A Wavelet-Based Watermarking Scheme with Authentication and Recovery Mechanism

In this paper, a wavelet-based. watermarking scheme used to verify the contents of transmission grayscale images is proposed. By the property of discrete wavelet transform, we design two watermarks from the low-frequency band and embed the watermarks into the high-frequency bands. One watermark is used for detecting the intentional content modification and indicating the modified location, and anther watermark is used for recovering the image. The watermark generation and watermark embedding are disposed in the image itself, and the received image authentication needs no information about the original image or watermark, so it will increase the security of watermark and prevent forged watermark. The experimental results show that the proposed scheme can resist the mild modifications of digital image and be able to detect and recovery the malicious modifications precisely.

[1]  Po-Whei Huang,et al.  Hierarchical watermarking scheme for image authentication and recovery , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[2]  Tong Liu,et al.  The survey of digital watermarking-based image authentication techniques , 2002, 6th International Conference on Signal Processing, 2002..

[3]  Shih-Fu Chang,et al.  New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Transactions on Multimedia.

[4]  John D. Villasenor,et al.  Visibility of wavelet quantization noise , 1997, IEEE Transactions on Image Processing.

[5]  Chin-Chen Chang,et al.  A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..

[6]  Deepa Kundur,et al.  Analysis and design of secure watermark-based authentication systems , 2006, IEEE Transactions on Information Forensics and Security.

[7]  Sheng-He Sun,et al.  Multipurpose image watermarking algorithm based on multistage vector quantization , 2005, IEEE Transactions on Image Processing.

[8]  Yu-Chen Hu,et al.  A Watermarking-Based Authentication with Malicious Detection and Recovery , 2005, 2005 5th International Conference on Information Communications & Signal Processing.

[9]  Po-Whei Huang,et al.  A fragile watermarking scheme for image authentication with localization and recovery , 2004, IEEE Sixth International Symposium on Multimedia Software Engineering.

[10]  Martin Vetterli,et al.  Adaptive wavelet thresholding for image denoising and compression , 2000, IEEE Trans. Image Process..