Journal of Applied Science and Engineering

Published by Tamkang University Press

1.30

Impact Factor

1.60

CiteScore

Chih-Hung Lin This email address is being protected from spambots. You need JavaScript enabled to view it.1, Tung-Shih Su2 and Wen-Shyong Hsieh2,3

1Department of Computer Science and Information Engineering, Southern Taiwan University of Technology, Tainan, Taiwan 710, R.O.C.
2Department of Computer Science and Engineering, National Sun Yat-Sen University, Kaohsiung, Taiwan 804, R.O.C.
3Department of Computer Science and Information Engineering, Shu Te University, Kaohsiung, Taiwan 824, R.O.C.


 

Received: April 25, 2005
Accepted: April 19, 2006
Publication Date: March 1, 2007

Download Citation: ||https://doi.org/10.6180/jase.2007.10.1.07  


ABSTRACT


This paper presents a novel digital watermarking method for verifying the authentication of JPEG images, by applying the novel concept of lowest authenticable JPEG quality (LAJQ). Given a LAJQ, the authenticity of the watermarked JPEG image will be protected as long as its final JPEG compressing quality is not less than the LAJQ. The image feature is generated based on the relationships of discrete cosine transfer (DCT) coefficients in the low/middle frequency domain. The image feature is then embedded in the high frequency domain for protection, and can be extracted without the original image. In addition, the parts that are modified by the malicious attack can be located in the authentication result image. The related theorems of this scheme are fully analyzed to strengthen the proposed solution, and the experimental results show that this new method is indeed effective for JPEG image authentication.


Keywords: Image Authentication, JPEG Compression, Watermarking, Semi-fragile.


REFERENCES


  1. [1] El-Din, S. N. and Moniri, M., “Fragile and SemiFragile Image Authentication Based on Image SelfSimilarity,” IEEE International Conference on Image Processing, Vol. 2, pp. 2225 (2002).
  2. [2] Friedman, G. L., “The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image,” IEEE Trans. Consumer Electron., Vol. 39, pp. 905 910 (1993).
  3. [3] Lin, C. Y. and Chang, S. F., “A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation,” IEEE Trans. on Circuits and Systems of Video Technology, Vol. 11, pp. 153168 (2001).
  4. [4] Sun, Q., Chang, S. F., Kurato, M. and Suto, M., “A New Semi-Fragile Image Authentication Framework Combining ECC and PKI Infrastructures,” IEEE International Symposium on Circuits and Systems (ISCAS 2002), Vol. 2, pp. 440443 (2002).
  5. [5] Li, C. T., “Digital Fragile Watermarking Scheme for Authentication of JPEG Images,” Proc. of IEE on Vision, Image and Signal Processing, Vol. 151, pp. 460 466 (2004).
  6. [6] Lu, C. S. and Liao, H. Y. M. H. Y. Mark, “Multipurpose Watermarking for Image Authentication and Protection,” IEEE Trans. Image Processing, Vol. 10, pp. 15791592 (2001).
  7. [7] Lu, Z. M., Liu, C. H., Xu, D. G. and Sun, S. H., “Semi-Fragile Image Watermarking Method Based on Index Constrained Vector Quantization,” IEE Electronics Letters, Vol. 39, pp. 3637 (2003).
  8. [8] Lu, Z. M., Xu, D. G. and Sun, S. H., “Multipurpose Image Watermarking Algorithm Based on Multistage Vector Quantization,” IEEE Trans. on Image Processing, Vol. 14, pp. 822831 (2005).
  9. [9] Sun, R., Sun, H. and Yao, T., “A SVD- and Quantization Based Semi-Fragile Watermarking Technique for Image Authentication,” IEEE International Conference on Signal Processing (ICSP 2002), Vol. 2, pp. 15921595 (2002).
  10. [10] Zhao, Y., Campisi, P. and Kundur, D., “Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images,” IEEE Trans. on Image Processing, Vol. 13, pp. 430448 (2004).
  11. [11] Schneider, M. and Chang, S. F., “A Robust Content Based Digital Signature for Image Authentication,” Proc. of IEEE Int. Conf. on Image Processing, Vol. 3, pp. 227230 (1996).
  12. [12] Cox, I. J., Kilian, J., Leighton, F. T. and Shamoon, T., “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. Image Process., Vol. 6, pp. 1673 1687 (1997).
  13. [13] Ramkumar, M. and Akansu, Ali N., “A Robust Protocol for Proving Ownership of Multimedia Content,” IEEE Trans. on Multimedia, Vol. 6, pp. 469478 (2004).
  14. [14] Celik, M. U., Sharma, G., Saber, E. and Tekalp, A. M., “Hierarchical Watermarking for Secure Image Authentication with Localization,” IEEE Trans. on Image Processing, Vol. 11, pp. 585595 (2002).
  15. [15] Lin, C. H. and Hsieh, W. S., ”Applying Projection and B-spline to Image Authentication and Remedy,” IEEE Trans. on Consumer Electronics, Vol. 49, pp. 1234 1239 (2003).
  16. [16] Bao, P. and Ma, X., “Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition,” IEEE Trans. on Circuits and Systems for Video Technology, Vol. 15, pp. 96102 (2005).
  17. [17] Zhou, X., Duan, X. and Wang, D., “A Semi-Fragile Watermark Scheme for Image Authentication,” IEEE International Conference on Multimedia Modeling, pp. 374377 (2004).
  18. [18] Lu, C. S. and Liao, H. Y., “Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme,” IEEE Transaction on Multimedia, Vol. 5, pp. 161173 (2003).
  19. [19] Feng, W. and Liu, Z. Q., “Bayesian Structural Content Abstraction for Image Authentication,” Proc. of IEEE Int. Conf. on Machine Learning and Cybernetics, Vol. 7, pp. 39994003 (2004).
  20. [20] El-Din, S. N. and Moniri, M., “Hierarchical Signatures for Semi-Fragile Image Authentication with Localization,” Proc. of IEE Int. Conf. on Visual Information Engineering, pp.317320 (2003).
  21. [21] Ho, C. K. and Li, C. T., “Semi-Fragile Watermarking Scheme for Authentication of JPEG Images,” Proc. of IEEE Int. Conf. on Information Technology: Coding and Computing, Vol. 1, pp. 711 (2004).
  22. [22] Wu, Y., “Detecting Tampered Image Blocks Using Error Correcting Code,” Proc. of IEEE Int. Conf. on Multimedia and Expo, Vol. 3, pp. 20472050 (2004).
  23. [23] Li, C. T., “Digital Fragile Watermarking Scheme for Authentication of JPEG Images,” Proc. of IEE on Vision, Image and Signal Processing, Vol. 151, pp. 460 466 (2004).
  24. [24] Rafael, C. Gonzalez and Richard, E. Woods, Digital Image Processing, Prentice Hall.
  25. [25] Li, Z.-N. and Drew, M. S., Fundamentals of Multimedia, Prentice Hall.


    



 

1.6
2022CiteScore
 
 
60th percentile
Powered by  Scopus

SCImago Journal & Country Rank

Enter your name and email below to receive latest published articles in Journal of Applied Science and Engineering.