A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform

Similar documents
DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Image Authentication and Recovery Scheme Based on Watermarking Technique

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Feature Based Watermarking Algorithm by Adopting Arnold Transform

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression

IAJIT First. Online Publication. Semi Fragile Watermarking for Content based Image Authentication and Recovery in the DWT-DCT domains. 1.

Robust Image Watermarking based on DCT-DWT- SVD Method

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

Digital Image Steganography Techniques: Case Study. Karnataka, India.

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

A Robust Image Hiding Method Using Wavelet Technique *

Data Hiding in Video

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

QR Code Watermarking Algorithm based on Wavelet Transform

Digital Watermarking with Copyright Authentication for Image Communication

Implementation of H.264/AVC Video Authentication System Using Watermark

A New Approach to Compressed Image Steganography Using Wavelet Transform

Image Authentication and Recovery Using BCH Error-Correcting Codes

An Improved Performance of Watermarking In DWT Domain Using SVD

Combined Hashing/Watermarking Method for Image Authentication

A new robust watermarking scheme based on PDE decomposition *

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A Reversible Data Hiding Scheme for BTC- Compressed Images

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting

ROBUSTNESS TESTING OF SOME WATERMARKING METHODS USING IDCT-II G. Petrosyan 1, H. Sarukhanyan 1, S.Agaian 2, J. Astola 3

ISSN (ONLINE): , VOLUME-3, ISSUE-1,

Digital Image Watermarking Scheme Based on LWT and DCT

Robust DWT Based Technique for Digital Watermarking

Robust Image Watermarking using DCT & Wavelet Packet Denoising

A New hybrid method in watermarking using DCT and AES

Improved Qualitative Color Image Steganography Based on DWT

FRAGILE WATERMARKING USING SUBBAND CODING

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

To perform digital image watermarking by inverse 5/3 Integer Wavelet Transform Neha Sahu*, Irshad Ahamad** and Vasim Khan**

Robust copyright protection scheme for digital images using the low-band characteristic

CHAPTER-4 WATERMARKING OF GRAY IMAGES

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

Image Error Concealment Based on Watermarking

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

Implementation of ContourLet Transform For Copyright Protection of Color Images

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

Towards a Telltale Watermarking Technique for Tamper-Proofing

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

Robust Lossless Data Hiding. Outline

Adaptive Quantization for Video Compression in Frequency Domain

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca

Digital watermarking techniques for JPEG2000 scalable image coding

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras

Watermarking Moble Phone Color Images With Error Correction Codes

A Flexible Scheme of Self Recovery for Digital Image Protection

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

FPGA Implementation of 4-D DWT and BPS based Digital Image Watermarking

Non-fragile High quality Reversible Watermarking for Compressed PNG image format using Haar Wavelet Transforms and Constraint Difference Expansions

Transparent Data Hiding for True Color Images

A Crypto Signature Scheme for Image Authentication over Wireless Channel

Multiple Binary Images Watermarking in Spatial and Frequency Domains

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

QR Code Watermarking Algorithm Based on DWT and Counterlet Transform for Authentication

Chaotic-Correlation Based Watermarking Scheme for Still Images

Implementation and Comparison of Watermarking Algorithms using DWT

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

DWT-SVD based Multiple Watermarking Techniques

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

I. Introduction. II Integer-To-Integer Wavelet Transforms

Efficient Image Steganography Using Integer Wavelet Transform

Reversible Authentication Watermark for Image

A Survey of Fragile Watermarking-based Image Authentication Techniques

ROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT

A Robust Image Watermarking Scheme using Image Moment Normalization

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

A Singular-Value-Based Semi-Fragile Watermarking Scheme for Image Content Authentication with Tampering Localization

A New Spatial q-log Domain for Image Watermarking

Invisible Watermarking Using Eludician Distance and DWT Technique

IMAGE COMPRESSION USING ANTI-FORENSICS METHOD

Comparison of DWT-CRT And TLDCT-CRT Methods In Digital Watermarking

Region of Interest Fragile Watermarking for Image Authentication

Digital Image Watermarking Using DWT Based DCT Technique

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

A DWT Based Steganography Approach

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Robust Watermarking Algorithm For JPEG Images

A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function

Transcription:

A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform Rafiullah Chamlawi, Asifullah Khan, Adnan Idris, and Zahid Munir Abstract Authentication of multimedia contents has gained much attention in recent times. In this paper, we propose a secure semi-fragile watermarking, with a choice of two watermarks to be embedded. This technique operates in integer wavelet domain and makes use of semi fragile watermarks for achieving better robustness. A self-recovering algorithm is employed, that hides the image digest into some Wavelet subbands to detect possible malevolent object manipulation undergone by the image (object replacing and/or deletion). The Semi-fragility makes the scheme tolerant for JPEG lossy compression as low as quality of 70%, and locate the tempered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees the safety of watermark, image recovery and location of the tempered area accurately. Keywords Integer Wavelet Transform (IWT), Discrete Cosine Transform (DCT), JPEG Compression, Authentication and Self- Recovery. I. INTRODUCTION HE ease, by which digital multimedia data can be T manipulated, has always raised many concerns about the possibility to reliably trust their content. Digital data authentication is thus one of the most important and investigated security applications. In our proposed approach, the image authentication and recovery is based on a comprehensive technique that operates with the computing of two watermarks [], an image digest and a binary image. The image digest is computed through a properly modified version of JPEG coding operating at very high compression ratio on original image [2]. Thus image digest is a compressed version of the image itself and it helps in obtaining an estimate of the original contents. The modification is introduced in the digest to make it insensitive to global, innocuous manipulations. The other watermark, binary signature (second watermark) is processed with a private key to ensure security [3]. The scheme is flexible enough with the choice of users, either to embed image Rafiullah Chamlawi, and Asifullah Khan are with Pakistan Institute of Engineering and Applied Sciences (PIEAS), Islamabad, Pakistan (e-mail: chamlawi@gmail.com, asif_jg@yahoo.com). Adnan Idris is with AJK University, Rawalakot, Azad jamu and Kashmir, Pakistan (e-mail: adnaidris@gmail.com). Zahid Munir is with Electronic Division PINSTECH, Nilore, Islamabad, Pakistan (e-mail: mzahid@pinstech.org.pk). digest, binary image or both. Embedding binary image can help in accurately detecting manipulations made in image, but it cannot ensure recovery of an estimated image. Similarly embedding image digest can retrieve the estimated image but leaves the users to judge the authenticity by themselves. Thus, embedding image digest as well as binary image can lead to both authentication and recovery. For the reason we use image digest as a compressed version of the original image, our technique can also be referred as a selfrecovery technique. The scheme use the parameterize integer wavelet transform which is the fast approach of Discrete Wavelet Transform. Based on the idea, [4] proposed for the first time to use the parameterized wavelet transform. However, his scheme is still based on conventional DWT. Lifting scheme is an effective method to improve the processing speed of DWT. Integer wavelet transform allows to construct lossless wavelet transforms. By lifting scheme, we can construct integer wavelet transform. In this paper, we will address the secure semi-fragile watermarking for image authentic-cation and recovery based on integer wavelet transform with parameters. In current communication, we discuss the watermarks generation, embedding and extraction in section 2, section 3 explains the temper detection. We report experimental results in section 4 and conclusion are made in section 5. II. WATERMARK GENERATION Our scheme is based on embedding of two watermarks. We proceed for the watermarks generation in this section. A. Binary Image Preprocessing A binary signature is preprocessed before embedding as a watermark. Let W be a binary signature of size M N and PN be a pseudorandom matrix of same size generated by a secret key. The binary signature W and pseudorandom matrix PN are represented as; W = wi (, j) ( i M, j N) () where wi (, j) { 0,} RandomMatrix = p (, i j) ( i M, j N) n (2) where p (, i j) { 0, n } We adopt the formula (3) to get the ultimate watermark W : 3866

