A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure

Size: px
Start display at page:

Download "A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure"

Transcription

1 A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure Chunlei Li 1,2, Yunhong Wang 1, Bin Ma 1, Zhaoxiang Zhang 1 1. School of Computer Science and Engineering, Beihang University, Beijing, , China 2. School of Electronic and Information Engineering, Zhongyuan University of Technology, ZhengZhou, , China Abstract In this paper, we propose a novel self-recovery watermarking scheme based on dual-redundant-ring structure (DRRS). All blocks of target image form a ring in a manner that the watermark of an image block is hidden in 1-LSB (Least Significant Bit) of its next block N 1, and the copy of this watermark is embedded into 2-LSB of another block whose position is determined by the position of N 1. The validity of test image block is determined by comparing the number of inconsistent blocks in the block-neighborhood with that of its mapping block. Other detection result is generated in the same way comparing test block with copy block of its next block. The fusion of two detection marks improves tamper detection accuracy, while two copies of watermark provide a second chance for tamper recovery. Experimental results demonstrate that the proposed algorithm is superior to the state of the art of tamper detection and tamper recovery and could keep high security strength. Keywords: Fragile watermarking; dual-redundant-ring; tamper detection; self-recovery; security analysis 1. Introduction With the rapid development of information technologies, digital images are more frequently used rather than their hard copies. Unfortunately or fortunately in other sense, this digitalization leads to the fact that digital media can be easily modified. To reckon with this problem, extensive methods have been reported on how to prevent digital media from copying or Preprint submitted to Computers & Electrical Engineering September 3, 2011

2 tampering, and redistributing them in original forms. Among the reported methods, cryptography-based methods are merely effective for verifying whether target images have not been tampered or come from extract sender, while digital watermarking methods, opposed to their pure cryptographic counterparts, could enable not only verification of image tamper, but also recovery of tampered image region. The self-recovery watermarking scheme can be classified as fragile or semifragile. A self-recovery fragile watermark is designed to be easily destroyed even if the watermarked image is modified in the slightest manner, and can recover the damaged region using its embedded watermarks [1-18]. On the other hand, self-recovery semi-fragile watermarks are more robust than fragile ones and less sensitive to classical user manipulations. Hence, semi-fragile watermarks are capable of distinguishing content-preserving (innocuous) operations, e.g., JPEG compression, from malicious manipulations [19-21]. It is used to detect malicious manipulation, and recover the damaged content. However, the recovered image is of low quality. In this paper, we put our attention on self-recovery fragile watermarking schemes for which the issues of tamper detection and self-recovery are well defined. In 1999, Fridrich et al. [11] proposed a self-embedding fragile watermarking scheme, in which test image is divided into blocks, then DCT transform has been applied on these blocks. The principal DCT coefficients of image blocks are coded to generate authentication data. Then a watermark is embedded for verifying the integrity of image and the recovery of tampered region. The reported method introduces the block-wise dependency, and makes self-embedding watermarking schemes invulnerable to vector quantization (VQ) counterfeiting attack [22] and collage attack [23]. However, this strategy has two deficiencies: 1) the block-mapping sequence is generated using a fixed offset, thus the attacker could easily obtain the information of block-mapping sequence. Then, via the obtained sequence information, watermark can be circumvented, leading to undetected image modification [11]. 2) The accuracy of tamper detection is low when a large proportion of image is tampered. In order to solve the aforementioned problems, Lin et al. [18] came up with a hierarchical digital watermarking method for tamper detection and recovery. It adopted parity check and intensity-relation check (i.e., the 2- bit authentication watermark) to determine the legitimacy of image block and the hierarchical structure to improve the tamper detection rate. However, Lin s method [18] is also ineffective when the host image is attacked 2

3 by the collage attack. Moreover, this method is vulnerable to the constantaverage attack and a kind of dictionary attack proposed by Chang et al. [25]. He et al. [12] proposed a self-recovery fragile watermarking scheme using block-neighborhood tampering characterization. The proposed method outperforms conventional self-recovery fragile watermarking algorithms in terms of tamper detection and tamper recovery under various attacks. However, in order to improve the accuracy of tamper detection and the quality of the recovered image, the proposed method divides test image into blocks with size of 2 2, leading to a low security strength (SS) [24], and therefore could brings related security flaws. To tackle this problem, in a refined work [13], an adjacent-block based statistical detection method (ABSD) is proposed. In the reported work, a random sequence is used to generate the block-mapping sequence for watermark embedding, in which all adjacent blocks of test block and the mapping block have been taken into account and then a statistic-based rule to determine the validity of test image blocks has been employed. The method has an improved performance for tamper detection while security is maintained. However, the reported work still has some drawbacks, namely, when tampered region is large, image block and its mapping block may be tampered simultaneously, so tampered image block cannot be recovered. In this sense, the quality of recovered image could not be guaranteed. For this dilemma, Lee et al [14] proposed a dual watermark scheme for image tamper detection and recovery. The scheme maintains two copies of watermark of test image, providing a second recovery chance in the case of one copy is destroyed. The reported dual watermark scheme can significantly improve the quality of recovered image. However, due to the block-wise independence of authentication data, the scheme is vulnerable to vector quantization (VQ) attack and collage attack [22] [23]. As for the aforementioned problems of tamper detection and tamper recovery, a novel self-recovery fragile watermarking scheme based on a dualredundant-ring structure is proposed in this paper. The proposed block-wise dependency and redundant embedding scheme could improve the accuracy of tamper detection and the quality of recovered image while keeping security strength. 2. Dual-redundant-ring structure The self-embedding watermarking scheme is block-wise dependent in sense that if one image block suffers from tampering, the image block and its map- 3

4 X I ( k ) XI( k 1) XI( k 2) 2-LSB 2-LSB X I( i) w XI( i 1) w X I( i 2) I( i) I( i 1) wi( i 2) 1-LSB 1-LSB... Figure 1: Dual-redundant-ring structure ping block are marked invalid simultaneously, which will increase the false alarm probability. For this problem, we propose a self-recovery fragile watermarking scheme based on dual-redundant-ring structure. This scheme is illustrated in Fig.1. Where X I(i) represents target image block, and watermark W I(i) is generated from the 6-MSB (Most Significant Bit) of X I(i). All image blocks form a ring in a manner that W I(i) of X I(i) is hidden in the 1-LSB of the following block X I(i+1), while watermark W I(i+1) is embedded into the 1-LSB of the following block X I(i+2). This manner continues until the last watermark has been embedded to X I(i). For increasing the tamper recovery probability, W I(i) is also embedded in X I(k+1) which is actually a duplication of X I(i+1). For verifying the validity of test block X I(i+1), the number of inconsistent blocks among the 3 3 block-neighborhood of X I(i+1) is checked with the corresponding one of the mapping block X I(i+2). The other detection result is generated in the same way by comparing the test block with the duplication of its following block. The fusion of the two detection results improves the accuracy of tamper detection, while the two watermark copies improve the recovery quality. 4

