Skip to main content

Part of the book series: Signals and Communication Technology ((SCT))

Abstract

Most multimedia signals today are in digital formats which are easy to reproduce and modify without any trace of manipulations. In this chapter, we present a comprehensive review of current technologies for multimedia data authentication and tamper detection. We first introduce in Section 7.2 the problem issues and general requirements for a multimedia authentication system. This is followed in Section 7.3 with detailed descriptions of the current algorithms for the three types of multimedia authentication: hard or complete authentication, soft authentication, and content-based authentication. The conclusion and future research directions are presented in Section 7.4.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. R. Stinson, Cryptography, Theory and Practice, CRC Press, 1995.

    Google Scholar 

  2. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.

    Google Scholar 

  3. G. L. Friedman, “The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image,” IEEE Trans. Consumer Electronics, vol. 39, no. 4, pp. 905–910, 1993.

    Article  Google Scholar 

  4. M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia Data-Embedding and Watermarking Technologies,” Proc. IEEE, vol. 86, no. 6, pp. 1064–1087, 1998.

    Article  Google Scholar 

  5. F. Hartung and M. Kutter, “Multimedia Watermarking Techniques,” Proc. IEEE, vol. 87, no. 7, pp. 1079–1107, 1999.

    Article  Google Scholar 

  6. R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, “Perceptual Watermarks for Digital Image and Video,” Proc. IEEE, vol. 87, no. 7, pp. 1108–1126, 1999.

    Article  Google Scholar 

  7. C. D. Vleeschouwer, J. Dekaugke, and B. Macq, “Invisibility and Application Functionalities in Perceptual Watermarking — An Overview,” Proc. IEEE, vol. 90, no. 1, pp. 64–77, 2002.

    Article  Google Scholar 

  8. E. T. Lin, and E. J. Delp, “A Review of Fragile Image Watermarks,” Proc. Multimedia and Security Workshop at ACM Multimedia’ 99, Orlando, FL. Oct. 1999, pp. 25–29.

    Google Scholar 

  9. J. Fridrich, “Methods for Tamper Detection in Digital Images,” Proc. Multimedia and Security Workshop at ACM Multimedia’ 99, Orlando, FL, Oct. 1999, pp. 19–23.

    Google Scholar 

  10. M. G. Albanesi, M. Ferretti, F. Guerrini, “A Taxonomy for Image Authentication Techniques and Its Application to the Current State of the Art,” Proc. 11 th Int. Conf. Image Analysis and Processing, 2001, pp. 535–540.

    Google Scholar 

  11. M. Holliman and N. Memon, “Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes,” IEEE Trans. Image Processing, vol. 9, no. 3, pp. 432–441, 2000.

    Article  Google Scholar 

  12. S. Walton, “Information authentication for a slippery new age,” Dr. Dobbs Journal, vol. 20, no. 4, pp. 18–26, 1995.

    MathSciNet  Google Scholar 

  13. M. Yeung and C. Mintzer, “An invisible watermarking technique for image verification,” IEEE Int. Conf. Image Processing, 1997, vol. 2, pp. 680–683.

    Article  Google Scholar 

  14. M. Wu and B Liu, “Watermarking for Image Authentication,” IEEE Int. Conf. Image Processing, vol. 2, pp. 437–441, 1998.

    Google Scholar 

  15. N. Memon, S. Shende, and P. W. Wong, “On the Security of the YeungMintzer Authentication Watermark,” Proc. IS&T PICS Symp. Savannah, Georgia, March, 1999.

    Google Scholar 

  16. J. Fridrich, M. Goljan, and N. Memon, “Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme,” Proc. SPIE Photonic West, Electronic Imaging 2000, Security and Watermarking of Multimedia Contents, San Jose, California, January 24–26, 2000.

    Google Scholar 

  17. J. Fridrich, M. Goljan, A. C. Baldoza, “New fragile authentication watermark for images,” IEEE Int. Conf. Image Processing, vol. 1, pp. 446–449, 2000.

