New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks

An authentication watermark is a hidden data inserted into an image that allows detecting any alteration made in the image. AWTs (Authentication Watermarking Techniques) normally make use of secret- or public-key cryptographic cipher to compute the authentication signature of the image, and inserts it into the image itself. Many previous public-key AWTs for uncompressed binary images can be attacked by an image adulterating technique named “parity attack.” JBIG2 is an international standard for compressing bi-level images (both lossy and lossless). The creation of secure AWTs for compressed binary images is an important practical problem. However, it seems that no AWT for JBIG2 resistant to parity attacks has ever been proposed. This paper proposes a new data-hiding method to embed information in the text region of JBIG2 files. Then, we use this technique to design a new AWT for JBIG2-encoded images resistant to parity attacks. Both the secret- and public-key versions of the proposed AWT are completely immune against parity attacks. Moreover, watermarked images are visually pleasant, without visible salt and pepper noise. Image authenticity verification can be performed in either JBIG2 file itself or in the binary image obtained by decoding the JBIG2 file.

[1]  Doron Shaked,et al.  Watermarking of dither halftoned images , 1999, Electronic Imaging.

[2]  Yu-Chee Tseng,et al.  A secure data hiding scheme for binary images , 2002, IEEE Trans. Commun..

[3]  Steven H. Low,et al.  Marking text documents , 1997, Proceedings of International Conference on Image Processing.

[4]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[5]  Oscar C. Au,et al.  Data hiding watermarking for halftone images , 2002, IEEE Trans. Image Process..

[6]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[7]  Min Wu,et al.  Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.

[8]  Hae Yong Kim,et al.  Watermarking JBIG2 text region for image authentication , 2005, IEEE International Conference on Image Processing 2005.

[9]  Pamela C. Cosman,et al.  Dictionary design for text image compression with JBIG2 , 2001, IEEE Trans. Image Process..

[10]  Sangho Ha,et al.  A Robust Printed Image Watermarking Based on Iterative Halftoning Method , 2003, IWDW.

[11]  Colin Boyd,et al.  Advances in Cryptology - ASIACRYPT 2001 , 2001 .

[12]  Faouzi Kossentini,et al.  The emerging JBIG2 standard , 1998, IEEE Trans. Circuits Syst. Video Technol..

[13]  Hae Yong Kim,et al.  A public-key authentication watermarking for binary images , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[14]  Hae Yong Kim,et al.  Alteration-Locating Authentication Watermarking for Binary Images , 2004, IWDW.

[15]  Hae Yong Kim A new public-key authentication watermarking for binary document images resistant to parity attacks , 2005, IEEE International Conference on Image Processing 2005.

[16]  Hae Yong Kim,et al.  A secure authentication watermarking for halftone and binary images , 2004, Int. J. Imaging Syst. Technol..

[17]  Soo-Chang Pei,et al.  Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images , 2003, IEEE Trans. Circuits Syst. Video Technol..

[18]  Pamela C. Cosman,et al.  Symbol dictionary design for the JBIG2 standard , 2000, Proceedings DCC 2000. Data Compression Conference.

[19]  Shen-Ge Wang,et al.  Digital watermarks using stochastic screens , 1997, Electronic Imaging.

[20]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.