5 3. Self-recovery fragile watermarking scheme The proposed watermarking scheme consists three parts including watermark embedding, tamper detection and tampered image recovery Watermark Embedding Fig.2 gives the illustration of embedding process, which could be divided into the following sub-processes: Original Image Secret key Image partition Dual-redundant-ring DCT & Quantization & encoding W Watermark embedding Watermarked image Figure 2: Watermark embedding process 1) Partition host image X into blocks with size of 8 8. Set the 1-LSB and 2-LSB of image block X I(i) as zeros, which are also used as the positions for watermark embedding. Then, the modified X I(i) can be used to embed two 64-bits watermarks Figure 3: Distribution of code-length 2) Transform image block X I(i) into the frequency domain by discrete cosine transform (DCT), and then quantize the DCT coefficients according 5

6 to the JPEG quantization table using a predetermined quality factor Q. The quantized DCT coefficients can be denoted as C = {c 1, c 2,, c N }, and the j th coefficient of the image block X I(i) is denoted as c I(i) (j) with each block of DCT coefficients arranged in zigzag order from low-frequency to high-frequency. The encoding of the first 14 coefficients and the code-length of each coefficient could be shown as Fig.3 [13], then these coefficients are encoded and encrypted by a secret key K 1 for generating a 64-bits watermark, denoted as W I(i). The encryption improves the security, making it harder to obtain the search condition of dictionary attack without secret key [25]. 3) Embed the watermarks based on dual-redundant-ring. For each image block X I(i), a 64-bits watermark W I(i) is generated in aforementioned manner, and embedded into the 1-LSB of W I(i+1) and the 2-LSB of W I(k+1) where the index I is generated in the following steps. Step 1. A random sequence B = {b 1, b 2,, b N ) of length N is generated by the following chaotic map [26]. b n+1 = ( (b n ) b 2 n z 2 n)mod3 (1) the sequence is non-periodic, non-convergent, and very sensitive to the initial value. Where the initial values of b 0 and b 1 are respectively set as k 0 and k 1 and z n denotes a logistic chaotic map with its initial value z 0 set as k 2. Then the secret key of the watermarking algorithm is formulated as follows: K 2 = {k 0, k 1, k 2 }, {k 0, k 1 } (1.5, 1.5), k 2 (0, 1). In this paper, the secret keys k 0 and k 1 and k 2 are set to 1.23, 0.43, and 0.53, respectively. Step 2. Obtain the index sequence A = {a 1, a 2,, a N }, satisfying b a1 b a2 b an, by sorting B = {b 1, b 2,, b N }. Step 3. Set the index I(i) of the image block X I(i) as I(i) = a i, i = 1, 2,, N, then the index of its mapping block is I(i + 1) = a i+1. For a tampered image, if the block X I(i 1) and X I(i) are tampered simultaneously, X I(i 1) cannot be recovered using the watermark W I(i 1) embedded into X I(i). Because X I(k) is the copy block of X I(i), the watermark embedded in X I(k) can be used for recovering the tampered block X I(i 1). However, if X I(k) is also tampered, recovery will fail. In order to reduce the probability of simultaneous tamper of X I(i) and X I(k), the distance between them should be kept as far as possible. The index I(k) can be calculated as follows: I(k) = mod((n/2 + I(i)), N) (2) where N is the number of image blocks. The embedding equation for each 6

7 pixel can be written as follows: Y i,j = 2 X i,j /2 + W i 1,j, i = 1, 2,, N.j = 1, 2,, 64 (3) Y i,j = 4 X k,j /4 + 2 W k 1,j + mod(x k,j, 2), k = 1, 2,, N.j = 1, 2,, 64 (4) The quality metrics commonly used for watermarked image include Signal to Noise Ratio (SNR), Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE) and Watson Distance (WD). In this paper, Peak Signal to Noise Ratio (PSNR) is used as follows: P SNR = 10log 10 [b/mse] (5) i,j MSE = [f(i, j) f w(i, j)] 2 (6) M N where b is the square of the maximum value of the signal. In this study, i.e. image intensity is of 8 bits format, so b = Due to the embedded watermark in 1-LSB and 2-LSB of test image, the probabilities of 0 and 1 are equal to 0.5 for any bit plane. After the watermark embedding, the probability of 0 changed to 1 is 0.5 with the equal probability of 1 changed to 0. If there is any bit changed, the corresponding changed value of 1-LSB and 2-LSB is 2 0 and 2 1, respectively. So, the pixel intensity disparity of the original image and the watermarked image can be written as follows: x w (i, j) x(i, j) = ( ) ( ) 2 0 = 1.5 (7) Correspondingly, PSNR of watermarked image is give as follows: P SNR = 10log 10 [b/mse] = 10log 10 (255 2 /1.5 2 ) = 44.61db (8) 3.2. Tamper detection Watermark extraction can be considered as the inverse process of watermark embedding. Let Y represents the test image, which can be a tampered watermarked image or untampered one. For each test image block YI(i), mapping block YI(i+1) and copy block YI(k+1) of Y I(i+1) can be obtained by using the dual-redundant-ring generated by secret key K 2. Watermark WI(i) generated from Y I(i) is compared with two watermarks W 1 I(i) and W 2 I(i) which are 7

8 extracted from the two mapping blocks, then two tamper detection masks T 1 and T 2 are generated according to verification. The final tamper detection T can be obtained by fusion of the two masks. The verification process is shown in Fig.4. and can be described as follows: * YI( i 1) * Y I ( i ) * YI( k 1) Extracting watermark DCT&quantizatio n&encoding Extracting watermark W * 1 I( i) * W I ( i ) W * 2 I( i) Compare Compare 1 d I ( i ) 2 d I ( i ) Postprocessing Postprocessing 1 T I ( i ) 2 T I ( i ) Fusion T Detection I( i) result Figure 4: Watermark extraction and verification More specifically, the verification process contains the following steps. 1) For each image block, the extraction of two 64-bits watermarks could be formulated as follows. w 1 I ( i),j = mod(y I(i+1),j, 2), i = 1, 2,, N, j = 1, 2,, 64 (9) w 2 I ( i),j = mod( y I(k+1),j, 2 ), i = 1, 2,, N, j = 1, 2,, 64 (10) 2) After the aforementioned watermark extraction, for each image block, two detection indicators could be calculated as follows: s 1 I(i) = { 1, ifw I(i) = W 1 I(i) 0, otherwise (11) s 2 I(i) = { 1, ifw I(i) = W 2 I(i) 0, otherwise (12) Consisting of both s 1 I(i) and s2 I(i), two tamper detection masks T 1 0 and T2 0 could be generated. 3) Optimize T1 0 and T2 0 using 8-neighborhood characterization. The optimization result can be written as follows: { 1, if(d d 1 1 I(i) = I(i) = 1)&(m 8 I(i) m8 I(i+1) ) (13) 0, otherwise 8

