• Title/Summary/Keyword: fragile watermark

Search Result 44, Processing Time 0.022 seconds

Fragile Watermark System using Quantization and DC Coefficients (양자화와 DC 계수를 이용한 연성 워터마크 시스템)

  • Yoo, Heung-Ryol;Son, Yung-Deug
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.774-779
    • /
    • 2018
  • This paper presents fragile watermark system using quantization and DC coefficients. It is a way to prevent the watermark fro, being detected if the original has been modified in any way. In other words, the detection of a watermark ca be said to be originality after the watermark is inserted, without any damage. Since lossy compression such as JPEG is often allowed or required in practical applications, authentication methods, authentication methods should be distinguished from malicious modifications such as image shifting, cropping, filtering, and replacement. The proposed algorithm implements a fragile watermarking algorithm that shows image authentication with JPEC compression and the watermark easily breaks other malicious variants.

An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform

  • Zhang, Heng;Wang, Chengyou;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1382-1396
    • /
    • 2017
  • In this paper, we analyze a recently proposed semi-fragile watermarking scheme based on local binary pattern (LBP) operators, and note that it has a fundamental flaw in the design. In this work, a binary watermark is embedded into image blocks by modifying the neighborhood pixels according to the LBP pattern. However, different image blocks might have the same LBP pattern, which can lead to false detection in watermark extraction process. In other words, one can modify the host image intentionally without affecting its watermark message. In addition, there is no encryption process before watermark embedding, which brings another potential security problem. To illustrate its weakness, two special copy-paste attacks are proposed in this paper, and several experiments are conducted to prove the effectiveness of these attacks. To solve these problems, an improved semi-fragile watermarking based on LBP operators is presented. In watermark embedding process, the central pixel value of each block is taken into account and Arnold transform is adopted to guarantee the security of watermark. Experimental results show that the improved watermarking scheme can overcome the above defects and locate the tampered region effectively.

Watermarking of Compressed Video in the Bitstream Domain: An Efficient Algorithm and its Implementation

  • Drobouchevitvh Inna G.;Lim Sung-Jun;Han Byung-Wan;Chang Hang-Bae;Kim Kyung-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4C
    • /
    • pp.458-471
    • /
    • 2006
  • Digital watermarking of multimedia data is a very active research area that has enjoyed a considerable amount of attention in recent years. In this paper, we propose an algorithm for embedding/detecting a fragile watermark in MPEG-4 compressed video domain (Simple and Advance Simple Profiles). The watermark bits are put directly into Huffman VLC-codespace of quantized DCT domain. The advantage of watermark embedding into the compressed domain is the significant savings for a real-time implementation as it does not require a full decoding operation. The watermark embedding does not change the video file size. The algorithm demonstrates high watermarking capacity, thereby providing reliable foolproof authentication. The results of experimental testing demonstrate that watermark embedding preserves the video quality. Watermark detection is performed without using the original video.

Semi-fragile Watermarking Scheme for H.264/AVC Video Content Authentication Based on Manifold Feature

  • Ling, Chen;Ur-Rehman, Obaid;Zhang, Wenjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4568-4587
    • /
    • 2014
  • Authentication of videos and images based on the content is becoming an important problem in information security. Unfortunately, previous studies lack the consideration of Kerckhoffs's principle in order to achieve this (i.e., a cryptosystem should be secure even if everything about the system, except the key, is public knowledge). In this paper, a solution to the problem of finding a relationship between a frame's index and its content is proposed based on the creative utilization of a robust manifold feature. The proposed solution is based on a novel semi-fragile watermarking scheme for H.264/AVC video content authentication. At first, the input I-frame is partitioned for feature extraction and watermark embedding. This is followed by the temporal feature extraction using the Isometric Mapping algorithm. The frame index is included in the feature to produce the temporal watermark. In order to improve security, the spatial watermark will be encrypted together with the temporal watermark. Finally, the resultant watermark is embedded into the Discrete Cosine Transform coefficients in the diagonal positions. At the receiver side, after watermark extraction and decryption, temporal tampering is detected through a mismatch between the frame index extracted from the temporal watermark and the observed frame index. Next, the feature is regenerate through temporal feature regeneration, and compared with the extracted feature. It is judged through the comparison whether the extracted temporal watermark is similar to that of the original watermarked video. Additionally, for spatial authentication, the tampered areas are located via the comparison between extracted and regenerated spatial features. Experimental results show that the proposed method is sensitive to intentional malicious attacks and modifications, whereas it is robust to legitimate manipulations, such as certain level of lossy compression, channel noise, Gaussian filtering and brightness adjustment. Through a comparison between the extracted frame index and the current frame index, the temporal tempering is identified. With the proposed scheme, a solution to the Kerckhoffs's principle problem is specified.

