Fragile Watermarking for Image Authentication Using the Characteristic of SVD

Digital image authentication has become a hot topic in the last few years. In this paper, a pixel-based fragile watermarking method is presented for image tamper identification and localization. By analyzing the left and right singular matrices of SVD, it is found that the matrix product between the first column of the left singular matrix and the transposition of the first column in the right singular matrix is closely related to the image texture features. Based on this characteristic, a binary watermark consisting of image texture information is generated and inserted into the least significant bit (LSB) of the original host image. To improve the security of the presented algorithm, the Arnold transform is applied twice in the watermark embedding process. Experimental results indicate that the proposed watermarking algorithm has high security and perceptual invisibility. Moreover, it can detect and locate the tampered region effectively for various malicious attacks.

[1]  Aboul Ella Hassanien,et al.  An effective SVD-based image tampering detection and self-recovery using active watermarking , 2014, Signal Process. Image Commun..

[2]  Zhenzhong Chen,et al.  Binocular Just-Noticeable-Difference Model for Stereoscopic Images , 2011, IEEE Signal Processing Letters.

[3]  Ming-Shi Wang,et al.  A fuzzy c-means clustering-based fragile watermarking scheme for image authentication , 2009, Expert Syst. Appl..

[4]  Ting Luo,et al.  Binocular visual characteristics based fragile watermarking scheme for tamper detection in stereoscopic images , 2016 .

[5]  Wen Gao,et al.  An image fragile watermark scheme based on chaotic image pattern and pixel-pairs , 2007, Appl. Math. Comput..

[6]  M. Omair Ahmad,et al.  Digital Watermarking Scheme Based on Arnold and Anti-Arnold Transforms , 2016, ICISP.

[7]  Chenggen Quan,et al.  Optical color image encryption based on Arnold transform and interference method , 2009 .

[8]  Zhenxing Qian,et al.  Reversible fragile watermarking for locating tampered blocks in JPEG images , 2010, Signal Process..

[9]  Xinpeng Zhang,et al.  Fragile watermarking scheme using a hierarchical mechanism , 2009, Signal Process..

[10]  Chin-Chen Chang,et al.  A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..

[11]  Jing-Ming Guo,et al.  False-positive-free SVD-based image watermarking , 2014, J. Vis. Commun. Image Represent..

[12]  Asoke K. Nandi,et al.  Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities , 2011, Signal Process..

[13]  Safya Belghith,et al.  Chaotic watermark for blind forgery detection in images , 2015, Multimedia Tools and Applications.

[14]  Millie Pant,et al.  Robust and false positive free watermarking in IWT domain using SVD and ABC , 2016, Eng. Appl. Artif. Intell..

[15]  Xinpeng Zhang,et al.  Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels , 2007, IEEE Signal Processing Letters.

[16]  Balasubramanian Raman,et al.  A chaotic system based fragile watermarking scheme for image tamper detection , 2011 .

[17]  Xing Xin,et al.  A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization , 2015, J. Vis. Commun. Image Represent..

[18]  Raphael C.-W. Phan,et al.  Tampering with a watermarking-based image authentication scheme , 2008, Pattern Recognit..

[19]  Lin Teng,et al.  Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme , 2013 .

[20]  Satyen Kale,et al.  A variation on SVD based image compression , 2007, Image Vis. Comput..