Image Content Authentication Using Pinned Sine Transform

Digital image content authentication addresses the problem of detecting any illegitimate modification on the content of images. To cope with this problem, a novel semifragile watermarking scheme using the pinned sine transform (PST) is presented in this paper. The watermarking system can localize the portions of a watermarked image that have been tampered maliciously with high accuracy as well as approximately recover it. In particular, the watermarking scheme is very sensitive to any texture alteration in the watermarked images. The interblock relationship introduced in the process of PST renders the watermarking scheme resistant to content cutting and pasting attacks. The watermark can still survive slight nonmalicious manipulations, which is desirable in some practical applications such as legal tenders. Simulation results demonstrated that the probability of tamper detection of this authentication scheme is higher than, and it is less sensitive to legitimate image processing operations such as compression than that of the equivalent DCT scheme.

[1]  A. Zvi Meiri,et al.  The Pinned Karhunen Loeve Transform Of A Two-Dimensional Gauss-Markov Field , 1976 .

[2]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[3]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[4]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[5]  Gonzalo R. Arce,et al.  A class of authentication digital watermarks for secure multimedia communication , 2001, IEEE Trans. Image Process..

[6]  A. Meiri,et al.  A Pinned Sine Transform Image Coder , 1981, IEEE Trans. Commun..

[7]  Jiri Fridrich,et al.  Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[8]  Ping Wah Wong,et al.  A Watermark for Image Integrity and Ownership Verification , 1998, PICS.

[9]  William K. Pratt,et al.  Digital image processing (2nd ed.) , 1991 .

[10]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[11]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[12]  Chun-Shien Lu,et al.  Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..

[13]  Anil K. Jain Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.

[14]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[15]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.