{"title":"An Authentication Watermark Algorithm for JPEG images","authors":"Xi Shi, Fenlin Liu, Daofu Gong, Jing Jing","doi":"10.1109/ARES.2009.8","DOIUrl":null,"url":null,"abstract":"In this paper, an authentication watermark algorithm for JPEG images is proposed, which is basing on the current watermark algorithm proposing and realizing a counterfeiting attack for the current watermarking algorithm security. In order to reduce the miss alarm caused by the mode of embedding watermark, in this algorithm the watermark embedded coefficients are as a factor of the watermark generation, and embedding watermark information by adopting the lowest bit substitute, so as to resist the counterfeiting attack effectively and improve the security of the current algorithm. The theoretical analysis and the realization show that the watermark algorithm presented by this paper has a lower miss alarm probability compared with the current algorithm, and further more the algorithm security.","PeriodicalId":169468,"journal":{"name":"2009 International Conference on Availability, Reliability and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Availability, Reliability and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2009.8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In this paper, an authentication watermark algorithm for JPEG images is proposed, which is basing on the current watermark algorithm proposing and realizing a counterfeiting attack for the current watermarking algorithm security. In order to reduce the miss alarm caused by the mode of embedding watermark, in this algorithm the watermark embedded coefficients are as a factor of the watermark generation, and embedding watermark information by adopting the lowest bit substitute, so as to resist the counterfeiting attack effectively and improve the security of the current algorithm. The theoretical analysis and the realization show that the watermark algorithm presented by this paper has a lower miss alarm probability compared with the current algorithm, and further more the algorithm security.