Abstract
Most multimedia signals today are in digital formats which are easy to reproduce and modify without any trace of manipulations. In this chapter, we present a comprehensive review of current technologies for multimedia data authentication and tamper detection. We first introduce in Section 7.2 the problem issues and general requirements for a multimedia authentication system. This is followed in Section 7.3 with detailed descriptions of the current algorithms for the three types of multimedia authentication: hard or complete authentication, soft authentication, and content-based authentication. The conclusion and future research directions are presented in Section 7.4.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
D. R. Stinson, Cryptography, Theory and Practice, CRC Press, 1995.
J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.
G. L. Friedman, “The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image,” IEEE Trans. Consumer Electronics, vol. 39, no. 4, pp. 905–910, 1993.
M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia Data-Embedding and Watermarking Technologies,” Proc. IEEE, vol. 86, no. 6, pp. 1064–1087, 1998.
F. Hartung and M. Kutter, “Multimedia Watermarking Techniques,” Proc. IEEE, vol. 87, no. 7, pp. 1079–1107, 1999.
R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, “Perceptual Watermarks for Digital Image and Video,” Proc. IEEE, vol. 87, no. 7, pp. 1108–1126, 1999.
C. D. Vleeschouwer, J. Dekaugke, and B. Macq, “Invisibility and Application Functionalities in Perceptual Watermarking — An Overview,” Proc. IEEE, vol. 90, no. 1, pp. 64–77, 2002.
E. T. Lin, and E. J. Delp, “A Review of Fragile Image Watermarks,” Proc. Multimedia and Security Workshop at ACM Multimedia’ 99, Orlando, FL. Oct. 1999, pp. 25–29.
J. Fridrich, “Methods for Tamper Detection in Digital Images,” Proc. Multimedia and Security Workshop at ACM Multimedia’ 99, Orlando, FL, Oct. 1999, pp. 19–23.
M. G. Albanesi, M. Ferretti, F. Guerrini, “A Taxonomy for Image Authentication Techniques and Its Application to the Current State of the Art,” Proc. 11 th Int. Conf. Image Analysis and Processing, 2001, pp. 535–540.
M. Holliman and N. Memon, “Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes,” IEEE Trans. Image Processing, vol. 9, no. 3, pp. 432–441, 2000.
S. Walton, “Information authentication for a slippery new age,” Dr. Dobbs Journal, vol. 20, no. 4, pp. 18–26, 1995.
M. Yeung and C. Mintzer, “An invisible watermarking technique for image verification,” IEEE Int. Conf. Image Processing, 1997, vol. 2, pp. 680–683.
M. Wu and B Liu, “Watermarking for Image Authentication,” IEEE Int. Conf. Image Processing, vol. 2, pp. 437–441, 1998.
N. Memon, S. Shende, and P. W. Wong, “On the Security of the YeungMintzer Authentication Watermark,” Proc. IS&T PICS Symp. Savannah, Georgia, March, 1999.
J. Fridrich, M. Goljan, and N. Memon, “Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme,” Proc. SPIE Photonic West, Electronic Imaging 2000, Security and Watermarking of Multimedia Contents, San Jose, California, January 24–26, 2000.
J. Fridrich, M. Goljan, A. C. Baldoza, “New fragile authentication watermark for images,” IEEE Int. Conf. Image Processing, vol. 1, pp. 446–449, 2000.
P. W. Wong, “A watermark for image integrity and ownership verification,” Proc. IS&T PIC, Portland, Oregon, 1998.
P. W. Wong, “A public key watermark for image verification and authentication,” Proc. IEEE Int. Conf. Image Processing, vol. 1, pp. 455–459, 1998.
P. W. Wong and N. Memon, “Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification,” IEEE. Trans. Image Processing, vol. 10, no. 10, pp. 1593–1601, 2001.
D. Coppersmith, F. Mintzer, C. Tresser, C. W. Wu, and M. M. Yeung, “Fragile Imperceptible Digital Watermark with Privacy Control,” Proc. SPIE/IS&T Int. Symp. Electronic Imaging: Science and Technology, San Jose, CA, 1999, vol. 3657, pp. 79–84.
M. Holliman, N. Memon, and M. M. Yeung, “On the Need for Image Dependent Keys for Watermarking,” Proc. Content Security and Data Hiding in Digital Media, Newark, NJ, May 14, 1999.
J. Fridrich, “Robust bit extraction from images,” Proc. IEEE Int. Conf. Multimedia Computing & Systems, vol. 2, pp. 536–540, 1999.
