Web based image authentication using invisible Fragile watermark
01 May 2001-pp 31-34
TL;DR: A web based image authentication method based in digital watermarking can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.
Abstract: The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret information into content for copyright protection and authentication. Watermark is embedded within an image that alteration and modification to the watermarked image can be detected in a fragile watermark system. Watermark detection is blind that does not require an original image and it is invisible to avoid revealing secret information to malicious attackers. A web based image authentication method based in digital watermarking is described in this paper. It can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.
Citations
More filters
••
TL;DR: This paper presents an overview of the various concepts and research works in the field of image watermark authentication, and the concept of content-based image water marking is reviewed in details.
Abstract: The digital revolution in digital image processing has made it possible to create, manipulate and transmit digital images in a simple and fast manner. The adverse affect of this is that the same image processing techniques can be used by hackers to tamper with any image and use it illegally. This has made digital image safety and integrity the top prioritized issue in today’s information explosion. Watermarking is a popular technique that is used for copyright protection and authentication. This paper presents an overview of the various concepts and research works in the field of image watermark authentication. In particular, the concept of content-based image watermarking is reviewed in details. KeywordsWatermark Lifecycle, Robust Watermarking Schemes, Fragile Watermarking Schemes, HVS, ICA.
44 citations
Cites background from "Web based image authentication usin..."
...Digital watermarking has been investigated deeply for its technical and commercial feasibility in all media types like, digital photographic image [31], audio [42], printed materials or compound document images [26], video [22], etc....
[...]
01 Jan 2012
TL;DR: The proposed system separate the ROI from medical image by GUI based approach, which works for all types of medical images, and shows satisfactory performance of the system to authenticate the medical images preserving ROI.
Abstract: Telemedicine is a well-known application where enormous amount of medical data need to be securely transferred over the public network and manipulate effectively. Medical image watermarking is an appropriate method used for enhancing security and authentication of medical data, which is crucial and used for further diagnosis and reference. This project focuses on the study of medical image watermarking methods for protecting and authenticating medical data. Additionally, it covers algorithm for application of water marking technique on Region of Non Interest (RONI) of the medical image preserving Region of Interest (ROI). The medical images can be transferred securely by embedding watermarks in RONI allowing verification of the legitimate changes at the receiving end without affecting ROI. Segmentation plays an important role in medical image processing for separating the ROI from medical image. The proposed system separate the ROI from medical image by GUI based approach, which works for all types of medical images. The experimental results show the satisfactory performance of the system to authenticate the medical images preserving ROI.
32 citations
••
TL;DR: A novel steganography technique that conceals patient information inside a medical image using a dynamic key generated by graph 3 coloring problem is proposed, which ensures reversibility as the original medical image is restored after extracting the embedded data from the stego medical image.
Abstract: Securing data in telemedicine applications is extremely essential and therefore it is mandatory to develop algorithms which preserve the data transmitted. Steganography (information hiding technique) plays a crucial role in telemedicine applications by providing confidentiality, integrity, availability and authenticity. This paper proposes a novel steganography technique that conceals patient information inside a medical image using a dynamic key generated by graph 3 coloring problem. The proposed method ensures reversibility as the original medical image is restored after extracting the embedded data from the stego medical image. Despite the embedding of patient information in the medical image, the visual quality of the image is preserved. Experimental results show that the proposed method is resistant against uniform affine transformations such as cropping, rotation and scaling. The proposed method is designed by considering issues related to transmission errors which could contaminate the medical images transmitted. The performance of the proposed method is compared to other information hiding methods against various parameters such as robustness of stego-image against affine transformations, toughness of the dynamic key generated, detection of transmission error, embedding rate and reversibility.
25 citations
Cites methods from "Web based image authentication usin..."
...[28] which uses a web server to check the integrity of the image transferred....
[...]
•
01 Jan 2010
TL;DR: This dissertation investigates how to protect a medical images, detect tampered images and recover the original image using the technique of Digital Watermarking, and designs a fragile watermarking system for the exact authentication of medical images.
Abstract: Due to development
of latest technologies in the areas of communication and computer
networks, present businesses are moving to the digital world for e
ectiveness, convenience and security. One of the examples is in the
area of medical applications, where traditional diagnosis is being
replaced by e-diagnosis. This paradigm gave birth to number of
applications in healthcare industry like teleconsulting, telesurgery
and telediagnosis. All these applications require the exchange of
medical images in digital format from one geographical location to
another throughout the globe via a cheap and fast network such as
Internet. However, digital form of medical image can easily be
manipulated through image processing softwares.Insurance companies,
hospitals as well as patients might want to modify the medical
images for a number of reasons. The tampered images may be used for
illegal purposes.
The objective of this dissertation is to investigate how to protect
a medical images, detect tampered images and recover the original
image using the technique of Digital Watermarking. Watermarking
tech- nology can be categorized into robust, fragile and
semi-fragile watermarking, each serving for di erent purposes. In
order to facilitate sharing and remote handling of medical images,
we propose techniques to solve the problem of copyright protection
and content authentication using robust and fragile watermarking
respectively.
In the rst part of this dissertation, we design a fragile
watermarking system for the exact authentication of medical images.
The proposed system authenticates the computed tomography (CT) scan
medical images of thorax area against di erent distortions. The
system rst enhances the embedding capacity of a CT scan image by
isolating the actual lung parenchyma unlike classical watermarking
techniques, which use logical square or ellipse for isolating region
of interest (ROI). Secondly it embeds watermark only in region of
non interest (RONI), thus not compromising the diagnosis value of
medical image. The method utilizes the spatial domain watermarking
and least signi cant bit (LSB) replacement method for embedding the
watermark. Experimental results reveal that the proposed system
detects both legitimate and illegitimate distortions.
