Alteration-Locating Authentication Watermarking for Binary Images

  • Hae Yong Kim
  • Ricardo Lopes de Queiroz
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3304)


In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small number of cryptography-based secure authentication methods are available for binary images. This paper proposes a new authentication watermarking method for binary images. It can detect any visually significant alteration while maintaining good visual quality for virtually all types of binary images (possibly excluding dispersed-dot halftones). As usual, the security of the algorithm lies only on the secrecy of a secret- or private-key. This paper also presents a variation of the proposed scheme that can locate the modified region with good spatial resolution. A possible application of the proposed technique is in Internet fax transmission, i.e. for legal authentication of documents routed outside the phone network.


Binary Image Watermark Image Watermark Scheme Host Image Data Hiding 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Baharav, Z., Shaked, D.: Watermarking of Dither Halftone Images, Hewlett- Packard Labs. Tech. Rep. HPL-98-32 (1998)Google Scholar
  2. 2.
    Barreto, P.S.L.M., Kim, H.Y.: Pitfalls in Public KeyWatermarking. In: Sibgrapi – Brazilian Symp. Computer Graphics and Image Processing, pp. 241–242 (1999)Google Scholar
  3. 3.
    Barreto, P.S.L.M., Kim, H.Y., Rijmen, V.: Toward a Secure Public-Key Blockwise Fragile Authentication Watermarking. IEE Proc. Vision, Image and Signal Processing 149(2), 57–62 (2002)CrossRefGoogle Scholar
  4. 4.
    Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Celik, M.U., Sharma, G., Saber, E., Tekalp, A.M.: Hierarchical Watermarking for Secure Image Authentication with Localization. IEEE Trans. Image Processing 11(6), 585–595 (2002)CrossRefGoogle Scholar
  6. 6.
    Chen, Y.-Y., Pan, H.-K., Tseng, Y.-C.: A Secure Data Hiding Scheme for Binary Images. In: IEEE Symposium on Computers and Communications, pp. 750–755 (2000)Google Scholar
  7. 7.
    Chun, I.G., Ha, S.: A Robust Printed Image Watermarking Based on Iterative Halftoning Method. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 200–211. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  8. 8.
    de Queiroz, R., Fleckenstein, P.: Object Modification for Data Embedding through Template Ranking. Xerox Invention Proposal (1999)Google Scholar
  9. 9.
    Deseilligny, M.P., Le Men, H.: An Algorithm for Digital Watermarking of Binary Images, Application to Map and Text Images (1998), available at,
  10. 10.
    Fu, M.S., Au, O.C.: Data Hiding by Smart Pair Toggling for Halftone Images. IEEE Int. Conf. Acoustics, Speech and Signal Processing 4, 2318–2321 (2000)Google Scholar
  11. 11.
    Fu, M.S., Au, O.C.: Data Hiding Watermarking for Halftone Images. IEEE Trans. Image Processing 11(4), 477–484 (2002)CrossRefGoogle Scholar
  12. 12.
    Hel-Or, H.Z.: Watermarking and Copyright Labeling of Printed Images. Journal of Electronic Imaging 10(3), 794–803 (2001)CrossRefGoogle Scholar
  13. 13.
    Holliman, M., Memon, N.: Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes. IEEE Trans. Image Processing 9(3), 432–441 (2000)CrossRefGoogle Scholar
  14. 14.
    Kim, H.Y., Afif, A.: Secure Authentication Watermarking for Binary Images. In: Proc. Sibgrapi – Brazilian Symp. on Comp. Graph. and Image Proc., pp. 199–206 (2003)Google Scholar
  15. 15.
    Kim, H.Y., Afif, A.: Secure Authentication Watermarking for Halftone and Binary Images. Int. J. Imaging Systems and Technology (to appear)Google Scholar
  16. 16.
    Knox, K.T., Wang, S.: Digital Watermarks Using Stochastic Screens, Color Imaging: Device-Independent Color, Color Hard Copy, and Graphic Arts II. In: SPIE Proc., February 1997, vol. 3018, pp. 316–322 (1997)Google Scholar
  17. 17.
    Li, C.T., Lou, D.C., Chen, T.H.: Image Authentication and Integrity Verification via Content-Based Watermarks and a Public Key Cryptosystem. In: IEEE Int. Conf. Image Processing, vol. 3, pp. 694–697 (2000)Google Scholar
  18. 18.
    Maxemchuk, N.F., Low, S.: Marking Text Documents. In: Int. Conf. Image Processing, vol. 3, pp. 13–17 (1997)Google Scholar
  19. 19.
    Pei, S.C., Guo, J.M.: Hybrid Pixel-Based Data Hiding and Block-Based Watermarking for Error-Diffused Halftone Images. IEEE Trans. on Circuits and Systems for Video Technology 13(8), 867–884 (2003)CrossRefGoogle Scholar
  20. 20.
    Schneier, B.: Applied Cryptography. John Wiley & Sons, Chichester (1996)zbMATHGoogle Scholar
  21. 21.
    Tseng, Y.-C., Chen, Y.-Y., Pan, H.-K.: A Secure Data Hiding Scheme for Binary Images. IEEE Trans. on Communications 50(8), 1227–1231 (2002)CrossRefGoogle Scholar
  22. 22.
    Wong, P.W.: AWatermark for Image Integrity and Ownership Verification. IS&T PIC Conference (Portland, OR) (May 1998), also available as Hewlett-Packard Labs. Tech. Rep. HPL-97-72 (May 1997)Google Scholar
  23. 23.
    Wong, P.W.: A Public Key Watermark for Image Verification and Authentication. In: IEEE Int. Conf. Image Processing, vol. 1, pp. 455–459 (1998), (MA11.07)Google Scholar
  24. 24.
    Wong, P.W., Memon, N.: Secret and Public Key ImageWatermarking Schemes for Image Authentication and Ownership Verification. IEEE Trans. Image Processing,  10(10), 1593–1601 (2001)Google Scholar
  25. 25.
    Wu, M., Tang, E., Liu, B.: Data Hiding in Digital Binary Image. In: IEEE Int. Conf. Multimedia and Expo., ICME 2000, New York, USA (2000)Google Scholar
  26. 26.
    Yeung, M.M., Mintzer, F.: An Invisible Watermarking Technique for Image Verification. In: IEEE Int. Conf. Image Processing, vol. 1, pp. 680–683 (1997)Google Scholar
  27. 27.
    Zhao, J., Koch, E.: Embedding Robust Labels into Images for Copyright Protection. In: Proc. Int. Cong. Intellectual Property Rights, Knowledge and New Technologies, pp. 242–251 (1995)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Hae Yong Kim
    • 1
  • Ricardo Lopes de Queiroz
    • 2
  1. 1.Escola PolitécnicaUniversidade de São PauloBrazil
  2. 2.Universidade de BrasíliaBrazil

Personalised recommendations