Semifragile hybrid watermarking method for image authentication

Greg C Lee, Fu Hao Yeh

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

We propose an adaptive watermarking technique that is robust to JPEG compression and sensitive to malicious manipulations, including counterfeiting attacks. The watermarking technique includes three major functions: generating content-based watermarks, hybrid watermarking, and calibration. Two features, invariant to JPEG compression, used to generate content-based watermarks increase the resistance to counterfeiting attacks. The watermarks are embedded using various strategies, depending on the characteristics of discrete cosine transform (DCT) coefficients. Finally, two calibration functions are used to increase the accuracy of authentication. Experimental results demonstrate that the proposed watermarking technique can blindly localize tampered areas, is robust to JPEG compression, and is sensitive to malicious manipulations, including counterfeiting attacks.

Original languageEnglish
Article number057002
JournalOptical Engineering
Volume46
Issue number5
DOIs
Publication statusPublished - 2007 May 1

Fingerprint

Watermarking
Authentication
attack
manipulators
discrete cosine transform
Calibration
Discrete cosine transforms
coefficients

Keywords

  • Digital watermaking
  • Image authentication
  • Semifragile watermaking

ASJC Scopus subject areas

  • Atomic and Molecular Physics, and Optics

Cite this

Semifragile hybrid watermarking method for image authentication. / Lee, Greg C; Yeh, Fu Hao.

In: Optical Engineering, Vol. 46, No. 5, 057002, 01.05.2007.

Research output: Contribution to journalArticle

@article{351adefc4e53478f8dcd94c125b6a4fa,
title = "Semifragile hybrid watermarking method for image authentication",
abstract = "We propose an adaptive watermarking technique that is robust to JPEG compression and sensitive to malicious manipulations, including counterfeiting attacks. The watermarking technique includes three major functions: generating content-based watermarks, hybrid watermarking, and calibration. Two features, invariant to JPEG compression, used to generate content-based watermarks increase the resistance to counterfeiting attacks. The watermarks are embedded using various strategies, depending on the characteristics of discrete cosine transform (DCT) coefficients. Finally, two calibration functions are used to increase the accuracy of authentication. Experimental results demonstrate that the proposed watermarking technique can blindly localize tampered areas, is robust to JPEG compression, and is sensitive to malicious manipulations, including counterfeiting attacks.",
keywords = "Digital watermaking, Image authentication, Semifragile watermaking",
author = "Lee, {Greg C} and Yeh, {Fu Hao}",
year = "2007",
month = "5",
day = "1",
doi = "10.1117/1.2740735",
language = "English",
volume = "46",
journal = "Optical Engineering",
issn = "0091-3286",
publisher = "SPIE",
number = "5",

}

TY - JOUR

T1 - Semifragile hybrid watermarking method for image authentication

AU - Lee, Greg C

AU - Yeh, Fu Hao

PY - 2007/5/1

Y1 - 2007/5/1

N2 - We propose an adaptive watermarking technique that is robust to JPEG compression and sensitive to malicious manipulations, including counterfeiting attacks. The watermarking technique includes three major functions: generating content-based watermarks, hybrid watermarking, and calibration. Two features, invariant to JPEG compression, used to generate content-based watermarks increase the resistance to counterfeiting attacks. The watermarks are embedded using various strategies, depending on the characteristics of discrete cosine transform (DCT) coefficients. Finally, two calibration functions are used to increase the accuracy of authentication. Experimental results demonstrate that the proposed watermarking technique can blindly localize tampered areas, is robust to JPEG compression, and is sensitive to malicious manipulations, including counterfeiting attacks.

AB - We propose an adaptive watermarking technique that is robust to JPEG compression and sensitive to malicious manipulations, including counterfeiting attacks. The watermarking technique includes three major functions: generating content-based watermarks, hybrid watermarking, and calibration. Two features, invariant to JPEG compression, used to generate content-based watermarks increase the resistance to counterfeiting attacks. The watermarks are embedded using various strategies, depending on the characteristics of discrete cosine transform (DCT) coefficients. Finally, two calibration functions are used to increase the accuracy of authentication. Experimental results demonstrate that the proposed watermarking technique can blindly localize tampered areas, is robust to JPEG compression, and is sensitive to malicious manipulations, including counterfeiting attacks.

KW - Digital watermaking

KW - Image authentication

KW - Semifragile watermaking

UR - http://www.scopus.com/inward/record.url?scp=34447569503&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=34447569503&partnerID=8YFLogxK

U2 - 10.1117/1.2740735

DO - 10.1117/1.2740735

M3 - Article

VL - 46

JO - Optical Engineering

JF - Optical Engineering

SN - 0091-3286

IS - 5

M1 - 057002

ER -