9 { 1, if(d d 2 2 I(i) = I(i) = 1)&(m 8 I(i) m8 I(k+1) ) 0, otherwise (14) where m 8 I(i) is the number of 1 in the 8-neighborhood of X I(i). As shown in Eq.(13) and Eq.(14), the inconsistent block is marked as tampered if the block-neighborhood characterization is more than or equal to that of its mapping block. Otherwise, the inconsistent block is genuine. 4) Count the number of the blocks in their 9-neighborhood where d I(i) = 1, if the number is larger than or equal to 4, then indicating the block is tampered. { 1, N9 (d t I(i) = I(i) ) 4 (15) 0, otherwise where N 9 (d I(i) ) denotes the number of inconsistent blocks in the 9-neighborhood of Y I(i). Then two detection masks T 2 1 and T 2 2 are generated. Table 1: AND operator: t 3 = t 1 &t 2 t t t ) Fuse the two tamper detection results. The fusion equation is represented as follows: T = T 2 1 &T 2 2 (16) where T is the final detection result. & represent AND operator, which can be explained in Table Tampered image recovery After tamper detection, all image blocks are marked as valid or invalid. The invalid blocks need to be recovered; the recovery is shown in Fig.5. 1) According to the result of verification, image blocks are classified into two classes: tampered blocks and un-tampered blocks. We mark the tampered blocks with id 1, and un-tampered blocks with id 0. 2) For test image block Y I(i) verify its mapping block Y I(i+1), if the image block is marked as invalid, we. If the image block is valid, the watermark W 1 I(i) is extracted from its 1-LSB. Otherwise, we verify image block Y I(k+1). If the image block is valid, its watermark W 2 I(i) is extracted from 2-LSB; otherwise, we set the value of all pixels in this image block to

10 3) Using extracted watermark W 1 I(i) or W 2 I(i), approximately reconstruct tampered image YI(i), noted as ỸI(i). Tested Image block Y I(i) * Tamper Y Y I(i+1) * Tamper Y Y * Y * I ( i) 128 I(k+1) Tamper N N Extract watermarking N Extract watermarking W * 1 I ( i) W * 2 I ( i) Decoding&IDCT Decoding&IDCT * ( ) YI i Figure 5: Tamper recovery 4. Security strength and computational complexity analysis 4.1. Security strength analysis Security plays an important role in fragile watermarking techniques, which refers to the inability by unauthorized users to manipulate the watermarked authentic image without being detected [6][27]. The measure of the success forgery probability (SFP) introduced in [24] is adopted in this study to e- valuate security strength (SS) under exhaustive search (ES) attack. SFP represents the probability that a manipulated image block is undetected by a verification system. Here we define SFP as follows: SF P = 1 N s (17) where N s is the size of search space for an image block. In order to forge an image block, the attackers must get the information of encrypted watermarks generated from image block and embedding position. Watermark with m-bits has N possible combinations, and the corresponding embedding position has 2 m possibilities ( N is the number of the image block). As a result, without 10

11 the secret keys, attacker needs 2 m N attempts to traverse the entire search space, meaning N s = 2 m N. In [12], image is divided into the 2 2 image blocks, the 8-bits feature of image block X i consists of 6-bits recovery and 2-bits key-based data. And the feature is encrypted to generate an 8-bits watermark. Watermark is embedded into the last two LSBs of its mapping block whose position is selected by a secret key. In order to forge an image block, for an image block, one at most will take 2 8 N attempts ( N is the number of image blocks). As a result, SFP of the proposed scheme under the ES attack is described as follows: SF P 1 1 = (18) 2 8 N In ABSD method [13], image is split into image blocks with size of 8 8, and a 64-bits feature of image block X i is encrypted to a 64-bits watermark. Then the watermark is embedded into the 1-LSB of its mapping block whose position is selected by a secret key. For an image block, an exhaustive search would take 2 64 N attempts (where N is the number of the image blocks). The corresponding SFP is calculated as follows: SF P 2 = N (19) In [14], image is divided into 2 2 image blocks, the joint 12-bit watermark of block A and its partner-block B is embedded into two mapping blocks. The joint 12-bits watermark of block A and B is shown in Fig.6. where the Five MSBs of avg_a Five MSBs of avg_b a 7 a 6 a 5 a 4 a 3 a 2 a 1 a 0 b 7 b 6 b 5 b 4 b 3 b 2 b 1 b 0 12-bits watermark for block A and B Figure 6: Generated watermark parity-check bits p and v are generated as follows: p = a 7 a 6 a 5 a 4 a 3 b 7 b 6 b 5 b 4 b 3 (20) 11

12 { 1, ifp = 0 v = 0, otherwise (21) A 12-bits watermark is embedded into three LSBs of their mapping blocks. During the procedure of tamper detection, the watermark information is extracted from the image block, and the parity-check bits p and v could be obtained from the watermark. Then the tamper detection can be determined by comparing p with v. Because the detection procedure is content independent, we can only modulate p and v to satisfy Eq.(20) and (21). So the forged image blocks cannot be detected by the verification system. Therefore it only takes one trial to forge an image block, the SFP of the proposed scheme under the ES attack is 1, SF P 3 = 1. For our DRRS method, image is split into image blocks with size of 8 8, the 64-bits feature of image block X i is encrypted to generate 64-bits watermark. And the watermark is embedded into the 1-LSB of its mapping block and the 2-LSB of the other mapping block. To forge an image block, an exhaustive search would take 2 64 N 2 64 N attempts at most, where N is the number of the image blocks. So the SFP could be written as follows: SF P 4 1 = 2 64 N 2 64 N = 1 (22) N 2 According to the above analysis, we can get the following inequality: SF P 4 < SF P 2 < SF P 1 < SF P 3 (23) The smaller SFP of the verification system indicates stronger security strength [28]. Therefore, our method has the highest security strength. Wong [29, 30] pointed that it is safe when the tries of exhaustive search (ES) attack above Our DRRS method and ABSD method [13] satisfy safety requirements computational complexity analysis Let the size of the image be M N, the computational complexity of each component in the embedding process is analyzed as follows: DCT transform, the computational complexity is O(nlogn); DCT coefficients quantization, suppose t to be the computational complexity for quantizing a coefficient, then quantize all the coefficients among an image block needs 7 t; the random position sequence with length N b generation, the computational complexity is O(Nb 2 ); authentication watermark embedding into the last two 12

