This document provides an overview of emerging techniques for digital image authentication using watermarking. It begins with introducing concepts like content authentication versus strict integrity, and outlines criteria for an effective authentication system. It then surveys the state of the art in watermarking-based authentication methods, classifying them into fragile watermarks and semifragile watermarks. Fragile watermarking techniques embed a predefined mark that detects any alterations, while semifragile watermarking aims to tolerate non-malicious changes like compression. Specific algorithms discussed include embedding checksums in least significant bits and self-embedding an image into itself for authentication and tampered region repair.
Efficient and secure authentication on remote server using stegno video objec...pradip patel
Due to the present increase in world population, people in this world tend to occupy available locations present in any zone which also include zones falling in the high seismic zone categories. The buildings constructed in such zones must be analysed and designed to withstand these earthquakes, along with the cost economy. Bracing systems is very efficient and unyielding lateral load resisting system. Bracing systems serves as one of the component in buildings for increasing stiffness and strength to guard buildings from incidence caused by natural forces like earthquake. Braced frames widen their resistance to lateral forces by the bracing action of inclined members. The braces stimulate forces in the associated beams and columns so that all works like a truss which results in smaller sizes of beam and column sections that turns out to be economical. In this study, G+14 storey building model has been analysed considering “Inverted V” and “V” type RCC bracing system and steel bracing system under seismic loadings using STADD PRO for analysis. Results are concluded by comparison of storey displacement, storey drift and base shear for fixed base building
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image,
which is overlaid on the host image, and provides a means of protecting the image. In order to provide high quality watermarked
image, the watermarked image should be imperceptible. This paper presents different techniques of digital image watermarking based
on spatial & frequency domain, which shows that spatial domain technique provides security & successful recovery of watermark
image and higher PSNR value compared to frequency domain.
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
This paper proposes an encryption-based image watermarking scheme for medical images using a customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The high frequency wavelet coefficients are selected to carry these scrambled-watermarks by using adaptive quantization low bit modulation (LBM). The proposed image watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, Thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is compared with other related techniques.
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
Abstract : Conventional personal identification techniques for instance passwords, tokens, ID card and PIN
codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing
and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and
legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal
biometric recognition is not able to meet the performance requirements of the applications. According to recent
trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics
unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in
multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric
data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data
from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the
directions of improving the performance of biometric identification system by going multimodal and, increasing
the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and
Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction
and presented outcomes justifies the effectiveness of the scheme.
Keywords: Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Multimodal biometrics,
Singular Value Decomposition, Watermarking
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
The field of Signal Processing has witnessed the strong emergence of a new technique, the Blind
Signal Processing (BSP) which is based on sound theoretical foundation. An offshoot of the BSP is known as
Blind Source Separation (BSS). This digital signal processing techniques have a wide and varied potential
applications. The term blind is indicative of the fact that both the source signal and the mixing procedures are
unknown. One of the more interesting applications of BSS is in field of image data security/authentication where
digital watermarking is proposed. Watermarking is a promising technique to help protect data security and
intellectual property rights. The plethora digital image watermarking methods are surveyed and discussed here
with their features and limitations. Thus literature survey is presented in two major categories-Digital image
watermarking methods and BSS based techniques in digital image watermarking and extraction
A Quick Glance over the Digital Watermarkingijsrd.com
Digital watermarking is a process for modifying physical or electronic media to embed a machine-readable code into the media. The media may be modified such that the embedded code is imperceptible or nearly imperceptible to the user, yet may be detected through an automated detection process. Watermarking is the art of imperceptibly embedding a message into a work. More than 700 years ago in Fabriano (Italy), paper watermarks appeared in handmade paper, in order to identify its provenance, format, and quality. In this context, the watermark is a kind of invisible signature that allows identifying the creator or the owner of a document, and to detect possible copyright violations, and especially non-authorized copying [1]. More recently, different watermarking techniques and strategies have been proposed in order to solve a number of problems, ranging from the detection of content manipulations, to information hiding (steganography), to document usage tracing. In particular, the insertion of multiple watermarks to trace a document during its lifecycle is a very interesting and challenging application [1]. The main property of the proposed method is that it allows the insertion of multiple watermarks by different users, who sequentially come into play one after the other and do not need any extra information besides the public keys. This characteristic makes the present approach more attractive than previously available solutions.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Efficient and secure authentication on remote server using stegno video objec...pradip patel
Due to the present increase in world population, people in this world tend to occupy available locations present in any zone which also include zones falling in the high seismic zone categories. The buildings constructed in such zones must be analysed and designed to withstand these earthquakes, along with the cost economy. Bracing systems is very efficient and unyielding lateral load resisting system. Bracing systems serves as one of the component in buildings for increasing stiffness and strength to guard buildings from incidence caused by natural forces like earthquake. Braced frames widen their resistance to lateral forces by the bracing action of inclined members. The braces stimulate forces in the associated beams and columns so that all works like a truss which results in smaller sizes of beam and column sections that turns out to be economical. In this study, G+14 storey building model has been analysed considering “Inverted V” and “V” type RCC bracing system and steel bracing system under seismic loadings using STADD PRO for analysis. Results are concluded by comparison of storey displacement, storey drift and base shear for fixed base building
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image,
which is overlaid on the host image, and provides a means of protecting the image. In order to provide high quality watermarked
image, the watermarked image should be imperceptible. This paper presents different techniques of digital image watermarking based
on spatial & frequency domain, which shows that spatial domain technique provides security & successful recovery of watermark
image and higher PSNR value compared to frequency domain.
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
This paper proposes an encryption-based image watermarking scheme for medical images using a customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The high frequency wavelet coefficients are selected to carry these scrambled-watermarks by using adaptive quantization low bit modulation (LBM). The proposed image watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, Thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is compared with other related techniques.
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
Abstract : Conventional personal identification techniques for instance passwords, tokens, ID card and PIN
codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing
and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and
legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal
biometric recognition is not able to meet the performance requirements of the applications. According to recent
trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics
unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in
multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric
data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data
from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the
directions of improving the performance of biometric identification system by going multimodal and, increasing
the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and
Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction
and presented outcomes justifies the effectiveness of the scheme.
Keywords: Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Multimodal biometrics,
Singular Value Decomposition, Watermarking
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
The field of Signal Processing has witnessed the strong emergence of a new technique, the Blind
Signal Processing (BSP) which is based on sound theoretical foundation. An offshoot of the BSP is known as
Blind Source Separation (BSS). This digital signal processing techniques have a wide and varied potential
applications. The term blind is indicative of the fact that both the source signal and the mixing procedures are
unknown. One of the more interesting applications of BSS is in field of image data security/authentication where
digital watermarking is proposed. Watermarking is a promising technique to help protect data security and
intellectual property rights. The plethora digital image watermarking methods are surveyed and discussed here
with their features and limitations. Thus literature survey is presented in two major categories-Digital image
watermarking methods and BSS based techniques in digital image watermarking and extraction
A Quick Glance over the Digital Watermarkingijsrd.com
Digital watermarking is a process for modifying physical or electronic media to embed a machine-readable code into the media. The media may be modified such that the embedded code is imperceptible or nearly imperceptible to the user, yet may be detected through an automated detection process. Watermarking is the art of imperceptibly embedding a message into a work. More than 700 years ago in Fabriano (Italy), paper watermarks appeared in handmade paper, in order to identify its provenance, format, and quality. In this context, the watermark is a kind of invisible signature that allows identifying the creator or the owner of a document, and to detect possible copyright violations, and especially non-authorized copying [1]. More recently, different watermarking techniques and strategies have been proposed in order to solve a number of problems, ranging from the detection of content manipulations, to information hiding (steganography), to document usage tracing. In particular, the insertion of multiple watermarks to trace a document during its lifecycle is a very interesting and challenging application [1]. The main property of the proposed method is that it allows the insertion of multiple watermarks by different users, who sequentially come into play one after the other and do not need any extra information besides the public keys. This characteristic makes the present approach more attractive than previously available solutions.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Graphical Password by Watermarking for securityIJERA Editor
The most common authentication method is to use alphanumerical usernames and passwords. This method has
been shown to have considerable disadvantage. For example, users tend to pick passwords that can be easily
guessed. On the other hand, if a password is very difficult to guess, then it is often difficult to remember. To
address this problem, some researchers have developed authentication methods that use pictures as passwords.
Graphical Password based on the fact that humans tend to remember images better. In this paper, we will
propose a new algorithm that using watermarking technique as the solution to solving image gallery attacks and
using the random character set generation for each image for resistance to shoulder surfing attack to provide
better system security. All the information images in registration phase will be process by copy right protection
of watermarking where the login page will check this information for security purposes.
Digital Image Watermarking Using Different Levels of Intermediate Significant...CSCJournals
The rapid growths of computer technologies have been increased over the last half century in terms of amount and complexity of data. Broadcasting of digital contents on the networks (especially Internet) has become more important and access to the data also has become much easier than before. Digital watermarking techniques are used to protect the copyrights of multimedia data by embedding secret information inside them. For example, embedding watermark in images, audios, and videos. Digital Image watermarking also has been using to detect original images against forged images by embedding an evidence of the owner of the digital image. Imperceptibility, on the other hand, is one of the problems in digital image watermarking which a repeated method in different bit planes of cover image has been presented to improve the imperceptibility of watermarking in both embedding and extracting processes. Moreover, embedding process aims to embed watermark in different bit planes by using a nonsequential method to improve security of image rather than simple sequential embedding.
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
Digital watermarking provides authentication, validation and copyright protection for multimedia contents over the internet. Text is the most widely used means of communication in addition to image, audio and video. So it needs to be protected. Text watermarking techniques that have been developed in past protects the text from illegal copying, imitation, and prevents copyright violations. In this paper, we have proposed an algorithm that ensures the integrity and confidentiality of the document. In this technique watermark is created based on the contents of the document and embeds it without changing the contents of the document and also encrypts the text to provide confidentiality. To authenticate and prove the integrity of the document the watermark can be easily extracted and verified for tampering.
In wireless communications sensitive data is frequently changed, requiring remote authentication. Remote authentication involves the submission of encrypted data, along with visual and audio cues (facial images/videos, human voice etc.). Nonetheless, malicious program and different attacks will cause serious issues, particularly in cases of remote examinations or interviewing. This paper proposes a sturdy authentication mechanism supported semantic segmentation, chaotic cryptography and knowledge concealment. Assuming that user X needs to be remotely documented, initially X’s video object (VO) is mechanically segmental, employing a head and-body detector. Next, one amongst X’s biometric signals is encrypted by a chaotic cipher. Subsequently the encrypted signal is inserted to the most vital riffle coefficients of the VO, victimization its Qualified Significant riffle Trees (QSWTs). QSWTs give invisibility and vital resistance against loss transmission and compression, conditions that area unit typical in wireless networks. Finally, the Inverse distinct riffle rework (IDWT) is applied to supply the stegno-object (SO). Experimental results, regarding: (a) security deserves of the planned cryptography theme, (b) strength to stegno-analytic attacks, to numerous transmission losses and JPEG compression ratios and (c) information measure potency measures, indicate the promising performance of the planned biometrics-based authentication theme.
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention since its introduction in 1992. In this study, authentication system contained two parts: registration part and matching part. In both parts, iris image is used for personal identification. Localization of inner boundary only, extracted a region from the iris (without eyelashes problem), a feature vector is deduced from the texture of the image. The feature vector is used for classification of the iris texture, then it's treated by the hash function to produce the hash value (authentic value of a person). In matching part, produced hash value searched in the authorized person's database for taking a decision (success or fail) of the authentication. The method was evaluated on iris images takes from the CASIA iris image database version 1.0 [15]. The experimental results show that the vector extracted by the proposed method has very discriminating values that led to a recognition rate of over 100% on iris database. Also, authentication system is very accurate because it's used a secure method of authentication that iris-biometric and a hash function for avoiding stealing data from database.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
Copyright protection has become a need in today’s world. To achieve a secure copyright protection we embedded some information in images and videos and that image or video is called copyright protected. The embedded information can’t be detected by human eye but some attacks and operations can tamper that information to breach protection. So in order to find a secure technique of copyright protection, we have analyzed image processing techniques i.e. Spatial Domain (Least Significant Bit (LSB)), Transform Domain (Discrete Cosine Transform (DCT)), Discrete Wavelet Transform (DWT) and there are numerous algorithm for watermarking using them. After having a good understanding of the same we have proposed a novel algorithm named as Stage Staffing Algorithm that generates results with high effectiveness, additionally we can use self extracted-watermark technique to increase the security and automate the process of watermark image. The proposed algorithm provides protection in three stages. We have implemented the algorithm and results of the simulations are shown. The various factors affecting spatial domain watermarking are also discussed.
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
For Image Authentication Problem using Encryption Technique and LDPC Source Coding is necessary in Content
Delivery via unsecure medium, Like Peer-To-Peer (P2P) File Sharing. These transferring Digital Files from one Computer to
another. Images are the Most Important Utility of our life. They are used in many applications. There are Two Main Goals of
Image Security: Image Encryption and Authentication. More different encoded versions of the original image available.In
addition, unsecure medium might tamper with the contents.. We propose an efficient, accurate, reliable process using
encryption and LDPC source coding for the image authentication problem. The key idea is to provide a Slepian-Wolf encoded
as authentication data which is encrypted using cryptography key before ready to send. The key used for encryption is usually
independent of the Plain-Image. This can be decoded with side information of an authentic image.
R E G U L A R P A P E RUser-centric privacy awareness in v.docxmakdul
R E G U L A R P A P E R
User-centric privacy awareness in video surveillance
Thomas Winkler • Bernhard Rinner
Published online: 1 July 2011
� Springer-Verlag 2011
Abstract Especially in urban environments, video cam-
eras have become omnipresent. Supporters of video sur-
veillance argue that it is an excellent tool for many
applications including crime prevention and law enforce-
ment. While this is certainly true, it must be questioned if
sufficient efforts are made to protect the privacy of moni-
tored people. Privacy concerns are often set aside when
compared to public safety and security. One reaction to this
situation is emerging: community-based efforts where cit-
izens register and map surveillance cameras in their envi-
ronment. Our study is inspired by this idea and proposes a
user-specific and location-aware privacy awareness system.
Using conventional smartphones, users not only can con-
tribute to the camera maps, but also use community-col-
lected data to be alerted of potential privacy violations. In
our model, we define different levels of privacy awareness.
For the highest level, we present a mechanism that allows
users to directly interact with specially designed, trust-
worthy cameras. These cameras provide direct feedback
about the tasks that are executed by the camera and how
privacy-sensitive data is handled. A hardware security chip
that is integrated into the camera is used to ensure
authenticity, integrity and freshness of the provided camera
status information.
Keywords Smart cameras � Video surveillance � Privacy �
User feedback � Trusted computing
1 Introduction and motivation
Video surveillance has been recognized as a valuable tool
for many applications including crime prevention and law
enforcement. As a consequence, surveillance cameras are
widely deployed especially in urban environments. This
trend is fostered by many factors such as technological
advances with the move from analog toward digital sys-
tems as well as considerable price drops of camera systems.
This way, surveillance cameras have become truly ubiq-
uitous sensors not only deployed by governments, but also
by companies and even individuals. In London, for
example, an average citizen is captured by surveillance
cameras 300 times a day [7].
It is commonly agreed that video surveillance not only
can help to increase public safety and security, but also
bears some risks. One of them is an increasing loss of
personal privacy. This problem is addressed from several
sides with mixed success. Governmental regulations intend
to protect the privacy of citizens. However, these regula-
tions are difficult to enforce and usually lag behind the
rapid developments of the surveillance industry. Several
efforts from research and academia try to address the
problem from a technological direction. Typically, they are
based on the identification and protection of privacy-sen-
sitive image regions such as human f ...
In imaging science, the photo editing software packages can alter the original images without any
detecting traces of tampering. Hence, the image forgery detection technique plays an important role in
verifying the integrity of digital image forensics for authentication. The techniques such as
watermarking are used for authentication but it can be modified through third parties attack through
extraction. Malicious and digital imaging (digital products) tamper detection is the subject of this
article. In particular, we focus on a special type of digital forgery detection - copy attack campaign, in
which part of the image is copied and pasted into the image and the cover features a large image of
intentions another. In this paper, we investigate the dynamic forged copy detection problem, and
describes a highly efficient and reliable detection method that based on image source ANN
identification.. Even when the region is enhanced copy / retouching and background merger, and the
method can successfully identify counterfeit forgery when images are saved in a lossy format (such as
JPEG). The performance of the method's performance several forged images.
Graphical Password by Watermarking for securityIJERA Editor
The most common authentication method is to use alphanumerical usernames and passwords. This method has
been shown to have considerable disadvantage. For example, users tend to pick passwords that can be easily
guessed. On the other hand, if a password is very difficult to guess, then it is often difficult to remember. To
address this problem, some researchers have developed authentication methods that use pictures as passwords.
Graphical Password based on the fact that humans tend to remember images better. In this paper, we will
propose a new algorithm that using watermarking technique as the solution to solving image gallery attacks and
using the random character set generation for each image for resistance to shoulder surfing attack to provide
better system security. All the information images in registration phase will be process by copy right protection
of watermarking where the login page will check this information for security purposes.
Digital Image Watermarking Using Different Levels of Intermediate Significant...CSCJournals
The rapid growths of computer technologies have been increased over the last half century in terms of amount and complexity of data. Broadcasting of digital contents on the networks (especially Internet) has become more important and access to the data also has become much easier than before. Digital watermarking techniques are used to protect the copyrights of multimedia data by embedding secret information inside them. For example, embedding watermark in images, audios, and videos. Digital Image watermarking also has been using to detect original images against forged images by embedding an evidence of the owner of the digital image. Imperceptibility, on the other hand, is one of the problems in digital image watermarking which a repeated method in different bit planes of cover image has been presented to improve the imperceptibility of watermarking in both embedding and extracting processes. Moreover, embedding process aims to embed watermark in different bit planes by using a nonsequential method to improve security of image rather than simple sequential embedding.
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
Digital watermarking provides authentication, validation and copyright protection for multimedia contents over the internet. Text is the most widely used means of communication in addition to image, audio and video. So it needs to be protected. Text watermarking techniques that have been developed in past protects the text from illegal copying, imitation, and prevents copyright violations. In this paper, we have proposed an algorithm that ensures the integrity and confidentiality of the document. In this technique watermark is created based on the contents of the document and embeds it without changing the contents of the document and also encrypts the text to provide confidentiality. To authenticate and prove the integrity of the document the watermark can be easily extracted and verified for tampering.
