Marcas d'Água Frágeis de Autenticação para Imagens em Tonalidade Contínua e Esteganografia para Imagens Binárias e Meio-Tom

Watermark is an information-carrying signal embedded into digital data that can be extracted later to make some assertion about the data. Digital watermarks are usually classified as robust or fragile. Robust watermarks are designed to resist most image manipulating procedures and are used normally to attest the image ownership. Fragile watermarks are easily corrupted by any image processing procedure. However, integrity checking watermarks must be fragile, in order to detect any alteration. This tutorial course expounds principal authentication watermarking techniques for still continuous-tone images. It also expounds major attacks against these techniques and how to defend against them. Afterwards, this tutorial will describe major techniques to embed data into binary images. We will restrict our study to non-compressed images only.

[1]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[2]  Sun Fu Data Hiding in Halftone Images by Stochastic Error Diffusion , 2004 .

[3]  H. Y. Kim,et al.  Toward a secure public-key blockwise fragile authentication watermarking , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[4]  Soo-Chang Pei,et al.  Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images , 2003, IEEE Trans. Circuits Syst. Video Technol..

[5]  Hagit Hel-Or Watermarking and copyright labeling of printed images , 2001, J. Electronic Imaging.

[6]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[7]  Ping Wah Wong,et al.  A Watermark for Image Integrity and Ownership Verification , 1998, PICS.

[8]  K. Nishimura,et al.  Probability to meet in the middle , 2005, Journal of Cryptology.

[9]  Donald E. Knuth,et al.  Digital halftones by dot diffusion , 1987, TOGS.

[10]  Chang-Tsun Li,et al.  Image authentication and integrity verification via content-based watermarks and a public key cryptosystem , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[11]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[12]  Paulo S. L. M. Barreto,et al.  Pitfalls in public key watermarking , 1999, XII Brazilian Symposium on Computer Graphics and Image Processing (Cat. No.PR00481).

[13]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[14]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[15]  Oscar C. Au,et al.  Data hiding watermarking for halftone images , 2002, IEEE Trans. Image Process..

[16]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[17]  P. Barreto,et al.  Toward secure public-key blockwise fragile authentication watermarking , 2002 .

[18]  Robert Ulichney,et al.  Digital Halftoning , 1987 .

[19]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[20]  Oscar C. Au,et al.  Data hiding by smart pair toggling for halftone images , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).