13 LSBs, the computational complexity is 2 M N. Then the computational complexity of the proposed method can be written as follows: f(n) = O(nlogn 7 t N b + N 2 b + 2 N b + 2 M N) (24) where n n is the size of image block, N b is the number of image blocks. The extraction process involves similar steps and hence the complexity of the extraction process is also f(n). All the experiments have been implemented on Matlab2010b, and the processor is Pentium IV running at 2.4G with 4G RAM. For an image with size , the embedding process costs less than 6.7s, and tamper detection and recovery cost 3.98s. Therefore, we can deploy it online. 5. Experimental results According to the above analysis, our proposed DRRS method and ABSD method [13] satisfy safety requirements. In this section, we present the performance comparison of the two methods on tamper detection and tampered image recovery Tamper detection For quantitative evaluation, two measures, i.e. the false acceptance rate (R fa ) and the false rejection rate (R fr ), are introduced to evaluate the performance of tamper detection. R fa = (1 N td /N t ) 100% (25) R fr = N fd /(N N t ) 100% (26) where N t is the number of tampered blocks, N td is the number of correctly detected tampered blocks, N fd is the number of valid blocks falsely detected. In the ideal situation, the values of both R fa and R fr should be zero for different tamper ratios [13]. A set of images is chosen in our simulations, which comprises 8 images of size , as shown in Fig.7. The average PSNR is 44.26dB, which is approximate with the result of Eq.(8). Suppose the proportion of tampered region a is in [0.01, 0.8] with the interval of For each a, we carry on random region tampering for 20 times. The mean value of R fa and R fr are shown in Fig.8. From this figure, it could be found that R fa of both methods 13

14 (a) (b) (c) (d) (e) (f) (g) (h) Figure 7: Test images ( ) used in our experiments: (a) Lena (b) Pepper (c) sailboat (d) couple (e) Elaine (f) trunk (g) mandrill (h) ship (all images are from USC- SIPI) increases gradually with the growing tamper ratio and maintains a low level (less than 5%). The curve of R fa of ADSD method is below our DRRS method s, while the difference is small, indicating that the two methods have good performance at false acceptance rate. However, the R fr of ABSD method is higher than our DRRS method s, especially when the tampered region is large. When the tamper ratio is up to 80%, the R fr of ABSD method is nearly 27%, while the corresponding one of our DRRS method is only 15%. As we know, when the tampered region is large, the number of un-tampered image blocks that can be used for recovery is small. If the R fr is high, some un-tampered image blocks are wrongly marked as tampered, making the embedded watermarks unavailable to be utilized. Otherwise, with lower R fr, we can make better use of the un-tampered image blocks to recover the tampered image. Hence, our DRRS method obtains higher quality of recovered image than ABSD method Tampered image recovery Fig.9 gives the recovery performance of the tampered region, where the x-axis represents the tamper ratio in [0.01, 0.8] with the interval of 0.01, and 14

15 Probability(%) Rfa(DRRS) Rfa(ABSD[13]) Rfr(DRRS) Rfr(ABSD [13]) Un recovered block number DRRS ABSD [13] Tamper ratio(%) Figure 8: FAR and FRR Tamper ratio(%) Figure 9: Un-recover image blocks number the y-axis is the number of un-recover image blocks of tampered region. The image with the size of is split into 4096 blocks with size 8 8. Under a given tamper ratio, the quality of recovered image will decrease with the increase of un-recovered image block number. It is evident that the un-recover image blocks number in our DRRS method is smaller than the one obtained by ABSD method. When the tampered ratio is up to 50%, our method has approximately 400 un-recovered image blocks, while the number of ABSD method is up to nearly In this paper, PSNR is used as the metrics of the recovered image quality. In Fig.10, we give the PSNR of the recovered image using our DRRS method and ABSD method. From this figure, we can observe that the recovered image PSNR of ABSD method is higher than our method when the tamper ratio below 10%, because ABSD method uses the 7-MSB of the pixels to generate the watermark, while we only apply 6-MSB. But with the increase of the tampered ratio, the PSNR of our method becomes higher than ABSD method. Moreover, Fig.12 gives the performance of tamper detection and image recovery at the given tampered ratios. It can be observed that our DRRS method outperforms ABSD method in term of the accuracy of tamper detection over the increased the tamper ratio. When the tamper ratio is 20%, both methods approximately have the same R fr. However, when the tamper ratio is up to 60% and 80%, we find that many un-tampered image blocks have been marked as tampered in ABSD method, while our method has very low R fr. The recovered images approximately have the same quality when the tamper ratio equals to 20% while with the increase of tampered 15

16 PSNR of recovered image ABSD [13] DRRS Recognition ratio (%) Tamper image ABSD [13] DRRS Tamper ratio (%) Figure 10: PSNR of recovered image Tamper ratio (%) Figure 11: Recognition ratio of recovered face image region. When tamper ratio is up to 60%, the quality of recovered image using ABSD method decreases quickly. Our method can nearly recover all tampered blocks except some blocks located in the boundary of tampered region. When the tamper ration is up to 80%, the recovered image using ABSD method is totally destroyed. However, our DRRS method can still recover the general appearance of the original image. The following experiments are conducted on the FERET face database [31]. We selected 500 people from the FERET database, with two face images (FA/FB) for each person, and they are scaled to the size of The FA set is used as the refer set, and FB set is selected as the test set. We tamper the test set under different ratio from 10% to 70%, and recover the face images using ABSD method and our proposed method, respectively. In order to validate the quality of recovered face image, we extract the PCA feature (64 coefficients), and calculate the recognition ratio using NN classifier. The recognition ratio is depicted in Fig.11, and the x-axis represents the tamper ratio from 10% to 70%, the y-axis is the recognition ratio. From the figure, we can see that the recognition ratio of tampered face image decreases with the tamper ratio increase. Using ABSD method and our proposed method, the tampered face image can be recovered to a certain extent. Meantime, when the tamper ratio is above 30%, the recognition ratio of our method is above ABSD method. Moreover, the tamper detection and recovery of a given face is depicted in Fig.13. We can see that our DRRS method outperforms ABSD method. Even if tamper ratio is up to 70%, we can recognize the face image identity. 16

17 (a) (b) (c) (d) (e) (f) (g) (h) (i) (j) (k) (l) (m) (n) (o) (p) (q) (r) (s) (t) ABSD [13] DDRS ABSD [13] DDRS ABSD [13] DDRS Tamper ratio (20%) Tamper ratio (60%) Tamper ratio (80%) Figure 12: Tamper detection and recovery: the first row is the original Lena image and elaine image, the second row is the tampered image under the tamper ratio 20%, 60% and 80%, respectively, the third row is the tamper detection using ABSD method and DRRS method, the last row is the recovered image. 17

18 Figure 13: Tamper detection and recovery of a face image: the first row is the tampered face image with tamper ratio from 10% to 70%; the second row is the tamper detection result by ABSD method; the third row is its recovered result; the fourth row is the tamper detection result by our DRRS method; the last row is recovered result by our method. 18