In wireless communications sensitive data is frequently changed, requiring remote authentication. Remote authentication involves the submission of encrypted data, along with visual and audio cues (facial images/videos, human voice etc.). Nonetheless, malicious program and different attacks will cause serious issues, particularly in cases of remote examinations or interviewing. This paper proposes a sturdy authentication mechanism supported semantic segmentation, chaotic cryptography and knowledge concealment. Assuming that user X needs to be remotely documented, initially X’s video object (VO) is mechanically segmental, employing a head and-body detector. Next, one amongst X’s biometric signals is encrypted by a chaotic cipher. Subsequently the encrypted signal is inserted to the most vital riffle coefficients of the VO, victimization its Qualified Significant riffle Trees (QSWTs). QSWTs give invisibility and vital resistance against loss transmission and compression, conditions that area unit typical in wireless networks. Finally, the Inverse distinct riffle rework (IDWT) is applied to supply the stegno-object (SO). Experimental results, regarding: (a) security deserves of the planned cryptography theme, (b) strength to stegno-analytic attacks, to numerous transmission losses and JPEG compression ratios and (c) information measure potency measures, indicate the promising performance of the planned biometrics-based authentication theme.
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention since its introduction in 1992. In this study, authentication system contained two parts: registration part and matching part. In both parts, iris image is used for personal identification. Localization of inner boundary only, extracted a region from the iris (without eyelashes problem), a feature vector is deduced from the texture of the image. The feature vector is used for classification of the iris texture, then it's treated by the hash function to produce the hash value (authentic value of a person). In matching part, produced hash value searched in the authorized person's database for taking a decision (success or fail) of the authentication. The method was evaluated on iris images takes from the CASIA iris image database version 1.0 [15]. The experimental results show that the vector extracted by the proposed method has very discriminating values that led to a recognition rate of over 100% on iris database. Also, authentication system is very accurate because it's used a secure method of authentication that iris-biometric and a hash function for avoiding stealing data from database.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
Copyright protection has become a need in today’s world. To achieve a secure copyright protection we embedded some information in images and videos and that image or video is called copyright protected. The embedded information can’t be detected by human eye but some attacks and operations can tamper that information to breach protection. So in order to find a secure technique of copyright protection, we have analyzed image processing techniques i.e. Spatial Domain (Least Significant Bit (LSB)), Transform Domain (Discrete Cosine Transform (DCT)), Discrete Wavelet Transform (DWT) and there are numerous algorithm for watermarking using them. After having a good understanding of the same we have proposed a novel algorithm named as Stage Staffing Algorithm that generates results with high effectiveness, additionally we can use self extracted-watermark technique to increase the security and automate the process of watermark image. The proposed algorithm provides protection in three stages. We have implemented the algorithm and results of the simulations are shown. The various factors affecting spatial domain watermarking are also discussed.
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
For Image Authentication Problem using Encryption Technique and LDPC Source Coding is necessary in Content
Delivery via unsecure medium, Like Peer-To-Peer (P2P) File Sharing. These transferring Digital Files from one Computer to
another. Images are the Most Important Utility of our life. They are used in many applications. There are Two Main Goals of
Image Security: Image Encryption and Authentication. More different encoded versions of the original image available.In
addition, unsecure medium might tamper with the contents.. We propose an efficient, accurate, reliable process using
encryption and LDPC source coding for the image authentication problem. The key idea is to provide a Slepian-Wolf encoded
as authentication data which is encrypted using cryptography key before ready to send. The key used for encryption is usually
independent of the Plain-Image. This can be decoded with side information of an authentic image.
R E G U L A R P A P E RUser-centric privacy awareness in v.docxmakdul
R E G U L A R P A P E R
User-centric privacy awareness in video surveillance
Thomas Winkler • Bernhard Rinner
Published online: 1 July 2011
� Springer-Verlag 2011
Abstract Especially in urban environments, video cam-
eras have become omnipresent. Supporters of video sur-
veillance argue that it is an excellent tool for many
applications including crime prevention and law enforce-
ment. While this is certainly true, it must be questioned if
sufficient efforts are made to protect the privacy of moni-
tored people. Privacy concerns are often set aside when
compared to public safety and security. One reaction to this
situation is emerging: community-based efforts where cit-
izens register and map surveillance cameras in their envi-
ronment. Our study is inspired by this idea and proposes a
user-specific and location-aware privacy awareness system.
Using conventional smartphones, users not only can con-
tribute to the camera maps, but also use community-col-
lected data to be alerted of potential privacy violations. In
our model, we define different levels of privacy awareness.
For the highest level, we present a mechanism that allows
users to directly interact with specially designed, trust-
worthy cameras. These cameras provide direct feedback
about the tasks that are executed by the camera and how
privacy-sensitive data is handled. A hardware security chip
that is integrated into the camera is used to ensure
authenticity, integrity and freshness of the provided camera
status information.
Keywords Smart cameras � Video surveillance � Privacy �
User feedback � Trusted computing
1 Introduction and motivation
Video surveillance has been recognized as a valuable tool
for many applications including crime prevention and law
enforcement. As a consequence, surveillance cameras are
widely deployed especially in urban environments. This
trend is fostered by many factors such as technological
advances with the move from analog toward digital sys-
tems as well as considerable price drops of camera systems.
This way, surveillance cameras have become truly ubiq-
uitous sensors not only deployed by governments, but also
by companies and even individuals. In London, for
example, an average citizen is captured by surveillance
cameras 300 times a day [7].
It is commonly agreed that video surveillance not only
can help to increase public safety and security, but also
bears some risks. One of them is an increasing loss of
personal privacy. This problem is addressed from several
sides with mixed success. Governmental regulations intend
to protect the privacy of citizens. However, these regula-
tions are difficult to enforce and usually lag behind the
rapid developments of the surveillance industry. Several
efforts from research and academia try to address the
problem from a technological direction. Typically, they are
based on the identification and protection of privacy-sen-
sitive image regions such as human f ...
In imaging science, the photo editing software packages can alter the original images without any
detecting traces of tampering. Hence, the image forgery detection technique plays an important role in
verifying the integrity of digital image forensics for authentication. The techniques such as
watermarking are used for authentication but it can be modified through third parties attack through
extraction. Malicious and digital imaging (digital products) tamper detection is the subject of this
article. In particular, we focus on a special type of digital forgery detection - copy attack campaign, in
which part of the image is copied and pasted into the image and the cover features a large image of
intentions another. In this paper, we investigate the dynamic forged copy detection problem, and
describes a highly efficient and reliable detection method that based on image source ANN
identification.. Even when the region is enhanced copy / retouching and background merger, and the
method can successfully identify counterfeit forgery when images are saved in a lossy format (such as
JPEG). The performance of the method's performance several forged images.
A Generalized Image Authentication Based On Statistical Moments of Color Hist...idescitation
Designing low cost and high speed authentication
solution for digital images is always an attractive area of
research in image processing. In past few years because of
widespread use of internet and network technology, concept
of information distribution has been become habit rather than
exception in daily life. In same aspects challenges involved
with distribution of authenticate information has been
increased manifolds. In this paper a generalize image
authentication method has proposed by hybridization of color
histogram and associated first four statistical moments to
achieve the objectives of low cost and high speed. Proposed
method can apply for both gray and color images having any
size and any format. Solution generates a very small
authentication code with an ease means which is use to analyze
the characteristics of received image from tampering
perspective.
A Review on Various Forgery Detection Techniquesijtsrd
Nowadays, there barely exists any platform where digital images are not used. They are used in almost every field, namely digital media, electronic media, military, law, industry, forensics, and so on, and all over the internet. With such vast numbers of images, the importance of their authenticity has increased enormously .We give much importance to what we see on daily basis in newspapers, on the covers of magazines, social media such as Facebook, Instagram, Twitter and many more. Digital image manipulation is the act of distorting the contents of an image in order to fulfil some fraudulent purposes, such manipulations are known as forgeries. There exist various cases of image forgeries in history which caused clutter and affected people organizations. Earlier photographers were habituated with using the process of photomontage, in which composites of images were created by pasting, gluing to get the final print. However, due to evolution of technology, various tools have been developed by researchers and made available over the internet. Aarushi Thusu | Mr. B. Indra Thannaya "A Review on Various Forgery Detection Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49915.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/49915/a-review-on-various-forgery-detection-techniques/aarushi-thusu
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
AHP validated literature review of forgery type dependent passive image forge...IJECEIAES
Nowadays, a lot of significance is given to what we read today: newspapers, magazines, news channels, and internet media, such as leading social networking sites like Facebook, Instagram, and Twitter. These are the primary wellsprings of phony news and are frequently utilized in malignant manners, for example, for horde incitement. In the recent decade, a tremendous increase in image information generation is happening due to the massive use of social networking services. Various image editing software like Skylum Luminar, Corel PaintShop Pro, Adobe Photoshop, and many others are used to create, modify the images and videos, are significant concerns. A lot of earlier work of forgery detection was focused on traditional methods to solve the forgery detection. Recently, Deep learning algorithms have accomplished high-performance accuracies in the image processing domain, such as image classification and face recognition. Experts have applied deep learning techniques to detect a forgery in the image too. However, there is a real need to explain why the image is categorized under forged to understand the algorithm’s validity; this explanation helps in mission-critical applications like forensic. Explainable AI (XAI) algorithms have been used to interpret a black box’s decision in various cases. This paper contributes a survey on image forgery detection with deep learning approaches. It also focuses on the survey of explainable AI for images.
Report on Digital Watermarking Technology vijay rastogi
Digital watermarking is the process of embedding information into digital multimedia content such that the information (which we call the watermark) can later be extracted or detected for a variety of purposes including copy prevention and control.
Abstract: A number of research papers has been produced about reversible watermarking. Reversible
watermarking is one of the important scheme of the watermarking schemes. Some security measures must be
there to protect the records from unauthorized user and destruction of information. Basic idea of digital
watermarking is to embed the data into the cover media to provide the security to data. The watermarking
techniques satisfying these requirements called as Reversible watermarking. Ownership of the original media
remains same but the best thing is original media is recovered from the watermarked media. This is the best and
main feature of reversible watermarking to extract the original image as it is without any distortion. This
feature is applicable in various areas such as medical as well as military images. If there is effect on the cover
then it would changes the meaning of this data. The aim of this paper is to represent the purpose of reversible
watermarking, some of the techniques related to reversible watermarking.
Keywords: Reversible watermarking, Security, copyright protection
This paper proposes an encryption-based image watermarking scheme for medical images using a
customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of
Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra
security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the
watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding,
an R-level discrete wavelet transform was applied to the host image.
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
The frequent availability of digital data such as audio, images and videos became possible to the public through the expansion
of the internet. Digital watermarking technology is being adopted to ensure and facilitate data authentication, security and copyright
protection of digital media. It is considered as the most important technology in today’s world, to prevent illegal copying of data. Digital
watermarking can be applied to audio, video, text or images. This paper includes the detail study of watermarking definition and various
watermarking applications and techniques used to enhance data security.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Unit 8 - Information and Communication Technology (Paper I).pdf
Rey.survey watermarking auth_images.2002
1. EURASIP Journal on Applied Signal Processing 2002:6, 613–621
c 2002 Hindawi Publishing Corporation
A Survey of Watermarking Algorithms
for Image Authentication
Christian Rey
Multimedia Department, Eurecom Institute, 2229 route de Crˆtes, B.P. 193, F-06904 Sophia Antipolis, France
e
Email: christian.rey@eurecom.fr
Jean-Luc Dugelay
Multimedia Department, Eurecom Institute, 2229 route de Crˆtes, B.P. 193, F-06904 Sophia Antipolis, France
e
Email: jean-luc.dugelay@eurecom.fr
Received 20 November 2001 and in revised form 8 March 2002
Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with
any image and make it available to others. Insuring digital image integrity has therefore become a major issue. Watermarking has
become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview
of emerging techniques for detecting whether image tampering has taken place. Compared to the techniques and protocols for
security usually employed to perform this task, the majority of the proposed methods based on watermarking, place a particular
emphasis on the notion of content authentication rather than strict integrity. In this paper, we introduce the notion of image
content authentication and the features required to design an effective authentication scheme. We present some algorithms, and
introduce frequently used key techniques.
Keywords and phrases: image processing, security, cryptography, watermarking, content authentication, review, state of the art.
1.
INTRODUCTION
1.1. Basic watermarking principles
The digital revolution, the explosion of communication networks, and the increasingly growing passion of the general
public for new information technologies lead to exponential
growth of multimedia document traffic (image, text, audio,
video, etc.). This phenomenon is now so important that insuring protection and control of the exchanged data has become a major issue. Indeed, from their digital nature, multimedia documents can be duplicated, modified, transformed,
and diffused very easily. In this context, it is important to
develop systems for copyright protection, protection against
duplication, and authentication of content. Watermarking
seems to be the alternative solution for reinforcing the security of multimedia documents.
The aim of watermarking is to include subliminal information (i.e., imperceptible) in a multimedia document to
ensure a security service or simply a labelling application. It
would be then possible to recover the embedded message at
any time, even if the document was altered by one or more
nondestructive attacks, whether malicious or not.
Until now, the majority of publications in the field of
watermarking mainly address the copyright of still images.
Other security services, such as image content authentication, are still marginal and many fundamental questions
remain open. We may wonder, for example, whether it is
preferable to use a fragile watermark, a robust watermark,
or even use a completely different technique. Furthermore,
an authentication service partially calls into question the settings commonly established in watermarking copyright protection, particularly in terms of the quantity and nature of
hidden information (for copyright, the mark is independent
of the image and is usually a 64-bit identifier), as well as in
terms of robustness.
1.2. Notions of integrity
In the security community, an integrity service is unambiguously defined as one, which insures that the sent and received
data are identical. This binary definition can also be applicable to images, however it is too strict and not well adapted to
this type of digital document. Indeed, in real life situations,
images will be transformed. Their pixel values will therefore
be modified but not the actual semantic meaning of the image. In other words, the problem of image authentication
concerns the image content, for example, when modifications of the document may change its meaning or visually
degrade it. In order to provide an authentication service for
2. 614
still images, it is important to distinguish between malicious
manipulations, which consist of changing the content of the
original image such as captions or faces, and manipulations
related to the use of an image, such as format conversion,
compression, filtering, and so on.
Unfortunately this distinction is not always clear, it partly
depends on the type of image and its use. Indeed the integrity criteria of an artistic masterpiece and a medical image will not be the same. In the first case, a JPEG compression will not affect the perception of the image, whereas
in the second case it may discard some of the fine details
which would render the image totally useless. Even if the
scope of this paper is the authentication of multimedia images for general purpose, it is interesting to notice that there
exist methods dedicated to very specific integrity services,
such as the authentication of medical or military images.
Indeed these images should be modified by no means (including watermarking) and a strict definition of integrity
is then required. The first class of these methods is invertible watermarking scheme [1], in the sense that, if the image
is deemed authentic, the distortion due to the watermarking process can be removed to obtain the original image.
Another approach [2] consists in separating the image into
two zones: a region of interest (ROI) which is the part of
the image used for the diagnostic, where data integrity must
be strictly controlled, and a region of noninterest (where
distortions are allowed) used to embed the authentication
data.
1.3. Classical examples of malicious manipulations
It is a well-known saying that an image is worth a thousand
words. Images tend to have more impact on people than text,
as it is easier to disregard the content of textual information
than to question the origin and authenticity of a photograph.
It used to be stated that the camera could not lie. However,
it is now possible to edit pictures easily and at very little cost.
The resulting images can have such a high quality that they
appear to be genuine.
In this context, it is obvious that an image authentication service cannot be used to verify the events, but it may be
able to detect an a posteriori alteration to an image (i.e., the
difference between the photograph as taken, and its released
version).
Recently, a picture published on the front page of the
Austrian newspaper Neue Kronen Zeitung, claims to illustrate
that the demonstrators opposed to Haider’s party joining the
government were aggressive.
Using digital modification, the picture was cropped and
the distance between a demonstrator and a policeman was reduced, so that it seemed that the policeman had been struck.
In reality, there was approximately two meters between the
two persons as certified by the original picture published by
the Reuters agency http://www.reuters.com.
The use of image, audio, or video elements in legal situations becomes more and more questionable at a time
where surveillance video cameras are increasingly common
in towns and other public places.
EURASIP Journal on Applied Signal Processing
1.4.
Generic image authentication system
Various formulations have been proposed by Wu and Liu [3]
and Lin and Chang [4].
However, we propose a generic image authentication system. To be effective, a system must satisfy the following criteria:
(1) Sensitivity: the system must be sensitive to malicious
manipulations (e.g., modifying the image meaning) such as
cropping or altering the image in specific areas.
(2) Tolerance: the system must tolerate some loss of information (originating from lossy compression algorithms)
and more generally nonmalicious manipulations (generated,
e.g., by multimedia providers or fair users).
(3) Localisation of altered regions: the system should be
able to locate precisely any malicious alteration made to the
image and verify other areas as authentic.
(4) Reconstruction of altered regions: the system may
need the ability to restore, even partially, altered or destroyed
regions in order to allow the user to know what was the original content of the manipulated areas.
In addition, some technical features must be taken into
account:
(i) Storage: authentication data should be embedded in
the image, such as a watermark, rather than in a separate file,
as is the case with an external signature.
(ii) Mode of extraction: depending on whether authentication data is dependent or not on the image, a full-blind or
a semiblind mode of extraction is required. It is quite obvious that a nonblind mode of extraction does not make sense
for an authentication service, since the original image is necessary.
(iii) Asymmetrical algorithm: contrary to classical security services such as copyright protection, an authentication
service requires an asymmetrical watermarking (or encryption) algorithm (i.e., only the author of an image can secure
it, but any user must be able to check the content of an image).
(iv) Visibility: authentication data should be invisible under normal observation. It is a question of making sure that
the visual impact of watermarking is as weak as possible so
that the watermarked image remains faithful to the original.
Recently, a new approach based on invertible algorithms [1]
has been proposed. The basic idea is to be able to remove
the distortions due to the watermarking process to obtain the
original image data. Obviously perfect in terms of visibility,
it is important to note that such an approach could create a
very attractive context for attackers.