M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, “A Hierarchical Image Authentication Watermark with Improved Localization and Security,” IEEE Int. Conf Image Processing, vol. 2, pp. 502–505, 2001.
D. Li and D. Feng, “A DCT Robust Multimedia Authentication Scheme,” 7 th Australian and New Zealand Intelligent Info. System Conf. Perth, Western Australia, Nov. 2001.
J. Lee and C. S. Won, “A Watermarking Sequence Using Parities of Error Control Coding for Image Authentication and Correction,” IEEE Trans. Consumer Electronics, vol. 46, no. 2, pp. 313–317, May 2000.
J. Fridrich and M. Goljan, “Images with Self-Correcting Capabilities”, Proc. IEEE Int. Conf Image Processing, 1999, vol. 3, pp. 792–796.
M. Schneider and S.-F. Chang, “A robust content based digital signature for image authentication,” IEEE Int. Conf. Image Processing, vol. 3, 1996, pp. 227–230.
C. W. Honsinger, P. W. Jones, M. Rabbani, and J. C. Stoffel, “Lossless recovery of an original image containing embedded data,” U. S. Patent No.6, 278, 791, Aug. 2001.
J. Fridrich, M. Goljan, and R. Du, “Invertible Authentication,” Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, California January, 2001.
M. Goljan, J. Fridrich, and R. Du, “Distortion-free Data Embedding,” 4th Information Hiding Workshop, Pittsburgh, Pennsylvania, April, 2001.
J. Fridrich, M. Goljan, and R. Du, “Lossless Data Embedding? New Paradigm in Digital Watermarking,” Special Issue on Emerging Applications of Multimedia Data Hiding, vol. 2002, no. 2, February 2002, pp. 185–196.
R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark,” Proc. IEEE Int. Conf. Image Processing, vol. 2, pp. 86–90, 1994.
R. B. Wolfgang and E. J. Delp, “A Watermarking for Digital Images,” Proc. IEEE Int. Conf. Image Processing, vol. 3, pp. 219–222, 1996.
R. B. Wolfgang and E. J. Delp, “Fragile Watermarking Using the VW2D Watermarking,” Proc. SPIE Security and Watermarking of Multimedia Contents, San Jose, California, Jan. 25–27, 1999, pp. 204–213.
B. Zhu, M. D. Swanson, A. H. Tewfik, “A Transparent Authentication and Distortion Measurement Technique for Images,” Proc. 7th IEEE Digital Signal Processing Workshop, Loen, Norway, pp. 45–48, September, 1996.
M. D. Swanson, B. Zhu, A. H. Tewfik, “Robust Data Hiding for Images,” Proc. of 7th IEEE Digital Signal Processing Workshop, Loen, Norway, pp. 37–40, September, 1996.
M. D. Swanson, B. Zhu, A. H. Tewfik, “Data Hiding for Video-in-Video,” Proc. IEEE Int. Conf, on Image Processing, vol. 2, pp. 676–679, Santa Barbara, CA, October, 1997.
M. D. Swanson, B. Zhu, A. H. Tewfik, “Video Data Hiding for Video-inVideo and Other Applications,” Proc. of SPIE Multimedia Storage and Archiving Systems, vol. 3229, pp. 32–43, Dallas, TX, November, 1997.
B. Zhu, Coding and Data Hiding for Multimedia, Ph. D. Thesis, Univ. of Minnesota, Dec. 1998.
D. Kundur, and D. Hatzinakos, “Towards a Telltale Watermarking Technique for Tamper Proofing,” Proc. IEEE Int. Conf Image Processing, vol. 2, 1998, pp. 409–413.
D. Kundur, and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proc. IEEE, vol. 87, no. 7, 1999, pp. 1167–1180.
A. B. Watson, G. Y. Yang, J. A. Solomon, and J. Villasenor, “Visibility of Wavelet Quantization Noise,” IEEE Trans. Image Processing,vol. 6, no. 8, pp. 1164–1175.
J. J. Eggers and B. Girod, “Blind Watermarking Applied to Image Authentication,” IEEE Int. Conf. Acoustics, Speech, and Signal Processing, vol. 3, pp. 1977–1980, 2001.
C.-P. Wu and C.-C. J. Kuo, “Comparison of Two Speech Content Authentication Approaches,” SPIE Int. Symp. Electronic Imaging, San Jose, California, January 2002.
A. Tefas and I. Pitas, “Image Authentication Using Chaotic Mixing Systems,” Proc. IEEE Int. Symp: Circuits and Systems (ISCAS 2000),vol. 1, pp. 216–219, 2000.
