Share Email Print

Optical Engineering

Digital watermarking scheme exploiting nondeterministic dependence for image authentication
Author(s): Chang-Tsun Li; Yinyin Yuan
Format Member Price Non-Member Price
PDF $20.00 $25.00

Paper Abstract

Watermarking schemes for authentication purposes are characterized by three factors: security, resolution of tamper localization, and embedding distortion. Since the requirements of high security, high localization resolution, and low distortion cannot be fulfilled simultaneously, the relative importance of a particular factor is application-dependent. Moreover, blockwise dependence is recognized as a key requirement for fragile watermarking schemes to thwart the Holliman-Memon counterfeiting attack. However, it has also been observed that deterministic dependence is still susceptible to transplantation attack or even simple cover-up attack. This work proposes a fragile watermarking scheme for image authentication, which exploits nondeterministic dependence and provides the users with freedom of making trade-offs among the three factors according to the needs of their applications.

Paper Details

Date Published: 1 December 2006
PDF: 6 pages
Opt. Eng. 45(12) 127001 doi: 10.1117/1.2402932
Published in: Optical Engineering Volume 45, Issue 12
Show Author Affiliations
Chang-Tsun Li, The Univ. of Warwick (United Kingdom)
Yinyin Yuan, The Univ. of Warwick (United Kingdom)

© SPIE. Terms of Use
Back to Top