Content-based watermarking in image authentication allowing remedying of tampered images

Fu Hao Yeh, Greg C Lee

Research output: Contribution to journalArticle

14 Citations (Scopus)

Abstract

Fragile watermarking techniques are developed to ensure the credibility, and integrity of images in open communication channels. Many related studies have proposed methods for accurately localizing tampered areas, but the ability to recover such areas has received less attention. Therefore, we propose a content-based fragile watermarking technique that can both accurately localize tampered areas and correct them in details, using embedded content-based watermarks. Our scheme provides a novel watermark structure. It adopts JPEG-compressed watermark prototypes and categorizes them into smooth, mid-textured, and textured areas. To resist forged-watermark attacks and promote self-recovery ability, the relationships among blocks are created by a toral automorphism with an asymmetric key structure. Furthermore, the watermark prototypes are disordered by a one-way hashing function and encrypted by a public-key encryption function to increase the security of watermarks. Finally, the watermarks are embedded to protect the integrity of images. Experiments show that the proposed scheme can correctly localize tampered areas and remedy them to the extent of JPEG-compression quality even when 50% of the image is cropped, and resist forge-watermark attacks.

Original languageEnglish
Article number077004
JournalOptical Engineering
Volume45
Issue number7
DOIs
Publication statusPublished - 2006 Jul 1

Fingerprint

Watermarking
Authentication
Cryptography
integrity
attack
Recovery
prototypes
Experiments
communication
recovery

Keywords

  • Image processing
  • Image reconstruction
  • Image transmission

ASJC Scopus subject areas

  • Atomic and Molecular Physics, and Optics
  • Engineering(all)

Cite this

Content-based watermarking in image authentication allowing remedying of tampered images. / Yeh, Fu Hao; Lee, Greg C.

In: Optical Engineering, Vol. 45, No. 7, 077004, 01.07.2006.

Research output: Contribution to journalArticle

@article{6bba2b83607d4100a38301dc4e44c3f9,
title = "Content-based watermarking in image authentication allowing remedying of tampered images",
abstract = "Fragile watermarking techniques are developed to ensure the credibility, and integrity of images in open communication channels. Many related studies have proposed methods for accurately localizing tampered areas, but the ability to recover such areas has received less attention. Therefore, we propose a content-based fragile watermarking technique that can both accurately localize tampered areas and correct them in details, using embedded content-based watermarks. Our scheme provides a novel watermark structure. It adopts JPEG-compressed watermark prototypes and categorizes them into smooth, mid-textured, and textured areas. To resist forged-watermark attacks and promote self-recovery ability, the relationships among blocks are created by a toral automorphism with an asymmetric key structure. Furthermore, the watermark prototypes are disordered by a one-way hashing function and encrypted by a public-key encryption function to increase the security of watermarks. Finally, the watermarks are embedded to protect the integrity of images. Experiments show that the proposed scheme can correctly localize tampered areas and remedy them to the extent of JPEG-compression quality even when 50{\%} of the image is cropped, and resist forge-watermark attacks.",
keywords = "Image processing, Image reconstruction, Image transmission",
author = "Yeh, {Fu Hao} and Lee, {Greg C}",
year = "2006",
month = "7",
day = "1",
doi = "10.1117/1.2227367",
language = "English",
volume = "45",
journal = "Optical Engineering",
issn = "0091-3286",
publisher = "SPIE",
number = "7",

}

TY - JOUR

T1 - Content-based watermarking in image authentication allowing remedying of tampered images

AU - Yeh, Fu Hao

AU - Lee, Greg C

PY - 2006/7/1

Y1 - 2006/7/1

N2 - Fragile watermarking techniques are developed to ensure the credibility, and integrity of images in open communication channels. Many related studies have proposed methods for accurately localizing tampered areas, but the ability to recover such areas has received less attention. Therefore, we propose a content-based fragile watermarking technique that can both accurately localize tampered areas and correct them in details, using embedded content-based watermarks. Our scheme provides a novel watermark structure. It adopts JPEG-compressed watermark prototypes and categorizes them into smooth, mid-textured, and textured areas. To resist forged-watermark attacks and promote self-recovery ability, the relationships among blocks are created by a toral automorphism with an asymmetric key structure. Furthermore, the watermark prototypes are disordered by a one-way hashing function and encrypted by a public-key encryption function to increase the security of watermarks. Finally, the watermarks are embedded to protect the integrity of images. Experiments show that the proposed scheme can correctly localize tampered areas and remedy them to the extent of JPEG-compression quality even when 50% of the image is cropped, and resist forge-watermark attacks.

AB - Fragile watermarking techniques are developed to ensure the credibility, and integrity of images in open communication channels. Many related studies have proposed methods for accurately localizing tampered areas, but the ability to recover such areas has received less attention. Therefore, we propose a content-based fragile watermarking technique that can both accurately localize tampered areas and correct them in details, using embedded content-based watermarks. Our scheme provides a novel watermark structure. It adopts JPEG-compressed watermark prototypes and categorizes them into smooth, mid-textured, and textured areas. To resist forged-watermark attacks and promote self-recovery ability, the relationships among blocks are created by a toral automorphism with an asymmetric key structure. Furthermore, the watermark prototypes are disordered by a one-way hashing function and encrypted by a public-key encryption function to increase the security of watermarks. Finally, the watermarks are embedded to protect the integrity of images. Experiments show that the proposed scheme can correctly localize tampered areas and remedy them to the extent of JPEG-compression quality even when 50% of the image is cropped, and resist forge-watermark attacks.

KW - Image processing

KW - Image reconstruction

KW - Image transmission

UR - http://www.scopus.com/inward/record.url?scp=33749378971&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33749378971&partnerID=8YFLogxK

U2 - 10.1117/1.2227367

DO - 10.1117/1.2227367

M3 - Article

AN - SCOPUS:33749378971

VL - 45

JO - Optical Engineering

JF - Optical Engineering

SN - 0091-3286

IS - 7

M1 - 077004

ER -