F. Bartolini, A. Tefas, M. Barni, and I. Pitas, “Image authentication techniques for surveillance applications,” Proc. IEEE vol. 89, no. 10, pp. 1403–1418, 2001.
M. P. Queluz, “Towards Robust, Content Based Techniques for Image Authentication,” IEEE 2nd Workshop on Multimedia Signal Processing, pp. 297–302, 1998.
M. P. Queluz, “Content-Based Integrity Protection of Digital Images,” SPIE Conf. Security and Watermarking of Multimedia Contents, vol. 3657, pp. 8593, Jan. 1999.
D.-C. Lou and J.-L. Liu, “Fault Resilient and Compression Tolerant Digital Signature for Image Authentication,” IEEE Trans. Consumer Electronics, vol. 46, no. 1, pp. 31–39, 2000.
L. Xie, G. R. Arce, and R. F. Graveman, “Approximate Image Message Authentication Codes,” IEEE Trans. Multimedia, vol. 3, no. 2, pp. 242–252, 2001.
R. F. Graveman and K. Fu, “Approximate Message Authentication Codes,” Proc. 3 rd Annual Fedlab Symp. Advanced Telcomm./Info. Distribution, vol. 1, College Park, MD, Feb. 1999.
S. Bhattacharjee and M. Kutter, “Compression Tolerant Image Authentication,” IEEE Mt. Conf. Image Processing, vol. 1, pp. 435–439, 1998.
J. Dittmann, A. Steinmetz, and R. Steinmetz, “Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking,” IEEE Int. Conf Multimedia Computing and Systems, vol. 2, pp. 209–213, 1999.
C.-T. Li, D.-C. Lou, and T.-H. Chen, “Image Authentication and Integrity Verification via Content-Based Watermarks and a Public Key Cryptosystem,” IEEE Int Conf. Image Processing, vol. 3, pp. 694–697, 2000.
ISO/IEC JTC1/SC2/WG9, “Progressive Bi-level Image Compression, Revision 4.1,” CD 11544, September 16, 1991.
C.-Y. Lin and S.-F. Chang, “A Robust Image Authentication Method Surviving JPEG Lossy Compression,” SPIE Storage and Retrieval of Image/Video Database, San Jose, Jan 1998.
C.-Y. Lin and S.-F. Chang, “A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation,” IEEE Trans Circuits and Systems of Video Tech., vol. 11, no. 2, pp. 153–168, 2001.
C.-Y. Lin and S.-F. Chang, “Generating Robust Digital Signature for ImageNideo Authentication,” Multimedia and Security Workshop at ACM Multimedia 98, Bristol, UK, Sep. 1998.
C.-Y. Lin and S.-F. Chang„ “Issues and Solutions for Authenticating MPEG Video,” SPIE Security and Watermarking of Multimedia Contents, EI ‘89, San Jose, CA, Jan. 1999.
R. Radhakrishnan and N. Memon, “On the Security of the SARI Image Authentication System,” IEEE Int. Conf Image Processing, vol. 3, pp. 971–974, 2001.
C.-P. Wu and C.-C. J. Kuo, “Speech Content Authentication Integrated with CELP Speech Coders,” IEEE Int. Conf on Multimedia and Expo (ICME2001), Aug. 2001.
C. Rey and J.-L. Dugelay, “Blind Detection of Malicious Alterations on Still Images Using Robust Watermarking,” IEE Seminar on Secure Images and Image Authentication (Ref. No. 2000/039), pp. 7/1–7/6, 2000.
C.-Y. Lin and S.-F. Chang, “Semi-Fragile Watermarking for Authenticating JPEG Visual Content,” SPIE Security and Watermarking of Multimedia Contents II, San Jose, CA, Jan. 2000.
H. S. Bassali, J. Chhugani, S. Agarwal, A. Aggarwal, and P. Dubey, “Compression Tolerant Watermarking for Image Verification,” IEEE Int. Conf. Image Processing, vol. 1, pp. 430–433, 2000.
J. Fridrich, “Image Watermarking for Tamper Detection,” Proc. IEEE Int. Conf Image Processing, vol. 2, pp. 404–408, 1998.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Zhu, B.B., Swanson, M.D. (2003). Multimedia Authentication and Watermarking. In: Feng, D.D., Siu, WC., Zhang, HJ. (eds) Multimedia Information Retrieval and Management. Signals and Communication Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-05300-3_7
Download citation
DOI: https://doi.org/10.1007/978-3-662-05300-3_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-05533-1
Online ISBN: 978-3-662-05300-3
eBook Packages: Springer Book Archive