Journal of Applied Science and Engineering

Published by Tamkang University Press

1.30

Impact Factor

1.60

CiteScore

Chih-Hung Lin This email address is being protected from spambots. You need JavaScript enabled to view it.1 and Wen-Shyong Hsieh1,2

1Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan 804, R.O.C.
2Department of Computer Science and Information Engineering, Shu Te University, Kaohsiung, Taiwan 824, R.O.C.


 

Received: January 13, 2005
Accepted: November 2, 2005
Publication Date: June 1, 2006

Download Citation: ||https://doi.org/10.6180/jase.2006.9.2.01  


ABSTRACT


Semi-fragile image authentication methods are robust to JPEG images, but are fragile to other malicious manipulations. This paper presents a novel digital signature scheme that adopts statistic Ogive analysis in quantized discrete cosine transform (DCT) coefficients to construct a feature code for image authentication. The lower bound sensitivity of fragility can be determined by a predetermined degree of fragility corresponding to an acceptable JPEG compression quality factor. The degree of fragility can be easily adjusted by simply controlling a fragile degree factor (FDF). This paper analyzes how to choose FDF and the critical image feature properties. Experimental results indicate the effectiveness of the proposed method.


Keywords: Digital Signature, Image Authentication, JPEG, Ogive, Semi-Fragile


REFERENCES


  1. [1] Liu, R. and Tan, T., “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership,” IEEE Transactions on Multimedia, Vol. 4, pp. 121128 (2002).
  2. [2] Ramkumar, M. and Akansu, Ali N., “A Robust Protocol for Proving Ownership of Multimedia Content,” IEEE Transactions on Multimedia, Vol. 6, pp. 469 478 (2004).
  3. [3] Kundur, D. and Hatzinakos, D., “Toward Robust Logo Watermarking Using Multiresolution Image Fusion Principles,” IEEE Transactions on Multimedia, Vol. 6, pp. 185198 (2004).
  4. [4] Celik, M. U., Sharma, G., Saber, E. and Tekalp, A. M., “Hierarchical Watermarking for Secure Image Authentication with Localization,” IEEE Transactions on Image Processing, Vol. 11, pp. 585595 (2002).
  5. [5] Radhakrishman, R. and Memon, N., “On the Security of the Digest Function in the SARI Image Authentication System,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 12, pp. 10301033 (2002).
  6. [6] Lin, C. H. and Hsieh, W. S., “Applying Projection and B-spline to Image Authentication and Remedy,” IEEE Transactions on Consumer Electronics, Vol. 49, pp. 12341239 (2003).
  7. [7] Lu, Z. M., Liu, C. H., Xu, D. G. and Sun, S. H., “SemiFragile Image Watermarking Method Based on Index Constrained Vector Quantization,” IEE Electronics Letters, Vol. 39, pp. 3637 (2003).
  8. [8] Sun, R., Sun, H. and Yao, T., “A SVD- and Quantization Based Semi-Fragile Watermarking Technique for Image Authentication,” IEEE International Conference on Signal Processing (ICSP 2002), Vol. 2, pp. 15921595 (2002).
  9. [9] Sun, Q., Chang, S. F., Kurato, M. and Suto, M., “A New Semi-Fragile Image Authentication Framework Combining ECC and PKI Infrastructures,” IEEE International Symposium on Circuits and Systems (ISCAS 2002), Vol. 2, pp. 440443 (2002).
  10. [10] Zhou, X., Duan, X. and Wang, D., “A Semi-Fragile Watermark Scheme for Image Authentication,” IEEE International Conference on Multimedia Modelling (MMM 2004), pp. 374377 (2004).
  11. [11] El-Din, S. N. and Moniri, M., “Fragile and SemiFragile Image Authentication Based on Image SelfSimilarity,” IEEE International Conference on Image Processing, Vol. 2, pp. 2225 (2002).
  12. [12] Li, C. T., “Digital Fragile Watermarking Scheme for Authentication of JPEG Images,” Vision, Image and Signal Processing, IEE Proceedings, Vol. 151, pp. 460466 (2004).
  13. [13] Bao, P. and Ma, X., “Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 15, pp. 96102 (2005).
  14. [14] Lu, Z. M., Xu, D. G. and Sun, S. H., “Multipurpose Image Watermarking Algorithm Based on Multistage Vector Quantization,” IEEE Transactions on Image Processing, Vol. 14, pp. 822831 (2005).


    



 

1.6
2022CiteScore
 
 
60th percentile
Powered by  Scopus

SCImago Journal & Country Rank

Enter your name and email below to receive latest published articles in Journal of Applied Science and Engineering.