19 5.3. Collage attack In this subsection, we give the effect of collage attack on ABSD method, Lee s method [14] and our DRRS method. Two images, Lena and elaine, both with the size of , are watermarked using the same secret key. The watermarked images are shown in Fig.14 (a) and Fig.14 (b), respectively. We replace a patch of Lena image with the same size patch of elaine image, and the result is shown in Fig.14(c). The detection result of Lee s method [14] is shown in Fig.14 (d). Fig.14 (e) is the detection result of ABSD method while Fig.14 (f) is the detection result of our method. According to the detection result, we can conclude that the method of Lee s method [14] cannot detect the forged watermarked image, which is vulnerable to collage attack. This is due to the fact that the detection procedure is content-independent. Our proposed method and ABSD method can localize the tampered region under collage attack. Fig.14 (g), Fig.14 (h) and Fig.14 (i) give the recovered image using the three methods, respectively. ABSD method and our DRRS method can efficiently recover the forged region, and our method has higher image quality. (a) (b) (c) (d) (e) (f) (g) (h) Figure 14: Tamper detection and recovery under collage attack: (a) Watermarked lena; (b) watermarked elaine; (c) tampered image; (d) detected by [14]; (e) detected by ABSD method; (f)detected by DRRS method; (e) recovered by [14]; (g) recovered by ABSD method; (i) recovered by DRRS method. 19

20 5.4. Only-content-tampering attack Only-content-tampering attack is proposed by Chang et al. [25]. The method only modifies the content of watermarked image, and leaves the watermark bits unchanged. Fig.15 (a) is the watermarked trunk image and Fig.15 (b) is the forged image. Two trunk copies have been added into the watermarked image while the watermarks among the two regions are kept unchanged. The detection results by Lee s method [14], ABSD [13] and our method are shown in Fig.15 (c), Fig.15 (d) and Fig.15 (e), respectively. Lee s method [14] cannot detect the forged watermarked image and is vulnerable to only-content-tampering attack. Our DRRS method and ABSD method can localize the tampered region under only-content-tampering attack. Fig.15 (f), Fig.15 (g) and Fig.15 (h) give the recovered image of the three methods, respectively. ABSD method and our DRRS method can efficiently recover the forged image region. (a) (b) (c) (d) (e) (f) (g) (h) Figure 15: Tamper detection and recovery under only-content-tampering attack: (a) Watermarked image; (b) forged image; (c) (e) detected by [14], ABSD method and DRRS method; (f)-(h) recovered by the three methods. 20

21 6. Conclusions In this paper, we propose a novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure. All blocks of target image form a ring in a manner that the watermark of an image block is hidden in 1-LSB (Least Significant Bit) of its next block N 1, and the copy of this watermark is embedded into 2-LSB of another block whose position is determined by the position of N 1. The validity of test image block is determined by comparing the number of inconsistent blocks in the block-neighborhood with that of its mapping block. Other detection result is generated in the same way comparing test block with copy block of its next block. The main features of the method are summarized below: 1) The redundant ring is generated by a chaotic map, which makes it difficult to obtain the information of the block-mapping sequence and therefore improves the security of the proposed method. 2) The strength security of the proposed method outperforms the stateof-art work. Furthermore, the proposed method can effectively resist the ES attack, collage attack and only-content-tampering attack due to its block dependence feature. 3) The fusion of two tamper detection masks improves the tamper detection accuracy. The R fa and R fr are not more than 5%, even if the tamper ratio is up to 70%; 4) Two copies of watermark provide a second chance for block recovery in the case one copy is destroyed. This strategy also improves the quality of the recovered image; Future research includes extending this approach to resist mild distortion such as random noise and JPEG compression, and reducing the image block size to 4 4 or 2 2 while keeping the security strength. Acknowledgments. This work is funded by the National Natural Science Foundation of China (No ), the National Basic Research Program of China (No.2010CB327902), the Fundamental Research Funds for the Central Universities, and the Opening Funding of the State Key Laboratory of Virtual Reality Technology and Systems. References [1] Fridrich, J., Goljan, M.. Protection of digital images using selfembedding. In: International Conference on Information Technologies and Control. 1999, p

22 [2] Wong, P., Menon, N.. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transaction on Image Processing 2001;10(1): [3] Yuan, H., Zhang, X.P.. Multiscale fragile watermarking based on the gaussian mixture model. IEEE Transaction on Image Processing 2006;15(10): [4] Wang, M.S., Chen, W.C.. A majority-voting based watermarking scheme for color image tamper detection and recovery. Computer Standards & Interfaces 2007;29(5): [5] Zhang, X.P., Wang, S.Z.. Statistical fragile watermarking capable of locating individual tampered pixels. Signal Processing Letters 2007;14(7): [6] Zhu, S.M., Liu, J.M.. A novel fragile watermarking scheme for image tamper detection and recovery. Chin Opt Lett 2010;8(10): [7] lawi, R.C., Khan, A., Usman, I.. Authentication and recovery of images using multiple watermarks. Computers Electrical & Engineering 2010;36(10): [8] Bing, C.S., Che, Z.G., Xu, S.. Research on image self-recovery algorithm based on dct. Journal of Multimedia 2010;5(10): [9] Hassan, A.M., Hamadi, A.A., Hasan, M.Y.. Variable block-size image authentication with localization and self-recovery. Proceedings of 2010 IEEE 17th International Conference on Image Processing 2010;: [10] Hassan, A.M., Hamadi, A.A., Michaelis, B.. Secure self-recovery image authentication using randomly-sized blocks. In: ICPR. 2010, p [11] Fridrich, J., Goljan, M.. Images with self-correcting capabilities. In: IEEE International Conference on Image Processing. 1999, p [12] He, H.J., Zhang, J.S., Tai, H.M.. Self-recovery fragile watermarking using block-neighborhood tampering characterization. In: IHW. 2009, p

23 [13] He, H.J., Zhang, J.S., Tai, H.M.. Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal processing 2009;: [14] Lee, T.Y., Lin, S.D.. Dual watermark for image tamper detection and recovery. Pattern Recognition 2008;41(1): [15] Zhang, H.B., Cheng, Y.. Tamper detection and self recovery of images using self-embedding. Elecronica Sinica 2004;32(2): [16] Wang, S.S., Tsai, S.L.. Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recognition 2008;41(2): [17] MeenakshiDevi, P., Venkatesan, M., Duraiswamyi, K.. A fragile watermarking scheme for image authentication with tamper localization using integer wavelet transform. Journal of Computer Science 2009;5(11): [18] Lin, P.L., Hsieh, C.K., Huang, P.W.. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 2005;38(12): [19] Chamlawi, R., Khan, A.. Digital image authentication and recovery: Employing integer transform based information embedding and extraction. Information Sciences 2010;180(12): [20] Tsai, M.J., Chien, C.C.. Authentication and recovery for wavelet-based semi-fragile watermarking. Optical Engineering 2008;47(6): [21] Yang, C.W., Shen, J.J.. Recover the tampered image based on vq indexing. Signal Processing 2009;90(6): [22] Holliman, M., Memon, N.. Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes. IEEE Transactions on Image Processing 2000;3(10): [23] Fridrich, J., Goljan, M., Memon, N.. Cryptanalysis of the yeungmintzer fragile watermarking technique. Journal of Electronic Imaging 2002;11(4):

