A Semi-Fragile Watermarking Scheme for Color Image Authentication

Similar documents
A Fragile Watermarking Scheme for Color Image Authentication

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Image Authentication and Recovery Scheme Based on Watermarking Technique

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

Robust Image Watermarking based on DCT-DWT- SVD Method

A Survey of Fragile Watermarking-based Image Authentication Techniques

Digital Image Steganography Techniques: Case Study. Karnataka, India.

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

FRAGILE WATERMARKING USING SUBBAND CODING

Image Error Concealment Based on Watermarking

A New DCT based Color Video Watermarking using Luminance Component

CHAPTER-5 WATERMARKING OF COLOR IMAGES

A New Approach to Compressed Image Steganography Using Wavelet Transform

A Reversible Data Hiding Scheme for BTC- Compressed Images

Combined Hashing/Watermarking Method for Image Authentication

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

An Efficient Self-Embedding Watermarking Scheme for Colour Image Tamper Detection and Recovery

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras

A Flexible Scheme of Self Recovery for Digital Image Protection

arxiv: v1 [cs.cr] 31 Dec 2018

Implementation of ContourLet Transform For Copyright Protection of Color Images

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

Towards a Telltale Watermarking Technique for Tamper-Proofing

A New Spatial q-log Domain for Image Watermarking

Data Hiding in Video

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Moment-preserving Based Watermarking for Color Image Authentication and Recovery

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

A reversible data hiding based on adaptive prediction technique and histogram shifting

A Digital Video Watermarking Algorithm Based on LSB and DCT

A NOVEL SECURE, IMPERCEPTIBLE AND ROBUST CDMA DIGITAL IMAGE WATERMARKING IN JPEG-YCBCR CHANNEL USING DWT2

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

Improved Qualitative Color Image Steganography Based on DWT

Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Digital Image Steganography Using Bit Flipping

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Digital Image Watermarking Scheme Based on LWT and DCT

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Invisible Watermarking Using Eludician Distance and DWT Technique

A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform

Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm

A new robust watermarking scheme based on PDE decomposition *

Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function

DCT-Based Image Feature Extraction and Its Application in Image Self-Recovery and Image Watermarking

Watermarking Moble Phone Color Images With Error Correction Codes

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

CHAPTER-4 WATERMARKING OF GRAY IMAGES

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Image and Video Watermarking

LETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

Implementation and Comparison of Watermarking Algorithms using DWT

Reversible Data Hiding VIA Optimal Code for Image

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

Chaotic-Correlation Based Watermarking Scheme for Still Images

DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A New DCT Based Watermarking Method Using Luminance Component

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

FRACTAL IMAGE COMPRESSION OF GRAYSCALE AND RGB IMAGES USING DCT WITH QUADTREE DECOMPOSITION AND HUFFMAN CODING. Moheb R. Girgis and Mohammed M.

Deepa Kundur and Dimitrios Hatzinakos. 10 King's College Road. Department of Electrical and Computer Engineering. University of Toronto

Robust Lossless Data Hiding. Outline

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

A Robust Watermarking Scheme Based on Steerable Pyramid and Singular Value Decomposition

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata

Robust copyright protection scheme for digital images using the low-band characteristic

Compression of Stereo Images using a Huffman-Zip Scheme

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

Digital Watermarking with Copyright Authentication for Image Communication

Data hiding technique in JPEG compressed domain

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

Copyright Detection System for Videos Using TIRI-DCT Algorithm

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

A Grayscale Image Steganography Based upon Discrete Cosine Transformation

Fingerprint Image Compression

ROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT

Steganography: Hiding Data In Plain Sight. Ryan Gibson

Robustness Test of Discrete Cosine Transform Algorithm in Digital Image Watermarking on Android Platform

Reference Sharing Mechanism for Watermark Self-Embedding Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian, and Guorui Feng

Improvements on Image Authentication and Recovery Using Distributed Source Coding

Introduction ti to JPEG

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

A CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME

International Journal of Advance Research in Computer Science and Management Studies

An Invisible, Robust and Secure DWT-SVD Based Digital Image Watermarking Technique with Improved Noise Immunity

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

Transcription:

A Semi-Fragile Watermarking Scheme for Color Image Authentication M. Hamad Hassan and S.A.M. Gilani Abstract In this paper, a semi-fragile watermarking scheme is proposed for color image authentication. In this particular scheme, the color image is first transformed from RGB to YST color space, suitable for watermarking the color media. Each channel is divided into 4 4 non-overlapping blocks and its each 2 2 sub-block is selected. The embedding space is created by setting the two LSBs of selected sub-block to zero, which will hold the authentication and recovery information. For verification of work authentication and parity bits denoted by a & p are computed for each 2 2 subblock. For recovery, intensity mean of each 2 2 sub-block is computed and encoded upto six to eight bits depending upon the channel selection. The size of sub-block is important for correct localization and fast computation. For watermark distribution 2D- Torus Automorphism is implemented using a private key to have a secure mapping of blocks. The perceptibility of watermarked image is quite reasonable both subjectively and objectively. Our scheme is oblivious, correctly localizes the tampering and able to recovery the original work with probability of near one. Keywords Image Authentication, YST Color Space, Intensity Mean, LSBs, PSNR. I I. INTRODUCTION N past decade, there has been exponential growth in the use of digital multimedia contents. The wideband networks made the exchange of multimedia contents, easy and fast. On the other hand, the availability of powerful image processing tools made it easy for user to do even imperceptible changes in the original work. As a result image authenticity becomes greatly threatened. Generally image authentication verifies the integrity of a digital image. Several questions may be asked about the authenticity of a work, e.g. has the work been altered in any way whatsoever, has the work been significantly altered, what parts of work have been altered, can an altered work be recovered. Although other techniques for answering these questions exist, Digital Watermarking Techniques may be useful because they do not require auxiliary data and they undergo the same transformations as the cover work. Manuscript received on April 30, 2006. This work was supported in part by the HEC, Pakistan under faculty development program. M. Hamad Hassan is graduate student of Faculty of Computer Science and Engineering at GIK Institute, Pakistan (email: hamad_gikian@yahoo.com). Dr. Asif Gilani is the Dean of Faculty of Computer Science and Engineering at GIK Institute, Pakistan (email: asif@giki.edu.pk). LSB: Least Significant Bits, PSNR: Peak Signal to Noise Ratio Depending on the application, digital watermarking techniques can be classified into two main categories; Robust and Fragile Watermarking Techniques. The former is mainly used for copy right protection and fingerprinting applications, in which the goal of watermark is to sustain under all kinds of attacks that intend to remove the watermark while preserving the perceptual quality of the original media. The latter is used for data authentication and is sensitive to any kind of processing that may occur. A fragile watermark is very sensitive and is designed to detect every possible change in a marked image, but in most multimedia applications, minor data modifications are acceptable as long as the content is authentic. A semi-fragile watermark is robust to acceptable content preserving manipulations such as lossy compression while fragile to malicious distortions such as content modification. In this paper, we propose a semi-fragile watermarking scheme for color image authentication. The given color image is first transformed from RGB to YST color space. This new color space is exclusively designed by Francesco et al. [3] for watermarking based applications. Details of this color space are discussed in Section III of this paper. The Y channel corresponds to the luminance component while S & T channels correspond to the chrominance component of color image. Since YS T therefore T channel is selected for embedding the authentication bits apart from the recovery bits, whereas, YS channels hold, only the recovery information. Each channel is divided into 4 4 non-overlapping blocks and its each 2 2 sub-block is selected. The embedding space for watermark is created by setting the LSBs of selected sub-block to zero. The LSBs plane is required to hold the corresponding blocks authentication and recovery information. For recovery, the intensity mean of each 2 2 sub-block is computed and encoded upto six bits in case of T channel and upto eight bits in case of YS channels. The authentication and parity bits i.e. a & p are computed for each sub-block using equation (3) and (4) as discussed in Section III of this paper. The size of sub-block is important for correct localization and fast computation. The corresponding block that will hold the source block information is determined by implementing 2D- Torus Automorphism presented by G. Voyatzis et al. [4], using a private key to have secure mapping of blocks by using equation (2). The perceptibility of watermarked image is quite high as the PSNR value for all the tested images is greater than 38 db. Our scheme is oblivious, correctly localizes the tampering with full recovery of the original work. The rest of the paper is organized as: Section II briefly states the related work, Section III explains about the 2405