(v) Robustness and security: it must not be possible for
authentication data to be forged or manipulated.
(vi) Protocols: protocols are an important aspect of any
image authentication system, in particular avoid protecting a
corrupted picture. It is obvious that any algorithm alone can
not guarantee the security of the system. It is necessary to
define a set of scenari and specifications describing the operation and rules of the system, such as the management of the
keys or the communication protocols between owner, seller,
client, and so forth.
3. A Survey of Watermarking Algorithms for Image Authentication
2.
615
STATE OF THE ART
Predefined mark
2.1. Introduction
In this section we do not aim to draw up a complete and exhaustive overview of all image authentication methods. We
therefore decided to exclude from this paper any approach
which does not include a watermarking aspect, in particular, approaches based on external signature, such as classical
cryptographically secure hash functions like MD-4, MD-5
(message digest), CRC-32 (32-bit cyclic redundancy check),
SHA-1 (secure hash algorithm) [5], and so on. Interested
readers are invited to refer to [6, 7, 8, 9, 10].
Nevertheless, we present a general outline of emerging
techniques in order to introduce the key concepts associated
with this type of service.
Image authentication systems can be classified in several
ways according to whether they ensure strict integrity or content authentication, and also according to the storage mode
of data authentication (i.e., watermark or external signature).
In this paper, we classify the watermarking methods into two
categories (fragile watermarks and semifragile watermarks),
even if the concept of robustness is sometimes ambiguous.
Watermark insertion
Original image
(a)
Predefined mark
Watermark extraction
Tampered regions detected
(b)
2.2.1 Principle
2.2.2 Embedding check-sums in LSB
One of the first techniques used for image tampering detection was based on inserting check-sums into the least significant bits (LSB) of the image data. The algorithm proposed
by Walton [12] in 1995 consists in selecting, according to a
secret key, pseudorandom groups of pixels. The check-sum
value is obtained by summing the numbers determined by
the 7 most significant bits (MSB) of selected pixels. Then the
check-sum bits are embedded in the LSB. The basic version
of this algorithm can be summarized as follows.
Algorithm 1 (embedding process).
(1) Let N be a large integer;
(2) divide the image into 8 × 8 blocks;
(3) for each block B:
Marks comparison
Public key
Tested image
2.2. Fragile watermarks
Most methods currently proposed for providing image authentication are based on a fragile watermark in opposition
to robust watermark classically used for copyright protection. The basic idea underlying these techniques is to insert a specific watermark (generally independent of the image data [11]) so that any attempt to alter the content of an
image will also alter the watermark itself (Figure 1). Therefore, the authentication process consists of locating watermark distortions in order to locate the regions of the image that have been tampered with. The major drawback of
these approaches is that it is difficult to distinguish between
malicious and nonmalicious attacks (e.g., most fragile methods consider a lossy compressed image as a tampered image,
whereas the semantic of the image is unchanged).
Protected image
Private key
Figure 1: Generic fragile watermark scheme: (a) Image security. (b)
Authenticity verification.
(i) define a pseudorandom walk through all 64 pixels, according to the secret key and the block number, and
denote the pixels as (p1 , p2 , . . . , p64 );
(ii) generate a pseudorandom sequence of 64 integers
(a1 , a2 , . . . , a64 ) comparable in size to N;
(iii) the check-sum value S is calculated as
S=
64
a j · g p j mod N,
(1)
j =1
where g(p j ) is the grey-level of the pixel p j (determined by the 7 MSB);
(iv) encrypt the binary form of S;
(v) embed the encrypted sequence into the LSB of the image block.
The checking process is similar to the embedding process. It consists in comparing, for each block, the check-sum
determined by the MSB of the tested image with the original
check-sum value recovered from the LSB.
The main advantages of this method are that it does not
produce visible changes in the image and provides a very high
probability of tamper detection. For example, if we swap only
two pixels of any block, the check-sum will be modified because each pixel p j of the block is multiplied by a different
coefficient a j . Furthermore the random walk of the pixels p j
and the coefficients a j are block dependent, thus making it
4. 616
EURASIP Journal on Applied Signal Processing
impossible to swap or duplicate entire blocks without making undetected changes. One of the drawbacks of this technique is that it is possible to swap homologous blocks (that
are blocks of the same position) from two authenticated images protected with the same key. A simple solution to this
type of attack is to make the watermark dependent on the
image content. This could be achieved using the robust bit
extraction algorithm proposed by Fridrich [13].
The use of such methods is mainly justified by the fact
that images are generally transmitted and stored in a compressed form. Moreover, for the majority of the applications,
the losses due to the compression process do not affect the
integrity of the image within the meaning of its interpretation.
2.2.3 Self-embedding
Lin and Chang [4] propose a semifragile watermarking algorithm that accepts JPEG lossy compression and rejects malicious attacks. They have highlighted and shown two invariance properties of DCT coefficients with respect to JPEG
compression.
The first property shows that if we modify a DCT coefficient to an integral multiple of a quantization step Qm , which
is larger than the steps used in later JPEG compressions, then
this coefficient can be exactly reconstructed after JPEG compression.
The second is an invariant relationship between two homologous coefficients in a block pair before and after JPEG
compression. Because all DCT coefficients matrices are divided by the same quantization table in the JPEG compression process, the relationship between two DCT coefficients
of the same coordinate position from two blocks will not be
changed after the quantization process. The only exception is
that strict inequalities may become simple equalities due to
quantization.
The authentication system proposed by Lin and Chang is
based on those two properties. The first one is used to embed
the signature and the other is used to generate the authentication bits. The steps of embedding and authentication can
be summarized as follows.
Fridrich and Goljan [14] propose an original method for selfembedding an image into itself as a mean of protecting the
image content. This method also allows the regions of the
image that have been tampered with, cropped, or replaced,
to be partially repaired. The basic principle of this method is
to embed a compressed version of the image into the LSB of
its pixels. As in all watermarking methods based on LSB embedding of the watermark, this method does not introduce
visible artefacts. The algorithm consists in dividing the image into 8 × 8 blocks. Setting the LSB of each pixel to zero
and then calculating a DCT (discrete cosine transform) for
each block. The DCT matrix is quantified with the quantization matrix corresponding to a 50% JPEG quality. The result
is encoded using only 64 bits and the code is inserted into
the LSB of another block. The watermarked block must be
sufficiently distant from the protected block to prevent simultaneous deterioration of the image and the recovery data
during local image tampering. The quality of the recovered
regions of the image is somewhat worse than a 50% JPEG
quality, but sufficient to inform the user of the original content of these areas. The same authors propose an alternative
method, which enables the quality of the reconstructed image to be slightly improved. In this variant, two LSBs are used
for embedding the encoded quantified DCT coefficients (i.e.,
128 bits can be used instead of 64 bits). For most blocks, 128
bits are enough to encode almost all quantified DCT coefficients. In this way, the quality of the recovered regions is
roughly equivalent to a 50% JPEG compression, but due to
the modification of the two LSBs, the watermarked image
quality is worse.
The major drawback of this method is that the embedded
information is not robust. If several distinct regions of the
image have been tampered with, the recovery data may also
be corrupted. Indeed, after global modifications of the image
such as filtering or lossy compression, most reconstruction
data will be erroneous as LSB values are changed by this kind
of operation.
2.3. Semifragile watermarks
A semifragile watermark is another type of authentication
watermark. Semifragile watermarks are more robust than
fragile watermarks and less sensitive to classical user modifications such as JPEG compression. The aim of these methods
is to discriminate between malicious manipulations, such as
the addition or removal of a significant element of the image,
and global operations preserving the semantic content of the
image.
2.3.1
Semifragile methods robust to JPEG
compression
Algorithm 2a (generation of authentication bits).
(1) Divide the original image into 8 × 8 blocks;
(2) form block pairs using a predetermined secret mapping
function;
(3) for each block pair (p, q):
(i) select a set B p of n DCT coefficients;
(ii) generate the binary signature φ p of the block pair such
that
φ p (υ) =
1, F p (υ) − Fq (υ) ≥ 0,
0, F p (υ) − Fq (υ) < 0,
(2)
where υ ∈ B p , F(υ) is the value of υ;
(iii) embed the authentication bits according to Algorithm
2b (embedding process).
The binary signature is then partly embedded into each
of the two blocks of the pair. For instance, if the signature length is 8 bits, each block has to embed 4 authentication bits. The embedding process is relatively simple. It consists in defining an equality relation between the
LSB of preset DCT coefficients and the bits of the signature.
5. A Survey of Watermarking Algorithms for Image Authentication
Algorithm 2b (embedding process).
(1) Select a set E p , of n/2 DCT coefficients, where E p ∪ B p =
∅;
(2) to hide an authentication bit φ p (υ) into a DCT coefficient ω let
F p (ω)
,
f p (ω) =
Qm (ω)
f p (ω) · Qm (ω),
˜p (ω) =
F
f p (ω) = sign
617
where X is the original image, and Y the watermarked image.
The verification process used to test if an image Z is authentic consists in computing a statistic score d (6) based on
a spatial cross-correlation function:
RAB (b) =
bwidth bheight
A(i, j)B(i, j),
i=0
δ(b) = RY W (b) − RZW (b),
if LSB f p (ω) = φ p (v),
F p (ω)
− f p (ω)
Qm (ω)
· Qm (ω),
otherwise,
(3)
where sign(x) = 0 if x < 0, 1 otherwise.
