Skip to main content

Semi-fragile Watermarking Based on Dither Modulation

  • Conference paper
Advances in Multimedia Information Processing - PCM 2004 (PCM 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3333))

Included in the following conference series:

  • 1178 Accesses

Abstract

In this paper, a semi-fragile watermarking algorithm is proposed to prevent images from being altered, based on dither modulation and linearity of discrete cosine transform (DCT). As the algorithm transforms DCT coefficients in spatial domain using dither modulation and the linearity of DCT, it embeds watermarking information very fast without DCT. The robustness of the pro-posed algorithm against compression proved in a serious of experiments. Furthermore, because a semi-fragile watermark can be embedded into DCT coefficients with only additions and subtractions, watermarking information can be embedded fast with simple computations. As a result, semi-fragile watermark-ing information can be added in a real time to prevent forgeries and alteration in portable devices with limited resources such as digital cameras, digital camcorders and cellular phones.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lin, C.-Y., Chang, S.-F.: Semi-Fragile Watermarking for Authenticating JPEG Visual Content. In: Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, California, January 2000, pp. 140–151 (2000)

    Google Scholar 

  2. Maeno, K., et al.: New Semi-Fragile Image Authentication Watermarking Techniques Using Random Bias and Non-Uniform Quantization. In: Proc. SPIE Security and Watermarking of Multimedia Contents, San Jose, California, January 2002, pp. 659–670 (2002)

    Google Scholar 

  3. Lin, E.T., et al.: Detection of image alterations using semi-fragile watermarks. In: Proc. SPIE Security and Watermarking of Multimedia Contents, San Jose, California, January 2000, pp. 23–28 (2000)

    Google Scholar 

  4. Chen, B., Wornell, G.: Quantization Index Modulation, a class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Info. Th. 47(4), 1423–1443 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  5. Chen, B., Wornell, G.: Dither modulation: a new approach to digital watermarking and information embedding. In: Proc. SPIE conference on security and watermarking multimedia contents, January 1999, pp. 342–353 (1999)

    Google Scholar 

  6. Kim, J., Byun, Y., Choi, J.: Image Forensics Technology for Digital Camera. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3333, pp. 331–339. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Lin, E.T., et al.: Detection of image alterations using semi-fragile watermarks. In: Proc. SPIE Security and Watermarking of Multimedia Contents, San Jose, California, January 2000, pp. 23–28 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, J., Byun, Y., Choi, J. (2004). Semi-fragile Watermarking Based on Dither Modulation. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds) Advances in Multimedia Information Processing - PCM 2004. PCM 2004. Lecture Notes in Computer Science, vol 3333. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30543-9_90

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30543-9_90

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23985-7

  • Online ISBN: 978-3-540-30543-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics