Image Content Authentication Using Pinned Sine Transform
- PDF / 2,219,526 Bytes
- 11 Pages / 600 x 792 pts Page_size
- 42 Downloads / 239 Views
Image Content Authentication Using Pinned Sine Transform Anthony T. S. Ho School of Electrical & Electronic Engineering, Nanyang Technological University, Nanyang Avenue, Singapore 639798 Email: [email protected]
Xunzhan Zhu School of Electrical & Electronic Engineering, Nanyang Technological University, Nanyang Avenue, Singapore 639798 Email: [email protected]
Yong Liang Guan School of Electrical & Electronic Engineering, Nanyang Technological University, Nanyang Avenue, Singapore 639798 Email: [email protected] Received 23 October 2003; Revised 24 December 2003 Digital image content authentication addresses the problem of detecting any illegitimate modification on the content of images. To cope with this problem, a novel semifragile watermarking scheme using the pinned sine transform (PST) is presented in this paper. The watermarking system can localize the portions of a watermarked image that have been tampered maliciously with high accuracy as well as approximately recover it. In particular, the watermarking scheme is very sensitive to any texture alteration in the watermarked images. The interblock relationship introduced in the process of PST renders the watermarking scheme resistant to content cutting and pasting attacks. The watermark can still survive slight nonmalicious manipulations, which is desirable in some practical applications such as legal tenders. Simulation results demonstrated that the probability of tamper detection of this authentication scheme is higher than 98%, and it is less sensitive to legitimate image processing operations such as compression than that of the equivalent DCT scheme. Keywords and phrases: semifragile watermarking, content authentication, pinned sine transform.
1.
INTRODUCTION
While digital media offer many distinct advantages over their analog counterparts, the ease with which they can be edited and tampered makes the protection of their integrity and authenticity a serious and important issue. In certain practical applications, such as remote sensing, legal defending, news reporting, and medical archiving, there is a need for verification or authentication of the integrity of the media content. A fragile watermarking detects changes of the watermarked image such that it can provide some form of guarantee that the image has not been tampered with and is originated from the right source. In addition, a fragile watermarking scheme should be able to identify which portions of the watermarked data are authentic and which are corrupted; if unauthenticated portions are detected, it should be able to restore it [1]. The earliest fragile watermarking schemes are designed to detect any slight changes to the bits of the watermarked image and the watermark becomes undetectable after the wa-
termarked image is modified in any way [2, 3, 4, 5]. However, since the meaning of multimedia data is generally based on their semantic content rather than the bit streams, in some applications, a semifragile watermarking is more desirable. A semifragile watermarking seeks to verify that
Data Loading...