QIM data hiding for tamper detection and correction in digital images using wavelet transform

This paper proposes a tamper detection and correction scheme using semi-fragile data hiding that aims to achieve high perceptual quality of images at the end-user even after malicious modification. The objective is achieved by embedding an external binary signature as well a low-resolution version of the image (image digest) by modulating integer wavelet coefficients using quantization index modulation (QIM). Half-toning technique is used to obtain image digest from the low-resolution version of the image. The receiver extracts the binary signature from the watermarked image for tamper detection while the extracted image digest is used to correct the tampered region. Unlike previously proposed techniques, this novel approach distinguishes malicious changes from various common image processing operations more efficiently and also correct tapered regions effectively. We compare the performance of the proposed method in term of probability of miss and false alarm with the same for the some of the existing semi-fragile watermarking techniques to demonstrate the success and potential of the present one.

[1]  Zhou Wang,et al.  Image Quality Assessment: From Error Measurement to Structural Similarity , 2004 .

[2]  Asifullah Khan,et al.  A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform , 2008 .

[3]  Shinfeng D. Lin,et al.  Hierarchical Fragile Watermarking Scheme For Image Authentication , 2011, Intell. Autom. Soft Comput..

[4]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[5]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[6]  De-Zhi Han,et al.  Using two semi-fragile watermark for image authentication , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[7]  Amit Phadikar,et al.  ROI Based Quality Access Control of Compressed Color Image using DWT via Lifting , 2009 .

[8]  Sheng-Bing Che,et al.  Image Self-Embedding Technology Research Based on Singular Value Decomposition , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[9]  Tiago Rosa Maria Paula Queluz Spatial watermark for image content authentication , 2002, J. Electronic Imaging.

[10]  Dezhi Chen,et al.  Research of digital semi-fragile watermarking of remote sensing image based on wavelet analysis , 2004, IGARSS 2004. 2004 IEEE International Geoscience and Remote Sensing Symposium.

[11]  Zhang Hongbin,et al.  Tamper Detection and Self-Recovery of Image Based on Self-Embedding , 2009, 2009 Asia-Pacific Conference on Information Processing.

[12]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.