A secure authentication watermarking for halftone and binary images

被引:17
作者
Kim, HY [1 ]
Afif, A [1 ]
机构
[1] Univ Sao Paulo, Escola Politecn, BR-05508900 Sao Paulo, Brazil
关键词
authentication watermarking; fragile watermarking; half-toning; binary image;
D O I
10.1002/ima.20018
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An authentication watermark is a hidden data inserted into an image that can be used to detect any accidental or malicious alteration in the image. Many authentication-watermarking techniques for continuous-tone images are described in the literature, but only a quite small number of secure authentication watermarking techniques are available for binary/halftone images. This article proposes a simple solution for inserting a secure authentication watermark in binary/halftone images. It consists of choosing a set of pseudo-random pixels in the image, clearing them, computing the message authentication code (or the digital signature) of the now-cleared image, and inserting the resulting code into the selected random pixels. Dispersed-dot halftone images watermarked by the proposed technique present better visual quality than do watermarked generic binary images. However, in practice, the visual degradation is hardly noticeable in either case. The proposed technique seems to be the only binary/halftone watermarking scheme that can detect even a single pixel alteration in the host image. It can be used with secret-key or public-key ciphers. (C) 2004 Wiley Periodicals, Inc.
引用
收藏
页码:147 / 152
页数:6
相关论文
共 22 条
[1]  
BARHARAV Z, 1998, HPL9832
[2]  
BARRETO PS, 1999, P 12 IEEE BRAZ S COM, P241
[3]  
BARRETO PSLM, 2002, IEEE P VISION IMAGE, V2, P57
[4]  
CHUN IG, 2003, 2 INT WORKSH DIG WAT, P200
[5]   THE TRUSTWORTHY DIGITAL CAMERA - RESTORING CREDIBILITY TO THE PHOTOGRAPHIC IMAGE [J].
FRIEDMAN, GL .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1993, 39 (04) :905-910
[6]  
Fu MS, 2000, INT CONF ACOUST SPEE, P2318, DOI 10.1109/ICASSP.2000.859304
[7]  
FU MS, 2002, IEEE INT S CIRC SYST, V3, P639
[8]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[9]   Secure authentication watermarking for binary images [J].
Kim, HY ;
Afif, A .
XVI BRAZILIAN SYMPOSIUM ON COMPUTER GRAPHICS AND IMAGE PROCESSING, PROCEEDINGS, 2003, :199-206
[10]   DIGITAL HALFTONES BY DOT DIFFUSION [J].
KNUTH, DE .
ACM TRANSACTIONS ON GRAPHICS, 1987, 6 (04) :245-273