Skip to main content

Watermarking for Image Authentication

  • Chapter
  • First Online:
Robust Image Authentication in the Presence of Noise

Abstract

Digital multimedia has become a ubiquitous part of the modern life with the rapid advancement of network communications systems. Digital multimedia content, in the form of images, audios, and videos, is widely used in electronic commerce, national security, forensics, networked communications, social networking websites, and other fields. Through electronic devices, digital multimedia information can be quickly and conveniently shared over the Internet. With the state-of-the-art powerful signal and image processing techniques and the widely available multimedia editing tools with perfect reconstruction capabilities, digital multimedia content is susceptible to malicious manipulations and alterations. It is difficult for users to establish the authenticity of the multimedia content. As a consequence, the copyright owners may suffer huge economic losses and reduced value of the actual multimedia resources. It might also cause a social disorder if digital multimedia content, such as confidential government documents, judicial evidences, or other significant information, were maliciously tampered. Digital images are one of the most widely used types of multimedia and a basis for video. Therefore, the content protection of multimedia, such as images and videos, is becoming an important problem in the study of information security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tirkel AZ, Rankin GA, Van Schyndel RM, Ho WJ Mee NRA. Osborne CF. Electronic watermark. Digital Image Computing, Technology and Applications (DICTA’93); 1993. pp. 666–73.

    Google Scholar 

  2. Fung C, Gortan A, Godoy JW. A review study on image digital watermarking. The Tenth International Conference on Networks (ICN 2011); 2011. pp. 24–8.

    Google Scholar 

  3. Li C, et al. Multi-block dependency based fragile watermarking scheme for fingerprint images protection. Multimed Tool Appl. 2013;64(3):757–76.

    Article  Google Scholar 

  4. Hartung F, Su JK, Girod B. Spread spectrum watermarking: malicious attacks and counterattacks. Image. 1999;1(1):12.

    Google Scholar 

  5. Thabit R, Khoo BE. Robust reversible watermarking scheme using Slantlet transform matrix. J Syst Softw. 2014;88:74–86.

    Article  Google Scholar 

  6. Arsalan M, Malik SA, Khan A. Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw. 2012;85(4):883–94.

    Article  Google Scholar 

  7. Jiménez-Salinas M, Garcia-Ugalde F. Improved spread spectrum image watermarking in contourlet domain. 23rd International Conference Image and Vision Computing New Zealand; 2008. pp. 1–6.

    Google Scholar 

  8. Zhang R, Wang H, Wang Y. A novel image authentification based on semi-fragile watermarking. 2012 Fifth International Joint Conference on Computational Sciences and Optimization (CSO); 2012. pp. 631–4.

    Google Scholar 

  9. Barton JM. Method and apparatus for embedding authentication information within digital data. US Patent HS5646997, 8 July 1997. 1997.

    Google Scholar 

  10. Honsinger CW, et al. Lossless recovery of an original image containing embedded data. US Patent 6,278, 791, 21 Aug 2001. 2001.

    Google Scholar 

  11. Tian J. Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol. 2003;13(8):890–6.

    Article  Google Scholar 

  12. Ni Z, et al. Reversible data hiding. IEEE Trans Circuits Syst Video Technol. 2006;16(3):354–62.

    Article  Google Scholar 

  13. Poonkuntran S, Rajesh RS. Chaotic model based semi fragile watermarking using integer transforms for digital fundus image authentication. Multimed Tools Appl. 2012;68(1):79–93.

    Article  Google Scholar 

  14. Alavianmehr MA, et al. A semi-fragile lossless data hiding scheme based on multi-level histogram shift in image integer wavelet transform domain. 2012 Sixth International Symposium on Telecommunications (IST); 2012. pp. 976–81.

    Google Scholar 

  15. Fridrich J, Goljan M. Images with self-correcting capabilities. 1999 International Conference on Image Processing (ICIP 99); 1999. pp. 792–6.

    Google Scholar 

  16. He H, Zhang J, Chen F. Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process. 2009;89(8):1557–66.

    Article  MATH  Google Scholar 

  17. Lee T, Lin SD. Dual watermark for image tamper detection and recovery. Pattern Recog. 2008;41(11):3497–506.

    Article  MATH  Google Scholar 

  18. Zhang X, Wang S. Fragile watermarking scheme using a hierarchical mechanism. Signal Process. 2009;89(4):675–9.

    Article  MATH  Google Scholar 

  19. Zhang X, Wang S, Qian Z, et al. Self-embedding watermark with flexible restoration quality. Multimedia Tools Appl. 2011;54(2):385–95.

    Google Scholar 

  20. Zhang X, Qian Z, Ren Y, et al. Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans Inf Forensics Secur. 2011;4(6):1223–32.

    Article  Google Scholar 

  21. Lin C, Chang S. SARI: self-authentication-and-recovery image watermarking system. Proceedings of the ninth ACM international conference on Multimedia; 2001. pp. 628–9.

    Google Scholar 

  22. Cheddad A, Condell J, Curran K, et al. A secure and improved self-embedding algorithm to combat digital document forgery. Signal Process. 2009;89(12):2324–32.

    Article  MATH  Google Scholar 

  23. Chamlawi R, Khan A, Usman I. Authentication and recovery of images using multiple watermarks. Computer Electr Eng. 2010;36(3):578–84.

    Article  MATH  Google Scholar 

  24. Zhu X, Ho AT, Marziliano P. A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process:Image Commun. 2007;22(5):515–28.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chen Ling .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Ling, C., Ur-Rehman, O. (2015). Watermarking for Image Authentication. In: Živić, N. (eds) Robust Image Authentication in the Presence of Noise. Springer, Cham. https://doi.org/10.1007/978-3-319-13156-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13156-6_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13155-9

  • Online ISBN: 978-3-319-13156-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics