Publication | Closed Access
Hierarchical watermarking for secure image authentication with localization
368
Citations
18
References
2002
Year
Digital WatermarkingHardware SecurityHierarchical StructureData HidingImage AnalysisEngineeringInformation SecurityBlock SignaturesBiometricsTamper LocalizationInformation HidingHierarchical WatermarkingInformation ForensicsComputer ScienceMultimedia SecurityImage ForensicsData SecurityCryptography
Fragile watermarking schemes often either succumb to vector‑quantization counterfeiting attacks or trade localization accuracy for security. This work proposes a hierarchical watermarking method that simultaneously resists VQ attacks and preserves blockwise localization performance. The method partitions the image into a multilevel block hierarchy, computing signatures at each level—small blocks for precise tamper detection, higher‑level blocks for VQ resistance, with a whole‑image signature at the top to defeat counterfeiting, and sliding‑window searches to verify untampered regions after cropping. Experimental results confirm that the hierarchical scheme effectively thwarts VQ attacks while maintaining accurate localization.
Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to improve security. Using a hierarchical structure, we propose a method that thwarts the VQ attack while sustaining the superior localization properties of blockwise independent watermarking methods. In particular, we propose dividing the image into blocks in a multilevel hierarchy and calculating block signatures in this hierarchy. While signatures of small blocks on the lowest level of the hierarchy ensure superior accuracy of tamper localization, higher level block signatures provide increasing resistance to VQ attacks. At the top level, a signature calculated using the whole image completely thwarts the counterfeiting attack. Moreover, "sliding window" searches through the hierarchy enable the verification of untampered regions after an image has been cropped. We provide experimental results to demonstrate the effectiveness of our method.
| Year | Citations | |
|---|---|---|
Page 1
Page 1