In this paper, we present a novel wavelet-based double watermarking system for the detection and subsequent characterisation of the tampering of images. Most tamper detection techniques use fragile watermarks. However, our previous work showed that this type of watermark is frequently completely destroyed by compression, which in many cases is undesirable. In addition, it gives little or no information about the nature of the attack. We propose using two robust watermarks, one inserted at the embedder, the other at the detector. The second watermark is used as a reference with which the first watermark may be compared. This allows additional information not previously available about the nature of the attack to be obtained. The use of a robust strategy prevents the watermark being easily destroyed, but instead allows the system to continue to perform after significant attacks.
|Translated title of the contribution||Towards tamper detection and classification with robust watermarks|
|Title of host publication||IEEE International Symposium on Circuits and Systems (ISCAS '03), Bangkok, Thailand|
|Publisher||Institute of Electrical and Electronics Engineers (IEEE)|
|Pages||II-959 - II-962|
|Number of pages||4|
|Publication status||Published - May 2003|
|Event||International Symposium on Circuits and Systems, 2003 - Bangkok, Thailand|
Duration: 1 May 2003 → …
|Conference||International Symposium on Circuits and Systems, 2003|
|Abbreviated title||ISCAS '03|
|Period||1/05/03 → …|
Bibliographical noteRose publication type: Conference contribution
Sponsorship: This work is supported by Motorola, the Metropolitan Police and
EPSRC grant GMIM81885.
This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Bristol's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to firstname.lastname@example.org.
By choosing to view this document, you agree to all provisions of the copyright laws protecting it.