necessary background. Section IV explains the proposed scheme, Section V demonstrates the simulation results, and Section VI derives the concluding remarks. II. RELATED WORK The earliest scheme for image authentication was proposed by Walton [5] that uses a key dependent pseudo-random walk on the image. The check-sum is obtained by summing the numbers determined by the seven most significant bits (MSBs) and taking a remainder operation with a large integer N. The computed check-sum is then inserted in a binary form in the LSBs of the selected pixels. The method is very fast and on average modifies only half of the pixels by one gray level. The check-sum approach provides a very high probability of tamper detection, but cannot distinguish between an innocent adjustment of brightness and replacing a person s face. Van Schyndel et al. [6] modify the LSBs of the pixels by adding extended m-sequences to rows of pixels. The sequences are generated with a linear feedback shift register. For an NxN image, a sequence of length N is randomly shifted and added to the image rows. The phase of the sequence carries the watermark information. A simple cross-correlation is used to test for the presence of the watermark. Wolfgang and Delp [7] extended van Schyndel s work and improved the localization properties and robustness. Fridrich [8]-[10] proposed schemes where in which image is divided into 8x8 blocks and each block is DCT (Discrete Cosine Transform) transformed. Specified number of the lowest frequency DCT coefficients are quantized using a given quantization table Q that corresponds to the 50% of JPEG quality. The encoded bits were then embedded into LSBs for authentication & recovery. Detailed survey on authentication schemes proposed by research community can be found in Liu, Z.D Que et al; in [11]. Phen et al [1] & Jagdish et al [2] proposes hierarchical based scheme in which intensity mean of blocks are embedded into randomly chosen block LSBs for authentication and recovery but for gray scale image authentication. In this paper we are presenting scheme for color image authentication using state of the art color space i.e. YST presented by Francesco et al. [3] and exclusively designed for watermarking based applications. In RGB color space, channels are highly correlated but in YST color space they are orthogonal to each other. Given color image is first transformed from RGB to YST color space using set of linear transformation matrix given by equation (1). Geometrically YS T therefore T channel is selected to hold authentication information apart from recovery information. Rest of channels is deployed to hold only the recovery information. Each channel is divided into 4 4 nonoverlapping blocks and its 2 2 sub-block is selected to set the two LSBs to zero. The LSBs plane is required to hold the corresponding block s authentication & recovery information. For recovery, the intensity mean of each 2 2 sub-block is computed and encoded upto six bits in case of T channel and upto eight bits in case of YS channels. The authentication and parity bits i.e. a & p are computed for each 4 4 block s sub-block using equation (3) and (4) respectively as discussed in Section III of this paper. The size of sub-block is important for correct localization and fast computation. The target block that will hold the source block information is determined by implementing the 2D-Torus Automorphism presented by G. Voyatzis et al. [4], using private key to have secure mapping of blocks by using the equation (2). The perceptibility of watermarked image is quite high as the PSNR value for all the tested images is greater than 38 db. Our scheme is oblivious, correctly localizes the tampering in a work with full recovery of the original work. III. BACKGROUND KNOWLEDGE YST Color Space: The selection of color space is very important step in watermarking based applications. In this regard we considered YST color space, exclusively designed and recommended by Francesco et al. [3]. A color space is notation by which we specify colors i.e. human perception of the visible electromagnetic spectrum. The RGB color space is good for image display but is not the best choice when analyzing images using the computer. The main disadvantage of the RGB color space is high correlation between its components. The value of crosscorrelation between the B and R channel is numerically about 0.78, 0.98 between the R and G channel and 0.94 between the G and B channels respectively. Because of this high correlation between channels, the RGB domain is not suitable for image processing techniques, especially for watermarking the color media. The potential of these three channels can be exploited for the applications of watermarking, by decreasing the correlation among them. Other colors spaces too exist which posses this feature of separating the luminance component from the chrominance component, such color spaces includes YCbCr, YUV etc. where Y corresponds to the brightness portion of an image while Cr, Cb and U, V corresponds to the chrominance (color) components of the color image. In case of YST color space, Y corresponds to the brightness component as before while S and T channels correspond to the chrominance component of the color image. The new color space satisfies all the principal conditions that are: i) The brightness must be the same to that of other two color spaces i.e. YUV and YCbCr. ii) iii) One component i.e. S must be ad hoc created to match the vector corresponding to the skin color. The transformation should be reversible. The two components Y and S form an angle of 52 because they were generated without imposing any orthogonal criterion. The T component is identified by the Gram-Schmidt procedure in order to have a component that is orthogonal to the plane containing Y and S component, henceys T. Thus we have set of linear transformation matrix to convert color image from RGB to YST color space given by equation (1). 2406