Robust watermarks are well suited for copyright protection because
they stay intact with the image under various manipulations. In the
second part of the dissertation, we investigate an approach of
robust watermarking for protection of medical images which ensures
the security of medical images against geomet- rical distortions. In
the proposed method we rstly normalize the medical image using image
moments in order to make it invariant against geometric
transformations. Secondly, we select the salient regions in the
normalized image based on feature points detected by Harris corner
detector. Watermarking is performed in Discrete Cosine Transform (DCT)
domain of salient regions by adapting block based embedding. The
scheme is completely blind, that it does not require the original
image to detect the watermark. We thus address the issue of
tolerating a ne transformations in medical images that is hardly be
found in existing schemes of medical image watermarking.
In third part of the dissertation, we investigate the complete
reversible watermarking system. The proposed method uses integer
wavelet transform and companding technique which can embed and
recover the secret information as well as can restore the image to
its pristine state. The method takes advantage of block based
watermarking and iterative optimization of threshold for companding,
which avoids histogram pre and post-processing. Consequently, it
reduces the associated overhead usually required in most of the
reversible watermarking techniques. As a result, it keeps the
distortion small between the marked and the original images.
Experimental results show that the proposed method outperforms the
existing reversible data hiding schemes reported in the literature.
24 citations
References
More filters
••
16 Sep 1996TL;DR: This work describes two techniques for the invisible marking of images and analyzes the robustness of the watermarks with respect to linear and nonlinear filtering, and JPEG compression.
Abstract: The growth of networked multimedia systems has magnified the need for image copyright protection. One approach used to address this problem is to add an invisible structure to an image that can be used to seal or mark it. These structures are known as digital watermarks. We describe two techniques for the invisible marking of images. We analyze the robustness of the watermarks with respect to linear and nonlinear filtering, and JPEG compression. The results show that our watermarks detect all but the most minute changes to the image.
548 citations
01 Jan 1995
TL;DR: A method using a JPEG model based, frequency hopped, randomly sequenced pulse position modulated code (RSPPMC) is described, which supports robustness of embedded labels against several damaging possibilities such as lossy data compression, low pass filtering and/or color space conversion.
Abstract: This paper first presents a "hidden label" approach for identifying the ownership and distribution of multimedia information (image or video data) in digital networked environment. Then it discusses criteria and difficulties in implementing the approach. Finally a method using a JPEG model based, frequency hopped, randomly sequenced pulse position modulated code (RSPPMC) is described. This method supports robustness of embedded labels against several damaging possibilities such as lossy data compression, low pass filtering and/or color space conversion.
528 citations
••
IBM1
TL;DR: A new method for invisibly watermarking high-quality color and gray-scale images intended for use in image verification applications, where one is interested in knowing whether the content of an image has been altered since some earlier time, perhaps because of the act of a malicious party.
Abstract: We propose a new method for invisibly watermarking high-quality color and gray-scale images. This method is intended for use in image verification applications, where one is interested in knowing whether the content of an image has been altered since some earlier time, perhaps because of the act of a malicious party. It consists of both a watermark stamping process which embeds a watermark in a source image, and a watermark extraction process which extracts a watermark from a stamped image. The extracted watermark can be used to determine whether the image has been altered. The processing used in the stamping and extraction processes is presented. We also discuss some advantages of this technique over other invisible watermarking techniques for the verification application; these include a high degree of invisibility, color preservation, ease of decoding, and a high degree of protection against retention of the watermark after unauthorized alterations.
518 citations
••
30 May 1996TL;DR: A digital watermarking method for use in audio, image, video and multimedia data that is robust to common signal distortions and malicious attack, and can be constructed to make counterfeiting almost impossible.
Abstract: We describe a digital watermarking method for use in audio, image, video and multimedia data. We argue that a watermark must be placed in perceptually significant components of a signal if it is to be robust to common signal distortions and malicious attack. However, it is well known that modification of these components can lead to perceptual degradation of the signal. To avoid this, we propose to insert a watermark into the spectral components of the data using techniques analogous to spread sprectrum communications, hiding a narrow band signal in a wideband channel that is the data. The watermark is difficult for an attacker to remove, even when several individuals conspire together with independently watermarked copies of the data. It is also robust to common signal and geometric distortions such as digital-to-analog and analog-to-digital conversion, resampling, and requantization, including dithering and recompression and rotation, translation, cropping and scaling. The same digital watermarking algorithm can be applied to all three media under consideration with only minor modifications, making it especially appropriate for multimedia products. Retrieval of the watermark unambiguously identifies the owner, and the watermark can be constructed to make counterfeiting almost impossible. Experimental results are presented to support these claims.
502 citations
••
26 Oct 1997TL;DR: A new multiresolution watermarking method based on the discrete wavelet transform (DWT), where Pseudo-random codes are added to the large coefficients at the high and middle frequency bands of the DWT of an image.
Abstract: We introduce a new multiresolution watermarking method for digital images. The method is based on the discrete wavelet transform (DWT). Pseudo-random codes are added to the large coefficients at the high and middle frequency bands of the DWT of an image. It is shown that this method is more robust to often proposed methods to some common image distortions, such as the wavelet transform based image compression, and image halftoning. Moreover, the method is hierarchical. The computation load needed to detect the watermark depends on the noise level in an image.
441 citations