• DocumentCode
    825087
  • Title

    A Set Theoretic Framework for Watermarking and Its Application to Semifragile Tamper Detection

  • Author

    Altun, Oktay ; Sharma, Gaurav ; Celik, Mehmet U. ; Bocko, Mark F.

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Rochester Univ., NY
  • Volume
    1
  • Issue
    4
  • fYear
    2006
  • Firstpage
    479
  • Lastpage
    492
  • Abstract
    We introduce a set theoretic framework for watermarking. Multiple requirements, such as watermark embedding strength, imperceptibility, robustness to benign signal processing, and fragility under malicious attacks are described as constraint sets and a watermarked image is determined as a feasible solution satisfying these constraints. We illustrate that several constraints can be formulated as convex sets and develop a watermarking algorithm based on the method of projections onto convex sets. The framework allows flexible incorporation of different constraints, including embedding strength requirements for multiple watermarks that share the same spatial context and different imperceptibility requirements based on frequency-weighted error and local texture perceptual models. We illustrate the effectiveness of the framework by designing a hierarchical semifragile watermark that is tolerant to mild compression, allows tamper localization, and is fragile under aggressive compression. Using a quad-tree representation, a spatial resolution hierarchy is established on the image and a watermark is embedded corresponding to each node of the hierarchy. The spatial hierarchy of watermarks provides a graceful tradeoff between robustness and localization under mild JPEG compression, where watermarks at coarser levels demonstrate progressively higher immunity to JPEG compression. Under aggressive compression, watermarks at all hierarchy levels vanish, indicating a lack of trust in the image data. The constraints implicitly partition watermark power in the resolution hierarchy as well as among image regions based on robustness and invisibility requirements. Experimental results illustrate the flexibility and effectiveness of the method
  • Keywords
    image representation; quadtrees; set theory; watermarking; JPEG compression; benign signal processing; convex set; frequency-weighted error; hierarchical semifragile watermark; imperceptibility requirements; local texture perceptual models; quad-tree representation; semifragile tamper detection; set theoretic watermarking framework; spatial resolution hierarchy; tamper localization; watermark embedding strength; watermarked image; Biology computing; Biomedical signal processing; Context modeling; Frequency; Image coding; Information security; Robustness; Signal processing algorithms; Transform coding; Watermarking; Projections onto convex sets (POCS); robustness to compression; semifragile watermark; set theoretic watermarking; spread-spectrum watermark; tamper localization;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2006.885018
  • Filename
    4014093