A Survey of Watermarking Algorithms for Image Authentication

Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Insuring digital image integrity has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of emerging techniques for detecting whether image tampering has taken place. Compared to the techniques and protocols for security usually employed to perform this task, the majority of the proposed methods based on watermarking, place a particular emphasis on the notion of content authentication rather than strict integrity. In this paper, we introduce the notion of image content authentication and the features required to design an effective authentication scheme. We present some algorithms, and introduce frequently used key techniques.

[1]  Edward J. Delp,et al.  Fragile watermarking using the VW2D watermark , 1999, Electronic Imaging.

[2]  Jean-Luc Dugelay,et al.  Image watermaking for owner and content authentication , 2000, ACM Multimedia.

[3]  Jessica J. Fridrich,et al.  Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.

[4]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[5]  Shih-Fu Chang,et al.  Generating Robust Digital Signature for Image/Video Authentication , 1998 .

[6]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[7]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[8]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[9]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[10]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[11]  Min Wu,et al.  Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[12]  Nasir D. Memon,et al.  Further attacks on Yeung-Mintzer fragile watermarking scheme , 2000, Electronic Imaging.

[13]  J. O'Ruanaidh,et al.  Rotation, Translation and Scale Invariant Digital Image Watermarking , 1997 .

[14]  Gregory W. Wornell,et al.  Information theoretic approach to the authentication of multimedia , 2001, IS&T/SPIE Electronic Imaging.

[15]  Jean-Luc Dugelay,et al.  Blind detection of malicious alterations on still images using robust watermarks , 2000 .

[16]  Regunathan Radhakrishnan,et al.  On the security of the SARI image authentication system , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[17]  Ping Wah Wong,et al.  A Watermark for Image Integrity and Ownership Verification , 1998, PICS.

[18]  Jean-Luc Dugelay,et al.  Image watermaking for owner and content authentication , 2000, MM 2000.

[19]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[20]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[21]  Tiago Rosa Maria Paula Queluz Towards robust, content based techniques for image authentication , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[22]  Jiri Fridrich,et al.  Robust bit extraction from images , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[23]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[24]  Thierry Pun,et al.  Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.

[25]  Deepa Kundur,et al.  Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[26]  Shih-Fu Chang,et al.  SARI: self-authentication-and-recovery image watermarking system , 2001, MULTIMEDIA '01.

[27]  Rama Chellappa,et al.  A new approach to image feature detection with applications , 1996, Pattern Recognit..

[28]  Adi Shamir,et al.  On Digital Signatures and Public-Key Cryptosystems. , 1977 .

[29]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[30]  Jean-Luc Dugelay,et al.  Introduction au tatouage d’images , 1999, Ann. des Télécommunications.

[31]  Bülent Sankur,et al.  Strict integrity control of biomedical images , 2001, IS&T/SPIE Electronic Imaging.