Share Email Print

Proceedings Paper

Security of fragile authentication watermarks with localization
Author(s): Jessica Fridrich
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

In this paper, we study the security of fragile image authentication watermarks that can localize tampered areas. We start by comparing the goals, capabilities, and advantages of image authentication based on watermarking and cryptography. Then we point out some common security problems of current fragile authentication watermarks with localization and classify attacks on authentication watermarks into five categories. By investigating the attacks and vulnerabilities of current schemes, we propose a variation of the Wong scheme18 that is fast, simple, cryptographically secure, and resistant to all known attacks, including the Holliman-Memon attack9. In the new scheme, a special symmetry structure in the logo is used to authenticate the block content, while the logo itself carries information about the block origin (block index, the image index or time stamp, author ID, etc.). Because the authentication of the content and its origin are separated, it is possible to easily identify swapped blocks between images and accurately detect cropped areas, while being able to accurately localize tampered pixels.

Paper Details

Date Published: 29 April 2002
PDF: 10 pages
Proc. SPIE 4675, Security and Watermarking of Multimedia Contents IV, (29 April 2002); doi: 10.1117/12.465330
Show Author Affiliations
Jessica Fridrich, SUNY/Binghamton (United States)

Published in SPIE Proceedings Vol. 4675:
Security and Watermarking of Multimedia Contents IV
Edward J. Delp; Ping Wah Wong, Editor(s)

© SPIE. Terms of Use
Back to Top