A Secure Hierarchical Fragile Watermarking Method with Tamper Localization

Several image authentication schemes are either vulnerable to attacks or sacrifice localization accuracy to improve security. In this paper, we proposed a scheme that not only thwarts all kinds of attacks such as vector quantization (VQ) and oracle attack in order to satisfy the security but also ensures superior accuracy of tamper localization. It is effective because the detection is based on a hierarchical structure so that the accuracy of tamper localization can be ensured. That is, if a tampered pixel is not detected in level-4, it will be detected in level 3, level 2 or level 1 with a probability of nearly 1. The method can detect any tampered pixel and the size of 2times2 pixel block with a missing rate less than 0.78% and 0.19% respectively, and the missing rate of more than or equal the size of 4times4 pixel block is approximately close to 0. Experimental results demonstrate that the proposed scheme is highly sensitive to intentional tampering and the embedding watermarking is imperceptive

[1]  Bernd Girod,et al.  Blind watermarking applied to image authentication , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[2]  Nasir D. Memon,et al.  Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.

[3]  Jessica J. Fridrich,et al.  Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.

[4]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[5]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[6]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[7]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[8]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[9]  Shipeng Li,et al.  A secure image authentication algorithm with pixel-level tamper localization , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[10]  Minerva M. Yeung,et al.  Invisible watermarking for image verification , 1998, J. Electronic Imaging.

[11]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[12]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..