A Grayscale Image Fragile Watermark Authentication System in Spatial-Domain

Article Preview

Abstract:

This study deals with devising and implementing a novel technique for image authentication and secured message transmission based on hiding large volume of data into gray scale images. A grayscale image fragile watermark authentication system in spatial-domain is proposed. First it preprocesses the watermark image and resizes it to a quarter of the size of the original image. Then, it generates a random key matrix K and 128bit message authentication code from the original image. It replaces the 128bit message authentication code for the former 128bit of K to obtain a new key matrix KH. Then, it calculates the embedded position P=KHi xor (b7,b6,b5.b4) i MOD 3. b7,b6,b5,b4 are the high 4 bits of the original images pixel. It embeds the watermark image according to P value to the lower 4 bits of the original images pixel. The system is made in experiment. The result shows the system has good imperceptibility.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2920-2924

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] R. Radhakrishnan, M. Kharrazi, N. Menon, Data Masking: A new approach for steganography, Journal of VLSI Signal Processing, Springer, Vol. 41, pp.293-303, (2005).

DOI: 10.1007/s11265-005-4153-1

Google Scholar

[2] Nameer N. EL-Emam, Hiding a large Amount of data with High Security Using Steganography Algorithm, Journal of Computer Science ISSN 1549-3636, vol. 3, no. 4, pp.223-232, (2007).

DOI: 10.3844/jcssp.2007.223.232

Google Scholar

[3] P. Amin, N. Lue and K. Subbalakshmi, Statistically secure digital image data hiding, IEEE Multimedia Signal Processing MMSP05, pp.1-4, Shanghai, China, Oct. (2005).

DOI: 10.1109/mmsp.2005.248648

Google Scholar

[4] B. Chen and G. W. Wornnel, Quantization index modulation: A class of provably good methods for digital watermarking and information embedding, IEEE Trans. On Info. Theory, vol. 47, no. 4, pp.1423-1443, May (2001).

DOI: 10.1109/18.923725

Google Scholar

[5] R. Chandramouli and N. Memon, Analysis of LSB based image steganography techniques, Proc. of ICIP, Thissaloniki, pp.1019-1022, Greece, (2001).

Google Scholar

[6] S. Dumitrescu, W. Xiaolin and Z. Wang, Detection of LSB steganography via sample pair analysis, IEEE Trans. on Signal processing, Vol. 51, no. 7, pp.1995-2007, (2003).

DOI: 10.1109/tsp.2003.812753

Google Scholar

[7] P. Moulin and J. A. O'Sullivan, Information-theoretic analysis of information Hiding, IEEE Trans. On Info. Theory, vol. 49, no. 3, pp.563-593, March (2003).

DOI: 10.1109/tit.2002.808134

Google Scholar

[8] S. Pavan, S. Gangadharpalli and V. Sridhar, Multivariate entropy detector based hybrid image registration algorithm, IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Philadelphia, Pennsylvania, USA, pp.18-23, March (2005).

DOI: 10.1109/icassp.2005.1415544

Google Scholar

[9] H. H. Pang, K. L. Tan and X. Zhou, Steganographic schemes for file system and B-tree, IEEE Trans. On Knowledge and Data Engineering, vol. 16, pp.701-713, Singapore, June (2004).

DOI: 10.1109/tkde.2004.15

Google Scholar

[10] P. Moulin and M. K. Mihcak, A framework for evaluating the datahiding capacity of image sources, IEEE Transactions on Image Processing, vol. 11, pp.1029-1042, Urbana, Illinois, Sept. (2002).

DOI: 10.1109/tip.2002.802512

Google Scholar

[11] A. H. Al-Hamami and S. A. Al-Ani A New Approach for Authentication Technique, Journal of computer Science, ISSN 1549-3636, Vol. 1, No. 1, pp.103-106, (2005).

DOI: 10.3844/jcssp.2005.103.106

Google Scholar