Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33090
Combined Hashing/Watermarking Method for Image Authentication
Authors: Vlado Kitanovski, Dimitar Taskovski, Sofija Bogdanova
Abstract:
In this paper we present a combined hashing/watermarking method for image authentication. A robust image hash, invariant to legitimate modifications, but fragile to illegitimate modifications is generated from the local image characteristics. To increase security of the system the watermark is generated using the image hash as a key. Quantized Index Modulation of DCT coefficients is used for watermark embedding. Watermark detection is performed without use of the original image. Experimental results demonstrate the effectiveness of the presented method in terms of robustness and fragility.Keywords: authentication, blind watermarking, image hash, semi-fragile watermarking
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1063010
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1999References:
[1] I. Cox, M. Miller, and J. Bloom, Digital Watermarking, Morgan Kaufmann Publishers Inc., San Francisco, 2001.
[2] O. Ekici, B. Sankur, B. Coskun, U. Naci, and M. Akcay, "Comparative evaluation of semifragile watermarking algorithms," Journal of Electronic Imaging , vol 13, No. 1, pp. 209- 216 January 2004.
[3] J. Fridrich, "Visual hash for oblivious watermarking," Proc. of IS&T/SPIE-s 12th Sym. on Electronic Imaging, Vol. 3971, USA, Jan 2000.
[4] R. Venkatesan, S. M. Koon, M. H. Jakubowski and P. Moulin, "Robust image hashing," IEEE Proc. ICIP, Vol. 3, pp. 664 - 666, Sep 2000.
[5] M. Holliman, N. Memon, and M. Yeung, "On the need for image dependent keys in watermarking," in Proc. 2nd Workshop on Multimedia, Newark, NJ, 1999.
[6] M. Kutter, S. Voloshinovskij, and A. Herrigel, "The watermark copy attack," Proc. SPIE, vol. 3657, pp. 226-239, 1999.
[7] J. Cannons, and P. Moulin, "Design and statistical analysis of a hashaided image watermarking system," IEEE Trans. Image Processing, vol. 13, No. 10, pp. 1393-1408, Oct. 2004
[8] D. K. Roberts, "Security camera video authentication", 10th IEEE Digital Signal Processing Workshop, Pine Mountain, Georgia, USA, October 13-16, 2002.
[9] B. Chen and W. Wornell, "Quantization Index Modulation: A class of provably good methods for digital watermarking and information embedding", IEEE Trans. Information Theory, vol. 47, No. 4, May 20