Pw. Wong et N. Memon, Secret and public key image watermarking schemes for image authentication and ownership verification, IEEE IM PR, 10(10), 2001, pp. 1593-1601
We describe a watermarking scheme for ownership verification and authentica
tion. Depending on the desire of the user, the watermark can be either visi
ble or invisible. The scheme can detect any modification made to the image
and indicate the specific locations that have been modified. If the correct
key is specified in the watermark extraction procedure, then an output ima
ge is returned showing a proper watermark, indicating the image is authenti
c and has not been changed since the insertion of the watermark. Any modifi
cation would be reflected in a corresponding error in the watermark. If the
key is incorrect, or if the image was not watermarked, or if the watermark
ed image is cropped, the watermark extraction algorithm will return an imag
e that resembles random noise. Since it requires a user key during both the
insertion and the extraction procedures, it is not possible for an unautho
rized user to insert a new watermark or alter the existing watermark so tha
t the resulting image will pass the test. We present secret key and public
key versions of the technique.