24 [24] Wu, Y., Deng, R.H.. Security of of an ill-posed operator for image authentication. IEEE Trans Circuits Syst Video Technol 2005;15(1): [25] Chang, C., Fan, Y.H., Tai, W.L.. Four-scanning attack on hierarchical digital watermark-ing method for image tamper detection and recovery. Pattern Recognition 2008;41(2): [26] Zhang, J.S., L.Tian,. A new chaotic digital watermarking method based on private key. Journal of China Institute of Communications 2004;25(8): [27] Deguillaume, F., Voloshynovskiy, S., Pun, T.. Secure hybrid robust watermarking resistant against tampering and copy attack. Signal Processing 2003;83(8): [28] He, H.J., Zhang, J.S., Tai, H.M.. Block-chain based watermarking scheme with superior localization. In: IHW. 2008, p [29] Wong, P.. A public key watermark for image verification and authentication. In: ICIP. 1998, p [30] Wong, P., Memon, N.. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 2001;10(8): [31] Phillips, P.J., Wechsler, H., Huang, J., Rauss, P.. The feret database and evaluation procedure for face recognition algorithm. Image and vision Computing 1998;16: Chunlei Li received his M.S. degree in Communication and Information System from Hohai University, Nanjing, china, in He worked at School of Electronic and Information Engineering, Zhongyuan University of Technology, ZhengZhou, China, from 2004 to Since 2008, He is working toward the Ph.D. degree in Beihang University, Beijing, China. His research interests include biometrics, pattern recognition, digital image watermarking. Yunhong Wang received a M.S. degree and a Ph.D. degree in electronic engineering from Nanjing University of Science and Technology in 1995 and 1998 respectively. She worked at the National Laboratory of Pattern 24

25 Recognition, Institute of Automation, Chinese Academy of Sciences, Beijing, China, from 1998 to Since 2004, she has been a Professor with the School of Computer Science and Engineering, Beihang University, Beijing, China. Her research interests include biometrics, pattern recognition, computer vision, data fusion and image processing. She is a member of IEEE and IEEE Computer Society. Bin Ma received a B.E. degree from Zhengzhou university, Zhengzhou, china, in Since 2008, he is working toward the Ph.D. degree in Beihang University, Beijing, China. His research interests include image processing, biometrics, pattern recognition, digital image watermarking. Zhaoxiang Zhang received a Ph.D. degree in the National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, Beijing, China, in Since 2009, he has been a lecture with the School of Computer Science and Engineering, Beihang University, Beijing, China. His research interests include biometrics, pattern recognition, computer vision, and image processing. 25

arxiv: v1 [cs.cr] 31 Dec 2018

arxiv: v1 [cs.cr] 31 Dec 2018 Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,

More information

Image Authentication and Recovery Scheme Based on Watermarking Technique

Image Authentication and Recovery Scheme Based on Watermarking Technique Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications

More information

Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique

Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique ISSC 2013, LYIT Letterkenny, June 20 21 Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique Rongrong Ni,H.D.Cheng, Yao Zhao andyuhou Institute of Information

More information

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed

More information

A Survey of Fragile Watermarking-based Image Authentication Techniques

A Survey of Fragile Watermarking-based Image Authentication Techniques Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 6, November 2016 A Survey of Fragile Watermarking-based Image Authentication

More information

A Flexible Scheme of Self Recovery for Digital Image Protection

A Flexible Scheme of Self Recovery for Digital Image Protection www.ijcsi.org 460 A Flexible Scheme of Self Recoery for Digital Image Protection Zhenxing Qian, Lili Zhao 2 School of Communication and Information Engineering, Shanghai Uniersity, Shanghai 200072, China

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust Image Watermarking based on DCT-DWT- SVD Method Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete

More information

Image Error Concealment Based on Watermarking

Image Error Concealment Based on Watermarking Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,

More information

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,

More information

Iterative Removing Salt and Pepper Noise based on Neighbourhood Information

Iterative Removing Salt and Pepper Noise based on Neighbourhood Information Iterative Removing Salt and Pepper Noise based on Neighbourhood Information Liu Chun College of Computer Science and Information Technology Daqing Normal University Daqing, China Sun Bishen Twenty-seventh

More information

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY Journal of Theoretical Applied nformation Technology 31 August 2012 Vol 42 No2 2005-2012 JATT & LLS All rights reserved SSN: 1992-8645 wwwjatitorg E-SSN: 1817-3195 A SEM-FRAGLE WATERMARNG SCHEME FOR MAGE

More information

Improved Qualitative Color Image Steganography Based on DWT

Improved Qualitative Color Image Steganography Based on DWT Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

An SVD-based Fragile Watermarking Scheme With Grouped Blocks

An SVD-based Fragile Watermarking Scheme With Grouped Blocks An SVD-based Fragile Watermarking Scheme With Grouped Qingbo Kang Chengdu Yufei Information Engineering Co.,Ltd. 610000 Chengdu, China Email: qdsclove@gmail.com Ke Li, Hu Chen National Key Laboratory of

More information

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Feature Based Watermarking Algorithm by Adopting Arnold Transform Feature Based Watermarking Algorithm by Adopting Arnold Transform S.S. Sujatha 1 and M. Mohamed Sathik 2 1 Assistant Professor in Computer Science, S.T. Hindu College, Nagercoil, Tamilnadu, India 2 Associate

More information

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,

More information

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA Xiaoxu Leng, Jun Xiao, and Ying Wang Graduate University of Chinese Academy of Sciences, 100049 Beijing, China lengxiaoxu@163.com, {xiaojun,ywang}@gucas.ac.cn

More information

Moment-preserving Based Watermarking for Color Image Authentication and Recovery

Moment-preserving Based Watermarking for Color Image Authentication and Recovery 2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore Moment-preserving Based Watermarking for Color Image Authentication and Recovery Kuo-Cheng Liu + Information Educating

More information

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing

More information

A New Approach to Compressed Image Steganography Using Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography

More information

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION Chuhong Fei a, Raymond Kwong b, and Deepa Kundur c a A.U.G. Signals Ltd., 73 Richmond St. W, Toronto, ON M4H 4E8 Canada b University of Toronto,

More information

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in

More information

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute

More information

A Robust Watermarking Algorithm For JPEG Images

A Robust Watermarking Algorithm For JPEG Images nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation

More information

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

User-Friendly Sharing System using Polynomials with Different Primes in Two Images User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra

More information

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Meaningful Shadows for Image Secret Sharing with Steganography

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

Digital image steganography using LSB substitution, PVD, and EMD

Digital image steganography using LSB substitution, PVD, and EMD Digital image steganography using LSB substitution, PVD, and EMD Anita Pradhan, K. Raja Sekhar, Gandharba Swain* Department of Computer Science and Engineering, K L University, Vaddeswaram-522502, Andhra

More information

SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras

SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN E. E. Varsaki, V. Fotopoulos and A. N. Skodras Digital Systems & Media Computing Laboratory School of Science and Technology, Hellenic

More information

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression Hui Wang, Anthony TS Ho and Xi Zhao 24 th October 2011 Outline Background

More information

A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform

A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform Rafiullah Chamlawi, Asifullah Khan, Adnan Idris, and Zahid Munir Abstract Authentication of

More information

Robust biometric image watermarking for fingerprint and face template protection

Robust biometric image watermarking for fingerprint and face template protection Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,

More information

Robust DWT Based Technique for Digital Watermarking

Robust DWT Based Technique for Digital Watermarking Robust DWT Based Technique for Digital Watermarking Mamta Jain Department of Electronics & Communication Institute of Engineering & Technology Alwar er.mamtajain@gmail.com Abstract Hiding the information

More information

Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction

Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction Ioan Catalin Dragoi, Henri-George Coanda and Dinu Coltuc Electrical Engineering Dept. Valahia

More information

An Efficient Self-Embedding Watermarking Scheme for Colour Image Tamper Detection and Recovery

An Efficient Self-Embedding Watermarking Scheme for Colour Image Tamper Detection and Recovery Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images J Inf Process Syst, Vol.13, No.2, pp.385~399, April 2017 https://doi.org/10.3745/jips.03.0070 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Fragile Watermarking Based on LBP for Blind Tamper Detection

More information

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS *Yuk Ying CHUNG, Man To WONG *Basser Department of Computer

More information

A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS

A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS Xie Li and Wenjun Zhang Institute of Image Communication and Information Processing, Shanghai Jiaotong

More information

An Improved Reversible Data-Hiding Scheme for LZW Codes

An Improved Reversible Data-Hiding Scheme for LZW Codes International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2016) An Improved Reversible Data-Hiding Scheme for LZW Codes Wenqiang Zhao a, Bailong Yang b, Shizhong

More information

Efficient & Secure Data Hiding Using Secret Reference Matrix

Efficient & Secure Data Hiding Using Secret Reference Matrix Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade 1, Rajshree Mahajan 2, Chandan Kulthe 3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3

More information

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD

More information

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , ) ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscasaccn Journal of Software, Vol17, No2, February 2006, pp315 324 http://wwwjosorgcn DOI: 101360/jos170315 Tel/Fax: +86-10-62562563 2006 by Journal of Software

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

CHAPTER-4 WATERMARKING OF GRAY IMAGES

CHAPTER-4 WATERMARKING OF GRAY IMAGES CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do

More information

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti

More information

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Comparison of Wavelet Based Watermarking Techniques for Various Attacks International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,

More information

Digital Watermarking with Copyright Authentication for Image Communication

Digital Watermarking with Copyright Authentication for Image Communication Digital Watermarking with Copyright Authentication for Image Communication Keta Raval Dept. of Electronics and Communication Patel Institute of Engineering and Science RGPV, Bhopal, M.P., India ketaraval@yahoo.com

More information

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014 Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental

More information

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based

More information

Implementation of ContourLet Transform For Copyright Protection of Color Images

Implementation of ContourLet Transform For Copyright Protection of Color Images Implementation of ContourLet Transform For Copyright Protection of Color Images * S.janardhanaRao,** Dr K.Rameshbabu Abstract In this paper, a watermarking algorithm that uses the wavelet transform with

More information

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique 1 Arathi Chitla, 2 Dr. M. Chandra Mohan 1 Associate Professor, Department of Computer Science &

More information

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain Chinmay Maiti a *, Bibhas Chandra Dhara b a Department of Computer Science & Engineering, College of Engineering & Management, Kolaghat,

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

Block Mean Value Based Image Perceptual Hashing for Content Identification

Block Mean Value Based Image Perceptual Hashing for Content Identification Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions

More information

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image 015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics

More information

A Grayscale Image Steganography Based upon Discrete Cosine Transformation

A Grayscale Image Steganography Based upon Discrete Cosine Transformation A Grayscale Image Steganography Based upon Discrete Cosine Transformation Chin-Chen Chang 1, Pei-Yu Lin, and Jun-Chou Chuang 3 1 Department of Information Engineering and Computer Science, Feng Chia University,

More information

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT COMPARISO BETWEE TWO WATERMARKIG ALGORITHMS USIG DCT COEFFICIET, AD LSB REPLACEMET Mona M. El-Ghoneimy Associate Professor, Elect. & Comm. Dept., Faculty of Engineering, Cairo University, Post code 12316

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Chi-Yao Weng 1, Yen-Chia Huang 1, Chin-Feng Lee 2(&), and Dong-Peng Lin 2 1 Department of Computer Science, National Pingtung University,

More information

A Robust Image Watermarking Scheme using Image Moment Normalization

A Robust Image Watermarking Scheme using Image Moment Normalization A Robust Image ing Scheme using Image Moment Normalization Latha Parameswaran, and K. Anbumani Abstract Multimedia security is an incredibly significant area of concern. A number of papers on robust digital

More information

A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images

A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 2, March 2016 A Novel Fragile Watermark-Based Image Authentication Scheme

More information

A new robust watermarking scheme based on PDE decomposition *

A new robust watermarking scheme based on PDE decomposition * A new robust watermarking scheme based on PDE decomposition * Noura Aherrahrou University Sidi Mohamed Ben Abdellah Faculty of Sciences Dhar El mahraz LIIAN, Department of Informatics Fez, Morocco Hamid

More information

An Improved Performance of Watermarking In DWT Domain Using SVD

An Improved Performance of Watermarking In DWT Domain Using SVD An Improved Performance of Watermarking In DWT Domain Using SVD Ramandeep Kaur 1 and Harpal Singh 2 1 Research Scholar, Department of Electronics & Communication Engineering, RBIEBT, Kharar, Pin code 140301,

More information

Combined Hashing/Watermarking Method for Image Authentication

Combined Hashing/Watermarking Method for Image Authentication Combined Hashing/Watermarking Method for Image Authentication Vlado Kitanovski, Dimitar Taskovski, and Sofija Bogdanova Abstract In this paper we present a combined hashing/watermarking method for image

