Ching-Tang Hsieh This email address is being protected from spambots. You need JavaScript enabled to view it.1, Yeh-Kuang Wu1 and Kuo-Ming Hung2

1Department of Electrical Engineering, Tamkang University, Tamsui, Taiwan 251, R.O.C.
2Department of Information Management, Kainan University, Taoyuan, Taiwan 338, R.O.C.


 

Received: January 17, 2006
Accepted: May 9, 2006
Publication Date: September 1, 2007

Download Citation: ||https://doi.org/10.6180/jase.2007.10.3.04  


ABSTRACT


In order to improve the detection of malicious tampering of images, it is necessary to decrease the fragility of hidden watermarks, even for digital images which have been distorted incidentally. However, watermarks are sensitive to geometric distortions. In this paper, we propose a new invariant semi-fragile digital watermarking technique based on eigenvalues and eigenvectors of a real symmetric matrix generated by the four pixel-pair. And the multi-rings Zernike transform (MRZT) is proposed to achieve geometric invariance. A signature bit for detecting malicious tampering of an image is generated using the dominant eigenvector. The MRZT method is against the geometric distortions even when the image is under malicious attacks. The experimental results show that this algorithm can resist high quality JPEG compression, and improve the detection performance of various malicious tampering.


Keywords: Semi-fragile Watermark, Real Symmetric Matrix, Eigenvlaue, Geometric Invariance, Zernike Transform


REFERENCES


  1. [1] Kundur, D. and Hatzinakos, D., “Digital Watermarking for Telltale Tamper Proofing and Authentication,” in Proceedings of IEEE Digital Object Identifier, Vol. 87, pp. 11671180 (1999).
  2. [2] Lin, E. T. and Delp, E. J., “A Review of Fragile Image Watermarks,” in Proceedings of the Multimedia and Security Workshop, pp. 2529 (1999).
  3. [3] Lin, C. Y. and Chang, S. F., “Semi-Fragile Watermarking for Authenticating JPEG Visual Content,” in Proceeding of the SPIE, Security and Watermarking of Multimedia Contents, pp. 140151 (2000).
  4. [4] Maeno, K., Sun, Q., Chang, S. F. and Suto, M., “New Semi-Fragile Image Authentication Watermarking Techniques Using Random Bias and Non-Uniform Quantization,” in Proceedong of the SPIE, Security and Watermarking of Multimedia Contents, pp. 659670 (2002).
  5. [5] Nakai, Y., “Multivalued Semi-Fragile Watermarking,” in Proceeding of the SPIE, Security and Watermarking of Multimedia Contents, pp. 671678 (2002).
  6. [6] Lu, C. S. and Liao, L. Y. M., “Multipurpose Watermarking for Image Authentication and Protection,” IEEE Transactions on Image Processing, Vol. 10, pp. 15791592 (2001).
  7. [7] Sun, Q., Chang, S. F., Maeno, K. and Suto, M., “A New Semi-Fragile Image Authentication Framework Combining ECC and PKI Infrastructures,” in Proceedings of the IEEE Circuits and Systems, pp. 440443 (2002).
  8. [8] Fridrich, J., “A Hybrid Watermark for Tamper Detection in Digital Images,” in Proceedings of the Signal Processing and Its Applications, pp. 301304 (1999).
  9. [9] Wong, P. W., “A Public Key Watermark for Image Verification and Authentication,” in Proceedings of the ICIP, Vol. 2, pp. 427431 (1998).
  10. [10] Coppersmith, D., Mintzer, F., Tresser, C., Wu, C. W. and Yeung, M. M., “Fragile Imperceptible Digital Watermark with Privacy Control,” in Proceedings SPIE, Security and Watermarking of Multimedia Contents, pp. 7984 (1999).
  11. [11] Dittmann, J., Steinmetz, A. and Steinmetz, R., “Content-Based Digital Signature for Motion Pictures Authentication and Content-fragile Watermarking,” in Proceedings of IEEE Multimedia Computing and Systems, Vol. 2, pp. 209213 (1999).
  12. [12] Wolfgang, R. B. and Delp, E. J., “Fragile Watermarking Using the VW2D Watermark,” in Proceedings of SPIE, Security and Watermarking of Multimedia Contents, pp. 204213 (1999).
  13. [13] Yin, P. and Yu, H. H., “A Semi-Fragile Watermarking System for MPEG Video Authentication,” in Proceedings of IEEE ICASSP, pp. 34613464 (2002).
  14. [14] Chen, T., Wang, J. and Zhou, Y., “Combined Digital Signature and Digital Watermark Scheme for Image Authentication,” in Proceedings of Info-tech and Infonet, pp. 7882 (2001).
  15. [15] Yu, G. J., Lu, C. S., Liao, H. Y. M. and Sheu, J. P., “Mean Quantization Blind Watermarking for Image Authentication,” in Proceedings of Image Processing, pp. 706709 (2002).
  16. [16] Kim, H. S. and Lee, H. K., “Invariant Image Watermark Using Zernike Moments,” IEEE Transactions on Circuits and Systems for Video Technology, pp. 766 775 (2003).
  17. [17] Xin, Y., Liao, S. and Pawlak, M., “A Multibit Geometrically Robust Image Watermark Based on Zernike Moments,” in Proceedings of Pattern Recognition, pp. 861864 (2004).
  18. [18] Liu, H., Lin, J. and Huang, J., “Image Authentication Using Content Based Watermark,” in Proceedings of IEEE Circuits and Systems, pp. 40144017 (2005).
  19. [19] Farzam, M. and Shirani, S., “A Robust Multimedia Watermarking Technique Using Zernike Transform,” in Proceedings of IEEE Multimedia Signal Processing, pp. 529534 (2004).
  20. [20] Chen, J., Yao, H., Gao, W. and Liu, S., “A Robust Watermarking Method Based on Wavelet and Zernike Transform,” in Proceedings of Circuits and Systems, pp. 173176 (2004).