A Novel Algorithm for Digital Watermarking for Image Tamper Localization and Recovery

Article Preview

Abstract:

A content-based and block-wise image authentication algorithm with location and recovery is presented. In this algorithm, the watermark of each block is its content-feature which is encrypted by md5, and it is embedded in another block which selected by an ergodic matrix of a chaotic sequence. That all security parameters are user dependent and can be computed at both ends individually based on Diffie-Hellman key exchange method makes the scheme not only robust against collage attack but also truly oblivious. The experiments demonstrate that the proposed scheme can detect and localize any tampering of size 8x8 pixels and above and can recover a 40% damaged image to an intelligible one.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

538-542

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Liu Guangqi, Zheng Xiaoshi,  A tamper-resistant authentication scheme on digital image. Advances in Intelligent Systems and Computing, v 181 AISC, pp.867-872, (2013).

DOI: 10.1007/978-3-642-31698-2_122

Google Scholar

[2] Sujatha, S.S. A novel DWT based blind watermarking for image authentication . International Journal of Network Security, v 14, n 4, pp.223-228, July 1, (2012).

Google Scholar

[3] Weng, Li. Proceedings Robust image content authentication with tamper location. IEEE International Conference on Multimedia and Expo, pp.380-385, (2012).

DOI: 10.1109/icme.2012.163

Google Scholar

[4] M. Holliman and N. Memon, Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, Image Processing, IEEE Transactions on, Volume: 9 Issue: 3, March (2010).

DOI: 10.1109/83.826780

Google Scholar

[5] P.S.L. M Barreto, H. Y. Kim, and V. Rijmen, Toward secure public -key blockwise fragile authentication watermarking, Vision, Image and Signal Processing, IEE Proceedings, Volume: 149 Issue: 2, April (2010).

DOI: 10.1049/ip-vis:20020168

Google Scholar

[6] J. Fridrich, ``Security of Fragile Authentication Watermarks with Localization, Proc. SPIE: Security and Watermarking of Multimedia Contents, Vol. 4675, pp.691-700, (2009).

DOI: 10.1117/12.465330

Google Scholar

[7] R. Radhakrisnan and N. Memon, ``On the Security of the SARI Image Authentication System, Proc. IEEE Int. Conf. on Image Proc., Vol. III, pp.971-974, (2009).

Google Scholar

[8] Ching-Yung Lin and Shih-Fu Chang, A robust image authentication method distinguishing JPEG compression from malicious manipulation, Circuits and Systems for Video Technology, IEEE Transactions on, Volume: 11 Issue: 2, Feb (2009).

DOI: 10.1109/76.905982

Google Scholar

[9] M. Utku Celik, G. Sharma, E. Saber, and A. Murat Tekalp, Hierarchical watermarking for secure image authentication with localization, Image Processing, IEEE Transactions on, Volume: 11 Issue: 6, June (2008).

DOI: 10.1109/tip.2002.1014990

Google Scholar

[10] Phen-Lan Lin, Po-Whei Huang, An-Wei Peng, A Fragile Watermarking Scheme for Image Authentication with Localization and Recover, Multimedia Software Engineering, 2007. Proceedings. IEEE Sixth International Symposium on 13-15 Dec. (2007).

DOI: 10.1109/mmse.2004.9

Google Scholar

[11] Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps., Int J Bifurcat Chaos 2008; 8(6): 1259–84.

DOI: 10.1142/s021812749800098x

Google Scholar

[12] Chuanmu Li. An Algorithm for Removable and Robust Digital Watermarking,. Journal of Computational Information Systems 6(2010): 2069-(2076).

Google Scholar

[13] J. Tian. Wavelet-based reversible watermarking for authentication[C]. Proc. of SPIE 2002, Security and Watermarking of Multimedia Contents III, 75(2002), 679.

DOI: 10.1117/12.465329

Google Scholar

[14] A.M. Alattar. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. on Image Processing, Vol. 13, Aug. 2004, p.1147 – 1156.

DOI: 10.1109/tip.2004.828418

Google Scholar

[15] A.B. Watson, G. Y. Yang, J. A. Solomon, and J. Villasenor. Visibility of wavelet quantization noise. IEEE Trans. Image Processing, vol. 6 , Aug. 1997, p.1164–1175.

DOI: 10.1109/83.605413

Google Scholar