[ Back to EurekAlert! ]

PUBLIC RELEASE DATE:
6-Jul-2010

[ | E-mail ] Share Share

Contact: Govindarajan Yamuna
yamunaphd@yahoo.com
Inderscience Publishers
@inderscience

Reversible watermarking for digital images

Safeguarding the integrity of digital images with a virtual watermark

Every picture tells a story, but how do you know that a digital photo has not been manipulated to change the tale being told? A new approach to adding an encrypted watermark to digital images allows the an image to be validated against a pass key, according to research published in the International Journal of Signal and Imaging Systems Engineering.

Visible watermarks are routinely added to digital images as a form of copy protection, but their presence essentially destroys the picture, obliterating information within altered pixels in a way that cannot be reversed. Now, Dakshinamurthi Sivakumar and Govindarajan Yamuna of Annamalai University, in Tamil Nadu, India, have developed a new, reversible watermarking scheme. The system could be used initially for the authentication of military images.

Inexpensive image editing software is now available that can be used to make essentially undetectable "photo realistic" changes to almost any photograph, the team explains. In a military setting it is important to prevent unauthorized manipulation of digital images and to be able to demonstrate credibility and provenance.

"Traditionally, source authentication and integrity verification of digital data have been carried out with digital signatures and encrypted watermarks," the team says, "Unfortunately, watermarking techniques modify original data as a modulation of the watermark information and unavoidably cause permanent distortion to the original data." Reversible, or lossless, watermarking is therefore required for many highly sensitive applications.

The team has now developed a reversible watermarking system based on calculating the parameters of every pixel in the image but nevertheless at low computer power. This information is converted into a code, a Hash Message Authentication Code (HMAC), of the image where distinct pixel values are selected for embedding watermark bits and the preferred pixel values are stored as a key. The key thus generated is used for both the watermark extraction and restoration of the original image. The extracted HMAC and the HMAC of the restored image can be compared to verify that the received image is authentic and has not been altered.

###



[ Back to EurekAlert! ] [ | E-mail Share Share ]

 


AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.