Hierarchical watermarking for secure image authentication with localization

被引:261
作者
Celik, MU
Sharma, G
Saber, E
Tekalp, AM
机构
[1] Univ Rochester, Dept Comp Engn, Rochester, NY 14627 USA
[2] Xerox Corp, Webster, NY 14580 USA
[3] Koc Univ, Coll Engn, Istanbul, Turkey
关键词
authentication; fragile watermark; tamper localization; vector quantization attack;
D O I
10.1109/TIP.2002.1014990
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
SeveraI fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to improve security. Using a hierarchical structure, we propose a method that thwarts the VQ attack while sustaining the superior localization properties of blockwise independent watermarking methods. In particular, we propose dividing the image into blocks in a multilevel hierarchy and calculating block signatures in this hierarchy. While signatures of small blocks on the lowest level of the hierarchy ensure superior accuracy of tamper localization, higher level block signatures provide increasing resistance to VQ attacks. At the top level, a signature calculated using the whole image completely thwarts the counterfeiting attack. Moreover, "sliding window" searches through the hierarchy enable the verification of untampered regions after an image has been cropped. We provide experimental results to demonstrate the effectiveness of our method.
引用
收藏
页码:585 / 595
页数:11
相关论文
共 17 条
[1]  
BHATTACHARJEE S, 1998, P IEEE INT C IM PROC
[2]  
COX IJ, 1999, P SPIE, V3016
[3]  
EGGERS J, 2001, P IEEE ICASSP SALT L
[4]  
FRIDRICH J, 2000, P IEEE INT C IM PROC
[5]  
FRIDRICH J, 2002, P SPIE, V4675
[6]   THE TRUSTWORTHY DIGITAL CAMERA - RESTORING CREDIBILITY TO THE PHOTOGRAPHIC IMAGE [J].
FRIEDMAN, GL .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1993, 39 (04) :905-910
[7]   Multimedia watermarking techniques [J].
Hartung, F ;
Kutter, M .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1079-1107
[8]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[9]   Digital watermarking for telltale tamper proofing and authentication [J].
Kundur, D ;
Hatzinakos, D .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1167-1180
[10]   Watermarking digital image and video data - A state-of-the-art overview [J].
Langelaar, GC ;
Setyawan, I ;
Lagendijk, RL .
IEEE SIGNAL PROCESSING MAGAZINE, 2000, 17 (05) :20-46