Combined Hashing/Watermarking Method for Image Authentication
In this paper we present a combined
hashing/watermarking method for image authentication. A robust
image hash, invariant to legitimate modifications, but fragile to
illegitimate modifications is generated from the local image
characteristics. To increase security of the system the watermark is
generated using the image hash as a key. Quantized Index
Modulation of DCT coefficients is used for watermark embedding.
Watermark detection is performed without use of the original image.
Experimental results demonstrate the effectiveness of the presented
method in terms of robustness and fragility.
[1] I. Cox, M. Miller, and J. Bloom, Digital Watermarking, Morgan
Kaufmann Publishers Inc., San Francisco, 2001.
[2] O. Ekici, B. Sankur, B. Coskun, U. Naci, and M. Akcay, "Comparative
evaluation of semifragile watermarking algorithms," Journal of
Electronic Imaging , vol 13, No. 1, pp. 209- 216 January 2004.
[3] J. Fridrich, "Visual hash for oblivious watermarking," Proc. of
IS&T/SPIE-s 12th Sym. on Electronic Imaging, Vol. 3971, USA, Jan
2000.
[4] R. Venkatesan, S. M. Koon, M. H. Jakubowski and P. Moulin, "Robust
image hashing," IEEE Proc. ICIP, Vol. 3, pp. 664 - 666, Sep 2000.
[5] M. Holliman, N. Memon, and M. Yeung, "On the need for image
dependent keys in watermarking," in Proc. 2nd Workshop on
Multimedia, Newark, NJ, 1999.
[6] M. Kutter, S. Voloshinovskij, and A. Herrigel, "The watermark copy
attack," Proc. SPIE, vol. 3657, pp. 226-239, 1999.
[7] J. Cannons, and P. Moulin, "Design and statistical analysis of a hashaided
image watermarking system," IEEE Trans. Image Processing, vol.
13, No. 10, pp. 1393-1408, Oct. 2004
[8] D. K. Roberts, "Security camera video authentication", 10th IEEE Digital
Signal Processing Workshop, Pine Mountain, Georgia, USA, October
13-16, 2002.
[9] B. Chen and W. Wornell, "Quantization Index Modulation: A class of
provably good methods for digital watermarking and information
embedding", IEEE Trans. Information Theory, vol. 47, No. 4, May 20
[1] I. Cox, M. Miller, and J. Bloom, Digital Watermarking, Morgan
Kaufmann Publishers Inc., San Francisco, 2001.
[2] O. Ekici, B. Sankur, B. Coskun, U. Naci, and M. Akcay, "Comparative
evaluation of semifragile watermarking algorithms," Journal of
Electronic Imaging , vol 13, No. 1, pp. 209- 216 January 2004.
[3] J. Fridrich, "Visual hash for oblivious watermarking," Proc. of
IS&T/SPIE-s 12th Sym. on Electronic Imaging, Vol. 3971, USA, Jan
2000.
[4] R. Venkatesan, S. M. Koon, M. H. Jakubowski and P. Moulin, "Robust
image hashing," IEEE Proc. ICIP, Vol. 3, pp. 664 - 666, Sep 2000.
[5] M. Holliman, N. Memon, and M. Yeung, "On the need for image
dependent keys in watermarking," in Proc. 2nd Workshop on
Multimedia, Newark, NJ, 1999.
[6] M. Kutter, S. Voloshinovskij, and A. Herrigel, "The watermark copy
attack," Proc. SPIE, vol. 3657, pp. 226-239, 1999.
[7] J. Cannons, and P. Moulin, "Design and statistical analysis of a hashaided
image watermarking system," IEEE Trans. Image Processing, vol.
13, No. 10, pp. 1393-1408, Oct. 2004
[8] D. K. Roberts, "Security camera video authentication", 10th IEEE Digital
Signal Processing Workshop, Pine Mountain, Georgia, USA, October
13-16, 2002.
[9] B. Chen and W. Wornell, "Quantization Index Modulation: A class of
provably good methods for digital watermarking and information
embedding", IEEE Trans. Information Theory, vol. 47, No. 4, May 20
@article{"International Journal of Information, Control and Computer Sciences:55571", author = "Vlado Kitanovski and Dimitar Taskovski and Sofija Bogdanova", title = "Combined Hashing/Watermarking Method for Image Authentication", abstract = "In this paper we present a combined
hashing/watermarking method for image authentication. A robust
image hash, invariant to legitimate modifications, but fragile to
illegitimate modifications is generated from the local image
characteristics. To increase security of the system the watermark is
generated using the image hash as a key. Quantized Index
Modulation of DCT coefficients is used for watermark embedding.
Watermark detection is performed without use of the original image.
Experimental results demonstrate the effectiveness of the presented
method in terms of robustness and fragility.", keywords = "authentication, blind watermarking, image hash,
semi-fragile watermarking", volume = "1", number = "6", pages = "1647-7", }