    Google Scholar 

  18. P. W. Wong, “A watermark for image integrity and ownership verification,” Proc. IS&T PIC, Portland, Oregon, 1998.

    Google Scholar 

  19. P. W. Wong, “A public key watermark for image verification and authentication,” Proc. IEEE Int. Conf. Image Processing, vol. 1, pp. 455–459, 1998.

    Google Scholar 

  20. P. W. Wong and N. Memon, “Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification,” IEEE. Trans. Image Processing, vol. 10, no. 10, pp. 1593–1601, 2001.

    Article  MATH  Google Scholar 

  21. D. Coppersmith, F. Mintzer, C. Tresser, C. W. Wu, and M. M. Yeung, “Fragile Imperceptible Digital Watermark with Privacy Control,” Proc. SPIE/IS&T Int. Symp. Electronic Imaging: Science and Technology, San Jose, CA, 1999, vol. 3657, pp. 79–84.

    Google Scholar 

  22. M. Holliman, N. Memon, and M. M. Yeung, “On the Need for Image Dependent Keys for Watermarking,” Proc. Content Security and Data Hiding in Digital Media, Newark, NJ, May 14, 1999.

    Google Scholar 

  23. J. Fridrich, “Robust bit extraction from images,” Proc. IEEE Int. Conf. Multimedia Computing & Systems, vol. 2, pp. 536–540, 1999.

    Article  Google Scholar 

  24. M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, “A Hierarchical Image Authentication Watermark with Improved Localization and Security,” IEEE Int. Conf Image Processing, vol. 2, pp. 502–505, 2001.

    Google Scholar 

  25. D. Li and D. Feng, “A DCT Robust Multimedia Authentication Scheme,” 7 th Australian and New Zealand Intelligent Info. System Conf. Perth, Western Australia, Nov. 2001.

    Google Scholar 

  26. J. Lee and C. S. Won, “A Watermarking Sequence Using Parities of Error Control Coding for Image Authentication and Correction,” IEEE Trans. Consumer Electronics, vol. 46, no. 2, pp. 313–317, May 2000.

    Article  Google Scholar 

  27. J. Fridrich and M. Goljan, “Images with Self-Correcting Capabilities”, Proc. IEEE Int. Conf Image Processing, 1999, vol. 3, pp. 792–796.

    Google Scholar 

  28. M. Schneider and S.-F. Chang, “A robust content based digital signature for image authentication,” IEEE Int. Conf. Image Processing, vol. 3, 1996, pp. 227–230.

    Article  Google Scholar 

  29. C. W. Honsinger, P. W. Jones, M. Rabbani, and J. C. Stoffel, “Lossless recovery of an original image containing embedded data,” U. S. Patent No.6, 278, 791, Aug. 2001.

    Google Scholar 

  30. J. Fridrich, M. Goljan, and R. Du, “Invertible Authentication,” Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, California January, 2001.

    Google Scholar 

  31. M. Goljan, J. Fridrich, and R. Du, “Distortion-free Data Embedding,” 4th Information Hiding Workshop, Pittsburgh, Pennsylvania, April, 2001.

    Google Scholar 

  32. J. Fridrich, M. Goljan, and R. Du, “Lossless Data Embedding? New Paradigm in Digital Watermarking,” Special Issue on Emerging Applications of Multimedia Data Hiding, vol. 2002, no. 2, February 2002, pp. 185–196.

    MATH  Google Scholar 

  33. R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark,” Proc. IEEE Int. Conf. Image Processing, vol. 2, pp. 86–90, 1994.

    Google Scholar 

  34. R. B. Wolfgang and E. J. Delp, “A Watermarking for Digital Images,” Proc. IEEE Int. Conf. Image Processing, vol. 3, pp. 219–222, 1996.

    Article  Google Scholar 

  35. R. B. Wolfgang and E. J. Delp, “Fragile Watermarking Using the VW2D Watermarking,” Proc. SPIE Security and Watermarking of Multimedia Contents, San Jose, California, Jan. 25–27, 1999, pp. 204–213.

