A novel reversible fragile watermarking in DWT domain for tamper localization and digital image authentication

Author(s):  
Gokhan Azizoglu ◽  
Ahmet Nusret Toprak
Author(s):  
Yue Li ◽  
Chia-Hung Wei

Digital image authentication refers to all the techniques performing anti-falsification, digital image copyright protection, or access control. A large number of DIA techniques have been developed to authenticate digital images, including cryptography-based digital image authentication (CBDIA) techniques and data-hiding-based digital image authentication (DHBDIA) techniques. This paper not only provides some practical applications on image authentication, but also describes general frameworks of image watermarking and the general techniques, including robust watermarking, fragile watermarking, and semi-fragile watermarking. This paper also addresses the potential issues on future research directions, including managing the PRNU database, development of advanced PRNU-based blind authentication techniques, and search for digital fingerprints.


Author(s):  
Sung-Cheal Byun ◽  
Sang-Kwang Lee ◽  
Ahmed H. Tewfik ◽  
Byung-Ha Ahn

Author(s):  
Xi Zhao ◽  
Anthony T.S. Ho ◽  
Yun Q. Shi

In the past few years, semi-fragile watermarking has become increasingly important to verify the content of images and localise the tampered areas, while tolerating some non-malicious manipulations. In the literature, the majority of semi-fragile algorithms have applied a predetermined threshold to tolerate errors caused by JPEG compression. However, this predetermined threshold is typically fixed and cannot be easily adapted to different amounts of errors caused by unknown JPEG compression at different quality factors (QFs). In this paper, the authors analyse the relationship between QF and threshold, and propose the use of generalised Benford’s Law as an image forensics technique for semi-fragile watermarking. The results show an overall average QF correct detection rate of approximately 99%, when 5%, 20% and 30% of the pixels are subjected to image content tampering and compression using different QFs (ranging from 95 to 65). In addition, the authors applied different image enhancement techniques to these test images. The proposed image forensics method can adaptively adjust the threshold for images based on the estimated QF, improving accuracy rates in authenticating and localising the tampered regions for semi-fragile watermarking.


Sign in / Sign up

Export Citation Format

Share Document