A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY

Similar documents
Image Authentication and Recovery Scheme Based on Watermarking Technique

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform

Combined Hashing/Watermarking Method for Image Authentication

An Improved Performance of Watermarking In DWT Domain Using SVD

Implementation of ContourLet Transform For Copyright Protection of Color Images

Data Hiding in Video

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Image Error Concealment Based on Watermarking

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

A Survey of Fragile Watermarking-based Image Authentication Techniques

Digital Watermarking with Copyright Authentication for Image Communication

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA

Robust Lossless Data Hiding. Outline

Robust Image Watermarking using DCT & Wavelet Packet Denoising

Implementation of H.264/AVC Video Authentication System Using Watermark

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

Digital Image Watermarking Using DWT Based DCT Technique

Improved Qualitative Color Image Steganography Based on DWT

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

A Crypto Signature Scheme for Image Authentication over Wireless Channel

Moment-preserving Based Watermarking for Color Image Authentication and Recovery

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION

Adaptive Quantization for Video Compression in Frequency Domain

Semi-fragile Watermarking for Video Content Authentication Based on Hybrid Feature

A Robust Image Watermarking Scheme using Image Moment Normalization

DWT Domain Information Hiding Approach Using Detail Sub-band Feature Adjustment

An Efficient Self-Embedding Watermarking Scheme for Colour Image Tamper Detection and Recovery

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

Primal Sketch Based Adaptive Perceptual JND Model for Digital Watermarking

IAJIT First. Online Publication. Semi Fragile Watermarking for Content based Image Authentication and Recovery in the DWT-DCT domains. 1.

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

A CRT BASED ROBUST IMAGE WATERMARKING USING DISCRETE TCHEBICHEF TRANSFORM

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images

APPLICATION OF CONTOURLET TRANSFORM AND MAXIMUM ENTROPY ON DIGITAL IMAGE WATERMARKING

A Flexible Scheme of Self Recovery for Digital Image Protection

An Invisible, Robust and Secure DWT-SVD Based Digital Image Watermarking Technique with Improved Noise Immunity

Digital Image Watermarking in Frequency Domain Using ECC and Dual Encryption Technique

FRAGILE WATERMARKING USING SUBBAND CODING

An SVD-based Fragile Watermarking Scheme With Grouped Blocks

A Watermarking Algorithm Based on HT- DWT-TGF for Security Applications

A SEMI-FRAGILE BLIND WATERMARKING SCHEME FOR COLOR IMAGES BASED ON VISUAL CRYPTOGRAPHY AND DISCRETE COSINE TRANSFORM

Comparison of DWT-CRT And TLDCT-CRT Methods In Digital Watermarking

Reversible Non-Blind Video Watermarking Based on Interlacing using 3-level DWT & Alpha Blending Technique

Video Watermarking Technique Based On Combined DCT and DWT Using PN Sequence Algorithm

Image Tamper Detection based on Edge Image and Chaotic Arnold Map

A new robust watermarking scheme based on PDE decomposition *

BLIND 3D MODEL WATERMARKING BASED ON MULTI-RESOLUTION REPRESENTATION AND FUZZY LOGIC

Hybrid DCT-CT Digital Image Adaptive Watermarking

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

Digital watermarking techniques for JPEG2000 scalable image coding

Image Authentication and Recovery Using BCH Error-Correcting Codes

Part II Authentication Techniques

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

3D DWT-DCT and Logistic MAP Based Robust Watermarking for Medical Volume Data

IntegerWaveletTransformbasedDualWatermarkingTechniqueusingTentMapandLocalBinaryPattern

CHAPTER-6 WATERMARKING OF JPEG IMAGES

Feature Based Watermarking Algorithm by Adopting Arnold Transform

A NOVEL SECURE, IMPERCEPTIBLE AND ROBUST CDMA DIGITAL IMAGE WATERMARKING IN JPEG-YCBCR CHANNEL USING DWT2

Digital Image Watermarking Scheme Based on LWT and DCT

Watermarking Moble Phone Color Images With Error Correction Codes

Performance Analysis of Discrete Wavelet Transform based Audio Watermarking on Indian Classical Songs

Implementation and Comparison of Watermarking Algorithms using DWT

A Robust Watermarking Algorithm For JPEG Images

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

Digital Watermarking of Still Images using the Discrete Wavelet Transform

CHAPTER-4 WATERMARKING OF GRAY IMAGES

A New Approach to Compressed Image Steganography Using Wavelet Transform

arxiv: v1 [cs.cr] 31 Dec 2018

A blind Wavelet-Based Digital Watermarking for Video

Implementation of Audio Watermarking Using Wavelet Families

VIDEO WATERMARKING ALGORITHM FOR CONTENT AUTHORISATION

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

Robust DWT Based Technique for Digital Watermarking

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

Perceptible Content Retrieval in DCT Domain and Semi-Fragile Watermarking Technique for Perceptible Content Authentication

