Secret and public key image watermarking schemes for image authentication and ownership verification

Ping Wah Wong, Nasir Memon

Research output: Contribution to journalArticle

Abstract

We describe a watermarking scheme for ownership verification and authentication. Depending on the desire of the user, the watermark can be either visible or-invisible. The scheme can detect any modification made to the image and indicate the specific locations that have been modified. If the correct key is specified in the watermark extraction procedure, then an output image is returned showing a proper watermark, indicating the image is authentic and has not been changed since the insertion of the watermark. Any modification would be reflected in a corresponding error in the watermark. If the key is incorrect, or if the image was not watermarked, or if the watermarked image is cropped, the watermark extraction algorithm will return an image that resembles random noise. Since it requires a user key during both the insertion and the extraction procedures, it is not possible for an unauthorized user to insert a new watermark or alter the existing watermarks so that the resulting image will pass the test. We present secret key and public key versions of the technique.

Original languageEnglish (US)
Pages (from-to)1593-1601
Number of pages9
JournalIEEE Transactions on Image Processing
Volume10
Issue number10
DOIs
StatePublished - Oct 2001

Fingerprint

Image Authentication
Image Watermarking
Image watermarking
Watermark
Public key
Authentication
Watermarking
Insertion
Random Noise
Output

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Graphics and Computer-Aided Design
  • Software
  • Theoretical Computer Science
  • Computational Theory and Mathematics
  • Computer Vision and Pattern Recognition

Cite this

Secret and public key image watermarking schemes for image authentication and ownership verification. / Wong, Ping Wah; Memon, Nasir.

In: IEEE Transactions on Image Processing, Vol. 10, No. 10, 10.2001, p. 1593-1601.

Research output: Contribution to journalArticle

@article{8f64f19849d747efa0ced8e4d9be5945,
title = "Secret and public key image watermarking schemes for image authentication and ownership verification",
abstract = "We describe a watermarking scheme for ownership verification and authentication. Depending on the desire of the user, the watermark can be either visible or-invisible. The scheme can detect any modification made to the image and indicate the specific locations that have been modified. If the correct key is specified in the watermark extraction procedure, then an output image is returned showing a proper watermark, indicating the image is authentic and has not been changed since the insertion of the watermark. Any modification would be reflected in a corresponding error in the watermark. If the key is incorrect, or if the image was not watermarked, or if the watermarked image is cropped, the watermark extraction algorithm will return an image that resembles random noise. Since it requires a user key during both the insertion and the extraction procedures, it is not possible for an unauthorized user to insert a new watermark or alter the existing watermarks so that the resulting image will pass the test. We present secret key and public key versions of the technique.",
author = "Wong, {Ping Wah} and Nasir Memon",
year = "2001",
month = "10",
doi = "10.1109/83.951543",
language = "English (US)",
volume = "10",
pages = "1593--1601",
journal = "IEEE Transactions on Image Processing",
issn = "1057-7149",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "10",

}

TY - JOUR

T1 - Secret and public key image watermarking schemes for image authentication and ownership verification

AU - Wong, Ping Wah

AU - Memon, Nasir

PY - 2001/10

Y1 - 2001/10

N2 - We describe a watermarking scheme for ownership verification and authentication. Depending on the desire of the user, the watermark can be either visible or-invisible. The scheme can detect any modification made to the image and indicate the specific locations that have been modified. If the correct key is specified in the watermark extraction procedure, then an output image is returned showing a proper watermark, indicating the image is authentic and has not been changed since the insertion of the watermark. Any modification would be reflected in a corresponding error in the watermark. If the key is incorrect, or if the image was not watermarked, or if the watermarked image is cropped, the watermark extraction algorithm will return an image that resembles random noise. Since it requires a user key during both the insertion and the extraction procedures, it is not possible for an unauthorized user to insert a new watermark or alter the existing watermarks so that the resulting image will pass the test. We present secret key and public key versions of the technique.

AB - We describe a watermarking scheme for ownership verification and authentication. Depending on the desire of the user, the watermark can be either visible or-invisible. The scheme can detect any modification made to the image and indicate the specific locations that have been modified. If the correct key is specified in the watermark extraction procedure, then an output image is returned showing a proper watermark, indicating the image is authentic and has not been changed since the insertion of the watermark. Any modification would be reflected in a corresponding error in the watermark. If the key is incorrect, or if the image was not watermarked, or if the watermarked image is cropped, the watermark extraction algorithm will return an image that resembles random noise. Since it requires a user key during both the insertion and the extraction procedures, it is not possible for an unauthorized user to insert a new watermark or alter the existing watermarks so that the resulting image will pass the test. We present secret key and public key versions of the technique.

UR - http://www.scopus.com/inward/record.url?scp=0035473831&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0035473831&partnerID=8YFLogxK

U2 - 10.1109/83.951543

DO - 10.1109/83.951543

M3 - Article

C2 - 18255501

AN - SCOPUS:0035473831

VL - 10

SP - 1593

EP - 1601

JO - IEEE Transactions on Image Processing

JF - IEEE Transactions on Image Processing

SN - 1057-7149

IS - 10

ER -