Y S T = 0.299 0.587 0.114 0.147 0.289 0.436. 0.615 0.515 0.100 R G B (1) 3. Select the T channel and calculate the authentication and parity bits; a and p bits as follows: Calculating Authentication bit The diagrammatic representation of YST color space is given by: 1, if sb_mean > B_mean a = (3) 0, otherwise Where: B: intensity mean of 4 4 block sb: intensity mean of 2 2 sub-block Calculating Parity bit Fig. 1 YST Color Space Representation 2D-Torus Automorphism: 2D-Torus Automorphism can be considered as a permutation function or spatial transformation of a plane region. This transformation can be performed using the 2 2 matrix A with constant elements. A point ( x, y ) can be transformed to new point ( x, y ) using equation (2). x 1 1 x =. modn y k k + 1 y [ [ ] Where ( x, y), ( x, y ) 0, N 1] x 0, N 1, N, the number of blocks in each dimensions, and k [0, N 1] is a private key. For in depth understanding of how 2D - Torus Automorphism works, reader is recommended to follow paper presented by G. Voyatzis et al. [4]. IV. PROPOSED SHCEME Pre-Processing of Image: Let C be the color image in RGB color space with size MxN. This color image is first transformed from RGB to YST color space using equation (1). Watermark Generation 1. Select each channel and divide it into non-overlapping 4 4 blocks and set the two LSBs of its each 2 2 subblock to zero. 2. Compute the intensity mean of each 2 2 sub-block and encode it upto six binary bits in case of T channel but encode it upto eight binary bits for YS channels. (2) 1, if # of 1 s is odd, in six bit code of sb_mean p = (4) 0, otherwise Watermark Embedding 1. Select the T channel of image M, divide it into nonoverlapping 4 4 blocks & perform a secure mapping of blocks using equation (2) with a private key. 2. Embed the watermark into each mapped 4 4 block s, 2 2 sub-block two LSBs of T channel as: LSB#2 LSB#1 Pixel 1 Pixel 2 Pixel 3 Pixel 4 Fig. 2 T Channel s 2x2 sub-block LSBs Embedding 3. Embed the watermark in each mapped 4 4 block s, 2 2 sub-block two LSBs of YS channels as: Pixel 1 Pixel 2 Pixel 3 Pixel 4 LSB#2 i1 i3 i5 i7 Fig. 3 YS Channel s 2x2 sub-block LSBs Embedding LSB#1 i4 i6 i8 4. Once the embedding process is done, concatenate all the channels and transform the image from YST domain to RGB by taking inverse transform of equation (1) to have the watermarked image. Watermark Extraction & Tamper Detection 1. Let W be the watermarked image in RGB color space with size MxN. This color image is first transformed from RGB to YST color space using equation (1). 2. Select T channel, divide it into non-overlapping 4 4 blocks and select its 2 2 sub-blocks to extract the a p i3 i5 i4 i6 2407

authentication and parity bits from the designated LSBs as demonstrated in Fig. 2. Test I: Feather Cropping 3. After extraction of desired bits from T channel, set the two LSBs to zero. 4. Compute the intensity mean of each 2 2 sub-block and encode it upto six binary bits. 5. Calculate the authentication and parity bits; a & p bits using equation (3) & (4) respectively. 6. Compare the extracted & generated a & p bits; if they are found same, the tested image is authentic otherwise tampered. (a) Original Image (b) Watermarked Image 7. In case of forged image, identify those blocks that are tampered by setting their pixels value to zero. Recovery of Tampered Work 1. In case of T channel, simply assign the earlier computed intensity mean in previous phase to the tampered block each pixel. 2. In case of YS channels, divide each channel into 4 4 nonoverlapping blocks and identify the corresponding source block for the tampered block using equation (2) with the same private key as used in embedding phase. 3. Extract the recovery bits from each corresponding 2 2 sub-block LSBs, for each 4 4 block, as demonstrated in Fig. 3 and assign it to each pixel of the tampered block. V. RESULTS The simulations were conducted on Intel machine with 2.4 GHz processor and 512 MB of RAM. MATLAB 7.0 & Photoshop 7.0 was used for implementation of proposed scheme and image processing operations respectively. PSNR Measurement: One commonly used measure to evaluate the imperceptibility of the watermarked image is the peak signal to noise ratio (PSNR) which is given by equation (5). PSNR = 10.log 10 255 MSE ( db) (5) (c) Tampered Image (d) Tampering Detection IMAGE SPECIFICATIONS TEST IMAGE:LENA FORMAT: TIFF DIMENSION : 200x200 TAMPERED REGION: LIPS (e) Recovered Image Fig. 4 Simulation Results: Feather Cropping In Fig. 4, caption (a), (b), (c), (d) and (e) shows the original image, watermarked image, tampered image, detected image and recovered image respectively Test II: JPEG Compression (a) Original Image (b) Watermarked Image TABLE I QUALITY MATRIX (PSNR) Image Format Size PSNR (db) Lena tiff 200x200 44.36 Watch tiff 200x200 44.34 F16 tiff 200x200 44.89 Baboon tiff 200x200 44.13 Opera tiff 256x256 44.17 Waterfall tiff 256x256 44.12 (c) JPEG Compression (50%) (d) Recovered Image Fig. 5 Simulation Results: JPEG Compression In Fig.5, caption (a), (b), (c) and (d) shows the original image, watermarked image, JPEG Compressed image and recovered image respectively 2408