The authentication process consists in first extracting the
authentication bits from the watermarked areas of the image
and using them to verify whether the DCT coefficient relationships in the signature match the predicted criteria. If they
match, the image is considered authentic. If they do not, this
means that either block, or possibly the two blocks, of the
considered pair has been manipulated.
The authors have proposed some improvement such
as recovery bits. The advantage of these overhead bits is
twofold. On the one hand, they allow an approximation of
the original block to be reconstructed, on the other hand they
help to locate precisely the zones of the images which were
really faded (i.e., to raise the ambiguity of the identification
of the altered blocks). The recovery bits are generated from
a down-sampled and compressed version of the original image. They are then embedded into 4 blocks. The embedding
process of recovery bits is similar to that of authentication
bits.
2.3.2 Block-based watermark
Block-based watermarking techniques consist in dividing the
image into blocks of about 64 × 64 pixels and inserting a
“robust” mark into each block. To check the integrity of an
image, the authenticator tests the presence or absence of the
mark in all blocks. If the mark is present with a high probability in each block, we can affirm that the tested image is
authentic.
The variable-watermark two-dimensional technique
(VW2D) described by Wolfgang and Delp [9, 10] is based on
the principle described previously. A binary watermark W(b)
is embedded in each block b of an image X. Like Van Schyndel et al. [15], the authors recommend to use m-sequences
[16] to generate the mark. The use of m-sequences is justified
by the fact that they have excellent auto-correlation properties, as well as a very good robustness with noise addition. To
generate the watermark, a binary sequence is mapped from
{0, 1} to {−1, 1}, arranged into a suitable block, and then
added to the image pixel values:
Y (b) = X(b) + W(b),
(4)
(5)
j =0
(6)
where Z is the tested image (the watermark W is supposed to
be known).
If d < T, where T is a user-defined threshold, the tested
block is considered genuine. While modifying the value of T,
one tolerates more or less significant changes in the image.
It is then possible to refine detection by defining several
thresholds corresponding to several levels of block degradation (e.g., unaltered, slightly altered, very altered, completely
changed).
However, in practice, this method offers only a limited interest insofar as it is necessary to store at least, for each block
b of an image, the result of the correlation between the watermarked block Y (b) and the watermark W(b).
Fridrich [17, 18] proposes a similar technique. To prevent unauthorized removal or intentional watermark distortion, the author recommends to make the mark dependent on the image in which it is embedded. The binary
mark used corresponds to a pseudo-random signal generated from a secret key, the block number and the content of
the block represented with an M-tuplet of bits. Each block is
´
then watermarked using O Ruanaidh spread spectrum technique [19]. The author claims that the watermark is fairly
robust with respect to brightness and contrast adjustment,
noise adding, histogram manipulation, cropping, and moderate JPEG compression (up to 55% quality). These watermark properties enable us to distinguish malicious manipulations from visible nonmalicious changes due to common
image processing operations.
2.3.3 Feature-based watermark
The basic idea of this method [20, 21] consists in first extracting features from the original image, and hiding them within
a robust and invisible watermark. Then, in order to check
whether an image has been altered, we simply compare its
features with those of the original image recovered from the
watermark. If the features are identical, this will mean that
the image was not tampered with, otherwise the differences
will indicate the altered areas (Figure 2).
The choice of image features used will directly affect the
type of image alterations that we wish to detect. Additionally, those features will depend on the type of image under consideration (paintings, satellite images, medical images, and so on). The features are typically selected so that
invariant properties are maintained under weak image alterations (lossy compression) and broken for malicious manipulations. These features could be also used to partially restore
the tampered regions of the image. Typical features used to
provide image authentication are edges, colours, gradient, luminance, or combinations of these features.
6. 618
EURASIP Journal on Applied Signal Processing
Feature extraction
Original image
Watermark insertion
Private key
Protected image
(a)
Feature extraction
Feature
comparison
Watermark extraction
Tested image
Public key
Tampered regions
detection
(b)
Figure 2: Generic semifragile watermark scheme: (a) Image security. (b) Authenticity verification.
A number of constraints are imposed by this method,
mainly in terms of robustness and storage capacity of the
signature. Robustness is required in order to allow lossless
extraction of the watermark. The accuracy of the detection
and the amount of information inserted into the image are
directly related. It is necessary to find a good compromise for
the size of the signature so that both robustness and accurate
detection can be achieved.
One of the problems faced by this method is that the image is slightly modified while inserting the watermark. Even
slight image variations may affect the image properties. Thus
since the features of the original image and the watermarked
image are not exactly the same, there are risks of false positive detection. This risk may be more or less important according to the choice of selected features. In order to solve
this problem we have implemented an iterative watermarking algorithm. The idea here is to sign the image, extract features from the newly obtained image, and then repeat the watermarking process on the original image (in order to avoid
cumulating distortions) using the newly computed features.
This iterative process enables hidden features to perfectly coincide with the protected image features. In practice, three
iterations are enough.
2.3.4 Other approaches
Other techniques are studied or investigated. Kundur and
Hatzinakos [22], and Lin and Chang [23] propose waveletbased image authentication. The principle of the Lin and
Chang method consists in first choosing a wavelet basis and
a pseudo-noise pattern (e.g., a 16 × 16 pixels pattern spatially repeated in the horizontal and vertical directions) selected according to a secret key. The image is then decomposed into four sub-bands, LL, LH, HL, and HH, using the
previously designated wavelet basis. The HH subband is substituted by the pseudo-noise pattern. Lastly, the watermarked
image is obtained after applying the inverse wavelet transformation. Note that the embedding process changes only the
HH subband of the image (i.e., high frequencies) and that
it does not introduce important visual degradation to the
image.
The authentication process is based on the detection of
the presence of the embedded pseudo-noise pattern. The first
step consists in extracting the HH subband. The extracted
subband is then convolved with the pseudo-noise pattern.
If the image was not manipulated, the convolution result
should be like a dot matrix. In the opposite case, the distribution will lose its uniform character in the areas where the
image was tampered with. The authors point out that their
method is robust with some filtering operations such as blurring and edge enhancing, and with a soft JPEG compression.
On the other hand, the authors do not show the robustness of
their method versus specific attacks such as the substitution
or preservation of the HH watermarked subband. In other
words, is the choice of the wavelet basic as secret, sufficient
to avoid this type of attack?
2.4. Summary of different methods
We summarize the different methods presented in this article in Table 1 below. The class to which each method belongs
is indicated: fragile, semifragile, digital signature, as well as
the type of authentication data used, the authentication data
support, the objectives regarding integrity (i.e., strict or content), and whether the method offers a possible localisation
and/or reconstruction of the areas tampered with.
By analyzing this table, we can notice that generally the
fragile watermarking methods allow only a strict integrity
service, whereas the semifragile watermarking methods and
the methods based on external signature guarantee a content
authentication. However, the fragile watermarking methods
remain the simplest to implement.
It is also interesting to notice that only few methods are
currently able to restore, even partially, the tampered regions
of the image.
3.
MALICIOUS ATTACKS
Our aim in this section is not to develop a list of all the possible malicious attacks that an image authentication system
can overcome, but to show some of the most frequent attacks. The common objective of these attacks is to trick the
authentication system, in other words, to show that an image
as authentic even though its content has been modified (or
sometimes, the opposite). Some of these attacks look trivial and easy to avoid; nevertheless, it is very important to
take them into account when developing an authentication
algorithm.
7. A Survey of Watermarking Algorithms for Image Authentication
619
Table 1: Summary of methods ensuring an authentication service.
Method
Yeung and Mintzer [11]
Walton [12]
Fridrich and Goljan [14]
Wong [24]
Lin and Chang [4]
Wolfgang and Delp [9] (1)
Rey and Dugelay [21]
Fridrich [17, 18]
Kundur and Hatzinakos [22]
Lin and Chang [23]
Queluz [25]
Bhattacharjee and Kutter [6]
Lin and Chang [7, 8]
Wolfgang and Delp [9] (2)
Class
fragile
fragile
fragile
fragile
semifragile
semifragile
semifragile
semifragile
semifragile
semifragile
signature
signature
signature
signature
Mark1
predefined logo
checksums
image comp.
hash function
DCT coef.
m-sequences
luminance
block-based
random noise
random noise
edges
interest points
DCT coef.
hash function
no
yes
yes
yes
yes
no
yes
yes
no
no
yes
yes
yes
yes
Cover
pixels
LSB
LSB
LSB
DCT
pixels
IFS
pixels
wavelets
wavelets
external
external
external
external
Integrity2
strict
strict
strict
strict
content
content
content
content
strict
content
content
content
content
strict
Localisation
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes∗
yes∗
Reconstruction
no
no
yes
no
yes
no
yes
no
no
no
no
no
no
no
1
indication whether authentication data is dependent on the image or not.
indicating sensitivity to JPEG compression.
∗
ambiguity in locating areas that have been tampered with.
