Chih-Hung Lin 1 and Wen-Shyong Hsieh1,2
1Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan 804, R.O.C.
2Department of Computer Science and Information Engineering, Shu Te University, Kaohsiung, Taiwan 824, R.O.C.
Received:
January 13, 2005
Accepted:
November 2, 2005
Publication Date:
June 1, 2006
Download Citation:
||https://doi.org/10.6180/jase.2006.9.2.01
ABSTRACT
Semi-fragile image authentication methods are robust to JPEG images, but are fragile to other malicious manipulations. This paper presents a novel digital signature scheme that adopts statistic Ogive analysis in quantized discrete cosine transform (DCT) coefficients to construct a feature code for image authentication. The lower bound sensitivity of fragility can be determined by a predetermined degree of fragility corresponding to an acceptable JPEG compression quality factor. The degree of fragility can be easily adjusted by simply controlling a fragile degree factor (FDF). This paper analyzes how to choose FDF and the critical image feature properties. Experimental results indicate the effectiveness of the proposed method.
Keywords:
Digital Signature, Image Authentication, JPEG, Ogive, Semi-Fragile
REFERENCES
- [1] Liu, R. and Tan, T., “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership,” IEEE Transactions on Multimedia, Vol. 4, pp. 121128 (2002).
- [2] Ramkumar, M. and Akansu, Ali N., “A Robust Protocol for Proving Ownership of Multimedia Content,” IEEE Transactions on Multimedia, Vol. 6, pp. 469 478 (2004).
- [3] Kundur, D. and Hatzinakos, D., “Toward Robust Logo Watermarking Using Multiresolution Image Fusion Principles,” IEEE Transactions on Multimedia, Vol. 6, pp. 185198 (2004).
- [4] Celik, M. U., Sharma, G., Saber, E. and Tekalp, A. M., “Hierarchical Watermarking for Secure Image Authentication with Localization,” IEEE Transactions on Image Processing, Vol. 11, pp. 585595 (2002).
- [5] Radhakrishman, R. and Memon, N., “On the Security of the Digest Function in the SARI Image Authentication System,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 12, pp. 10301033 (2002).
- [6] Lin, C. H. and Hsieh, W. S., “Applying Projection and B-spline to Image Authentication and Remedy,” IEEE Transactions on Consumer Electronics, Vol. 49, pp. 12341239 (2003).
- [7] Lu, Z. M., Liu, C. H., Xu, D. G. and Sun, S. H., “SemiFragile Image Watermarking Method Based on Index Constrained Vector Quantization,” IEE Electronics Letters, Vol. 39, pp. 3637 (2003).
- [8] Sun, R., Sun, H. and Yao, T., “A SVD- and Quantization Based Semi-Fragile Watermarking Technique for Image Authentication,” IEEE International Conference on Signal Processing (ICSP 2002), Vol. 2, pp. 15921595 (2002).
- [9] Sun, Q., Chang, S. F., Kurato, M. and Suto, M., “A New Semi-Fragile Image Authentication Framework Combining ECC and PKI Infrastructures,” IEEE International Symposium on Circuits and Systems (ISCAS 2002), Vol. 2, pp. 440443 (2002).
- [10] Zhou, X., Duan, X. and Wang, D., “A Semi-Fragile Watermark Scheme for Image Authentication,” IEEE International Conference on Multimedia Modelling (MMM 2004), pp. 374377 (2004).
- [11] El-Din, S. N. and Moniri, M., “Fragile and SemiFragile Image Authentication Based on Image SelfSimilarity,” IEEE International Conference on Image Processing, Vol. 2, pp. 2225 (2002).
- [12] Li, C. T., “Digital Fragile Watermarking Scheme for Authentication of JPEG Images,” Vision, Image and Signal Processing, IEE Proceedings, Vol. 151, pp. 460466 (2004).
- [13] Bao, P. and Ma, X., “Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 15, pp. 96102 (2005).
- [14] Lu, Z. M., Xu, D. G. and Sun, S. H., “Multipurpose Image Watermarking Algorithm Based on Multistage Vector Quantization,” IEEE Transactions on Image Processing, Vol. 14, pp. 822831 (2005).