ABSTRACT
In this project, we designed a novel image authentication system based on a our semi-fragile watermarking technique. The system, called SARI, can accept quantization-based lossy compression to a determined degree without any false alarm and can sensitively detect and locate malicious manipulations. It's the first system that has such capability in distinguishing malicious attacks from acceptable operations. Furthermore, the corrupted area can be approximately recovered by the information hidden in the other part of the contentimage. The amount of information embedded in our SARI system has nearly reached the theoretical maximum zero-error information hiding capacity of digital images. The software prototype includes two parts - the watermark embedder that's freely distributed and the authenticator that can be deployed online as a third-party service or used in the recipient side.
- 1.C.-Y. Lin and S.-F. Chang. Semi-Fragile Watermarking for Authenticating JPEG Visual Content. SPIE Security and Watemnrking of Mulfimedio Content II, Jan 2000.Google ScholarCross Ref
- 2.W. DiMe and M. E. Helhnan. New Directions in Cryptography. IEEE Trans. on Informnlion Theory, Vol. 22, No. 6, pp-644.654, Nov 1976.Google Scholar
- 3.C.-Y. Lin, D. Sow, and S.-F. Chang. Using Self-Authentication-and-Recovery for Error Concealment in Wireless Envirounents. Proceedings ojSPIE, Vol. 4518, Aug. 2001.Google Scholar
Index Terms
- SARI: self-authentication-and-recovery image watermarking system
Recommendations
An Introduction to Image Steganography Techniques
ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and TechnologiesSteganography is a form of security technique through obscurity, the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various types of files, including ...
Authentication of images using Zernike moment watermarking
The rapid development of the Internet and digital image modification software has invited the illegal access to and use of digital images. In response, digital watermarking has emerged as a unique tool for protecting the authenticity of digital images. ...
A Semi-Fragile Watermarking Scheme Using Weighted Vote with Sieve and Emphasis for Image Authentication
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing. Each watermark bit is duplicated and randomly embedded in the original image in the discrete wavelet domain by modifying the corresponding image ...
Comments