Secure hybrid robust watermarking resistant against tampering and copy attack

被引:43
作者
Deguillaume, F [1 ]
Voloshynovskiy, S [1 ]
Pun, T [1 ]
机构
[1] Univ Geneva, CUI, Dept Comp Sci, CH-1211 Geneva 4, Switzerland
关键词
hybrid watermarking; tamper proofing; authentication; copyright protection; copy attack; substitution attacks;
D O I
10.1016/S0165-1684(03)00172-5
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Digital watermarking appears today as an efficient mean of securing multimedia documents. Several application scenarios in the security of digital watermarking have been pointed out, each of them with different requirements. The three main identified scenarios are: copyright protection, i.e. protecting ownership and usage rights; tamper proofing, aiming at detecting malicious modifications; and authentication, the purpose of which is to check the authenticity of the originator of a document. While robust watermarks, which survive to any change or alteration of the protected documents, are typically used for copyright protection, tamper proofing and authentication generally require fragile or semi-fragile watermarks in order to detect modified or faked documents. Further, most of robust watermarking schemes are vulnerable to the so-called copy attack, where a watermark can be copied from one document to another by any unauthorized person, making these schemes inefficient in all authentication applications. In this paper, we propose a hybrid watermarking method joining a robust and a fragile or semi-fragile watermark, and thus combining copyright protection and tamper proofing. As a result this approach is at the same time resistant against copy attack. In addition, the fragile information is inserted in a way which preserves robustness and reliability of the robust part. The numerous tests and the results obtained according to the Stirmark benchmark demonstrate the superior performance of the proposed approach. (C) 2003 Elsevier B.V. All rights reserved.
引用
收藏
页码:2133 / 2170
页数:38
相关论文
共 66 条
[1]  
ALATTAR A, 2000, IS T SPIES 12 ANN S, V3971
[2]  
[Anonymous], S CONT SEC DAT HID D
[3]  
Barreto PSLM, 2001, 2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, P494, DOI 10.1109/ICIP.2001.958536
[4]   Near optimum error correcting coding and decoding: Turbo-codes [J].
Berrou, C ;
Glavieux, A .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1996, 44 (10) :1261-1271
[5]  
BHATTACHARJEE S, IEEE INT C IM PROC 9
[6]   Representations that uniquely characterize images module translation, rotation, and scaling [J].
Brandt, RD ;
Lin, F .
PATTERN RECOGNITION LETTERS, 1996, 17 (09) :1001-1015
[7]  
Celik MU, 2001, 2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, P502, DOI 10.1109/ICIP.2001.958538
[8]   Digital watermarking and information embedding using dither modulation [J].
Chen, B ;
Wornell, GW .
1998 IEEE SECOND WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 1998, :273-278
[9]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[10]   Fragile imperceptible digital watermark with privacy control [J].
Coppersmith, D ;
Mintzer, F ;
Tresser, C ;
Wu, CW ;
Yeung, MM .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 :79-84