W = W RandomMatrix (3) where denotes the exclusive OR. B. Digest Generation The image digest (second watermark) is a comp-ressed version of original image and it is generated using following steps: One level Integer Wavelet Transform is applied on the original image size N N. Full frame DCT on low pass version (LL) is computed. DCT coefficients are quantized to decrease their obtrusiveness. The scaled DCT values are ordered through a zigzag scan and first M coefficients are likely to be selected and stored in vector v: v= ( v, v2, v3... vm) (4) where M = N 2 /32. DC component is discard-ed because of its too high energy. Coefficients are further scaled based on secret key (k ), using equation (5): v scaled( i ) = v (). i α.log( i+ 2 + r ()) i (5) where α is a strength factor and r is ranging from -0.5 to 0.5. DCT coefficients are quadruplicated because we have N 2 /8 available positions (shown in Fig. ) which are four times M coefficients. Thus, we get a new vector Q as. Q= ( v, v2... vm, v, v2... vm, v, v2... vm, v, v2... vm) P scrambled is obtained by scrambling vector Q with the help of a secret key, in order to make it more secure. Thus, Q permuted is yielded image digest to be embedded in the highlighted subbands as shown in Figure. W 2 is our second watermark ready for embedding. W = Q (6) 2 permuted C. Watermark Embedding Both the watermarks (image digest and binary signature) have been computed and now both are embedded into the original image with the following steps: Applying -level IWT on image, the two horizontal and vertical details subbands are further decomposed while approximation subband is two times decomposed. Embedding areas are highlighted in Fig.. We use the following formula, [5] to embed the watermark W in the LL3 subband coefficients. Let F(a) denote the five least significant bits of a, F(a,b) represent the substitution of b for the five least significant bits of a. When W( i, j ) = 0, formula (7) is adopted ( (, ) 0000,000) ( (, )) 0000 * F f i j F f i j f (, i j) = (7) F( f ( i, j),000) otherwise When W( i, j ) =, formula (8) is adopted * F( f( i, j) + 0000,0000) F( f( i, j)) 000 f (, i j) = (8) F( f ( i, j),0000) otherwise where f (, i j ) is a IWT coefficient in LL3 subband before embedding, after embedding. f * (, i j ) is the IWT coefficient HL2 and LH2 are replaced by generated digest W 2 as shown in Fig.. Performing the inverse IWT, we get a watermarked image. Fig. Embedding Diagram D. Integrity Verification In this phase the watermarked image is undergone a procedure and embedded watermarks ( W andw 2 ) are extracted. The extraction procedure of W includes the following step: Given an N N watermarked image, after applying a One-level IWT, the approximation subband is two times decomposed and LL3 is selected as shown in Fig. 2. 3867

* Let W (, i j) denote the extracted watermark bit, LFB(a) denote the five least significant bits of a, we do the following: * * LFB( f ( i, j)) = 0 W (, i j) = ( i M, j N) * 0 LFB( f ( i, j)) = To acquire the ultimate watermark W (a binary image), equation (0) is required. (9) * W (, i j ) = W (, i j ) RandomMatrix (, i j ) ( i M, j N ) (0) We express the difference mark as () D(, i j) = W(, i j) W(, i j) ( i M, j N) () If Di (, j ) =, then the pixel in the difference binary image is white and represents mark extraction error, contrarily, it is black and represents accurate mark extraction. To get estimated image we move further to extract W 2.Following steps are taken for the extraction ofw 2 : Horizontal and Vertical details are further decomposed and HL2 and LH2 are selected. Here the data is reversed into a vectorq, which permuted is inversely permuted by means of the same key, thus resulting in a sequence Q. An estimate of the hidden DCT coefficients is then obtained by averaging all four copies of each extracted coefficient. A unique set of authentication data v extracted (i.e. M coefficients) is obtained. Invert scaling operation is performed using the same key with the help of formula (2). vreconstructed () i = vextracted (). i. α log( i+ 2 + r ( i )) (2) The v reconstructed then replaced in their correct positions, by means of an anti-zigzag scanning (missing elements are set to zero and a DC component with value 28 is reinserted). These obtained values are inversely quantizes and DCT is applied to finally obtain an approximation of the original image.(having size N /2, N /2) Fig. 2 Extraction Diagram III. TEMPER DETECTION We express the difference mark as (3): Difference = W (, i j) W (, i j) (3) If Difference is, then pixel in Difference binary image is white and shows the error. It accurately locates the tampered area and distinguishes between malicious attack and incidental attack. A method is given as follows: Dense pixel: For a mark error pixel in the difference image, it is a dense pixel if at least one of its eight neighbor pixels is a mark error pixel and a sparse pixel otherwise [3]. Thus, we have the following parameters. DenseArea The total of dense pixel of LL subband SparseArea The total of sparse pixel of LL subband Area The total pixel of LL subband} TotalArea DenseArea + SparseArea Δ = TotalArea / Area δ = AreaDense / AreaSparse if Δ = 0 Then the image is not tampered) if Δ > 0 and ζ < β then tampering is incidental, where β = [0.5,] if ζ β then tampering is malicious Following above parameters depict that if difference image has sparse pixels then the image is incidentally attacked otherwise in a case of dense pixels on the difference image, the image is maliciously attacked. 3868