VI. CONCLUDING REMARKS In this paper, we proposed a semi-fragile watermarking scheme for color image authentication. The given color image is first transformed from RGB to YST color space suitable for watermarking based applications. The Y channel corresponds to the luminance component while S, T corresponds to chrominance components of color image. AsYS T, therefore T channel is selected for embedding the authentication bits apart from recovery bits, whereas, YS channels hold, only the recovery information. Each channel is divided into 4 4 non-overlapping blocks and its 2 2 subblock is selected. The LSBs plane is created by setting the value of selected LSBs to zero. The LSBs plane is required to hold the corresponding blocks authentication and recovery information. Authentication and parity bits i.e. a and p are computed for each sub-block. For recovery, the intensity mean of each 2 2 sub-block is computed and encoded upto six bits in case of T channel and upto eight bits in case of YS channels. The size of sub-block is important for correct localization and fast computation. The target block that will hold the source block information is determined by implementing 2D-Torus Automorphism, using a private key to have secure mapping of blocks. The perceptibility of watermarked image is quite high as the PSNR value for all the tested images is greater than 38 db. Our scheme is oblivious, correctly localizes the tampering with full recovery of the original work. In future we will investigate the proposed scheme for VQ counterfeit attacks and other illegitimate attacks to check the degree of survival of this scheme. REFERENCES [1] Phen Lan Lin, Chung-Kai Hsieh, Po-Whei Huang, Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery, Journal of Pattern Recognition, Elsevier, 2005. [2] Jagdish C. Patra, Kah K. Ang and Ee-Luang Ang, Hierarchical Multiple Image Watermarking for Image Authentication and Ownership Verification, ICIP, 2004. [3] Francesco Benedetto, Gaetano Giunta, Alessandro Neri, A New Color Space Domain for Digital Watermarking in Multimedia Applications, ICIP, 2005. [4] G. Voyatzis, I. Pitas, Applications of Toral Automorphism in Image Watermarking, ICIP, Vol II, 1996, pp.237-240, 1996. [5] S. Walton, Image Authentication for a Slippery New Age, Dr. Dobb s Journal of Software Tools for Professional Programmers, Vol. 20, Apr. 1995. [6] R. G. van Schyndel, A. Z. Tirkel, and C. F Osborne, A Digital Watermark, Proc. of the IEEE Int. Conf. on Image Processing, vol. 2, pp. 86 90, Austin, Texas,1994. [7] R. B. Wolfgang and E. J. Delp, A Watermark for Digital Images, Proc. IEEE Int. Conf. on Image Processing, vol. 3, pp. 219 222, 1996. [8] J. Fridrich, Image Watermarking for Tamper Detection, Proc. ICIP 98, Chicago, Oct 1998. [9] J.Fridrich and M.Goljan, Protection of Digital Images using Self Embedding, symposium on Content Security and Data Hiding in Digital Media, Newark, NJ, USA, May 1999. [10] J. Fridrich, Methods for Tamper Detection in Digital Images, Multimedia and Security Workshop at ACM Multimedia, Orlando, Florida, USA, Oct, 1999. [11] T. Liu and Z.D. Qiu, The Survey of Digital Watermarking based Image Authentication Techniques, 6 th International Conference, pp. 1566-1559, 2002. M. Hamad Hassan did his BS(CS) and MIT from Peshawar and Iqra University respectively. At present, he is HEC Scholar at Faculty of Computer Science and Engineering, Ghulam Ishaq Khan Institute of Engineering Sciences and Technology, Pakistan for his MS in Computer System Engineering. He is also faculty member at the Institute of Information Technology, Kohat University of Science and Technology, Pakistan. His research interests include Digital Image Watermarking and Cryptography for Information Security. Dr. Asif Gilani did his M.Sc from Islamia University Pakistan and Ph.D in Copyright Protection from University of Patras, Greece. He is Dean of Faculty of Computer Science and Engineering at Ghulam Ishaq Khan Institute of Engineering Sciences and Technology, Pakistan. His research interests include Digital Image Watermarking, Steganography and Image Authentication. He has published number of research papers internationally. At present he is supervising many MS/Ph.D students at GIK Institute. He is also at the list of HEC and PCST approved Ph.D supervisors. 2409