More information

Open Access Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain

Open Access Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain Send Orders for Reprints to reprints@benthamscience.net The Open Signal Processing Journal, 2013, 5, 1-6 1 Open Access Side-Informed Image ing Scheme Based on Dither Modulation in the Frequency Domain

More information

An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode

An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode Jia-Ji Wang1, Rang-Ding Wang1*, Da-Wen Xu1, Wei Li1 CKC Software Lab, Ningbo University, Ningbo, Zhejiang 3152,

More information

An Effective Denoising Method for Images Contaminated with Mixed Noise Based on Adaptive Median Filtering and Wavelet Threshold Denoising

An Effective Denoising Method for Images Contaminated with Mixed Noise Based on Adaptive Median Filtering and Wavelet Threshold Denoising J Inf Process Syst, Vol.14, No.2, pp.539~551, April 2018 https://doi.org/10.3745/jips.02.0083 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) An Effective Denoising Method for Images Contaminated with

More information

Structure-adaptive Image Denoising with 3D Collaborative Filtering

Structure-adaptive Image Denoising with 3D Collaborative Filtering , pp.42-47 http://dx.doi.org/10.14257/astl.2015.80.09 Structure-adaptive Image Denoising with 3D Collaborative Filtering Xuemei Wang 1, Dengyin Zhang 2, Min Zhu 2,3, Yingtian Ji 2, Jin Wang 4 1 College

More information

A new predictive image compression scheme using histogram analysis and pattern matching

A new predictive image compression scheme using histogram analysis and pattern matching University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai 00 A new predictive image compression scheme using histogram analysis and pattern matching

More information

A Semi-Fragile Watermarking Scheme for Color Image Authentication

A Semi-Fragile Watermarking Scheme for Color Image Authentication A Semi-Fragile Watermarking Scheme for Color Image Authentication M. Hamad Hassan and S.A.M. Gilani Abstract In this paper, a semi-fragile watermarking scheme is proposed for color image authentication.

More information

QR Code Watermarking Algorithm based on Wavelet Transform

QR Code Watermarking Algorithm based on Wavelet Transform 2013 13th International Symposium on Communications and Information Technologies (ISCIT) QR Code Watermarking Algorithm based on Wavelet Transform Jantana Panyavaraporn 1, Paramate Horkaew 2, Wannaree

More information

A Color Image Digital Watermarking Scheme Based on SOFM

A Color Image Digital Watermarking Scheme Based on SOFM 302 A Color Image Digital Watermarking Scheme Based on SOFM J. Anitha 1, S. Immanuel Alex Pandian 2 1 Asst.Prof., Dept. of Computer Science and Engineering, Karunya University, Coimbatore, Tamilnadu, India.

More information

FRAGILE WATERMARKING USING SUBBAND CODING

FRAGILE WATERMARKING USING SUBBAND CODING ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING

More information

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD Robust Lossless Image Watermarking in Integer Domain using SVD 1 A. Kala 1 PG scholar, Department of CSE, Sri Venkateswara College of Engineering, Chennai 1 akala@svce.ac.in 2 K. haiyalnayaki 2 Associate

More information

7 MULTIMEDIA AUTHENTICATION

7 MULTIMEDIA AUTHENTICATION 7 MULTIMEDIA AUTHENTICATION AND WATERMARKING Dr. Bin B. Zhu and Dr. Mitchell D. Swanson Most multimedia signals today are in digital formats which are easy to reproduce and modify without any trace of

More information

Fast Watermarking of Traffic Images Secure Transmission in Effective Representation Mode

Fast Watermarking of Traffic Images Secure Transmission in Effective Representation Mode Appl. Math. Inf. Sci. 8, No. 5, 2565-2569 (2014) 2565 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/080555 Fast Watermarking of Traffic Images Secure

More information

Abstract. Keywords: Semi-fragile watermarking, DCT embedding, Localisation, Restoration

Abstract. Keywords: Semi-fragile watermarking, DCT embedding, Localisation, Restoration Abstract This report introduces two semi-fragile watermarking algorithms in details, including how they are deigned and implemented using Matlab. The first algorithm relies on embedding the watermark,

More information

Image Authentication and Recovery Using BCH Error-Correcting Codes

Image Authentication and Recovery Using BCH Error-Correcting Codes 1 Image Authentication and Recovery Using BCH Error-Correcting Codes Jose Antonio Mendoza Noriega, Brian M. Kurkoski, Mariko Nakano Miyatake, and Hector Perez Meana Abstract text In this paper an image

More information

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark Global Journal of Computer Science and Technology Graphics & Vision Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.

More information

An Efficient Image Compression Using Bit Allocation based on Psychovisual Threshold

An Efficient Image Compression Using Bit Allocation based on Psychovisual Threshold An Efficient Image Compression Using Bit Allocation based on Psychovisual Threshold Ferda Ernawan, Zuriani binti Mustaffa and Luhur Bayuaji Faculty of Computer Systems and Software Engineering, Universiti

More information

Part II Authentication Techniques

Part II Authentication Techniques Part II Authentication Techniques Authentication Codes Provides means for ensuring integrity of message Independent of secrecy - in fact sometimes secrecy may be undesirable! Techniques for Authentication

More information

Multiple Binary Images Watermarking in Spatial and Frequency Domains

Multiple Binary Images Watermarking in Spatial and Frequency Domains Multiple Binary Images Watermarking in Spatial and Frequency Domains K.Ganesan 1 and Tarun Kumar Guptha 2 1 Director, TIFAC-CORE in Automotive Infotronics and Senior Professor, School of Information Technology

More information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation , 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

More information

A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function

A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function Walid Alakk Electrical and Computer Engineering Department Khalifa University of Science, technology and Research

More information

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor

More information

Image Inpainting Using Sparsity of the Transform Domain

Image Inpainting Using Sparsity of the Transform Domain Image Inpainting Using Sparsity of the Transform Domain H. Hosseini*, N.B. Marvasti, Student Member, IEEE, F. Marvasti, Senior Member, IEEE Advanced Communication Research Institute (ACRI) Department of

More information

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT- Shaveta 1, Daljit Kaur 2 1 PG Scholar, 2 Assistant Professor, Dept of IT, Chandigarh Engineering College, Landran, Mohali,

More information

REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION.

REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION. REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION Ling-ling WAN 1,Fan CHEN 1, Hong-jie HE 1,Lei ZHANG 2 1 the School of Information Science and Technology, Southwest

More information

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing Arash Ashtari Nakhaie, Shahriar Baradaran Shokouhi Iran University of Science

More information

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting

More information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM 74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small

More information

Watermarking of Image Using Priority Based On Algorithms

Watermarking of Image Using Priority Based On Algorithms This work by IJARBEST is licensed under Creative Commons Attribution 4.0 International License. Available at https://www.ijarbest.com Watermarking of Image Using Priority Based On Algorithms B.Aarthi,

More information