Robust Blind Digital Watermarking in Contourlet Domain

Robust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique

Transcription:

Journal of Theoretical Applied nformation Technology 31 August 2012 Vol 42 No2 2005-2012 JATT & LLS All rights reserved SSN: 1992-8645 wwwjatitorg E-SSN: 1817-3195 A SEM-FRAGLE WATERMARNG SCHEME FOR MAGE TAMPER LOCALZATON AND RECOVERY 1 LNTAO LV, 2 HUA FAN, 3 JNFENG WANG, 4 YUXANG YANG 123 School of Computer Science Engineering, Xi an University of Technology, 710048, PR China 4 School of Mechanical nstrumental Engineering, Xi an University of Technology, 710048, PR China E-mail: 1 lvlintao@auteducn, 2 huafan0408@gmailcom, 3 wjf1986114@163com, 4 yyflyinger@gmailcom ABSTRACT A novel semi-fragile watermarking scheme for mage tamper localization recovery is proposed The Logistic map is used to encrypt the feature etracted from the original image the generated watermark is embedded into the middle-frequency DCT coefficients of each block after being ordered in zigzag manner based on invariance properties of DCT coefficients before after JPEG compressions As for authentication, firstly, the feature information is etracted after decryption, compared it with reconstructed feature information, the tamper matri is generated Finally, recover the invalid blocks by using bicubic interpolation Eperimental results illustrate that the watermarked image has good imperceptibility can tolerate the common content-preserving image processing t is also sensitive to malicious manipulations can localize recover tampered regions approimately eywords: mage authentication; Semi-fragile; Tamper localization; Recovery 1 NTRODUCTON Due to the wide spread rapid growth of image processing software, people can replicate digital images easily nowadays Thus, digital watermarking has been presented to protect the copyright integrity of image content n a watermarking system, there are two important properties: robustness imperceptibility Usually, a robust watermark is used to protect the copyright, while a fragile or semi-fragile watermark is used to verify the authenticity [1-2] Semi-fragile watermarking has properties of both fragile watermarking robust watermarking, which can authenticate the reliability of digital contents [3] Many semi-fragile watermarking schemes for image authentication have been proposed [4-7] The common model of a semi-fragile watermark authentication is that the authentication watermark is the features etracted from one given image then encrypted with sender's private key To verify the integrity of the transmitted images, the authentication procedure etracts watermark from the received image then decrypted by sender's public key Many watermarking-based authentication schemes only determine the integrity of the image contents locate the modification areas, but lack of the recovery function However, there are many applications not only require the detection location, but also require recovery tampered content approimately [8] 2 DGTAL WATERMARNG GENERATON AND EMBEDDNG ALGORTHM 21 Chaotic System n mathematics physics, Logistic map is the classical dynamic system which is researched widely in chaos theory The definition is the following: = k 1 µ k(1 + k), Where 0 µ 4 (1) Eperiments show that the system will be completely chaotic when µ (357, 4] (0,1) k That is to say, the generated sequence with two different initial values is irrelevant The sequence generated by Logistic map is simple sensitive to initial conditions The initial values of 0 µ will be used as a 1 22 Digital Watermark Generation Algorithm 287