2
One of the most common attacks against fragile watermarking systems consists of trying to modify the protected
image without altering the embedded watermark, or even
more common, trying to create a new watermark that the
authenticator will consider as authentic. Take the following
simplified example: the integrity of an image is insured by
a fragile watermark, independent of the image content, embedded in the LSB of its pixels. We easily see that if we modify
the image without taking account of which bits are affected
by this manipulation, we will most likely degrade the watermark and therefore the attack will be detected. On the other
hand, if we alter the image without modifying the LSB; the
watermark will remain as it was, and the authentication process will not detect any falsification.
In general, when the integrity of an image is based on
by a mark that is independent of its content, it is possible to
develop an attack that could copy a valid watermark of one
image into another image. By doing so, the second image becomes protected even though the second image is false. This
attack can even be performed over the same image. First, extract the watermark from the image; then manipulate the image, and finally reinsert the watermark on the altered image.
This process will cheat the authentication system.
Following the same philosophy, the Collage-Attack proposed by Fridrich et al. [26] creates a falsified image from
parts of a group of images protected by the same authenticator using the same mark and the same key. This attack does
not assume a priori any knowledge about the hidden binary
watermark, or the secret key. Its principle is relatively easy
since it replaces each pixel of the altered image by the closest
pixel value of equal coordinates of the images in the base. The
main difficulty of this method lies on obtaining a database of
images rich enough to obtain a falsified image of good visual
quality.
Another classic attack tries to discover the secret key used
to generate the watermark. This kind of attack, also called
Brute Force Attack, is very well known by the security community. Once the key has been found, it is very easy for a
“hacker” to falsify a watermark of an image that has been
protected by this key. The only way to counter this attack is
to use long keys to dissuade the attacker from trying to discover the key, because of the high cost of computing time.
Lastly, it is interesting to notice that protocol attacks are
also investigated. In [27] Radhakrishnan and Memon propose an attack against the image authentication system SARI
[28]. The authors show that the image digest of the SARI system is not secure under certain circumstances. Specifically, if
an attacker has the image digests for a multiple number of
images where the same secret key has been used to generate
the digest, he is able to cause arbitrary images to be authenticated. The authors propose several countermeasures to overcome this attack.
4.
CONCLUSION
The increasing amount of digital exchangeable data generates new information security needs. Multimedia documents, and specifically images, are also affected. Users expect that robust solutions will ensure copyright protection
and also guarantee the authenticity of multimedia documents. There is such a strong demand for image manipulation techniques and applications that they are becoming
more and more sophisticated and are accessible to a greater
number of people. An unfortunate consequence of this is
that new specialized counterfeiters have appeared. Image watermarking, although being a very recent field of research,
can propose complementary counterattack methods to the
classical cryptographic ones. Its approach grants priority to
8. 620
the content authentication more than to the strict digital
integrity.
In the current state of research, it is difficult to affirm
which approach seems most suitable to ensure an integrity
service adapted to images and in a more general way to multimedia documents. There does not exist, for the moment,
any solution perfectly answering this problem. Fragile watermarking methods are very sensitive to the slightest deterioration of the image, but they offer only a strict integrity
service, relatively far from users’ needs. Nevertheless, the advantage of fragile watermarking techniques, compared to the
methods classically used in security, is that they allow a precise localisation of the manipulated areas. However, the current tendency is more and more towards the use of semifragile methods. These methods are much more tolerant in respect of nonmalicious manipulation, such as a good quality JPEG compression. This flexibility is made possible partly
due to watermarking algorithms designed with specific robustness criteria (i.e., the mark is resistant only to certain
well-defined manipulations), and also to the use of invariant authentication data to modification preserving the semantic content of the image. The use of a mark dependent
on the image content allows, on the one hand, to increase
the robustness of the method in respect of malicious attacks,
such as the Collage-Attack, and on the other hand, a possible partial repair of the altered areas, according to the chosen
features.
Generally speaking watermarking research lacks of a rigorous theoretical framework until now. But, follow some
empirical results already available, very recent works dealing
with theoretical aspects of watermarking appear within the
community. In [29], Martinian et al. present one information theoretic formulation of the multimedia authentication
problem. They highlight a link between multimedia authentication and a wide array of powerful results from signal processing and information theory. They examine in particular
the use of error-correcting codes in authentication.
Additionally, digital signature methods offer an interesting alternative to classical watermarking techniques, insofar
there is no longer a limitation in terms of capacity, nor a
problem of robustness, thus offering better localisation of the
manipulated areas, better quality reconstruction, and a limited risk of false alarms. Moreover, there is already a high level
of expertise in the area of community security. However, the
major drawback of these techniques is that the image alone
is not self-sufficient. Therefore, the benefits of watermarking
are reduced and it becomes necessary to be able to guarantee
the authenticity of the image/signature pair. Moreover digital
signature methods are not very practical to use with multimedia documents. Finally, future developments should not
exclude methods based on the combination of robust watermarking and external signature methods. Watermarking
would just be an identifier which would allow a trusted user
access to the registered signature [30].
Before concluding, it is interesting to point out that
even though current methods designed for image integrity
may not be perfect, technical demonstrations [28, 31] and
commercial products, software and technical material are
EURASIP Journal on Applied Signal Processing
already available to the public. The most recent and complete R&D (Research and Development) demonstration is
without any doubt SARI (self-authentication and recovery images) which is based on a semifragile watermarking technique [4]. SARI is able to detect malicious manipulations, such as crop-and-replacement, and approximatly recover the original content in the altered areas.
Another important feature of SARI is its compatibility
to JPEG lossy compression within an acceptable quality
range. The main commercial products are: the DSS system from Kodak [32] (Digital Signature Standard, standard
recognized by the National Institute of Standards and Technology, http://www.itl.nist.gov/fipspubs/by-num.htm), the
IAS system (Image Authentication System) from Epson
http://www.epson.co.uk/, Veridata from Signum Technologies http://www.signumtech.com/, Eikonamark from AlphaTec Ltd http://www.alphatecltd.com, Mediasign from MediaSec http://www.mediasec.com, and PhotoCheck from
AlpVision http://www.alpvision.com. Kodak and Epson systems are directly integrated into their digital cameras in order to protect images as they are digitized. The applications covered by these products are multiple. They range
from image authentication for expert needs, to the protection of digital documents, for example, images from security
video cameras, in the event that they may be used in court.
AlpVision and Signum Technologies propose more original
uses such as reinforcing the security of paper documents,
for example, passports or badges by watermarking their ID
pictures.
REFERENCES
[1] J. Fridrich, M. Goljan, and R. Du, “Invertible authentication,”
in Proc. SPIE Conf. Security and Watermarking of Multimedia
Contents III, vol. 4314, pp. 197–208, San Jose, Calif, USA, January 2001.
[2] G. Coatrieux, B. Sankur, and H. Maˆtre, “Strict integrity conı
trol of biomedical images,” in Security and Watermarking of
Multimedia Contents III, vol. 4314 of SPIE Proceedings, San
Jose, Calif, USA, January 2001.
[3] M. Wu and B. Liu, “Watermarking for image authentication,”
in Proc. IEEE International Conference on Image Processing,
vol. 2, pp. 437–441, Chicago, Ill, USA, October 1998.
[4] C.-Y. Lin and S.-F. Chang, “Semi-fragile watermarking for authenticating JPEG visual content,” in Proc. SPIE International
Conf. on Security and Watermarking of Multimedia Contents
II, vol. 3971, San Jose, Calif, USA, January 2000.
[5] SHA-1,
“Secure hash standard (SHS),”
specification
(FIPS 180-1), April 1995, http://www.itl.nist.gov/fipspubs/
fip180-1.htm.
[6] S. Bhattacharjee and M. Kutter, “Compression tolerant image
authentication,” in Proc. 5th IEEE International Conference on
Image Processing (ICIP ’98), pp. 435–439, Chicago, Ill, USA,
October 1998.
[7] C.-Y. Lin and S.-F. Chang, “Generating robust digital signature for image/video authentication,” in Proc. Multimedia
and Security Workshop at ACM Multimedia ’98, Bristol, UK,
September 1998.
[8] C.-Y. Lin and S.-F. Chang, “A robust image authentication
method surviving JPEG lossy compression,” in Proc. SPIE
Storage and Retrieval of Image/Video Database, vol. 3312, pp.
296–307, San Jose, Calif, USA, January 1998.
9. A Survey of Watermarking Algorithms for Image Authentication
[9] R. B. Wolfgang and E. J. Delp, “A watermark for digital images,” in Proc. 1996 IEEE International Conference on Image Processing, vol. 3, pp. 219–222, Lausanne, Switzerland,
September 1996.
[10] R. B. Wolfgang and E. J. Delp, “Fragile watermarking using
the VW2D watermark,” in Security and Watermarking of Multimedia Contents, vol. 3657 of SPIE Proceedings, pp. 40–51, San
Jose, Calif, USA, January 1999.
[11] M. M. Yeung and F. Mintzer, “An invisible watermarking technique for image verification,” in Proc. IEEE International Conference on Image Processing, vol. 2, pp. 680–683, Santa Barbara,
Calif, USA, October 1997.
[12] S. Walton, “Information authentification for a slippery new
age,” Dr. Dobbs Journal, vol. 20, no. 4, pp. 18–26, 1995.
[13] J. Fridrich, “Robust bit extraction form images,” in Proc. IEEE
International Conference on Multimedia Computing and Systems, vol. 2, pp. 536–540, Florence, Italy, June 1999.
