Semi fragile watermark with self authentication and self recovery

Robust watermarks are suitable for copyright protection in a DRM scenario. On the other hand, fragile watermarks are good for tamper detection applications. Semi fragile watermarks possess some properties of both robust and fragile watermarks at a moderate level. The need for semi fragile watermarks...

Full description

Bibliographic Details
Main Authors: Woo, C.S., Jiang, D., Binh, P.
Format: Article
Published: 2009
Subjects:
_version_ 1796945329185095680
author Woo, C.S.
Jiang, D.
Binh, P.
author_facet Woo, C.S.
Jiang, D.
Binh, P.
author_sort Woo, C.S.
collection UM
description Robust watermarks are suitable for copyright protection in a DRM scenario. On the other hand, fragile watermarks are good for tamper detection applications. Semi fragile watermarks possess some properties of both robust and fragile watermarks at a moderate level. The need for semi fragile watermarks arises from the requirements of content authentication where the watermark must highlight malicious attacks while tolerating legitimate changes that do not alter the content severely. Very few watermarking scheme has both self authentication and self recovery features. We developed and evaluated a semi fragile watermarking scheme that offers these features. The scheme embeds a downscaled version of an image into the image�s discrete wavelet transform subbands. Our scheme provides content authentication by allowing high quality JPEG compression, minor local distortion, and minimal noise insertion. Other changes such as histogram equalisation, cropping, rotation, and mean filtering are classified as malicious attacks because it affects the visual quality of the image. The scheme is practical because it does not require a reference image during content authentication. Tampered regions can be located correctly, and its original content can be recovered. The watermark information is secured by a secret key that randomises the watermark pixel positions. The single transform, correlator detector, and down-scaled processing spaces of the scheme offer low computational cost.
first_indexed 2024-03-06T05:15:02Z
format Article
id um.eprints-5708
institution Universiti Malaya
last_indexed 2024-03-06T05:15:02Z
publishDate 2009
record_format dspace
spelling um.eprints-57082013-01-06T15:01:51Z http://eprints.um.edu.my/5708/ Semi fragile watermark with self authentication and self recovery Woo, C.S. Jiang, D. Binh, P. T Technology (General) Robust watermarks are suitable for copyright protection in a DRM scenario. On the other hand, fragile watermarks are good for tamper detection applications. Semi fragile watermarks possess some properties of both robust and fragile watermarks at a moderate level. The need for semi fragile watermarks arises from the requirements of content authentication where the watermark must highlight malicious attacks while tolerating legitimate changes that do not alter the content severely. Very few watermarking scheme has both self authentication and self recovery features. We developed and evaluated a semi fragile watermarking scheme that offers these features. The scheme embeds a downscaled version of an image into the image�s discrete wavelet transform subbands. Our scheme provides content authentication by allowing high quality JPEG compression, minor local distortion, and minimal noise insertion. Other changes such as histogram equalisation, cropping, rotation, and mean filtering are classified as malicious attacks because it affects the visual quality of the image. The scheme is practical because it does not require a reference image during content authentication. Tampered regions can be located correctly, and its original content can be recovered. The watermark information is secured by a secret key that randomises the watermark pixel positions. The single transform, correlator detector, and down-scaled processing spaces of the scheme offer low computational cost. 2009 Article PeerReviewed Woo, C.S. and Jiang, D. and Binh, P. (2009) Semi fragile watermark with self authentication and self recovery. Malaysian Journal of Computer Science, 22 (1). pp. 64-84. ISSN 0127-9084, http://www.myjurnal.my/filebank/published_article/2415/744.pdf
spellingShingle T Technology (General)
Woo, C.S.
Jiang, D.
Binh, P.
Semi fragile watermark with self authentication and self recovery
title Semi fragile watermark with self authentication and self recovery
title_full Semi fragile watermark with self authentication and self recovery
title_fullStr Semi fragile watermark with self authentication and self recovery
title_full_unstemmed Semi fragile watermark with self authentication and self recovery
title_short Semi fragile watermark with self authentication and self recovery
title_sort semi fragile watermark with self authentication and self recovery
topic T Technology (General)
work_keys_str_mv AT woocs semifragilewatermarkwithselfauthenticationandselfrecovery
AT jiangd semifragilewatermarkwithselfauthenticationandselfrecovery
AT binhp semifragilewatermarkwithselfauthenticationandselfrecovery