Journal of Theoretical Applied nformation Technology 31 August 2012 Vol 42 No2 2005-2012 JATT & LLS All rights reserved SSN: 1992-8645 wwwjatitorg E-SSN: 1817-3195 The watermark is generated from the LL3 subb of three-level wavelet decomposition of the original image, which is the best description of the original image at low resolution Assume is the original gray-level host image, the number of gray levels is 256 The steps of watermark generation are described as follows Step1: Take three-level DWT on M M original image, obtain the LL3 subb image L, the size M M of L is 8 8 Step2: Set the three LSBs of each piel of the L to zero According the grey values of each piel, generate the watermarkw Step3: Watermark encryption The etraction of watermark is public; therefore encryption for watermark is necessary n this paper Logistic map just mentioned above is utilized to generate the pseudo rom sequence X Subsequently the output sequence X is converted to a binary mask sequence M, the length is the same as W Then XOR operation on watermark W mask sequence M is performed to obtain the encryption watermark sequence S, S = W M 23 Digital Watermark Embedding Algorithm The scheme is based on invariance properties of DCT coefficients before after JPEG compressions [9] Eperiments demonstrate that the invariant relationships between two coefficients in a block before after JPEG compression Therefore, we can use this property to embed watermark To find a tradeoff between perceptual invisibility the robustness of watermarking, after order the DCT coefficients in a zigzag manner, we embed the watermark into the middle frequency coefficients from 11 to 20 According to human visual system [10], the human eye is not sensitive to the change of rich teture edge, while sensitive to the change of smooth area Therefore, before the watermark embedded into image, scramble the original image is necessary to ensure the perceptual invisibility of watermarked image n this scheme, Arnold cat mapping is used to scramble the original image The steps of watermark embedding are described as follows Step1: Scramble the original image using 2, generate image 2 Step2: Divide the image 2 into 8 8 nonoverlapping blocks transforming each block using DCT Step3: Each DCT-transformed block is quantized using a quantization matri corresponding to a 50% quality JPEG Then the coefficients are ordered in a zigzag manner their values are encoded using a fied number of bits Step4: According to invariance properties of JPEG just mentioned above, embed the watermark sequence S into middle frequency coefficients from 11 to 20 The embed rules as follows Assume the total block number of 3 is n, M M n = 8 8 The total piel number of S is n Obtain the high five bit of each piel of S, denoted M M si (, i [1, ] as r, r [4,8] j [1, ], 8, 8 The middle frequency coefficients denoted as 11, 12,, 20 j ) f 8 = 1 11 < 16 11 16, so as to 11 > 16 s ( i, j ) 8 = 0 11 > 16 11 16, so as to 11 < 16 f 7 =1 12 < 17 12 17, so as to 12 > 17 s ( i, j ) 7 = 0 12 > 17 12 17, so as to 12 < 17 f 4 = 1 15 < 20 15 20, so as to 15 > 20 4 = 0 15 > 20 15 20, so as to 15 < 20 Step 5: Repeat Step 4, until all of the blocks are processed Step6: Divide the processed image into 8 8 blocks transforming each block using DCT, using 2 to inverse scramble the image, generate the watermarked image 288

Journal of Theoretical Applied nformation Technology 31 August 2012 Vol 42 No2 2005-2012 JATT & LLS All rights reserved SSN: 1992-8645 wwwjatitorg E-SSN: 1817-3195 3 DGTAL WATERMAR EXTRACTON AND AUTHENTCATON ALGORTHM 31 Digital Watermark Etraction Algorithm mage authentication restoration are based on the watermark etracted from watermarked image The steps of watermark etraction are described as follows Step1: Scramble the watermarked image using 2, generate image 2 Step2: Divide the image 2 into 8 8 blocks transforming each block using DCT Step3: Obtain the middle frequency coefficients from 11 to 20 of each block after dct coefficients are ordered in a zigzag manner Step4: n each block, the watermark bit etracted as follows: 1, w8 = 0, if if 11 11 > < 16 16, 1, if w7 = 0, if 12 12 w i > < 17 17 is, (2) After all the watermark bits are etracted, the watermark W 1 is obtained 32 Digital Watermark Authentication Algorithm Step1: Based on 1, the mask sequence M is obtained by Logistic map Then the watermark Wb is computed as: Wb = W1 M (3) Step2: Based on LL3 subb image of the watermarked image, the etracted watermark Wf is obtained The process is similar to that of watermark generation Step3: mage authentication Define the tamper matri Wt as follows: Wt = Wb Wf (4) After malicious attacks, most watermark error piels in Wt would cluster in the attacked regions, while after content preserving attacks,most watermark error points would be spread across Wt So we delete the isolated error points in the tamper matri Wt before authentication An error point is an isolated one if none of its eight neighbor points is an error point Then we can distinguish malicious 289 attacks from content-preserving attacks through the pattern of the filtered tamper matri, after all of the isolated error points are deleted from the tamper matri 33 mage restoration Due to practical application in image authentication, not only require to determine whether the image is tampered or not, but also requires to recovery tampered content approimately The algorithm is also based on this After the image authentication, a tamper matri Wt is obtained n order to restore the original image, replace each invalid blocks by correct area which come from the image enlarge watermark Wb There are three methods to enlarge an image: Nearest Neighbor nterpolation, Bilinear nterpolation, bicubic interpolation Eperiments demonstrate that the third method is the best 4 EXPERMENTAL RESULTS The eperiments were implemented on gray-level images with size of 512 512 piels The 1 is set to 04123, 2 is set to 24, "Haar" was chosen for wavelet transform Test the watermarked image in transparency, the JPEG compression, Salt-pepper noise malicious attack 41 Quality of watermarked image The quality metric is based on PSNR The original images the watermarked images are shown in Figure 1 1(a) is the original images, 1(b) is the watermarked images The PSNR are 442936dB t shows that the proposed algorithm has satisfying perceptual invisibility Figure 1 Original image watermarked image (a) (b) Figure 2 JPEG compression, quality=90