    Google Scholar 

  36. B. Zhu, M. D. Swanson, A. H. Tewfik, “A Transparent Authentication and Distortion Measurement Technique for Images,” Proc. 7th IEEE Digital Signal Processing Workshop, Loen, Norway, pp. 45–48, September, 1996.

    Google Scholar 

  37. M. D. Swanson, B. Zhu, A. H. Tewfik, “Robust Data Hiding for Images,” Proc. of 7th IEEE Digital Signal Processing Workshop, Loen, Norway, pp. 37–40, September, 1996.

    Google Scholar 

  38. M. D. Swanson, B. Zhu, A. H. Tewfik, “Data Hiding for Video-in-Video,” Proc. IEEE Int. Conf, on Image Processing, vol. 2, pp. 676–679, Santa Barbara, CA, October, 1997.

    Google Scholar 

  39. M. D. Swanson, B. Zhu, A. H. Tewfik, “Video Data Hiding for Video-inVideo and Other Applications,” Proc. of SPIE Multimedia Storage and Archiving Systems, vol. 3229, pp. 32–43, Dallas, TX, November, 1997.

    Google Scholar 

  40. B. Zhu, Coding and Data Hiding for Multimedia, Ph. D. Thesis, Univ. of Minnesota, Dec. 1998.

    Google Scholar 

  41. D. Kundur, and D. Hatzinakos, “Towards a Telltale Watermarking Technique for Tamper Proofing,” Proc. IEEE Int. Conf Image Processing, vol. 2, 1998, pp. 409–413.

    Google Scholar 

  42. D. Kundur, and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proc. IEEE, vol. 87, no. 7, 1999, pp. 1167–1180.

    Article  Google Scholar 

  43. A. B. Watson, G. Y. Yang, J. A. Solomon, and J. Villasenor, “Visibility of Wavelet Quantization Noise,” IEEE Trans. Image Processing,vol. 6, no. 8, pp. 1164–1175.

    Google Scholar 

  44. J. J. Eggers and B. Girod, “Blind Watermarking Applied to Image Authentication,” IEEE Int. Conf. Acoustics, Speech, and Signal Processing, vol. 3, pp. 1977–1980, 2001.

    Google Scholar 

  45. C.-P. Wu and C.-C. J. Kuo, “Comparison of Two Speech Content Authentication Approaches,” SPIE Int. Symp. Electronic Imaging, San Jose, California, January 2002.

    Google Scholar 

  46. A. Tefas and I. Pitas, “Image Authentication Using Chaotic Mixing Systems,” Proc. IEEE Int. Symp: Circuits and Systems (ISCAS 2000),vol. 1, pp. 216–219, 2000.

    Google Scholar 

  47. F. Bartolini, A. Tefas, M. Barni, and I. Pitas, “Image authentication techniques for surveillance applications,” Proc. IEEE vol. 89, no. 10, pp. 1403–1418, 2001.

    Article  Google Scholar 

  48. M. P. Queluz, “Towards Robust, Content Based Techniques for Image Authentication,” IEEE 2nd Workshop on Multimedia Signal Processing, pp. 297–302, 1998.

    Google Scholar 

  49. M. P. Queluz, “Content-Based Integrity Protection of Digital Images,” SPIE Conf. Security and Watermarking of Multimedia Contents, vol. 3657, pp. 8593, Jan. 1999.

    Google Scholar 

  50. D.-C. Lou and J.-L. Liu, “Fault Resilient and Compression Tolerant Digital Signature for Image Authentication,” IEEE Trans. Consumer Electronics, vol. 46, no. 1, pp. 31–39, 2000.

    Article  Google Scholar 

  51. L. Xie, G. R. Arce, and R. F. Graveman, “Approximate Image Message Authentication Codes,” IEEE Trans. Multimedia, vol. 3, no. 2, pp. 242–252, 2001.

