,
1998,
Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[9]
Edward J. Delp,et al.
A watermark for digital images
,
1996,
Proceedings of 3rd IEEE International Conference on Image Processing.
[10]
Tiago Rosa Maria Paula Queluz.
Content-based integrity protection of digital images
,
1999,
Electronic Imaging.