With the wide application of multimedia data, multimedia content protection becomes urgent. Until now, various means have been reported that can be classified into several types according to their functionalities, such as data encryption, digital watermarking, or data authentication. They are used to protect multimedia data's confidentiality, ownership, and integrity, respectively. A wavelet-based multifeature semifragile multimedia authentication scheme is proposed. According to the approximation component and the energy relationship between the subbands of the detail component, global feature and local feature are both generated. Then, the global watermark and local watermark are generated from global feature and local feature, respectively. Two watermarks are then embedded into the multimedia data themselves, in the wavelet domain. Both the feature extraction and embedding processes are controlled by secret keys to improve the security of the proposed scheme. On the receiver side, the extracted watermark and the one generated from the received image are compared to determine the tampered location. A new authentication method is designed, and it is proved valid in the experiments. This authentication scheme is robust to general compression; sensitive to cutting, pasting, or modification; efficient in real-time operation; and secure for practical applications.
With the wide application of multimedia data, multimedia content protection becomes urgent. Till now, various means have been reported, which can be classified into several types according to their functionalities, such as data encryption, digital watermarking or data authentication. They are used to protect multimedia data's confidentiality, ownership and integrity, respectively. For multimedia data authentication, some approaches have been proposed. In this paper, a wavelet-based multi-feature semi-fragile authentication scheme is proposed. According to the approximation component and the energy relationship between the subbands of the detail component, global feature and local feature are both generated. Then, the global watermark and local watermark are generated from global feature and local feature, respectively. The watermarks are then embedded into the multimedia data themselves in the wavelet domain. Both the feature extraction and embedding processes are controlled by secret keys to improve the security of the proposed scheme. In the receiver end, the extracted watermark and the one generated from the received image are compared to determine the tampered location. A new authentication method is designed and it is proved valid in the experiments. This authentication scheme is robust to general compression, sensitive to cutting, pasting or modification, efficient in real-time operation, and secure for practical applications.
In this paper, a new counter-geometric attack watermarking scheme is proposed, which uses the matching of corner points that are extracted by Harris corner detector. In the process of watermark embedding, the watermark is adaptively embedded according to the HVS. In the detection process, a new matching method implements the coarse matching of the corner points and random sample consensus is used to refine the matching of the corner points. And then the parameter of affine transform is precisely estimated by the matching of corner points. Therefore, the watermark is detected based on the register of the geometrical-attack watermarked image. The experimental results are shown that this proposed scheme can not only counter geometrical attacks and signal processing but also improve the capacity of watermark embedding.
KEYWORDS: Digital watermarking, Video, Directed energy weapons, Multimedia, Quantization, Visualization, Feature extraction, Information security, Detection and tracking algorithms, Image compression
This paper presents a new content-fragile watermarking algorithm for the detection and localization of malicious manipulations of MPEG-I/II videos. While being fragile to malicious manipulations, the watermarking scheme is robust against content-preserving manipulations like re-encoding processes. It is a bitstream watermarking method based on 8x8 DCT blocks. One of the main advantages of our scheme is the possibility of localizing positions within the video where modifications occurred. Another main advantage is the portability of the scheme to other multimedia documents based on the 8x8 DCT block domain, e.g. JPEG images. The framework of the watermarking scheme can be divided into three main parts: watermark construction, watermark embedding and watermark detection. We derive a Content Based Message (CBM) from the multimedia document, based on a partial energy relationship between two groups of DCT blocks. Embedding the CBM is based on the Differential Energy Watermarking (DEW) concept. In the detection process we compare the CBM and the retrieved watermark to detect and locate manipulations. Besides the algorithm we present experimental results to demonstrate the feasibility of the scheme. We discuss four experiments representing four typical kinds of malicious manipulations.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.