A set theoretic framework for watermarking and its application to semifragile tamper detection

被引:17
|
作者
Altun, Oktay
Sharma, Gaurav
Celik, Mehmet U.
Bocko, Mark F.
机构
[1] Univ Rochester, Elect & Comp Engn Dept, Rochester, NY 14627 USA
[2] Univ Rochester, Dept Biostat & Computat Biol, Rochester, NY 14627 USA
关键词
projections onto convex sets (POCS); robustness to compression; semifragile watermark; et theoretic watermarking; spread-spectrum watermark; tamper localization;
D O I
10.1109/TIFS.2006.885018
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce a set theoretic framework for watermarking. Multiple requirements, such as watermark embedding strength, imperceptibility, robustness to benign signal processing, and fragility under malicious attacks are described as constraint sets and a watermarked image is determined as a feasible solution satisfying these constraints. We illustrate that several constraints can be formulated as convex sets and develop a watermarking algorithm based on the method of projections onto convex sets. The framework allows flexible incorporation of different constraints, including embedding strength requirements for multiple watermarks that share the same spatial context and different imperceptibility requirements based on frequency-weighted error and local texture perceptual models. We illustrate the effectiveness of the framework by designing a hierarchical semifragile watermark that is tolerant to mild compression, allows tamper localization, and is fragile under aggressive compression. Using a quad-tree representation, a spatial resolution hierarchy is established on the image and a watermark is embedded corresponding to each node of the hierarchy. The spatial hierarchy of watermarks provides a graceful tradeoff between robustness and localization under mild JPEG compression, where watermarks at coarser levels demonstrate progressively higher immunity to JPEG compression. Under aggressive compression, watermarks at all hierarchy levels vanish, indicating a lack of trust in the image data. The constraints implicitly partition watermark power in the resolution hierarchy as well as among image regions based on robustness and invisibility requirements. Experimental results illustrate the flexibility and effectiveness of the method.
引用
收藏
页码:479 / 492
页数:14
相关论文
共 50 条
  • [1] Semifragile hierarchical watermarking in a set theoretic framework
    Altun, O
    Sharma, G
    Celik, M
    Bocko, M
    2005 International Conference on Image Processing (ICIP), Vols 1-5, 2005, : 1153 - 1156
  • [2] Fragile Watermarking Framework for Tamper Detection of Color Biometric Images
    Thanki, Rohit
    Borra, Surekha
    Kothari, Ashish
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2021, 13 (02) : 35 - 56
  • [3] Watermarking for tamper detection and recovery
    Park, Youngran
    Kang, Hyunho
    Yamaguchi, Kazuhiko
    Kobayashi, Kingo
    IEICE ELECTRONICS EXPRESS, 2008, 5 (17) : 689 - 696
  • [4] Image watermarking for tamper detection
    Fridrich, J
    1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, 1998, : 404 - 408
  • [5] A framework for tamper detection marking of mobile application
    Jochen, M
    Marvel, LM
    Pollock, LL
    ISSRE 2003: 14TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2003, : 143 - 153
  • [6] Audio Database Watermarking for Tamper Detection
    Prasannakumari, V.
    Balu, V.
    COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 446 - 448
  • [7] An image watermarking scheme with tamper detection and recovery
    Lin, Shineng D.
    Kuo, Yuchan
    Yao, Minghua
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2007, 3 (6A): : 1379 - 1387
  • [8] Medical image watermarking with tamper detection and recovery
    Zain, Jasni M.
    Fauzi, Abdul R. M.
    2006 28TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOLS 1-15, 2006, : 655 - 658
  • [9] A secure image watermarking for tamper detection and localization
    Siddharth Bhalerao
    Irshad Ahmad Ansari
    Anil Kumar
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 1057 - 1068
  • [10] Medical image watermarking for ownership & tamper detection
    Hanan S. Alshanbari
    Multimedia Tools and Applications, 2021, 80 : 16549 - 16564