A classification of semi-fragile watermarking systems for JPEG images
  Egorova A.A., Fedoseev V.A.
   
  IPSI RAS – Branch of the  FSRC “Crystallography and Photonics” RAS, 
Molodogvardeyskaya 151, 443001, Samara, Russia;
Samara National Research University, Moskovskoye shosse, 34,  443086, Samara, Russia
 
 PDF
  PDF
Abstract:
The article discusses  semi-fragile digital watermarking systems designed to protect JPEG images  against unauthorized changes. These systems allow detecting and locating  changes, and some of them are able to restore the original content. Formal  schemes describing the procedures for watermark embedding and authentication  are given. We consider more than a dozen systems of this type and classify them  according to various criteria. We also consider the results of experimental  studies of these systems estimating their level of distortions arising from  watermark embedding. In addition, we test the systems whether they are able to  operate in the semi-fragile way
Keywords:
digital watermarking, image  authentication, semi-fragile watermarking, JPEG, QIM, LSB
Citation:
Egorova AA, Fedoseev VA.  A classification of semi-fragile watermarking systems for JPEG images. Computer  Optics 2019; 43(3): 419-433. DOI: 10.18287/2412-6179-2019-43-3-419-433.
References:
  - Cox I, Kilian J,  Leighton FT, Shamoon T. Digital Watermarking and Steganography: Morgan  Kaufmann. Elsevier; 2008.
- Fedoseev VA.  Digital Watermarking and Steganography: A Tutorial. 2nd ed. Samara: Samara University;  2019.
- Fedoseev VA. A unified model for information  hiding systems. Computer Optics 2016; 40: 87-98.
 
- Barni M, Bartolini F. Watermarking  systems engineering: Enabling digital assets security  and other applications.  CRC Press; 2004.
 
- Lin C-Y, Chang S-F. Issues and  solutions for authenticating MPEG video. Proceedings of SPIE 1999; 54-65.
 
- Lin C-Y, Chang S-F. Semifragile  watermarking for authenticating JPEG visual content. Electronic Imaging 2000;  140-151.
 
- Ho CK, Li CT. Semi-fragile  watermarking scheme for authentication of JPEG images. International Conference  on Information Technology: Coding and Computing, 2004. Proceedings 2004; 1:  7-11.
 
- Huang L-Y. Authentication  watermarking algorithm resisting JPEG compression based on preliminary  quantization. Information Technology Journal 2013; 12(16): 3723-3728.
 
- Ye S, Zhou Z, Sun Q, Chang E, Tian  Q. A quantization-based image authentication system. Proceedings of the 2003  Joint Fourth International Conference on Information, Communications and Signal  Processing, 2003 and the Fourth Pacific Rim Conference  on Multimedia. Proceedings of the 2003 Joint 2003; 2: 955-959.
 
- Preda RO, Vizireanu DN.  Watermarking-based image authentication robust to JPEG compression. Electronics  Letters 2015; 51(23): 1873-1875.
 
- Wang H, Ho A, Zhao X. A novel fast  self-restoration semi-fragile watermarking algorithm for image content  authentication resistant to JPEG compression. Digital Forensics and  Watermarking 2011;  7128:  72-85.
 
- Fallahpour M, Megias D. Flexible  image watermarking in JPEG domain. 2016 IEEE International Symposium on Signal  Processing and Information Technology (ISSPIT) 2016; 311-316.
 
- Mursi M, Assassa GMR, Aboalsamh H,  Alghathbar K. A DCT-based secure JPEG image authentication scheme. World Academy  of Science, Engineering and Technology 2009; 53: 681-687.
 
- Lin ET, Podilchuk CI, Delp EJ. Detection of image alterations using  semifragile watermarks. Security and Watermarking of Multimedia Contents II  2000; 3971: 152-164.
 
- Al-Mualla ME. Content-adaptive  semi-fragile watermarking for image authentication. 2007 14th IEEE  International Conference on Electronics, Circuits and Systems 2007; 1256-1259.
 
- Wong PHW, Au OCL, Wong JWC. Data  hiding technique in JPEG compressed domain. Proceedings of SPIE – The International  Society for Optical Engineering 2001; 309-320.
 
- Xiao J, Ma Z, Lin B, Su J, Wang Y. A  semi-fragile watermarking distinguishing JPEG compression and  gray-scale-transformation from malicious manipulation. 2010 IEEE Youth Conference  on Information, Computing and Telecommunications (YC-ICT) 2010; 202-205.
 
- Evsutin OO, Kokurina AS, Shelupanov  AA, Shepelev II. An improved algorithm for data hiding in compressed digital  images based on PM1 method. Computer Optics 2015; 39(4): 572-581. DOI:  10.18287/0134-2452-2015-39-4-572-581. 
 
- Yu X, Wang C, Zhou X. Review on  Semi-Fragile Watermarking Algorithms for Content Authentication of Digital  Images. Future Internet 2017; 9(4): 56.
 
- Wallace GK. The JPEG still picture  compression standard. IEEE Transactions on Consumer Electronics 1992; 38(1):  xviii-xxxiv.
 
- Chen B, Wornell G. Quantization  index modulation: A class of provably good methods for digital watermarking and  information embedding. IEEE Transaction on Information Theory 2001; 47(4):  1423-1443.
 
- Cox IJ, Kilian J, Leighton FT,  Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE  Transactions on Image Processing 1997; 6(12): 1673-1687.
 
- Mitekin V, Fedoseev V. A new  QIM-based watermarking algorithm robust against multi-image histogram attack.  Procedia Engineering 2017; 201: 453-462. DOI: 10.1016/j.proeng.2017.09.687.
 
- Mitekin VA,  Fedoseev VA.  New secure QIM-based information hiding algorithms. Computer Optics 2018; 42(1): 118-127. DOI:  10.18287/2412-6179-2018-42-1-118-127. 
 
- Glumov NI, Kuznetsov AV. Copy-move  image forensics detection. Computer Optics 2011; 35(4): 508-512.
 
- Glumov NI, Kuznetsov AV. Detection  of local artificial changes in images. Optoelectronics, Instrumentation and  Data Processing 2011; 47(3): 207-214. DOI: 10.3103/S8756699011030010.
- The USC-SIPI Image Database. Source: <http://sipi.usc.edu/database/>.
  
  © 2009, IPSI RAS
  151,  Molodogvardeiskaya str., Samara, 443001, Russia; E-mail: journal@computeroptics.ru ; Tel: +7  (846)  242-41-24 (Executive secretary), +7 (846)332-56-22 (Issuing   editor), Fax: +7 (846) 332-56-20