Abstract
Invertible authentication techniques have been used in some special applications (such as medical or military applications), where original data can be recovered after being authenticated. In this paper, we proposed a new scheme combine features (relation of coefficients) in DCT domain with content features (edges or textures) of JPEG image into multi-feature, which is useful to authenticate images in both spatial and frequency domains. A novel invertible data embedding mechanism based on random walk is proposed. Experimental results show that the algorithm is sensitive to intended tampers while accepting appropriate JPEG recompressions, and even more, it has the ability to locate corrupt areas. Compared with authentication scheme based on features extracted from single domain, the “miss alarm” probability of our scheme is much lower.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lin, C.-Y., Chang, S.-F.: Issues and Solutions for Authenticating MPEG Video. In: SPIE Conf. on Security and Watermarking of Multimedia Contents, San Jose, CA, January 1999, vol. 3657, pp. 54–65 (1999)
Fridrich, J., Goljan, M., Du, R.: Invertible Authentication Watermark for JPEG Images. In: ITCC 2001, Las Vegas, Nevada, April 2-4, pp. 223–227 (2001)
Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless Recovery of an Original Image Containing Embedded Data. US Patent 6, 278, 791 (August 2001)
Bhattacharjee, S., Kutter, M.: Compression Tolerant Image Authentication. In: IEEE International Conf. on Image Processing, Chicago (October 1998)
Queluz, M.P.: Content-based Integrity Protection of Digital Images. In: SPIE Conf. on Security and Watermarking of Multimedia Contents, San Jose, CA, January 1999, vol. 3657, pp. 85–93 (1999)
Tian, J.: Wavelet-based reversible watermarking for authentication. In: Proc. Security and Watermarking of Multimedia Contents IV, Electronic Imaging 2002, January 20-25, vol. 4675, pp. 679–690 (2002)
Vleeschouwer, C.D., Delaigle, J.F., Macq, B.: Circular Interpretation of Bijective Transformations in lossless Watermarking for Media Asset Management. In: IEEE Transaction on Multimedia (March 2003)
Awrangjeb, M., Kankanhalli, M.S.: Lossless Watermarking Considering the Human Visual System. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 581–592. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Deng-Pan, Y., Yao-Bin, M., Yue-Wei, D., Zhi-Quan, W. (2005). A Multi-feature Based Invertible Authentication Watermarking for JPEG Images. In: Cox, I.J., Kalker, T., Lee, HK. (eds) Digital Watermarking. IWDW 2004. Lecture Notes in Computer Science, vol 3304. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31805-7_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-31805-7_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24839-2
Online ISBN: 978-3-540-31805-7
eBook Packages: Computer ScienceComputer Science (R0)