Region of Interest Fragile Watermarking for Image Authentication

Similar documents
DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )

A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Feature Based Watermarking Algorithm by Adopting Arnold Transform

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

FRAGILE WATERMARKING USING SUBBAND CODING

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE AUTHENTICATION AND TAMPER-PROOFING

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Quality Estimation of Video Transmitted over an Additive WGN Channel based on Digital Watermarking and Wavelet Transform

Towards a Telltale Watermarking Technique for Tamper-Proofing

Digital Watermarking of Still Images using the Discrete Wavelet Transform

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

Improved Qualitative Color Image Steganography Based on DWT

A Watermarking Algorithm Based on HT- DWT-TGF for Security Applications

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

On domain selection for additive, blind image watermarking

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Watermarking Moble Phone Color Images With Error Correction Codes

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY

Robust copyright protection scheme for digital images using the low-band characteristic

A Wavelet-Based Watermarking for Still Images

Data Hiding in Video

2D barcodes as watermarks in image authentication

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust biometric image watermarking for fingerprint and face template protection

Moment-preserving Based Watermarking for Color Image Authentication and Recovery

Implementation of ContourLet Transform For Copyright Protection of Color Images

Reversible Authentication Watermark for Image

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

An Improvement Technique based on Structural Similarity Thresholding for Digital Watermarking

Speech Modulation for Image Watermarking

Implementation and Comparison of Watermarking Algorithms using DWT

VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION

An Improved Blind Watermarking Scheme in Wavelet Domain

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

A Digital Watermarking Approach Based on DCT Domain Combining QR Code and Chaotic Theory

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Robust Steganography Using Texture Synthesis

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

DWT-SVD based Multiple Watermarking Techniques

ROBUSTNESS TESTING OF SOME WATERMARKING METHODS USING IDCT-II G. Petrosyan 1, H. Sarukhanyan 1, S.Agaian 2, J. Astola 3

A New Spatial q-log Domain for Image Watermarking

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

Audio Watermarking using Empirical Mode Decomposition

An Efficient Self-Embedding Watermarking Scheme for Colour Image Tamper Detection and Recovery

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

A new robust watermarking scheme based on PDE decomposition *

Image Error Concealment Based on Watermarking

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA

Deepa Kundur and Dimitrios Hatzinakos. 10 King's College Road. Department of Electrical and Computer Engineering. University of Toronto

Image Authentication and Recovery Scheme Based on Watermarking Technique

Tracing Watermarking for Multimedia Communication Quality Assessment

Digital Image Watermarking Scheme Based on LWT and DCT

signal-to-noise ratio (PSNR), 2

Robust Image Watermarking using DCT & Wavelet Packet Denoising

Digital Image Watermarking Using DWT Based DCT Technique

An Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Comparison of wavelet based watermarking techniques Using SVD

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing

A New Approach to Compressed Image Steganography Using Wavelet Transform

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

A blind Wavelet-Based Digital Watermarking for Video

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Wavelet Based Image Compression Using ROI SPIHT Coding

A Robust Image Hiding Method Using Wavelet Technique *

A New DCT based Color Video Watermarking using Luminance Component

QR Code Watermarking Algorithm based on Wavelet Transform

Chaotic-Correlation Based Watermarking Scheme for Still Images

Implementation of H.264/AVC Video Authentication System Using Watermark

An Adaptive Content Based Localized Watermarking Algorithm for Remote Sensing Image

Combined Hashing/Watermarking Method for Image Authentication

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

Adaptive Quantization for Video Compression in Frequency Domain

A DUAL WATERMARKING USING DWT, DCT, SVED AND IMAGE FUSION

QR Code Watermarking Algorithm Based on DWT and Counterlet Transform for Authentication

Evaluating the Visual Quality of Watermarked Images

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Transcription:

Region of Interest Fragile Watermaring for Image Authentication Yiping Chu, Yin Zhang, Sanyuan Zhang and Xiuzi Ye College of Computer Science, State Key Lab of CAD&CG, Zhejiang University, 310027 Hangzhou, PR China hzcyp@yahoo.com.cn Abstract Digital watermaring plays an important role in verification and copyright protection. A watermaring scheme for authenticating ROI (region of interest) of has been proposed in the paper. To embed the watermar in the interior of ROI, Poisson matting technique is introduced to extract the region of interest of. The color foreground obtained by Poisson matting is converted to the binary as reference mas. According to principles of wavelet, we construct watermar embedding function and accurately embed watermar in the interior of ROI. Exploiting watermar extraction function, we extract the watermar from watermared. Differentiating the values between embedding watermar and extracted watermar can detect whether ROI of was tampered, and where was tampered. Experiment results have demonstrated that the presented watermaring scheme can detect tamper in the interior of ROI for authentication. 1. Introduction Digital watermaring [1] plays an important role in verification and copyright protection. Many different watermaring schemes have already been proposed that can be divided in two general categories: those, which are robust watermaring [2], are robust for processing operations and malicious attacs, and the others, are fragile watermaring schemes [3,4,5,6,7,8], which are very fragile to tamper. For having a better understanding of what has already been proposed, we can also review more extensive surveys published [9, 10]. The watermaring schemes as mentioned above have not reported to be able to watermar for local authentication and copyright protection. In some applications, we may need local watermaring scheme, such as copyright owner may permit unimportant region of the tampered by others. In this paper, we present a new scheme for embedding watermar, which allows copyright owner to select a region of, called region of interest (ROI), to embed watermar. Editing in the exterior of the ROI of watermared will not give rise to watermaring alarm. We organize the rest of this paper as follows: in next section we will review the previous wor of fragile watermaring scheme and approaches to extract foreground for s. In section 3, we use Poisson matting and binary morphology filtering to produce the binary reference mas for watermar embedding and watermar extraction function. Our watermaring schemes, including watermar embedding scheme, watermar extraction and tamper detection scheme, will be given then. Section 4 discusses how to choose parameters and shows the experiment results. We attac the watermared s by tamper in the interior of the ROI and tamper in the exterior of the ROI respectively. JPEG compression tolerance of the scheme is also tested in our experiment. Finally in section 5, we give our conclusion. 2. Related wor 2.1. Fragile watermaring Schemes Fragile watermaring schemes have been proposed to authenticate the integrity of s. Techniques that embed hidden information in the spatial domain are more straightforward than the ones using transforms method [7, 11]. However, the schemes using transform domain offer a higher degree of robustness [12]. Nowadays, Many Fragile watermaring schemes are based wavelet transform since it allows the highest degree of robustness to simple processing operations [13]. Kundur et al. [14] present a fragile watermaring technique which embeds a watermar in the discrete wavelet domain by quantizing the corresponding Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS06)

coefficients. Their approach allows tamper detection in localized spatial and frequency regions, therefore, maing possible the identification of specific modified frequencies in an. They define a Tampering Assessment Function as a measurement for tamper proofing. In [11], the authors propose a novel technique for content authentication of digital s by the use of wavelet pacets. It is able to detect and localize malicious alterations while offering a certain degree of robustness to compression. These semi-fragile watermaring system also adopts the human visual system for enhance invisibility of watermared. Wu et al. [15] present a secure semi-fragile watermaring for authentication, which is based on integer wavelet transform, they also use the technique presented by Liu et al. [2] to embed the watermar in the spatial domain of the original. Ding et al. [3] propose a semi-fragile watermaring scheme, which is a wavelet-based chaotic semi-fragile watermaring scheme with more JPEG compression tolerance. Fig.1 shows the diagram of watermar embedding scheme and diagram of watermar extraction and tamper detection scheme, which denote embedding watermar in the interior of ROI and detecting malicious temper inside ROI, respectively. We adopt technique of Poisson matting [18] to obtain ROI as foreground of original, and then generate the binary reference mas. The approach that produces the binary reference mas will be described in following subsection. To get diagonal detail coefficient LL of original, we mae use of 2D discrete wavelet decomposition. Since the LL sub-band is the coarse resolution corresponding to original with its 1/4 size [21], we obtain the binary reference mas with respect to LL by resizing it with 1/4 times the size of original. We use K as random seed to yield binary pseudo random sequence W, and embed W in sub-band LL of original according the binary reference mas. 2.2. Foreground extraction original ROI selection for egr ound extraction reference mas BM The GVF snae [16, 17] was used to retrieve the contour of foreground because it has two significant advantages over the traditional snae formulation. First, the GVF snae can fit into concavities, and second, the GVF snae can fit itself to objects exploiting both expansion and contraction of the snae. But GVF snae fails to retrieve the contour of foreground when bacground of is very complex. Sun et al. [18] present a matting approach to obtain foreground from complex bacground by solving Poisson PDE equations. Boundary condition is important for Poisson matting to extract foreground, user need carefully specify the exterior boundary and the interior boundary, which are related to bacground and foreground, respectively. In [19], authors present the system GrabCut to extract foreground for s, which is an iterative segmentation technique based upon the Graph Cut algorithm [20]. Compared with Poisson matting, selection of foreground for CrabCut is simple. While bacground is complex, Poisson matting and GrabCut have their respective advantages over each other. In the paper, we adopt Poisson matting to extract foreground. 3. Proposed scheme K Wavelet transfrom original mare d K Wavelet transfrom LLK embed W in of LL of R OI watermar W ROI selection LLK of waterm ar W ( a) foreground extract ion () b reference mas BM extracted watermar W tamper detection W W mared Fig. 1. (a) Diagram of watermar embedding scheme (b) Diagram of watermar extraction and tamper detection scheme To detect the tamper inside ROI of watermared, retrieving the binary reference mas is necessary step. Using the same K as random seed to yield binary pseudo random sequence W is also needed. On the other hand, we can extract another watermar from watermared. The difference Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS06)

