Digital watermarking scheme exploiting nondeterministic dependence for image authentication

Chang Tsun Li, Yinyin Yuan

Research output: Contribution to journalArticle

20 Citations (Scopus)

Abstract

Watermarking schemes for authentication purposes are characterized by three factors: security, resolution of tamper localization, and embedding distortion. Since the requirements of high secudty, high localization resolution, and low distortion cannot be fulfilled simultaneously, the relative importance of a particular factor is application-dependent. Moreover, blockwise dependence is recognized as a key requirement for fragile watermarking schemes to thwart the Holliman-Memon counterfeiting attack. However, it has also been observed that deterministic dependence is still susceptible to transplantation attack or even simple cover-up attack. This work proposes a fragile watermarking scheme for image authentication, which exploits nondeterministic dependence and provides the users with freedom of making trade-offs among the three factors according to the needs of their applications.

Original languageEnglish
Article number127001
JournalOptical Engineering
Volume45
Issue number12
DOIs
Publication statusPublished - Dec 2006

Fingerprint

Digital watermarking
Watermarking
Authentication
attack
transplantation
requirements
embedding

Cite this

@article{ce26685af36948129af613cf90097813,
title = "Digital watermarking scheme exploiting nondeterministic dependence for image authentication",
abstract = "Watermarking schemes for authentication purposes are characterized by three factors: security, resolution of tamper localization, and embedding distortion. Since the requirements of high secudty, high localization resolution, and low distortion cannot be fulfilled simultaneously, the relative importance of a particular factor is application-dependent. Moreover, blockwise dependence is recognized as a key requirement for fragile watermarking schemes to thwart the Holliman-Memon counterfeiting attack. However, it has also been observed that deterministic dependence is still susceptible to transplantation attack or even simple cover-up attack. This work proposes a fragile watermarking scheme for image authentication, which exploits nondeterministic dependence and provides the users with freedom of making trade-offs among the three factors according to the needs of their applications.",
keywords = "Fragile watermarking, Image authentication, Integrity verification, Multimedia security",
author = "Li, {Chang Tsun} and Yinyin Yuan",
year = "2006",
month = "12",
doi = "10.1117/1.2402932",
language = "English",
volume = "45",
journal = "SPIE J",
issn = "0091-3286",
publisher = "SPIE",
number = "12",

}

Digital watermarking scheme exploiting nondeterministic dependence for image authentication. / Li, Chang Tsun; Yuan, Yinyin.

In: Optical Engineering, Vol. 45, No. 12, 127001, 12.2006.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Digital watermarking scheme exploiting nondeterministic dependence for image authentication

AU - Li, Chang Tsun

AU - Yuan, Yinyin

PY - 2006/12

Y1 - 2006/12

N2 - Watermarking schemes for authentication purposes are characterized by three factors: security, resolution of tamper localization, and embedding distortion. Since the requirements of high secudty, high localization resolution, and low distortion cannot be fulfilled simultaneously, the relative importance of a particular factor is application-dependent. Moreover, blockwise dependence is recognized as a key requirement for fragile watermarking schemes to thwart the Holliman-Memon counterfeiting attack. However, it has also been observed that deterministic dependence is still susceptible to transplantation attack or even simple cover-up attack. This work proposes a fragile watermarking scheme for image authentication, which exploits nondeterministic dependence and provides the users with freedom of making trade-offs among the three factors according to the needs of their applications.

AB - Watermarking schemes for authentication purposes are characterized by three factors: security, resolution of tamper localization, and embedding distortion. Since the requirements of high secudty, high localization resolution, and low distortion cannot be fulfilled simultaneously, the relative importance of a particular factor is application-dependent. Moreover, blockwise dependence is recognized as a key requirement for fragile watermarking schemes to thwart the Holliman-Memon counterfeiting attack. However, it has also been observed that deterministic dependence is still susceptible to transplantation attack or even simple cover-up attack. This work proposes a fragile watermarking scheme for image authentication, which exploits nondeterministic dependence and provides the users with freedom of making trade-offs among the three factors according to the needs of their applications.

KW - Fragile watermarking

KW - Image authentication

KW - Integrity verification

KW - Multimedia security

UR - http://www.scopus.com/inward/record.url?scp=33947277938&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33947277938&partnerID=8YFLogxK

U2 - 10.1117/1.2402932

DO - 10.1117/1.2402932

M3 - Article

AN - SCOPUS:33947277938

VL - 45

JO - SPIE J

JF - SPIE J

SN - 0091-3286

IS - 12

M1 - 127001

ER -