Share Email Print
cover

Proceedings Paper

Phase signature-based image authentication watermark robust to compression and coding
Author(s): Farid Ahmed; Ira S. Moskowitz
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

We present the further development of a watermarking technique that embeds an authentication signal in an image. In this paper, we concentrate on the JPEG 2000 image format. The detection/extraction of this signal can then be used to decide whether the image has gone through any intentional malicious tampering. Therefore, the watermark needs to be fragile to such tampering attacks. On the other hand, we need to make sure that the authentication is robust to change resulting from the watermarking process itself, or from necessary changes such as image compression. We address the robustness against watermarking process issue in two ways. First, we decompose the image into phase and magnitude values. A signature is then generated from the phase values. In particular, binary phase-only filters and their variants will are utilized for this. This signature is subsequently hidden into the magnitude part by a bit-plane embedding technique. The disjoint operations of signature generation and signature embedding minimize the embedding artifacts of the authentication signal. Secondly, we use wavelet decomposition, whereby, the signature can be generated from one subband, and then it can be embedded in other subband(s), or the same subband.

Paper Details

Date Published: 18 October 2004
PDF: 12 pages
Proc. SPIE 5561, Mathematics of Data/Image Coding, Compression, and Encryption VII, with Applications, (18 October 2004); doi: 10.1117/12.557192
Show Author Affiliations
Farid Ahmed, The Catholic Univ. of America (United States)
Ira S. Moskowitz, Naval Research Lab. (United States)


Published in SPIE Proceedings Vol. 5561:
Mathematics of Data/Image Coding, Compression, and Encryption VII, with Applications
Mark S. Schmalz, Editor(s)

© SPIE. Terms of Use
Back to Top