Protecting the content integrity of digital imagery with fidelity preservation
- 1 August 2011
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Multimedia Computing, Communications, and Applications
- Vol. 7 (3), 1-20
- https://doi.org/10.1145/2000486.2000489
Abstract
Fragile watermarking is applied to protect the content integrity of digital images. The main concerns related to watermarking include retaining the quality of the watermarked image and retaining the ability to detect whether any manipulation has occurred. Because recent watermarking techniques seriously distort the quality of the protected image after embedding the authentication code into the image content, attention has been drawn to how to satisfy both the need for image fidelity and detection ability. To account for the influence from both essentials, a novel algorithm is proposed in this article. The new scheme utilizes a weighted-sum function to embed ( n + 1) authentication bits into a block with 2 n pixels by modifying only one original pixel with (±1). With fewer authentication codes, the new process can protect the content of the image. The experimental results demonstrate that the approach can guarantee the fidelity of the watermarked image while retaining tamper-proof functionality.Keywords
This publication has 27 references indexed in Scilit:
- A secure and improved self-embedding algorithm to combat digital document forgerySignal Processing, 2009
- Fragile Watermarking Based on Encoding of the Zeroes of the $z$-TransformIEEE Transactions on Information Forensics and Security, 2008
- Fragile watermarking scheme for digital image authentication using pixel differenceThe Imaging Science Journal, 2007
- An efficient image authentication method based on Hamming codePattern Recognition, 2007
- Multiple Image Watermarking Applied to Health Information ManagementIEEE Transactions on Information Technology in Biomedicine, 2006
- A watermarking-based image ownership and tampering authentication schemePattern Recognition Letters, 2006
- Analysis and Design of Secure Watermark-Based Authentication SystemsIEEE Transactions on Information Forensics and Security, 2006
- Further attacks on Yeung-Mintzer fragile watermarking schemePublished by SPIE-Intl Soc Optical Eng ,2000
- Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemesIEEE Transactions on Image Processing, 2000
- A binary single-key-lock system for access controlIEEE Transactions on Computers, 1989