    Article  Google Scholar 

  52. R. F. Graveman and K. Fu, “Approximate Message Authentication Codes,” Proc. 3 rd Annual Fedlab Symp. Advanced Telcomm./Info. Distribution, vol. 1, College Park, MD, Feb. 1999.

    Google Scholar 

  53. S. Bhattacharjee and M. Kutter, “Compression Tolerant Image Authentication,” IEEE Mt. Conf. Image Processing, vol. 1, pp. 435–439, 1998.

    Google Scholar 

  54. J. Dittmann, A. Steinmetz, and R. Steinmetz, “Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking,” IEEE Int. Conf Multimedia Computing and Systems, vol. 2, pp. 209–213, 1999.

    Article  Google Scholar 

  55. C.-T. Li, D.-C. Lou, and T.-H. Chen, “Image Authentication and Integrity Verification via Content-Based Watermarks and a Public Key Cryptosystem,” IEEE Int Conf. Image Processing, vol. 3, pp. 694–697, 2000.

    Google Scholar 

  56. ISO/IEC JTC1/SC2/WG9, “Progressive Bi-level Image Compression, Revision 4.1,” CD 11544, September 16, 1991.

    Google Scholar 

  57. C.-Y. Lin and S.-F. Chang, “A Robust Image Authentication Method Surviving JPEG Lossy Compression,” SPIE Storage and Retrieval of Image/Video Database, San Jose, Jan 1998.

    Google Scholar 

  58. C.-Y. Lin and S.-F. Chang, “A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation,” IEEE Trans Circuits and Systems of Video Tech., vol. 11, no. 2, pp. 153–168, 2001.

    Article  MathSciNet  Google Scholar 

  59. C.-Y. Lin and S.-F. Chang, “Generating Robust Digital Signature for ImageNideo Authentication,” Multimedia and Security Workshop at ACM Multimedia 98, Bristol, UK, Sep. 1998.

    Google Scholar 

  60. C.-Y. Lin and S.-F. Chang„ “Issues and Solutions for Authenticating MPEG Video,” SPIE Security and Watermarking of Multimedia Contents, EI ‘89, San Jose, CA, Jan. 1999.

    Google Scholar 

  61. R. Radhakrishnan and N. Memon, “On the Security of the SARI Image Authentication System,” IEEE Int. Conf Image Processing, vol. 3, pp. 971–974, 2001.

    Google Scholar 

  62. C.-P. Wu and C.-C. J. Kuo, “Speech Content Authentication Integrated with CELP Speech Coders,” IEEE Int. Conf on Multimedia and Expo (ICME2001), Aug. 2001.

    Google Scholar 

  63. C. Rey and J.-L. Dugelay, “Blind Detection of Malicious Alterations on Still Images Using Robust Watermarking,” IEE Seminar on Secure Images and Image Authentication (Ref. No. 2000/039), pp. 7/1–7/6, 2000.

    Google Scholar 

  64. C.-Y. Lin and S.-F. Chang, “Semi-Fragile Watermarking for Authenticating JPEG Visual Content,” SPIE Security and Watermarking of Multimedia Contents II, San Jose, CA, Jan. 2000.

    Google Scholar 

  65. H. S. Bassali, J. Chhugani, S. Agarwal, A. Aggarwal, and P. Dubey, “Compression Tolerant Watermarking for Image Verification,” IEEE Int. Conf. Image Processing, vol. 1, pp. 430–433, 2000.

    Google Scholar 

  66. J. Fridrich, “Image Watermarking for Tamper Detection,” Proc. IEEE Int. Conf Image Processing, vol. 2, pp. 404–408, 1998.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Zhu, B.B., Swanson, M.D. (2003). Multimedia Authentication and Watermarking. In: Feng, D.D., Siu, WC., Zhang, HJ. (eds) Multimedia Information Retrieval and Management. Signals and Communication Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-05300-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-05300-3_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-05533-1

  • Online ISBN: 978-3-662-05300-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics