Title :
Scalar DC–QIM for Semifragile Authentication
Author :
Boyer, Jean-Philippe ; Duhamel, Pierre ; Blanc-Talon, Jacques
Author_Institution :
Renault-TCR RUC T 62, Guyancourt
Abstract :
Semifragile watermarking can be used to detect illegal and local manipulation, while being robust toward legal processings such as lossy compression. The aim of this work is twofold: 1) we first formalize this semifragile authentication problem by proposing an appropriate payoff: by considering the watermark as an integrity stamp (i.e., its detectability stands as an integrity evidence), a natural game cost is the false-alarm probability which still detects the watermark in a tampered content and 2) this approach is further applied to find the optimal power allocation across parallel additive Gaussian channels of a dithered distortion compensated scalar quantization-based scheme against substitution attacks. The results are specialized to design an efficient discrete cosine transform (DCT) semifragile image watermarking system which allows detecting substitution attacks despite JPEG compression.
Keywords :
Gaussian channels; discrete cosine transforms; distortion; image coding; quantisation (signal); watermarking; DC-QIM; JPEG compression; discrete cosine transform; distortion-compensated-quantization index modulation; false-alarm probability; image watermarking system; integrity stamp; local manipulation; lossy compression; natural game cost; optimal power allocation; parallel additive Gaussian channels; scalar quantization-based scheme; semifragile authentication; semifragile watermarking; substitution attacks; tampered content; Authentication; Cost function; Discrete cosine transforms; Gaussian channels; Image coding; Law; Legal factors; Robustness; Transform coding; Watermarking; Authentication; JPEG compression; dithered scalar distortion-compensated–quantization index modulation (DC–QIM); integrity checking; large deviation technique; parallel channels; semifragile tamper proofing; substitution attack;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2008.2004285