OMAR FAROOQ et al : TAMPER-PROOFING OF DIGITAL IMAGES
355

 

TABLE 2: Comparison of JPEG compression effect for 2nd level and 5th level decomposition of image
JPEG Compression ratio TAF for 2nd level decomposition TAF for 5th level decomposition
1 0.4914 0.4912
2 0.4998 0.4910
3 0.4940 0.5051
4 0.4968 0.4971
5 0.4989 0.4930
6 0.4978 0.5029
7 0.4962 0.4908
8 0.4941 0.4799
9 0.5006 0.3869
10 0.4993 0.3743
     
     

7. CONCLUSION

Due to ease in the availability of digital media, watermarking them has become an important issue for digital right management and tamper proofing. A brief survey of different watermarking techniques has been carried out in this paper. Further, wavelet based tamper proofing of images has been successfully carried out and the results are presented in this paper. Attacks based on averaging filter and compression were applied and the tampering was successfully detected by the proposed technique in all the cases.

REFERENCES

  1. C I Podilchuk & E J Delp, Digital Watermarking: Algorithms and Applications, IEEE Signal Processing Magazine, vol 18, pp 33-46, Jul 2001.

  2. M-S Hsieh, D-C Tseng Y-H Huang, Hiding Digital Watermarks Using Multiresolution Wavelet Transform, IEEE Transactions on Industrial Electronics, vol 48, no 5, pp 875-882, Oct 2001.

  3. 3. A P Fabien & Petitcolas, Watermarking Schemes Evaluation, IETE Signal Processing Magazine, vol 17, pp 58-64, Sep 2000.

  4. C Shoemaker & Rudko, Hidden Bits-A Survey of Techniques for Digital Watermarking, Spring Project, EER-290, 2002.

  5. S Craver, N Memon, B L Yeo & M M Yeung, Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks and Implications, IEEE Journal on Selected Areas in Communications, vol 16, no 4, pp 573-586, May 1998.
 
  1. J F Delaigle, D De Vleeschouwer & B Macq, Low cost perceptive digital picture watermarking method, Proc ECMAST’97, Milan, Italy, May 1997, pp 153- 167.

  2. S. Craver, N Memon, B L Yeo & M Yeung, Can invisible watermarks resolve rightful ownerships?, IBM Res Rep RC 20509, July 1996.

  3. I J Cox, J P Linnartz & T Shamoon, Public watermarks and resistance to tampering, Proc Int. Conf Image Processing (ICIP), volume 3, 26-29 Oct
    1997 pp 3-6, 1997.

  4. F M Boland, J J K O Ruanaidh & W J Dowling, Watermarking digital images for copyright protection, Proc Int Conf Image Processing and Its
    Applications
    , vol 410, Edinburgh, UK, pp 326-330 July 1995.

  5. A Bors & I Pitas, Embedding parametric digital signatures in images, EUSIPCO-96, Trieste, Italy, vol III, pp 1701-1704, Sept 1996.

  6. J Brassil, S Low, N Maxemchuk & L O’Gorman, Electronic marking and identification techniques to discourage document copying, IEEE J Select Areas Comm, vol 13, pp 1495-1504, Oct. 1995.

  7. C W Yang, Watermarking, Tamper-Proofing and Obfuscation, Technical Report, Computer Center, Dept of Computer & Information Science National Chiao Tung University, 2000.

  8. O Bruyndonckx, J J Quisquater & B Macq, Spatial method for copyright labeling of digital images, Proc IEEE-Workshop Nonlinear Signal and Image Processing, Halkidiki, Greece, pp 456-459, June 1995.

  9. M Barni, F Bartolini, V Cappellini & A Piva, A DCT domain system for robust image watermarking, Signal Processing (Special Issue on Watermarking), vol 66, no 3, pp 357-372, May 1998.

  10. M Barni, F Bartolini, V Cappellini, A Piva & F Rigacci, A M.A.P. identification criterion for DCTbased watermarking, Proc Europ Signal Processing Conf (EUSIPCO ’98), Rhodes, Greece, pp 17-20 Sept 1998.

  11. D Benham, N Memon, B L Yeo & M Yeung, Fast watermarking of DCT-based compressed images, Proc Int Conf Image Science, Systems, and
    Technology
    (CISST ’97), Las Vegas, NV, June 1997, pp 243-253.

  12. I J Cox & J P. Linnartz, Some general methods for tampering with watermarks, IEEE J Select Areas Comm (Special Issue on Copyright and Privacy Protection), vol 16, pp 587-593, May 1998.

  13. D Kundur, Multiresolution digital Watermarking: Algorithms and Implications For Multimedia Signals, Thesis of degree of doctor of philosophy, University of Toronto, 1999.

  14. F Hartung & M Kutter, Multimedia Watermarking Techniques, Proc IEEE, vol 87, no 7, pp 1079-1107, July 1999.

  15. Lim and D June, Digital Watermarking, SNU Mai Lab, Summer Project, 2003.