Title :
Secret and public key image watermarking schemes for image authentication and ownership verification
Author :
Wong, Ping Wah ; Memon, Nasir
Author_Institution :
Hewlett-Packard Co., Cupertino, CA, USA
fDate :
10/1/2001 12:00:00 AM
Abstract :
We describe a watermarking scheme for ownership verification and authentication. Depending on the desire of the user, the watermark can be either visible or invisible. The scheme can detect any modification made to the image and indicate the specific locations that have been modified. If the correct key is specified in the watermark extraction procedure, then an output image is returned showing a proper watermark, indicating the image is authentic and has not been changed since the insertion of the watermark. Any modification would be reflected in a corresponding error in the watermark. If the key is incorrect, or if the image was not watermarked, or if the watermarked image is cropped, the watermark extraction algorithm will return an image that resembles random noise. Since it requires a user key during both the insertion and the extraction procedures, it is not possible for an unauthorized user to insert a new watermark or alter the existing watermark so that the resulting image will pass the test. We present secret key and public key versions of the technique
Keywords :
copy protection; data encapsulation; image coding; public key cryptography; extraction algorithm; image authentication; insertion procedure; modification; ownership verification; public key image watermarking schemes; random noise; secret key image watermarking schemes; unauthorized user; user key; watermark extraction procedure; Authentication; Digital images; Electronic commerce; Image coding; Image processing; Public key; Robustness; Testing; Watermarking; Web sites;
Journal_Title :
Image Processing, IEEE Transactions on