A set theoretic framework for watermarking and its application to semifragile tamper detection

被引:17
|
作者
Altun, Oktay
Sharma, Gaurav
Celik, Mehmet U.
Bocko, Mark F.
机构
[1] Univ Rochester, Elect & Comp Engn Dept, Rochester, NY 14627 USA
[2] Univ Rochester, Dept Biostat & Computat Biol, Rochester, NY 14627 USA
关键词
projections onto convex sets (POCS); robustness to compression; semifragile watermark; et theoretic watermarking; spread-spectrum watermark; tamper localization;
D O I
10.1109/TIFS.2006.885018
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce a set theoretic framework for watermarking. Multiple requirements, such as watermark embedding strength, imperceptibility, robustness to benign signal processing, and fragility under malicious attacks are described as constraint sets and a watermarked image is determined as a feasible solution satisfying these constraints. We illustrate that several constraints can be formulated as convex sets and develop a watermarking algorithm based on the method of projections onto convex sets. The framework allows flexible incorporation of different constraints, including embedding strength requirements for multiple watermarks that share the same spatial context and different imperceptibility requirements based on frequency-weighted error and local texture perceptual models. We illustrate the effectiveness of the framework by designing a hierarchical semifragile watermark that is tolerant to mild compression, allows tamper localization, and is fragile under aggressive compression. Using a quad-tree representation, a spatial resolution hierarchy is established on the image and a watermark is embedded corresponding to each node of the hierarchy. The spatial hierarchy of watermarks provides a graceful tradeoff between robustness and localization under mild JPEG compression, where watermarks at coarser levels demonstrate progressively higher immunity to JPEG compression. Under aggressive compression, watermarks at all hierarchy levels vanish, indicating a lack of trust in the image data. The constraints implicitly partition watermark power in the resolution hierarchy as well as among image regions based on robustness and invisibility requirements. Experimental results illustrate the flexibility and effectiveness of the method.
引用
收藏
页码:479 / 492
页数:14
相关论文
共 50 条
  • [31] Information Theoretic Anomaly Detection Framework for Web Application
    Bronte, Robert
    Shahriar, Hossain
    Haddad, Hisham
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2, 2016, : 394 - 399
  • [32] Robust watermarking scheme for tamper detection and authentication exploiting CA
    Pal, Pabitra
    Jana, Biswapati
    Bhaumik, Jaydeb
    IET IMAGE PROCESSING, 2019, 13 (12) : 2116 - 2129
  • [33] Dual Watermarking for Image Tamper Detection and Self-recovery
    Han, Qi
    Han, Lei
    Wang, Erfu
    Yang, Jie
    2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 33 - 36
  • [34] A novel tamper detection watermarking approach for improving image integrity
    Muath AlShaikh
    Multimedia Tools and Applications, 2023, 82 : 10039 - 10060
  • [35] A robust video watermarking technique for the tamper detection of surveillance systems
    Arab, Farnaz
    Abdullah, Shahidan M.
    Hashim, Siti Zaiton Mohd
    Manaf, Azizah Abdul
    Zamani, Mazdak
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (18) : 10855 - 10885
  • [36] Authentication and Tamper Detection in Images Using Dual Watermarking Approach
    Saiyyad, Mohmmad Ali M.
    Patil, Nitin N.
    2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [37] Fuzzy Transforms and Fragile Watermarking Tamper Detection on Coded Images
    Di Martino, Ferdinando
    Sessa, Salvatore
    PROCEEDINGS OF THE 7TH CONFERENCE OF THE EUROPEAN SOCIETY FOR FUZZY LOGIC AND TECHNOLOGY (EUSFLAT-2011) AND LFA-2011, 2011, : 444 - 451
  • [38] A novel tamper detection watermarking approach for improving image integrity
    AlShaikh, Muath
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (07) : 10039 - 10060
  • [39] Reversible ECG Watermarking for Ownership Detection, Tamper Localization, and Recovery
    Siddharth Bhalerao
    Irshad Ahmad Ansari
    Anil Kumar
    Circuits, Systems, and Signal Processing, 2022, 41 : 5134 - 5159
  • [40] Crypto-watermarking scheme for tamper detection of medical images
    Borra, Surekha
    Thanki, Rohit
    COMPUTER METHODS IN BIOMECHANICS AND BIOMEDICAL ENGINEERING-IMAGING AND VISUALIZATION, 2020, 8 (04): : 345 - 355