Semi-fragile watermarking for authenticating JPEG visual content

被引:123
作者
Lin, CY [1 ]
Chang, SF [1 ]
机构
[1] Columbia Univ, Dept Elect Engn, New York, NY 10027 USA
来源
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II | 2000年 / 3971卷
关键词
image authentication; content verification; tampering detection; JPEG; watermark;
D O I
10.1117/12.384968
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we propose a semi-fragile watermarking technique that accepts JPEG lossy compression on the watermarked image to a pre-determined quality factor, and rejects malicious attacks. The authenticator can identify the positions of corrupted blacks, and recover them with approximation of the original ones. In addition to JPEG compression, adjustments of the brightness of the image within reasonable ranges, are also acceptable using the proposed authenticator. The security of the proposed method is achieved by using the secret block mapping function which controls the signature generating/embedding processes. Our authenticator is based on two invariant properties of DCT coefficients before and after JPEG compressions. They are deterministic so that no probabilistic decision is needed in the system. The first property shows that if we modify a DCT coefficient to an integral multiple of a quantization step, which is larger than the steps used in later JPEG compressions, then this coefficient can be exactly reconstructed after later acceptable JPEG compression. The second one is the invariant relationships between two coefficients in a block pair before and after JPEG compression. Therefore, we can use the second property to generate authentication signature, and use the first property to embed it as watermarks. There is no perceptible degradation between the watermarked image and the origianl. In additional to authentication signatures, we can also embed the recovery bits for recovering approximate pixel values in corrupted areas. Our authenticator utilizes the compressed bitstream, and thus avoids rounding errors in reconstructing DCT coefficients. Experimental results showed the effectiveness of this system. The system also guarantees no false alarms, i.e., no acceptable JPEG compression is rejected.
引用
收藏
页码:140 / 151
页数:12
相关论文
共 13 条
[1]  
BHATTACHARJEE S, 1998, IEEE P ICIP CHICAGO
[2]  
FRIDRICH J, 1998, IEEE INT C IM PROC C
[3]  
FRIDRICH J, 1998, IEEE WORKSH INT SIGN
[4]  
Jayant N. S., 1984, DIGITAL CODING WAVEF
[5]  
LIN CY, 1998, 4869719 CUCTR
[6]  
LIN CY, BIBLIO MULTIMEDIA AU
[7]  
LIN CY, 1999, P SPIE SECURITY WATE
[8]   Content-based integrity protection of digital images [J].
Queluz, MP .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 :85-93
[9]  
SCHNEIDER M, 1996, IEEE P ICIP LAUSSANE
[10]  
WOLFGANG RB, 1996, IEEE P ICIP LAUSSANE