A classification of semi-fragile watermarking systems for JPEG images
Egorova A.A., Fedoseev V.A.

 

IPSI RAS – Branch of the FSRC “Crystallography and Photonics” RAS, Molodogvardeyskaya 151, 443001, Samara, Russia;
Samara National Research University, Moskovskoye shosse, 34, 443086, Samara, Russia

 PDF

Abstract:
The article discusses semi-fragile digital watermarking systems designed to protect JPEG images against unauthorized changes. These systems allow detecting and locating changes, and some of them are able to restore the original content. Formal schemes describing the procedures for watermark embedding and authentication are given. We consider more than a dozen systems of this type and classify them according to various criteria. We also consider the results of experimental studies of these systems estimating their level of distortions arising from watermark embedding. In addition, we test the systems whether they are able to operate in the semi-fragile way

Keywords:
digital watermarking, image authentication, semi-fragile watermarking, JPEG, QIM, LSB

Citation:
Egorova AA, Fedoseev VA. A classification of semi-fragile watermarking systems for JPEG images. Computer Optics 2019; 43(3): 419-433. DOI: 10.18287/2412-6179-2019-43-3-419-433.

References:

  1. Cox I, Kilian J, Leighton FT, Shamoon T. Digital Watermarking and Steganography: Morgan Kaufmann. Elsevier; 2008.
  2. Fedoseev VA. Digital Watermarking and Steganography: A Tutorial. 2nd ed. Samara: Samara University; 2019.
  3. Fedoseev VA. A unified model for information hiding systems. Computer Optics 2016; 40: 87-98.
  4. Barni M, Bartolini F. Watermarking systems engineering: Enabling digital assets security and other applications. CRC Press; 2004.
  5. Lin C-Y, Chang S-F. Issues and solutions for authenticating MPEG video. Proceedings of SPIE 1999; 54-65.
  6. Lin C-Y, Chang S-F. Semifragile watermarking for authenticating JPEG visual content. Electronic Imaging 2000; 140-151.
  7. Ho CK, Li CT. Semi-fragile watermarking scheme for authentication of JPEG images. International Conference on Information Technology: Coding and Computing, 2004. Proceedings 2004; 1: 7-11.
  8. Huang L-Y. Authentication watermarking algorithm resisting JPEG compression based on preliminary quantization. Information Technology Journal 2013; 12(16): 3723-3728.
  9. Ye S, Zhou Z, Sun Q, Chang E, Tian Q. A quantization-based image authentication system. Proceedings of the 2003 Joint Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint 2003; 2: 955-959.
  10. Preda RO, Vizireanu DN. Watermarking-based image authentication robust to JPEG compression. Electronics Letters 2015; 51(23): 1873-1875.
  11. Wang H, Ho A, Zhao X. A novel fast self-restoration semi-fragile watermarking algorithm for image content authentication resistant to JPEG compression. Digital Forensics and Watermarking 2011; 7128: 72-85.
  12. Fallahpour M, Megias D. Flexible image watermarking in JPEG domain. 2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT) 2016; 311-316.
  13. Mursi M, Assassa GMR, Aboalsamh H, Alghathbar K. A DCT-based secure JPEG image authentication scheme. World Academy of Science, Engineering and Technology 2009; 53: 681-687.
  14. Lin ET, Podilchuk CI, Delp EJ. Detection of image alterations using semifragile watermarks. Security and Watermarking of Multimedia Contents II 2000; 3971: 152-164.
  15. Al-Mualla ME. Content-adaptive semi-fragile watermarking for image authentication. 2007 14th IEEE International Conference on Electronics, Circuits and Systems 2007; 1256-1259.
  16. Wong PHW, Au OCL, Wong JWC. Data hiding technique in JPEG compressed domain. Proceedings of SPIE – The International Society for Optical Engineering 2001; 309-320.
  17. Xiao J, Ma Z, Lin B, Su J, Wang Y. A semi-fragile watermarking distinguishing JPEG compression and gray-scale-transformation from malicious manipulation. 2010 IEEE Youth Conference on Information, Computing and Telecommunications (YC-ICT) 2010; 202-205.
  18. Evsutin OO, Kokurina AS, Shelupanov AA, Shepelev II. An improved algorithm for data hiding in compressed digital images based on PM1 method. Computer Optics 2015; 39(4): 572-581. DOI: 10.18287/0134-2452-2015-39-4-572-581.
  19. Yu X, Wang C, Zhou X. Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images. Future Internet 2017; 9(4): 56.
  20. Wallace GK. The JPEG still picture compression standard. IEEE Transactions on Consumer Electronics 1992; 38(1): xviii-xxxiv.
  21. Chen B, Wornell G. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transaction on Information Theory 2001; 47(4): 1423-1443.
  22. Cox IJ, Kilian J, Leighton FT, Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 1997; 6(12): 1673-1687.
  23. Mitekin V, Fedoseev V. A new QIM-based watermarking algorithm robust against multi-image histogram attack. Procedia Engineering 2017; 201: 453-462. DOI: 10.1016/j.proeng.2017.09.687.
  24. Mitekin VA, Fedoseev VA. New secure QIM-based information hiding algorithms. Computer Optics 2018; 42(1): 118-127. DOI: 10.18287/2412-6179-2018-42-1-118-127.
  25. Glumov NI, Kuznetsov AV. Copy-move image forensics detection. Computer Optics 2011; 35(4): 508-512.
  26. Glumov NI, Kuznetsov AV. Detection of local artificial changes in images. Optoelectronics, Instrumentation and Data Processing 2011; 47(3): 207-214. DOI: 10.3103/S8756699011030010.
  27. The USC-SIPI Image Database. Source: <http://sipi.usc.edu/database/>.

© 2009, IPSI RAS
151, Molodogvardeiskaya str., Samara, 443001, Russia; E-mail: journal@computeroptics.ru ; Tel: +7 (846) 242-41-24 (Executive secretary), +7 (846)332-56-22 (Issuing editor), Fax: +7 (846) 332-56-20