Annotated Bibliography

advertisement
Name: Nathan Singleton
Topic: Computerized Image Processing for Forgery Prevention
Description: This research paper will investigate discuss problems with and make suggestions for
current forgery detection software.
Motivation: Every year computers have been able to display pictures with higher resolution. This has
made forging checks, identification, and paintings a simple task. The world economy suffers because of
forgery of all types of documents and paintings.



References:
Meerwald, Peter, and Shelby Pereira. Attacks, applications and evaluation of known
watermarking algorithms with Checkmark. Tech. Austria: Department of Computing Science.
Print.
[This paper discusses digital photo watermarking specifically for courtroom evidence, insurance
claims and journalistic photography. However as many other papers solely focus on property,
this paper focuses on tamper proofing an image so it can be a credible source to be used in court.
The approach proposed in this paper makes it so that the user can see image distortion because
of filtering or lossy compression. The paper takes in a picture F and a picture G that may be the
same as picture F, and tries to determine whether or not to a certain percentage whether or not
G is credible. The paper determines that there is not a yes or no solution to this problem because
there are many different ways in which to tamper with an image. With tamper proofing, a fragile
watermark is better to implement because it uses frequency within the image in order to
determine tampering. Unlike a normal watermark that must stay in the signal in order to
remove it, fragile watermarks detect distortion by examining a signal. If the signal, which is a
randomly generated binary stream, has changed since the last use of the image, the image has
been tampered with. ]
Mohanty, Saraju P. Watermarking of Digital Images. Rep. INDIAN INSTITUE OF SCIENCE, 1999.
Print.
[This paper talks about four different techniques of Watermarking Adaptive Visible
Watermarking Technique for Image Data, Adaptive Visible Watermarking for Image Data in DCT
Domain, Invisible Image Watermarking Technique in Spatial Domain and Spread Spectrum
Watermarking Technique for Digital Images. Visible watermarks should be used in digital
libraries so that they can be used in research papers and other scholarly works. This keeps the
image safe from commercial use. Watermarking is still a growing field and more research has to
be done if it invisible watermarks are going to be “legally useful.”[86] It also goes into the history
of Watermarking in the beginning. This is a very good source for background information on
Watermarking and some very detailed information on 4 specific watermarking algorithms. This
paper talks about the eye’s brightness sensitivity, frequency sensitivity, and texture sensitivity.]
Voyatzis, G., and I. Pitas. The Use of Watermarks in the Protection of Digital Multimedia
Products. Rep. Thessaloniki: University of Thessaloniki, 1999. Print.


[This paper creates a General watermarking framework (GWF) that will be studied throughout
the paper. The reasons why the algorithm is efficient and reliable are discussed. The author also
outlines what Digital signatures are, and how they have been implemented in the past. In
conclusion, according to the author, digital signatures are slow and watermarking is a better,
and much faster way to keep pictures, audio, and video safe. The author also outlines different
reasons for pirating watermarked images. One is to remove the watermark in order to violate
the copyright, another is to steal the watermark in “ order to create a false positive content
verification”[3]. The author also goes into detail of different pirating attacks and how they are
protected. The prevention of attacks that are discussed are Extraction of counterfeit watermarks,
detection of false positives, statistical watermark extraction, multiple watermarking, and
watermarking by using arbitrary keys.]
Yeung, Minerva M., Scott A. Craver, Nasir Memon, and Boon-Lock Yeo. Resolving Rightful
Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications. Rep.
May 1998. Web. 28 Sept. 2009.
<http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=668979&isnumber=14639>.
[This paper focuses only on invisible watermarking and which techniques are best. It also talks
about the “ends” to watermarking and how it can be used in the real world. The author states
that it is necessary to define when a watermark is able to be used and when it is not. He also
takes a strong stance on the fact that it is currently impossible, as of 1998, to use a
watermarking algorithm efficiently for posting on the internet. This paper brings up a good point
that when there are two watermarks on an image, how do you declare who’s image it is? The
paper goes into detail of invalidating claims of ownership. Mainly the authors state that because
people have implemented robust watermarks, it does not mean the picture is totally protected
from theft.]
Sencar, Http://delivery.acm.org/10.1145/1110000/1102563/p93sencar.pdf?key1=1102563&key2=9910614521&coll=GUIDE&dl=GUIDE&CFID=55103819&CFTOK
EN=67618896, and Nasir Memon. Watermarking and Ownership Problem: A Revisit. Rep. 2005.
Web. 28 Sept. 2009. <http://delivery.acm.org/10.1145/1110000/1102563/p93sencar.pdf?key1=1102563&key2=9910614521&coll=GUIDE&dl=GUIDE&CFID=55103819&CFTOK
EN=67618896>.
[This paper focuses on legal aspects and tries to resolve problems with image forgery and theft.
It goes over topics to help prevent theft with different types of Watermarking techniques. The
author tries to minimize vulnerabilities of his algorithm, and even suggests embedding two
watermarks in the image. This paper breaks down watermarking into three major steps,
watermark and key generation, embedding, and detection. The paper then goes into how
pirates take pictures, even with watermarks currently on them, and are able to take ownership.
This is because if the watermarking program has a large false positive rate of acceptance, the
counterfeiter has a much easier time of stealing the image for his or her own use. “Accordingly,
the detection statistic is obtained as a combination (i.e., weighted difference) of two statistics
where the first one indicates the presence of the watermark in the embedded-object and the
second term signifies the non-existence of the watermark in the cover-object. Hence, to claim
ownership on the true original, the pirate has to ensure that the fake watermark exhibits strong
presence in the true original and at the same time no presence in his fake-original.” ]
Other References:





Song, Y. J., R. Z. Liu, and T. A. Tan. Digital Watermarking for Forgery Detection in Printed
Materials. Tech. National Lab of Pattern Recognition Institute of Automation, Chinese Academy
of Sciences. Web. 14 Sept. 2009.
<http://www.springerlink.com/content/gw9rf6gyeptmen93/fulltext.pdf>. [Great Research
paper of forgery. Good sources to look back at.]
Mohanty, Saraju P., N. Ranganathan, and Ravi K. Namballa. VLSI Implementation of
VisibleWatermarking for a Secure Digital Still Camera Design. Rep. Print. <
http://www.cse.unt.edu/~smohanty/research/ConfPapers/2004/MohantyVLSID2004Chip.pdf>
[Proposes a hardware implementation in order to watermark pictures. Also shows two separate
algorithms and how they work when implemented.]
N. Memon and P. W. Wong, “Protecting Digital Media Content,” Comm. of the ACM, vol. 41, no.
7, pp. 34-43, Jul 1998. [Gives definitions to specific types of watermarks and gives outlines of
what can be done with them.
Mohanty, Saraju P. Digital Watermarking : A Tutorial Review. Rep. Web. 25 Sept. 2009.
<http://www.informatika.org/~rinaldi/Kriptografi/WMSurvey1999Mohanty.pdf>.
[Provides a history of hiding information, key definitions and comparisons of techniques.
Partially delves into Steganography]
Kundur, and Hatzinakos. Digital Watermarking for Telltale Tamper-Proofing and Authentication.
Tech. Toronto: Natural Sciences and Engineering Research Coucil and Canada, 1999. Print.
[Provides analysis for digital watermarking, and more specifically, fragile watermarking of still
images. The author provides research in order to help court rooms recognize legitimate images.]
Download