Semi fragile watermark with self authentication and self recovery

Robust watermarks are suitable for copyright protection in a DRM scenario. On the other hand, fragile watermarks are good for tamper detection applications. Semi fragile watermarks possess some properties of both robust and fragile watermarks at a moderate level. The need for semi fragile watermarks...

Full description

Saved in:
Bibliographic Details
Main Authors: Woo, C.S., Jiang, D., Binh, P.
Format: Article
Published: 2009
Subjects:
Online Access:http://eprints.um.edu.my/5708/
http://www.myjurnal.my/filebank/published_article/2415/744.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.um.eprints.5708
record_format eprints
spelling my.um.eprints.57082013-01-06T15:01:51Z http://eprints.um.edu.my/5708/ Semi fragile watermark with self authentication and self recovery Woo, C.S. Jiang, D. Binh, P. T Technology (General) Robust watermarks are suitable for copyright protection in a DRM scenario. On the other hand, fragile watermarks are good for tamper detection applications. Semi fragile watermarks possess some properties of both robust and fragile watermarks at a moderate level. The need for semi fragile watermarks arises from the requirements of content authentication where the watermark must highlight malicious attacks while tolerating legitimate changes that do not alter the content severely. Very few watermarking scheme has both self authentication and self recovery features. We developed and evaluated a semi fragile watermarking scheme that offers these features. The scheme embeds a downscaled version of an image into the image�s discrete wavelet transform subbands. Our scheme provides content authentication by allowing high quality JPEG compression, minor local distortion, and minimal noise insertion. Other changes such as histogram equalisation, cropping, rotation, and mean filtering are classified as malicious attacks because it affects the visual quality of the image. The scheme is practical because it does not require a reference image during content authentication. Tampered regions can be located correctly, and its original content can be recovered. The watermark information is secured by a secret key that randomises the watermark pixel positions. The single transform, correlator detector, and down-scaled processing spaces of the scheme offer low computational cost. 2009 Article PeerReviewed Woo, C.S. and Jiang, D. and Binh, P. (2009) Semi fragile watermark with self authentication and self recovery. Malaysian Journal of Computer Science, 22 (1). pp. 64-84. ISSN 0127-9084 http://www.myjurnal.my/filebank/published_article/2415/744.pdf
institution Universiti Malaya
building UM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaya
content_source UM Research Repository
url_provider http://eprints.um.edu.my/
topic T Technology (General)
spellingShingle T Technology (General)
Woo, C.S.
Jiang, D.
Binh, P.
Semi fragile watermark with self authentication and self recovery
description Robust watermarks are suitable for copyright protection in a DRM scenario. On the other hand, fragile watermarks are good for tamper detection applications. Semi fragile watermarks possess some properties of both robust and fragile watermarks at a moderate level. The need for semi fragile watermarks arises from the requirements of content authentication where the watermark must highlight malicious attacks while tolerating legitimate changes that do not alter the content severely. Very few watermarking scheme has both self authentication and self recovery features. We developed and evaluated a semi fragile watermarking scheme that offers these features. The scheme embeds a downscaled version of an image into the image�s discrete wavelet transform subbands. Our scheme provides content authentication by allowing high quality JPEG compression, minor local distortion, and minimal noise insertion. Other changes such as histogram equalisation, cropping, rotation, and mean filtering are classified as malicious attacks because it affects the visual quality of the image. The scheme is practical because it does not require a reference image during content authentication. Tampered regions can be located correctly, and its original content can be recovered. The watermark information is secured by a secret key that randomises the watermark pixel positions. The single transform, correlator detector, and down-scaled processing spaces of the scheme offer low computational cost.
format Article
author Woo, C.S.
Jiang, D.
Binh, P.
author_facet Woo, C.S.
Jiang, D.
Binh, P.
author_sort Woo, C.S.
title Semi fragile watermark with self authentication and self recovery
title_short Semi fragile watermark with self authentication and self recovery
title_full Semi fragile watermark with self authentication and self recovery
title_fullStr Semi fragile watermark with self authentication and self recovery
title_full_unstemmed Semi fragile watermark with self authentication and self recovery
title_sort semi fragile watermark with self authentication and self recovery
publishDate 2009
url http://eprints.um.edu.my/5708/
http://www.myjurnal.my/filebank/published_article/2415/744.pdf
_version_ 1643687647739117568
score 13.160551