Abstract
Digital multimedia has become a ubiquitous part of the modern life with the rapid advancement of network communications systems. Digital multimedia content, in the form of images, audios, and videos, is widely used in electronic commerce, national security, forensics, networked communications, social networking websites, and other fields. Through electronic devices, digital multimedia information can be quickly and conveniently shared over the Internet. With the state-of-the-art powerful signal and image processing techniques and the widely available multimedia editing tools with perfect reconstruction capabilities, digital multimedia content is susceptible to malicious manipulations and alterations. It is difficult for users to establish the authenticity of the multimedia content. As a consequence, the copyright owners may suffer huge economic losses and reduced value of the actual multimedia resources. It might also cause a social disorder if digital multimedia content, such as confidential government documents, judicial evidences, or other significant information, were maliciously tampered. Digital images are one of the most widely used types of multimedia and a basis for video. Therefore, the content protection of multimedia, such as images and videos, is becoming an important problem in the study of information security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Tirkel AZ, Rankin GA, Van Schyndel RM, Ho WJ Mee NRA. Osborne CF. Electronic watermark. Digital Image Computing, Technology and Applications (DICTA’93); 1993. pp. 666–73.
Fung C, Gortan A, Godoy JW. A review study on image digital watermarking. The Tenth International Conference on Networks (ICN 2011); 2011. pp. 24–8.
Li C, et al. Multi-block dependency based fragile watermarking scheme for fingerprint images protection. Multimed Tool Appl. 2013;64(3):757–76.
Hartung F, Su JK, Girod B. Spread spectrum watermarking: malicious attacks and counterattacks. Image. 1999;1(1):12.
Thabit R, Khoo BE. Robust reversible watermarking scheme using Slantlet transform matrix. J Syst Softw. 2014;88:74–86.
Arsalan M, Malik SA, Khan A. Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw. 2012;85(4):883–94.
Jiménez-Salinas M, Garcia-Ugalde F. Improved spread spectrum image watermarking in contourlet domain. 23rd International Conference Image and Vision Computing New Zealand; 2008. pp. 1–6.
Zhang R, Wang H, Wang Y. A novel image authentification based on semi-fragile watermarking. 2012 Fifth International Joint Conference on Computational Sciences and Optimization (CSO); 2012. pp. 631–4.
Barton JM. Method and apparatus for embedding authentication information within digital data. US Patent HS5646997, 8 July 1997. 1997.
Honsinger CW, et al. Lossless recovery of an original image containing embedded data. US Patent 6,278, 791, 21 Aug 2001. 2001.
Tian J. Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol. 2003;13(8):890–6.
Ni Z, et al. Reversible data hiding. IEEE Trans Circuits Syst Video Technol. 2006;16(3):354–62.
Poonkuntran S, Rajesh RS. Chaotic model based semi fragile watermarking using integer transforms for digital fundus image authentication. Multimed Tools Appl. 2012;68(1):79–93.
Alavianmehr MA, et al. A semi-fragile lossless data hiding scheme based on multi-level histogram shift in image integer wavelet transform domain. 2012 Sixth International Symposium on Telecommunications (IST); 2012. pp. 976–81.
Fridrich J, Goljan M. Images with self-correcting capabilities. 1999 International Conference on Image Processing (ICIP 99); 1999. pp. 792–6.
He H, Zhang J, Chen F. Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process. 2009;89(8):1557–66.
Lee T, Lin SD. Dual watermark for image tamper detection and recovery. Pattern Recog. 2008;41(11):3497–506.
Zhang X, Wang S. Fragile watermarking scheme using a hierarchical mechanism. Signal Process. 2009;89(4):675–9.
Zhang X, Wang S, Qian Z, et al. Self-embedding watermark with flexible restoration quality. Multimedia Tools Appl. 2011;54(2):385–95.
Zhang X, Qian Z, Ren Y, et al. Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans Inf Forensics Secur. 2011;4(6):1223–32.
Lin C, Chang S. SARI: self-authentication-and-recovery image watermarking system. Proceedings of the ninth ACM international conference on Multimedia; 2001. pp. 628–9.
Cheddad A, Condell J, Curran K, et al. A secure and improved self-embedding algorithm to combat digital document forgery. Signal Process. 2009;89(12):2324–32.
Chamlawi R, Khan A, Usman I. Authentication and recovery of images using multiple watermarks. Computer Electr Eng. 2010;36(3):578–84.
Zhu X, Ho AT, Marziliano P. A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process:Image Commun. 2007;22(5):515–28.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ling, C., Ur-Rehman, O. (2015). Watermarking for Image Authentication. In: Živić, N. (eds) Robust Image Authentication in the Presence of Noise. Springer, Cham. https://doi.org/10.1007/978-3-319-13156-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-13156-6_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13155-9
Online ISBN: 978-3-319-13156-6
eBook Packages: EngineeringEngineering (R0)