A Robust Algorithm for Digital Watermarking with Tamper Recovery

Article Preview

Abstract:

A block-wise and content-based image authentication scheme with location and recovery is presented. In this scheme, the watermark of each block is an encrypted form of its content-feature, which is embedded in another block which selected by an ergodic matrix of a chaotic sequence. The randomicity of selected block can robust the VQ attack. The encryption further strengthens the security. That all security parameters are user dependent and can be computed at both ends individually based on Diffie-Hellman key exchange method makes the scheme not only robust against collage attack but also truly oblivious. The experiments demonstrate that the proposed scheme can detect and localize any tampering of size 8x8 pixels and above and can recover a 40% damaged image to an intelligible one.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

533-537

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Liu Guangqi, Zheng Xiaoshi,  A tamper-resistant authentication scheme on digital image. Advances in Intelligent Systems and Computing, v 181 AISC, pp.867-872, (2013).

DOI: 10.1007/978-3-642-31698-2_122

Google Scholar

[2] Sujatha, S.S. A novel DWT based blind watermarking for image authentication . International Journal of Network Security, v 14, n 4, pp.223-228, July 1, (2012).

Google Scholar

[3] Weng, Li. Proceedings Robust image content authentication with tamper location. IEEE International Conference on Multimedia and Expo, pp.380-385, (2012).

DOI: 10.1109/icme.2012.163

Google Scholar

[4] M. Holliman and N. Memon, Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, Image Processing, IEEE Transactions on, Volume: 9 Issue: 3, March (2010).

DOI: 10.1109/83.826780

Google Scholar

[5] P.S.L. M Barreto, H. Y. Kim, and V. Rijmen, Toward secure public -key blockwise fragile authentication watermarking, Vision, Image and Signal Processing, IEE Proceedings, Volume: 149 Issue: 2, April (2010).

DOI: 10.1049/ip-vis:20020168

Google Scholar

[6] J. Fridrich, ``Security of Fragile Authentication Watermarks with Localization, Proc. SPIE: Security and Watermarking of Multimedia Contents, Vol. 4675, pp.691-700, (2009).

DOI: 10.1117/12.465330

Google Scholar

[7] R. Radhakrisnan and N. Memon, ``On the Security of the SARI Image Authentication System, Proc. IEEE Int. Conf. on Image Proc., Vol. III, pp.971-974, (2009).

Google Scholar

[8] Ching-Yung Lin and Shih-Fu Chang, A robust image authentication method distinguishing JPEG compression from malicious manipulation, Circuits and Systems for Video Technology, IEEE Transactions on, Volume: 11 Issue: 2, Feb (2009).

DOI: 10.1109/76.905982

Google Scholar