Abstract
In this paper, we present an effective image authentication scheme that can tolerate incidental distortions but that indicates tampered regions in cases of malicious manipulation. After having divided an image into blocks in the spatial domain and having obtained the average of each block’s pixel values, we represent the size relationship among three random blocks in a binary tree and use it as a fragile watermark. We insert the watermark, which has been extracted based on content, into the DCT block, which is the frequency domain of the image. The experimental results show that this is an effective technique of image authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Schneider, M., Chang, S.F.: A robust content based digital signature for image authentication. In: Proc. IEEE ICIP, pp. 227–230 (1996)
Lin, C.Y., Chang, S.F.: A robust image authentication method surviving JPEG lossy compression. In: Proc. SPIE Storage and Retrieval of Image/Video Database, San Jose (1998)
Bhattacharjee, S., Kutter, M.: Compression tolerant image authentication. In: Proc. IEEE Int. Conf. on Image Processing, pp. 435–439 (1998)
Lu, C.S., Liao, H.M.: Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme. In: Proc. ACM Multimedia and Security Workshop at the 8th ACM Int. Conf. on Multimedia, Los Angeles, California, USA, pp. 115–118 (2000)
Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. In: Proc. IEEE ICIP, pp. 1167–1180 (1997)
Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proc. IEEE Int. Conf. on Image Processing, pp. 680–683 (1997)
Wu, M., Liu, B.: Watermarking for image authentication. In: Proc. IEEE Int. Conf. on Image Processing, pp. 437–441 (1998)
Wong, P.W.: A public key watermark for image verification and authentication. In: Proc. IEEE Int. Conf. on Image Processing, pp. 455–459 (1998)
Zou, D., Wu, C.W., Xuan, G., Shi, Y.Q.: A content-based image authentication system with lossless data hiding. In: Proc. ICME Int. Conf. on Multimedia and Expo., pp. 213–216 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, MA., Lee, WH. (2004). A Content-Based Fragile Watermarking Scheme for Image Authentication. In: Chi, CH., Lam, KY. (eds) Content Computing. AWCC 2004. Lecture Notes in Computer Science, vol 3309. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30483-8_31
Download citation
DOI: https://doi.org/10.1007/978-3-540-30483-8_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23898-0
Online ISBN: 978-3-540-30483-8
eBook Packages: Springer Book Archive