Journal of Theoretical Applied nformation Technology 31 August 2012 Vol 42 No2 2005-2012 JATT & LLS All rights reserved SSN: 1992-8645 wwwjatitorg E-SSN: 1817-3195 42 JPEG compression Lossy compression, such as JPEG, is widely used in image operation, so the authentication algorithm should be robust to image compression operation to distinguish it from malicious tamper Figure 2 Figure 3 are the eperimental results of JPEG compression The JPEG compression qualities are 90 80 respectively (a) is compressed watermarked image with different compression qualities, (b) is the authentication result The authentication results show that the watermarked images have not been tampered Table 1 shows the comparison of the normalized correlation against JPEG between proposed method reference [11] Eperiments demonstrate that our method is better Figure 3 JPEG compression, quality=80 43 Adding noise Figure 4 Figure 5 shows the result of adding salt--pepper noise to watermarked image The rates of the noise are 0005 002 respectively (a) is the watermarked image with different rate of noise, (b) is the authentication result Also the authentication results show that the watermarked images have not been tampered Figure 4 Salt--pepper noise, rate=0005 (a) (b) Figure 5 Salt--pepper noise, rate=002 44 Tampering attacks We perform malicious attacks on two watermarked images There are one, two tampered regions in the watermarked images respectively Figure 6 Figure 7 show the results of tamper detection localization (a) is the watermarked image, (b) is the tampered image, (c) is the authentication result, (d) is the recovered images The authentication results clearly show that the tampers can be detected, localized accurately recovered Table 1 Comparison of the normalized correlation against JPEG Quality QF=50 QF=60 QF=70 QF=80 QF=90 Proposed 09993 09994 09998 10000 10000 Ref[11] 06874 07394 08174 09070 09710 (c) (d) Figure 6 Tampering test of lenna (c) (d) Figure 7 Tampering test of baboon 290

Journal of Theoretical Applied nformation Technology 31 August 2012 Vol 42 No2 2005-2012 JATT & LLS All rights reserved SSN: 1992-8645 wwwjatitorg E-SSN: 1817-3195 5 CONCLUSONS n this paper, a semi-fragile watermarking scheme for mage tamper localization recovery is proposed The watermarked image has good imperceptibility can tolerate the common content-preserving image processing Meanwhile, it has a good capability of localizing recovering the tampered regions Eperimental results show the effectiveness of the proposed scheme REFERENCES [1] R Petrovic,"Digital Watermarks for Audio ntegrity Verification", Serbia Montenegro, Nis, September 2005 28-30 [2] WH Chang LW Chang,"Semi-Fragile Watermarking for mage Authentication, Localization, Recovery Using Tchebichef Moments", Communications nformation Technologies (SCT), 2010 [3] Zhou, H, H Li, et al "Semi-fragile Watermarking Technique for mage Tamper Localization"nternational Conference on Measuring Technology Mechatronics Automation, 2009 519-523 [4] Mj Tsai CC Chien,"A Wavelet-Based Semi-Fragile Watermarking with Recovery Mechanism", EEE nternational Symposium on Circuits Systems, May 2008pp3033-3036 [5] D Zhang Z Pan, A contour-based semifragile image watermarking algorithm in DWT domain, Proc ETCS vol 3, 2010, pp 228-231 [6] Maeno, S Qibin, SF Chang M Suto New semi-fragile image authentication watermarking techniques using rom bias nonuniform quantization EEE Trans Multimedia;8(1) 2006:32 45 [7] X Wang, A novel adaptive semi-fragile watermarking scheme based on image content, ACTA AUTOMATCA SNCA vol 33, no 4, 2007 pp 361-366, [8] P Tsai YChen Hu," A Watermarking- Based Authentication with Malicious Detection Recovery ",Fifth nternational Conference on nformation, Communications Signal Processing,2005 [9] CY Lin SF Chang, "Semi-Fragile Watermarking for Authenticating JPEG Visual Content", Proc SPE Security Watermarking of Multimedia Contents, San Jose, California, January 2000, pp 140-151 [10] Hf Yang XM Sun, "Semi-Fragile Watermarking for mage Authentication Tamper Detection Using HVS Model", nternational Conference on Multimedia Ubiquitous Engineering 2007 [11] HFYang XM Sun Semi-fragile Watermarking for mage Authentication Tamper Detection Using HVS Model Proc of nternational Conference on Multimedia Ubiquitous SeoulSouthkorea: [s N], 2007 291