between two watermars illustrates the location of tamper in watermared. 3.1. Reference mas generation To determine whether the color pixels belong to interior of ROI of, we generate a binary reference mas corresponding to original. Binary reference mas is a binary the same size as original with 1s outside the ROI and 0s inside. In order to produce the binary reference mas, copyright owner adopt Poisson matting [18] to obtain the RIM which consists of the ROI of original as foreground and blue color (or other colors) bacground. By interactive means, copyright owner can extract suitable ROI RIM just as Fig.2 (a). Generating binary BI from RIM is relatively simple. Create a binary with 0s for all pixels, and set 1s to pixels when corresponding pixels in RIM are blue color. Fig.2 (b) is the binary BI constructed from the ROI RIM. Some noises blobs with small size inside ROI in Fig.2 (b) are removed after the morphology filtering. Therefore binary reference mas BI is yielded. Fig. 2. Reference mas generation for Lena (a) ROI obtain by using passion matting (b) Binary converted from (a) (c) Morphology filtering result of (b). To obtain another binary reference mas BM, which indicates the location of ROI in LL of wavelet domain, we resize the binary reference mas BI with 1/4 times the size of original. BM is a binary the same size as LL of original with 1s outside the ROI of LL and 0s inside. 3.2. Watermar embedding To ensure that only ROI of is embedded by watermar, we adopt the method described above to produce the binary reference mas BM. After obtain BM, We choose parameter K as random seed to generate pseudo-random sequence W over GF(2) with the same size as LL. We get watermar W by using logical operate between W and BM, such as, let W 0, if BM (, i j ) =1 else let W W. We adopt 2D discrete wavelet to decompose the original, and embed W in the coefficients of LL by using watermar embedding function. Finally, watermared is yielded by wavelet synthesis. Our watermar embedding function is similar to one presented by Kundur et al. [14]. Firstly, we define a quantization function for our watermar embedding function. Quantization function Q δ is given by. f 0 if is even h δ 2 Qδ = f 1 if is odd h δ 2 + where δ is the quantization magnitude, and. is floor function. Our watermar embedding function is defined as follows: gx ( ) ifqδ ( y) w f( y, w) = (1) y if Qδ ( y) = w where h x δ 2 if x > 0 + + gx ( ) = x R, δ, h h x + δ 2 if x 0 Watermar embedding procedure: Step1: Obtain diagonal detail coefficient LL by thlevel 2D discrete wavelet decomposition on the original, choose parameters K, where K is random seed to generate binary pseudo random sequence W Step2: Copyright owner select the ROI of original and adopt Poisson matting to extract foreground, then generate binary reference mas BI Step3: Compute BM according to BI, generate binary watermar W by using following method: if BM (, i j ) =1, then W 0 else W W Step4: Exploit watermar embedding function f( y, w ) to generate watermaring: Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS06)

