A Survey of Watermarking Algorithms for Image Authentication

  • PDF / 884,178 Bytes
  • 9 Pages / 600 x 792 pts Page_size
  • 89 Downloads / 200 Views

DOWNLOAD

REPORT


A Survey of Watermarking Algorithms for Image Authentication Christian Rey Multimedia Department, Eurecom Institute, 2229 route de Crˆetes, B.P. 193, F-06904 Sophia Antipolis, France Email: [email protected]

Jean-Luc Dugelay Multimedia Department, Eurecom Institute, 2229 route de Crˆetes, B.P. 193, F-06904 Sophia Antipolis, France Email: [email protected] Received 20 November 2001 and in revised form 8 March 2002 Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Insuring digital image integrity has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of emerging techniques for detecting whether image tampering has taken place. Compared to the techniques and protocols for security usually employed to perform this task, the majority of the proposed methods based on watermarking, place a particular emphasis on the notion of content authentication rather than strict integrity. In this paper, we introduce the notion of image content authentication and the features required to design an effective authentication scheme. We present some algorithms, and introduce frequently used key techniques. Keywords and phrases: image processing, security, cryptography, watermarking, content authentication, review, state of the art.

1.

INTRODUCTION

1.1. Basic watermarking principles The digital revolution, the explosion of communication networks, and the increasingly growing passion of the general public for new information technologies lead to exponential growth of multimedia document traffic (image, text, audio, video, etc.). This phenomenon is now so important that insuring protection and control of the exchanged data has become a major issue. Indeed, from their digital nature, multimedia documents can be duplicated, modified, transformed, and diffused very easily. In this context, it is important to develop systems for copyright protection, protection against duplication, and authentication of content. Watermarking seems to be the alternative solution for reinforcing the security of multimedia documents. The aim of watermarking is to include subliminal information (i.e., imperceptible) in a multimedia document to ensure a security service or simply a labelling application. It would be then possible to recover the embedded message at any time, even if the document was altered by one or more nondestructive attacks, whether malicious or not. Until now, the majority of publications in the field of watermarking mainly address the copyright of still images.

Other security services, such as image content authentication, are still marginal and many fundamental questions remain open. We may wonder, for example, whether it is preferable to use a fragile watermark, a robust watermark, or even use a completely different technique. Furthermore, an authentication service partially calls into q