Paper
9 April 1999 Fragile watermarking using the VW2D watermark
Raymond B. Wolfgang, Edward J. Delp III
Author Affiliations +
Proceedings Volume 3657, Security and Watermarking of Multimedia Contents; (1999) https://doi.org/10.1117/12.344670
Event: Electronic Imaging '99, 1999, San Jose, CA, United States
Abstract
Two classes of digital watermarks have been developed to protect the copyright ownership of digital images. Robust watermarks are designed to withstand attacks on an image (such as compression or scaling), while fragile watermarks are designed to detect minute changes in an image. Fragile marks can also identify where an image has been altered. This paper compares two fragile watermarks. The first method uses a hash function to obtain a digest of the image. An altered or forged version of the original image is then hashed and the digest is compared to the digest of the original image. If the image has changed the digests will be different. We will describe how images can be hashed so that any changes can be spatially localized. The second method uses the Variable-Watermark Two- Dimensional algorithm (VW2D). The sensitivity to changes is user-specific. Either no changes can be permitted (similar to a hard hash function), or an image can be altered and still be labeled authentic. Latter algorithms are known as semi-fragile watermarks. We will describe the performance of these two techniques and discuss under what circumstances one would use a particular technique.
© (1999) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Raymond B. Wolfgang and Edward J. Delp III "Fragile watermarking using the VW2D watermark", Proc. SPIE 3657, Security and Watermarking of Multimedia Contents, (9 April 1999); https://doi.org/10.1117/12.344670
Lens.org Logo
CITATIONS
Cited by 105 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Image filtering

Bridges

Digital filtering

Binary data

Image encryption

Image processing

Back to Top