for li (, j) LL, compute li (, j) gli ((, j), W) Step5: Use Inverse discrete wavelet transform on the mared wavelet coefficient LL and other wavelet coefficients to produce the watermared. After watermar embedding, copyright owner need preserve BM and K for watermar detection. 3.3. Watermar detection Before watermar detection, copyright owner use binary reference mas BM that was preserve in the step of watermar embedding and the same parameter K as random seed to retrieve binary watermar W. On the other hand, we can extract another watermar W by wavelet decomposition of watermared, and calculated by following formula Wr = Qδ ((, l i j)) l LL (2) Because W r include the watermar information in exterior of ROI, so we need eliminate it by following process: for Wr, if BM (, i j ) =1, then W 0, else W Wr. In this way, we get two watermars W and W, we define the tamper detection matrix T = W W (3) If W = W, then T = 0, it means that theres no tamper inside ROI of watermared. Otherwise, the 1s in the tamper detection matrix denote the pixels that were tampered. Notes that tamper detection matrix is the same size as the LL, which is about 1/4 of the original. Thus one element denotes a 1 1 corresponding 4 4 bloc in the ROI of original. Tamper detection procedure: Step1: Use K as random seed to generate binary watermarw Step2: Use BM and generate binary watermar W by following method: if BM (, i j ) =1, then W 0 else W W Step3: Use wavelet decomposition of watermared, and then calculate extracted watermar Wr (, i j ) by the formula Wr = Qδ ((, l i j)) l LL Step4: Calculate W by using following method: if BM (, i j ) =1, then W 0, else W Wr Step5: If W = W, then the tamper detection matrix T = 0, which means no tamper in ROI of watermared. Otherwise, the 1s in the tamper detection matrix denote the pixels that were tampered. 4. Experiments and results 256 256 s Lena and Airplane are adopted to chec the validity of our scheme. The binary watermar is pseudo random sequence generated by pseudo random generator. To generate high quality pseudo random number, we considered a generator implemented by means of an LFSR (Linear Feedbac Shift Register) in our experiments. For such a generator characterized by K degree primitive polynomial over GF(2) [22]. Fig. 3. Invisibility of the watermaring scheme (a) Original (b) Watermared. In our watermaring scheme, invisibility of watermar and values of detection matrix are restricted by each other. For exact measurement of the difference between W and W, which is respect to ROI in Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS06)

, we introduce the normalized cross-correlation [3] W W NC = 2 W ( i, j) where W W and W W are corresponding to the values of in interior of the ROI. The PSNR and NC of watermared are influence each other while h varying. In our experiments, we found that h =4 provide a good trade-off between invisibility and accuracy. Let parameters = 2, h = 4,δ =1, K =21, in our experiments. Fig.3 (a) and (b) are original and watermared respectively. It explains that our watermaring scheme has good invisibility for watermared when suitable parameters are specified. TABLE I ROBUSTNESS AGAINST JPEG COMPRESSION Lena(NC) 0.95 0.92 0.87 0.79 0.67 0.59 Airplane(NC) 0.94 0.87 0.83 0.77 0.68 0.61 JPEG 92% 83% 75% 67% 58% 50% Compression We attac by tamper in interior of ROI and in exterior of ROI for checing the validity of our scheme. In our experiment, the figure of Lena is ROI designated by us. In Fig.4 (a), the interior of ROI of watermared is tampered. A flower is added to the cap of Lena, and some words is added onto the airplane. As a result, the embedding watermar W is different to the extracted watermar W from watermared. By computing its tamper detection matrix T, the tamper locations in ROI of watermared are revealed in Fig. 4 (d). Fig. 4. (a) Tamper inside ROI (b) Embedding watermarw (c) Extracted watermarw (d) Tamper location inside ROI revealed byt In Fig.5 (a), watermared was tampered in the exterior of ROI, which is permitted by the copyright owner. A frame is added to outside figure of Lena, also some words is added to outside airplane. In this case, the embedding watermar W and the extracted watermar W are the same. Fig.5 (d) shows the of T = 0 that means ROI was not tampered. It will not give rise to watermaring alarm. Figure 5. (a) Tamper in the exterior of ROI (b) Embedding watermarw (c) Extracted watermar W (d) T =0, no alarm occurred Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS06)