[14] J. Fridrich and M. Goljan, “Protection of digital images using
self embedding,” in Symposium on Content Security and Data
Hiding in Digital Media, New Jersey Institute of Technology,
Newark, NJ, USA, May 1999.
[15] R. G. Van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital
watermark,” in Proc. IEEE International Conference on Image
Processing, vol. 2, pp. 86–90, Austin, Texas, USA, November
1994.
[16] J. G. Proakis, Digital Communications, McGraw-Hill, New
York, NY, USA, 3rd edition, 1995.
[17] J. Fridrich, “Image watermarking for tamper detection,” in
Proc. IEEE International Conference on Image Processing, vol. 2,
pp. 404–408, Chicago, Ill, USA, October 1998.
[18] J. Fridrich, “Methods for detecting changes in digital images,”
in Proc. IEEE International Conference on Image Processing,
Chicago, Ill, USA, October 1998.
´
[19] J. J. K. O Ruanaidh and T. Pun, “Rotation, scale and translation invariant digital image watermarking,” in Proc. IEEE
International Conference on Image Processing, vol. 1, pp. 536–
539, Santa Barbara, Calif, USA, October 1997.
[20] J.-L. Dugelay and S. Roche, “Process for marking a multimedia document, such an image, by generating a mark,” Pending
patent EP 99480075.3, EURECOM 11/12 EP, July 1999.
[21] C. Rey and J.-L. Dugelay, “Blind detection of malicious alterations on still images using robust watermarks,” in Secure
Images and Image Authentication Colloquium, IEE Electronics
& Communications, London, UK, 2000.
[22] D. Kundur and D. Hatzinakos, “Towards a telltale watermarking technique for Tamper-Proofing,” in Proc. IEEE International Conference on Image Processing, vol. 2, pp. 409–413,
Chicago, Ill, USA, October 1998.
[23] C.-Y. Lin and S.-F. Chang, “A watermark-based robust image authentication method using wavelets,” ADVENT project
report, Columbia University, April 1998.
[24] P. Wong, “A watermark for image integrity and ownership
verification,” in Proc. Final Program and Proceedings of the
IS&T PICS 99, pp. 374–379, Savana, Ga, USA, April 1999.
[25] M. P. Queluz, “Towards robust, content based techniques for
image authentication,” in Proc. IEEE Signal Processing Society
1998 Workshop on Multimedia Signal Processing, pp. 297–302,
Los Angeles, Calif, USA, December 1998.
[26] J. Fridrich, M. Goljan, and N. Memon, “Further attacks on
Yeung-Mintzer fragile watermarking scheme,” in Security and
Watermarking of Multimedia Contents II, vol. 3971 of SPIE
Proceedings, San Jose, Calif, USA, January 2000.
[27] R. Radhakrishnan and N. Memon, “On the security of the
SARI image authentication system,” in Proc. IEEE International Conference on Image Processing (ICIP 01), Thessaloniki,
Greece, October 2001.
621
[28] C.-Y. Lin and S.-F. Chang, “SARI: Self-authentication-andrecovery image watermarking system,” in Proc. 9th ACM
International Conference on Multimedia, Ottawa, Canada, 30
September–5 October 2001.
[29] E. Martinian, B. Chen, and G. W. Wornell, “Information theoretic approach to the authentication of multimedia,” in Proc.
SPIE Conf. Security and Watermarking of Multimedia Contents
III, vol. 4314, pp. 185–196, San Jose, Calif, USA, January 2001.
[30] “RNRT-AQUAMARS,” National French project (1999–2001),
http://www.telecom.gouv.fr/rnrt/wprojets.htm.
[31] C. Rey and J.-L. Dugelay, “Image watermarking for owner and
content authentication,” in Proc. ACM Multimedia Technical
Demonstration, Los Angeles, Calif, USA, November 2000.
[32] Kodak, “Understanding and integrating KODAK picture authentication cameras,” http://www.kodak.com/US/en/digital/
software/imageAuthentication/ White paper.
Christian Rey graduated with master degree in computer science and artificial intelligence from the University of Sciences of
Luminy (Marseille), France in 1998. He joined Eur´ com in May
e
1999 as Ph.D. student, registered at the University of Avignon.
His research interests currently include image/video watermarking,
with a particular emphasis on malicious attacks on watermarking
systems and counter-measures, image authentication, and turbo
codes. He was involved in the French national research project
RNRT AQUMARS, on work package “image authentication.” He
is the coauthor of several publications, demo, and patents related
to watermarking.
Jean-Luc Dugelay is professor in the Department of Multimedia Communications
at the Institut Eur´ com in Sophia Antipoe
lis, he works in the area of multimedia signal processing. He got his Ph.D. degree from
the University of Rennes in 1992. His main
research interests are imaging for security
(watermarking and biometrics) and face
cloning for telecommunications. He contributed to the first book on watermarking
(information hiding techniques for steganography and digital watermarking, Artech House 1999). He gave several tutorials on digital watermarking (coauthored with F. Petitcolas from Microsoft Research) at major conferences (ACM MultiMedia, October 2000, Los
Angeles, and Second IEEE Pacific-Rim Conference on Multimedia,
October 2001, Beijing). He is currently serving as a Consultant in
watermarking for France Telecom R&D and STMicroelectronics.
His group is involved in the European IST project Certimark (Certification of watermarking techniques). He is Associate Editor of
the IEEE Transactions in Image Processing, the EURASIP Journal
on Applied Signal Processing and the Kluwer Multimedia Tools and
Applications. He is also a member of the IEEE Signal Processing
Society, Multimedia Signal Processing Technical Committee (IEEE
MMSP TC), and Image and Multidimensional Digital Signal Processing (IMDSP TC). He was technical cochair and organizer of the
fourth IEEE workshop on Multimedia Signal Processing, Cannes,
October 2001.
10. International Journal of Digital Multimedia Broadcasting
Special Issue on
Enhanced Physical Layer and Diversity Techniques for
Digital Terrestrial and Wireless Broadband
Call for Papers
Recent success in delivering high-definition TV (HDTV) services over digital terrestrial and Internet Protocol Television
(IPTV) has aspired service providers to offer more extensive HDTV services with wider coverage and accessibility.
For digital terrestrial broadcasting systems, this implies that
more efficient utilization of spectrum must be realized with
the help of enhanced physical layer (PHY) techniques. On
the other hand, in the domain of IPTV, service providers
are looking forward to offer HDTV services through wireless broadband channels such as WiMAX, WiFi, UWB, and
3G/4G cell phone. In view of the high data throughput requirement of HDTV signals, innovative techniques that facilitate efficient delivery of HDTV services over wireless broadband channels must address issues such as capacity and realtime implementation.
The purpose of this special issue is to report recent
progress in enhanced physical layer and diversity techniques
that would facilitate HDTV to be delivered over both
terrestrial and wireless broadband channels. Of special
concerns are innovative techniques that improve spectrum
usage, channel capacity, bandwidth, coverage, and quality of services (QoS). Experts from both academia and
industry are invited to submit high-quality manuscripts
that describe the latest research results. Discussions on
existing systems/standards are also welcomed if the results include objective comparison of different technical
solutions and concrete suggestions on how to improve existing systems/standards to achieve significant performance
enhancement.
Topics of interest include, but are not limited to:
• Coding and modulation: Turbo codes/LDPC,
COFDM, BST-OFDM, SOFDM, VSB
• Transmit/receive diversity techniques: cyclic delay
diversity (CDD), discontinue Doppler diversity
(DDoD), equal gain combining (EGC), maximal ratio
combining (MRC)
• MIMO techniques, wideband MIMO channel models,
channel estimation and equalization, and time and/or
frequency synchronization
• Practical issues relevant to enhanced PHY: frequency
utilization, dynamic bandwidth/robustness control,
backward compatibility, coexistence receiving techniques, network planning, service coverage and onchannel repeater design consideration
• Hardware prototyping, that is, system-on-chip and
software-defined radio techniques, field testing and
measurement campaign relevant to enhanced PHY
Authors should follow the International Journal of Digital Multimedia Broadcasting manuscript format described
at the journal site http://www.hindawi.com/journals/ijdmb/.
Prospective authors should submit an electronic copy of their
complete manuscript through the journal Manuscript Tracking System at http://mts.hindawi.com/, according to the following timetable:
Manuscript Due
August 1, 2008
First Round of Reviews
November 1, 2008
Publication Date
February 1, 2009
Guest Editors
Jonathan Loo, School of Engineering and Design, Brunel
University, Uxbridge, Middlesex UB8 3PH, UK;
jonathan.loo@brunel.ac.uk
Yue Zhang, Anritsu Corporation, Stevenage, Hertfordshire
SG1 2EF, UK; yue.zhang@anritsu.com
Jie Zhu, Intel Corporation, Digital Home Group, Santa
Clara, CA 95054, USA; jie.z.zhu@intel.com
Chih-Yang Kao, Department of Information and
Telecommunication Engineering, Ming Chuan University,
Gui-Shan District, Taoyuan County 333, Taiwan;
cykaoo@mcu.edu.tw
Yu-Hen Hu, Department of Electrical and Computer
Engineering, University of Wisconsin - Madison, 1415
Engineering Drive, Madison, WI 53706, USA;
hu@engr.wisc.edu
Hindawi Publishing Corporation
http://www.hindawi.com