A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
Fragile/semi-fragile watermarking are important methods for authenticating multimedia contents. The watermark must be sensitive to malicious attacks. However, at the same time, it also has to be insensitive to allowed modifications. In practice, the definitions of "allowed modifications" are various. It is difficult to satisfy multiple users having different authentication requirements with a fixed algorithm. In this paper, we introduced a novel "sensor-based" authentication watermarking with the concept of "authentication on demand", in which user requirements are adopted as parameters for authentication. In addition, fuzzy identification of multiple authentication sensors' outputs has introduced the ability of finely tuning on authentication type and degree. With this approach, authentication sensitivity to malicious attacks is enhanced. At the same time, the approach is also more robust against allowed modifications. As a byproduct, this algorithm provides a new function, to detect the attack method.