Combined Hashing/Watermarking Method for Image Authentication

In this paper we present a combined hashing/watermarking method for image authentication. A robust image hash, invariant to legitimate modifications, but fragile to illegitimate modifications is generated from the local image characteristics. To increase security of the system the watermark is generated using the image hash as a key. Quantized Index Modulation of DCT coefficients is used for watermark embedding. Watermark detection is performed without use of the original image. Experimental results demonstrate the effectiveness of the presented method in terms of robustness and fragility.




References:
[1] I. Cox, M. Miller, and J. Bloom, Digital Watermarking, Morgan
Kaufmann Publishers Inc., San Francisco, 2001.
[2] O. Ekici, B. Sankur, B. Coskun, U. Naci, and M. Akcay, "Comparative
evaluation of semifragile watermarking algorithms," Journal of
Electronic Imaging , vol 13, No. 1, pp. 209- 216 January 2004.
[3] J. Fridrich, "Visual hash for oblivious watermarking," Proc. of
IS&T/SPIE-s 12th Sym. on Electronic Imaging, Vol. 3971, USA, Jan
2000.
[4] R. Venkatesan, S. M. Koon, M. H. Jakubowski and P. Moulin, "Robust
image hashing," IEEE Proc. ICIP, Vol. 3, pp. 664 - 666, Sep 2000.
[5] M. Holliman, N. Memon, and M. Yeung, "On the need for image
dependent keys in watermarking," in Proc. 2nd Workshop on
Multimedia, Newark, NJ, 1999.
[6] M. Kutter, S. Voloshinovskij, and A. Herrigel, "The watermark copy
attack," Proc. SPIE, vol. 3657, pp. 226-239, 1999.
[7] J. Cannons, and P. Moulin, "Design and statistical analysis of a hashaided
image watermarking system," IEEE Trans. Image Processing, vol.
13, No. 10, pp. 1393-1408, Oct. 2004
[8] D. K. Roberts, "Security camera video authentication", 10th IEEE Digital
Signal Processing Workshop, Pine Mountain, Georgia, USA, October
13-16, 2002.
[9] B. Chen and W. Wornell, "Quantization Index Modulation: A class of
provably good methods for digital watermarking and information
embedding", IEEE Trans. Information Theory, vol. 47, No. 4, May 20