Fragile Image Watermarking Using Bit Planes (비트 플레인을 이용한 영상의 연성 워터마킹)

  • 이혜주
    • Journal of Broadcast Engineering
    • /
    • v.6 no.1
    • /
    • pp.41-49
    • /
    • 2001
  • Digital watermarking has been proposed for copyright protection of digital data. According to the property of an embedded watermark, it is classified into two categories, robust watermarking and fragile watermarking. The former is used for copyright protection, and the latter applies to the authentication/integrity to verify the authenticity of data, If an Image has been modified or forged. the embedded watermark cannot be extracted from the Image. As a results, it is possible to defect the modification of the image. As pixels are represented by tilts, the modification of bits corresponds to the alteration of the image. In this paper, a new fragile watermarking is proposed In which two watermarks are embedded in order to detect some modification occurred In high and low bit Planes. From simulation results, the embedded watermark is Invisible in a watermarked image and we can locale some Places where the modification occurring

  • PDF

LBP and DWT Based Fragile Watermarking for Image Authentication

  • Wang, Chengyou;Zhang, Heng;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.14 no.3
    • /
    • pp.666-679
    • /
    • 2018
  • The discrete wavelet transform (DWT) has good multi-resolution decomposition characteristic and its low frequency component contains the basic information of an image. Based on this, a fragile watermarking using the local binary pattern (LBP) and DWT is proposed for image authentication. In this method, the LBP pattern of low frequency wavelet coefficients is adopted as a feature watermark, and it is inserted into the least significant bit (LSB) of the maximum pixel value in each block of host image. To guarantee the safety of the proposed algorithm, the logistic map is applied to encrypt the watermark. In addition, the locations of the maximum pixel values are stored in advance, which will be used to extract watermark on the receiving side. Due to the use of DWT, the watermarked image generated by the proposed scheme has high visual quality. Compared with other state-of-the-art watermarking methods, experimental results manifest that the proposed algorithm not only has lower watermark payloads, but also achieves good performance in tamper identification and localization for various attacks.

Fragile Watermarking Scheme Based on Wavelet Edge Features

  • Vaishnavi, D.;Subashini, T.S.
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.5
    • /
    • pp.2149-2154
    • /
    • 2015
  • This paper proposes a novel watermarking method to discover the tampers and localize it in digital image. The image which is to be used to generate a watermark is first wavelet decomposed and the edge feature from the sub bands of high frequency coefficients are retrieved to generate a watermark (Edge Feature Image) and which is to be embed on the cover image. Before embedding the watermark, the pixels of cover image are disordered through the Arnold Transform and this helps to upgrade the security of the watermark. The embedding of generated edge feature image is done only on the Least Significant Bit (LSB) of the cover image. The invisibleness and robustness of the proposed method is computed using Peak-Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) and it proves that the proposed method delivers good results and the proposed method also detects and localizes the tampers efficiently. The invisibleness of proposed method is compared with the existing method and it proves that the proposed method is better.

Tamper Detection of Digital Images using Hash Functions (해쉬 함수를 이용한 디지털 영상의 위변조 검출)

  • Woo, Chan-Il;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.7
    • /
    • pp.4516-4521
    • /
    • 2014
  • Digital watermarking for digital image authentication and integrity schemes are based on fragile watermarking and can detect any modifications in a watermark embedded image by comparing the embedded watermark with the regenerated watermark. Therefore, the digital watermark for image authentication and integrity should be erased easily when the image is changed by digital image processing, such as scaling or filtering etc. This paper proposes an effective tamper detection scheme for digital images. In the proposed scheme, the original image was divided into many non-overlapping $2{\times}2$ blocks. The digital watermark was divided into two LSB of each block and the image distortion was imperceptible to the human eye. The watermark extraction process can be used to determine if the watermarked image has been tampered. The experimental results successfully revealed the effectiveness of the proposed scheme.

A Study on Semi-fragile Watermarking for Robust Authentication on Image Compression (영상압축에 강인한 변질검증 워터마킹에 관한 연구)

  • Ahn, Sung-Cheol;Lee, Kyoung-Hak;Park, Hwa-Bum;Ko, Hyung-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12C
    • /
    • pp.1165-1172
    • /
    • 2006
  • The rapid progress of the software has enabled individuals to copy and remark digital contents, which was only done by professionals. As a solution for the problems, contents producer needs to have certification and inspection of its contents and hold the proprietary right. A fragile watermarking method is able to detect the distortion and damage of watermarked image, but the watermark is also fragile on standardized image compression. That is the problem of fragile watermarking technique. We propose semi-fragile watermarking technique that is robust in the image processing such as JPEG compression used on computer, but it is fragile on the addition of noise and other attacks. In the proposed method, we can generate the watermarks of an image from the relationship between two block coefficients, also the generated watermark is inserted into insensible part of HVS(Human Visual System) after processing DCT(Discrete Cosine Transform) and using quantization. As a result, on the spatial domain, high detection of distortion has been possible even in slight changes, and could detect the corrupted blocks on image. Therefore, it is simple to judge the pixels at which some location has been changed in the space.

Block Fragile Watermarking Based on LUT (LUT 기반의 블록 연성 워터마킹)

  • Joo Eun-Kyong;Kang Hyun-Ho;Park Ji-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.9
    • /
    • pp.1294-1303
    • /
    • 2004
  • This paper proposes new block fragile watermarking for image authentication and integrity by using the existing pixel-based scheme and block-based scheme. The proposed scheme is performed as fellows. First, we choose LUT(Look Up Table) from each pixel of original image and information of the corresponding block. Next, we insert a watermark, modifying original image with values to compare binary original image with the watermark to be embedded. As a result, we provide the means to overcome some weakness of the existing scheme. Binary logo as watermark can be detected from watermarked image and altered location can also be detected by the unit of pixel or that of block in our scheme.

  • PDF