5. Conclusion A secure watermaring for ROI of authentication based on foreground extraction has been presented. To mae sure that embedding watermar in the interior of ROI, we produce a binary reference mas according to extracted foreground for ROI of. Our watermaring embedding function and watermaring extraction function perform well for only authenticating ROI of. Experiment results have demonstrated that the proposed scheme is capable of detecting tamper in the interior of ROI and tolerating tamper exterior of ROI. Acnowledgment The authors would lie to than the support from the China NSF under Grant #60473106, #60273060 and #60333010, China Ministry of Education under Grant#20030335064, Education Office of Zhejiang Province under Grant #G20030433. References [1] I.Cox, L. Miller, A. Bloom, Digital Watermaring. Morgan Kaufmann Publishers, New Yor, 2002. [2] H.M. Liu, J.F. Liu, J.W. Huang, D.R. Huang, and Y.Q. Shi, A robust DWT-based blind data hiding algorithm, Proc. of IEEE on Circuits and Systems, (2), 2002, pp.672-675. [3] K. DING, C. HE, L.G. JIANG, and H.X. WANG, Wavelet-Based Semi-Fragile Watermaring with Tamper Detection, IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences, E88- A(3), 2005,pp.787-790. [4] H. Yuan, and X.P. Zhang A multi-scale fragile watermaring based on the Gaussian mixture model in the wavelet area, Proc. 2004 Int. Conf. on Acoustics, Speech and Signal Processing, 3, 2004,pp.413 416. [5] A.Z. Tirel, C.F. Osborne, and S.R.G. van, Image watermaring - a spread spectrum technique, in IEEE 4th International Symposium on Spread Spectrum Techniques and Applications, II, 1996,pp.785 789. [6] M.M. Yeung, and F. Mintzer, An invisible watermaring techniques for verification, in IEEE International Conference on Image Processing (ICIP 1997), II, 1997,pp.680 683. [7] F. Bartollini, A. Tefas, M. Barni, and I. Pitas, Image authentication techniques for surveillance applications, Proceedings of the IEEE, 89(10), 2001, pp. 1403 1418. [8] M.P. Queluz, and P. Lamy, Spatial watermar for verification, in SPIE Conference on Security and Watermaring of Multimedia Contents, II(3971) 2000,pp.120 130. [9] C.I. Podilchu, and E.J. Delp, Digital watermaring:algorithms and applications, IEEE Signal Processing Magazine, 18(4), 2001,pp.33 46. [10] M. Barni, C.I. Podilchu, F. Bartolini,, E.J. and Delp, Watermar embedding: Hiding a signal within a cover, Special Issue of IEEE Communication Magazine on Digital Watermaring for Copyright Protection: A Communication Perspective, 39(8), 2001, pp.102 108. [11] H.P. Alexandre, K.W. Rabab, Wavelet-based digital watermaring for, IEEE Canadian Conference on Electrical and Computer Engineering, vol. I, 2002, pp. 879-884. [12] I. Cox, J. Killian, T. Leighton, and T. Shamoon, Secure spread spectrum watermaring for s, audio, and video, in IEEE International Conference on Image Processing (ICIP 96). IEEE, III, 1996, pp. 243-246. [13] I. Daubechies. Ten Lectures on Wavelets, SIAM,Philadelphia, Notes from the 1990 CBMSNSF Conference on Wavelets and Applications at Lowell, MA, 1992. [14] D. Kundur, and Hatzinaos, Digital watermaring for telltale tamper proofing and authentication, Proceedings of the IEEE, 87(7), 1999, pp.1167 1180. [15] X.Y. Wu, J.Q. Hu, Z.X. Gu, J.W. Huang, A Secure Semi-Fragile Watermaring for Image Authentication Based on Integer Wavelet Transform with Parameters Abstract, ACSW Frontiers, 2005, pp.75-80. [16] C. Xu, and J.L. Prince, Gradient Vector Flow: A New External Force for Snaes, Proc. IEEE Conf. on Comp. Vis. Patt. Recog.(CVPR), Los Alamitos: Comp. Soc. Press, 1997, pp. 66-71. [17] C. Xu, and J.L. Prince, Snaes, Shapes, and Gradient Vector Flow, IEEE Transactions on Image Processing, 7(3), 1998, pp.359-369. [18] J. Sun, J. Jia, C. Tang, and H. Shum, Poisson Matting, In Proceeding of ACM SIGGRAPH 2004, 2004. [19] C. Rother, V.Kolmogorov, and A.Blac. grabcut : interactive foreground extraction using integrated graph cuts. ACM Trans.Graph, 23(3), 2004,pp.309-314. [20] Y. Boyov, M.P. Jolly, Interactive graph cuts for optimal boundary and region segmentation of objects in n-d s, In ICCV, 2001, pp. 105 112. [21] J. S. Eric, D. Tony and H.S. David, Wavelets for computer graphics: A primer, Part 1, IEEE Computer Graphics and Applications, 15(3), 1995, pp. 76-84. [22] M. Mitrea, T. Zaharia, F. Preteux, Spread spectrum robust watermaring for NURBS surfaces, WSEAS Transactions on Communications, 3, 2004,pp.734 740 Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS06)