Abstract
In this paper, we propose a new method for authentication, integrity and invertibility of digital images using invertible watermarking. While all watermarking schemes introduce some small amount of non-invertible distortion in the image, the new method is invertible in the sense that, if the image is deemed authentic, the distortion on the extraction procedure can be removed to obtain the original image data. Authentication data is produced from XOR operation between watermark signal and binary bits obtained from a hash function of one block image. If the unmodified watermarked image is used, the extraction process will return the correct watermark signal and exact original image The techniques provide new assurance tools for integrity protection of sensitive imagery such as medical images
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. on Image Processing 6(12), 1673–1687 (1997)
Yeung, M., Mintzer, F.: An Invisible Watermarking Technique for Image Verification. In: Proc. ICIP, Santa Barbara, CA, vol. 2, pp. 680–683 (1997)
Memon, N., Shende, S., Wong, P.: On the Security of the Yeung-Mintzer Authentication Watermark. In: Proc. Of the IS and TPICS Symposium, Savannah, Georgia (2000)
Wong, P., Memon, N.: Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification. IEEE Trans. on Image Processing 10, 1593–1601 (2001)
Byun, S., Lee, S., Tewfik, A., Ahn, B.: A SVD-Based Fragile Watermarking Scheme for Image Authentication. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol. 2613, pp. 170–178. Springer, Heidelberg (2003)
Fridrich, J., Goljan, M., Rui, D.: Lossless Data Embedding For All Image Formats. SPIE Photonics West, Security and Watermarking of Multimedia Contents, 572–583 (2002)
Barton, J.M.: Method and apparatus for embedding authentication information within digital data. United States Patent 5, 646–997 (1997)
Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E.: Reversible data hiding. In: Proc. of International Conference on Image Processing, vol. II, September 2002, pp. 157–160 (2002)
Fridrich, J., Goljan, M., Du., R.: Lossless data embedding - new paradigm in digital watermarking. EURASIP Journal on Applied Signal Processing, 185–196 (February 2002)
Yang, Y., Bao, F.: An Invertible Watermarking Schemes for Authentication of Electronic Clinical Brain Atlas. In: ICASSP (2003)
Goljan, M., Fridrich, J.J., Du, R.: Distortion-Free Data Embedding for Images. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 27–41. Springer, Heidelberg (2001)
Rivest, R.L.: The MD5 message digest algorithm, Tech. Rep. (1992)
Katzenbeisser, S., Fabien, A.P.: Petttcolas: Information hiding techniques for steg-anography and digital watermarking, pp. 128–129. Artech House, Boston (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yoo, KS., Kim, MA., Lee, WH. (2005). Invertible Watermarking Scheme for Authentication and Integrity. In: Ho, YS., Kim, HJ. (eds) Advances in Multimedia Information Processing - PCM 2005. PCM 2005. Lecture Notes in Computer Science, vol 3768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11582267_33
Download citation
DOI: https://doi.org/10.1007/11582267_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30040-3
Online ISBN: 978-3-540-32131-6
eBook Packages: Computer ScienceComputer Science (R0)