IV. EXPERIMENTAL RESULTS We have tested our scheme on Lena image. In our work, we apply two and three level IWT for embedding process. The PSNR of the watermarked image is 38dB, which is quite reasonable. The watermarks are perceptually invisible. Fig. 3 shows the original and watermarked images of Lena and a binary signature, which is embedded in LL3, subband of the Lena image. Fig. 3 (a) The original Lena Image (b) The Binary signature (c) The watermarked Image (PSNR 38dB) The extracted watermark (Binary Signature) and reference image (Recovered image) without any attack is shown in Fig. 4. (d) Fig. 4 (a) The watermarked image (b) the recovered Image (c) The extracted binary signature (d) Difference in original and extracted binary signature We have tested the scheme on the Cameraman image and get the following results, shown in Fig. 5. (d) (e) Fig. 5 (a) Original image of cameraman (b) the watermarked image, PSNR 38.2dB (c) Recovered image (d) extracted binary image (e) Difference in binary images Results obtained after tampering which are not visible as shown in Fig. 6. The Lena image is tampered invisibly. The scheme recovers the approximated image and also locates the tampered area accurately. Fig. 6 (a) Original image (b) Watermarked image (c) Difference which shows those areas which are tampered Fig. 7 shows the estimated image recovered and extracted binary signatures from the watermarked image compressed by JPEG at different quality factors (QF). We can see that the proposed scheme can resist as low as 70% JPEG compression while in case the quality less than 70% should be considered malicious manipulation and also the recovered image will be degraded. (d) (e) (f) Fig. 7 (a), (b), (c) The recovered images in first row and (d), (e), (f) the difference in the second row after compressing the watermarked image with quality factors 90, 80, 70 respectively. The dots on the difference images show the parse pixels that the image is incidentally tampered, not maliciously. Below 70, the dense pixels occur on the difference image. V. CONCLUSION The detailed experiments are conducted and it is found that the proposed scheme is able to distinguish the malicious and incidental attacks and also recovers a good estimate of original contents. The technique is highly secure because of inclusion of three private keys at various stages of watermark generation. The proposed scheme also shows efficient authentication for a smallest scale transformation on an image. Embedding of two watermarks in this scheme makes it more efficient in accurate detection of tampered area and recovery of estimated image. Invisible tamper detection is another authentication criteria achieved in this semi fragile secured watermarking method. 3869

REFERENCES [] Ching-Yang Lin and Shi Fu-Chang, Semi-Fragile Watermarking for authentication of JPEG visual contents. [2] Alessandro Piva, Franco Bartolini and Roberto Caldelliy, Self recovery authentication of images in the DWT domain, International Journal of Image and Graphics Vol. 5, No. 49-65 (2005) [3] Xiaoyun Wu, Junquan Hu, Zhixiong Gu, Jiwu Huang (contacting author), A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters, Copyright 2005 Australian Computer Society, Inc. This paper appeared at the Australasian Info: Security Workshop 2005, [4] Meerward, P.and Uhl,A. watermark security via wavelet filter parameterization. Proc. IEEE Int. Conf. on image processing, (3): 027-030 (200) [5] Ingemar J Cox, Methiw L Miller and Jeffery A Bloom, Digital Watermarking. (2002). [6] Liu, H.M., Liu, J.F, Huang, J.W, Huang, D.R. and Shi, Y.Q. (2002): A robust DWT-based blind data hiding algorithm. Proc. of IEEE on Circuits and Systems, (2):672 - II-675. [7] Kurato Maeno, Qibin Sun, Shih-Fu Chang, Masayuki Suto, New Semi- Fragile Image Authentication Watermarking Techniques, Using Random Bias and Non-Uniform Quantization, IEEE Transactions on Multimedia, Vol 8, No, (2006). 3870