In this work, we consider the problem of blind geometric synchronization of images for watermarking. Existing
solutions involve insertion of periodic templates, geometrically-invariant domains, and feature-point-based
techniques. However, security leakage and poor watermark detection performance under under lossy geometric
attacks are some known disadvantages of these methods. Different from above, recently a perceptual-hash-based
secure and robust image synchronization scheme has been proposed. Although it has some promising results, it
requires a series of heavy computations which prevents it from being employed in real time (or near real time)
applications and from being extended to wider range of geometric attack models. In this paper, we focus on the
computational efficiency of this scheme and introduce a novel randomized algorithm which conducts geometric
synchronization much faster.
Semi-fragile watermarking techniques aim to prevent tampering and fraudulent use of modified images. A semi-fragile watermark monitors the integrity of the content of the image but not its exact representation. Thus the watermark is designed so that if the content of the image has not been tampered with, and so long as the correct key is known and the image ha sufficiently high quality, the integrity is proven. However if some parts of the image is replaced by someone who does not possess the key, the watermark information will not be reliably detected, which can be taken as evidence of forgery. In this paper we compare the performance of nine semi-fragile watermarking algorithms in terms of their miss probability under forgery attack, and in terms of false alarm probability under mild, hence non-malicious signal processing operations that preserve the content and quality of the image. We propose desiderata for semi-fragile watermarking algorithms and indicate the promising algorithms among existing ones.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.