Name: Nathan Singleton Topic: Computerized Image Processing for Forgery Prevention Description: This research paper will investigate discuss problems with and make suggestions for current forgery detection software. Motivation: Every year computers have been able to display pictures with higher resolution. This has made forging checks, identification, and paintings a simple task. The world economy suffers because of forgery of all types of documents and paintings. References: Meerwald, Peter, and Shelby Pereira. Attacks, applications and evaluation of known watermarking algorithms with Checkmark. Tech. Austria: Department of Computing Science. Print. [This paper discusses digital photo watermarking specifically for courtroom evidence, insurance claims and journalistic photography. However as many other papers solely focus on property, this paper focuses on tamper proofing an image so it can be a credible source to be used in court. The approach proposed in this paper makes it so that the user can see image distortion because of filtering or lossy compression. The paper takes in a picture F and a picture G that may be the same as picture F, and tries to determine whether or not to a certain percentage whether or not G is credible. The paper determines that there is not a yes or no solution to this problem because there are many different ways in which to tamper with an image. With tamper proofing, a fragile watermark is better to implement because it uses frequency within the image in order to determine tampering. Unlike a normal watermark that must stay in the signal in order to remove it, fragile watermarks detect distortion by examining a signal. If the signal, which is a randomly generated binary stream, has changed since the last use of the image, the image has been tampered with. ] Mohanty, Saraju P. Watermarking of Digital Images. Rep. INDIAN INSTITUE OF SCIENCE, 1999. Print. [This paper talks about four different techniques of Watermarking Adaptive Visible Watermarking Technique for Image Data, Adaptive Visible Watermarking for Image Data in DCT Domain, Invisible Image Watermarking Technique in Spatial Domain and Spread Spectrum Watermarking Technique for Digital Images. Visible watermarks should be used in digital libraries so that they can be used in research papers and other scholarly works. This keeps the image safe from commercial use. Watermarking is still a growing field and more research has to be done if it invisible watermarks are going to be “legally useful.”[86] It also goes into the history of Watermarking in the beginning. This is a very good source for background information on Watermarking and some very detailed information on 4 specific watermarking algorithms. This paper talks about the eye’s brightness sensitivity, frequency sensitivity, and texture sensitivity.] Voyatzis, G., and I. Pitas. The Use of Watermarks in the Protection of Digital Multimedia Products. Rep. Thessaloniki: University of Thessaloniki, 1999. Print. [This paper creates a General watermarking framework (GWF) that will be studied throughout the paper. The reasons why the algorithm is efficient and reliable are discussed. The author also outlines what Digital signatures are, and how they have been implemented in the past. In conclusion, according to the author, digital signatures are slow and watermarking is a better, and much faster way to keep pictures, audio, and video safe. The author also outlines different reasons for pirating watermarked images. One is to remove the watermark in order to violate the copyright, another is to steal the watermark in “ order to create a false positive content verification”[3]. The author also goes into detail of different pirating attacks and how they are protected. The prevention of attacks that are discussed are Extraction of counterfeit watermarks, detection of false positives, statistical watermark extraction, multiple watermarking, and watermarking by using arbitrary keys.] Yeung, Minerva M., Scott A. Craver, Nasir Memon, and Boon-Lock Yeo. Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications. Rep. May 1998. Web. 28 Sept. 2009. <http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=668979&isnumber=14639>. [This paper focuses only on invisible watermarking and which techniques are best. It also talks about the “ends” to watermarking and how it can be used in the real world. The author states that it is necessary to define when a watermark is able to be used and when it is not. He also takes a strong stance on the fact that it is currently impossible, as of 1998, to use a watermarking algorithm efficiently for posting on the internet. This paper brings up a good point that when there are two watermarks on an image, how do you declare who’s image it is? The paper goes into detail of invalidating claims of ownership. Mainly the authors state that because people have implemented robust watermarks, it does not mean the picture is totally protected from theft.] Sencar, Http://delivery.acm.org/10.1145/1110000/1102563/p93sencar.pdf?key1=1102563&key2=9910614521&coll=GUIDE&dl=GUIDE&CFID=55103819&CFTOK EN=67618896, and Nasir Memon. Watermarking and Ownership Problem: A Revisit. Rep. 2005. Web. 28 Sept. 2009. <http://delivery.acm.org/10.1145/1110000/1102563/p93sencar.pdf?key1=1102563&key2=9910614521&coll=GUIDE&dl=GUIDE&CFID=55103819&CFTOK EN=67618896>. [This paper focuses on legal aspects and tries to resolve problems with image forgery and theft. It goes over topics to help prevent theft with different types of Watermarking techniques. The author tries to minimize vulnerabilities of his algorithm, and even suggests embedding two watermarks in the image. This paper breaks down watermarking into three major steps, watermark and key generation, embedding, and detection. The paper then goes into how pirates take pictures, even with watermarks currently on them, and are able to take ownership. This is because if the watermarking program has a large false positive rate of acceptance, the counterfeiter has a much easier time of stealing the image for his or her own use. “Accordingly, the detection statistic is obtained as a combination (i.e., weighted difference) of two statistics where the first one indicates the presence of the watermark in the embedded-object and the second term signifies the non-existence of the watermark in the cover-object. Hence, to claim ownership on the true original, the pirate has to ensure that the fake watermark exhibits strong presence in the true original and at the same time no presence in his fake-original.” ] Other References: Song, Y. J., R. Z. Liu, and T. A. Tan. Digital Watermarking for Forgery Detection in Printed Materials. Tech. National Lab of Pattern Recognition Institute of Automation, Chinese Academy of Sciences. Web. 14 Sept. 2009. <http://www.springerlink.com/content/gw9rf6gyeptmen93/fulltext.pdf>. [Great Research paper of forgery. Good sources to look back at.] Mohanty, Saraju P., N. Ranganathan, and Ravi K. Namballa. VLSI Implementation of VisibleWatermarking for a Secure Digital Still Camera Design. Rep. Print. < http://www.cse.unt.edu/~smohanty/research/ConfPapers/2004/MohantyVLSID2004Chip.pdf> [Proposes a hardware implementation in order to watermark pictures. Also shows two separate algorithms and how they work when implemented.] N. Memon and P. W. Wong, “Protecting Digital Media Content,” Comm. of the ACM, vol. 41, no. 7, pp. 34-43, Jul 1998. [Gives definitions to specific types of watermarks and gives outlines of what can be done with them. Mohanty, Saraju P. Digital Watermarking : A Tutorial Review. Rep. Web. 25 Sept. 2009. <http://www.informatika.org/~rinaldi/Kriptografi/WMSurvey1999Mohanty.pdf>. [Provides a history of hiding information, key definitions and comparisons of techniques. Partially delves into Steganography] Kundur, and Hatzinakos. Digital Watermarking for Telltale Tamper-Proofing and Authentication. Tech. Toronto: Natural Sciences and Engineering Research Coucil and Canada, 1999. Print. [Provides analysis for digital watermarking, and more specifically, fragile watermarking of still images. The author provides research in order to help court rooms recognize legitimate images.]