Fragile Watermarking Scheme Based on Wavelet Edge Features

This paper proposes a novel watermarking method to discover the tampers and localize it in digital image. The image which is to be used to generate a watermark is first wavelet decomposed and the edge feature from the sub bands of high frequency coefficients are retrieved to generate a watermark (Edge Feature Image) and which is to be embed on the cover image. Before embedding the watermark, the pixels of cover image are disordered through the Arnold Transform and this helps to upgrade the security of the watermark. The embedding of generated edge feature image is done only on the Least Significant Bit (LSB) of the cover image. The invisibleness and robustness of the proposed method is computed using Peak-Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) and it proves that the proposed method delivers good results and the proposed method also detects and localizes the tampers efficiently. The invisibleness of proposed method is compared with the existing method and it proves that the proposed method is better.

[1]  Shan Suthaharan Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance , 2010, EURASIP J. Inf. Secur..

[2]  Zhigeng Pan,et al.  A Contour-Based Semi-fragile Image Watermarking Algorithm in DWT Domain , 2010, 2010 Second International Workshop on Education Technology and Computer Science.

[3]  M. N. Giri Prasad,et al.  A Novel Fragile Watermarking Scheme For Image Tamper Detection Using K Mean Clustering , 2013 .

[4]  D. Vaishnavi,et al.  Robust and Invisible Image Watermarking in RGB Color Space Using SVD , 2015 .

[5]  Balasubramanian Raman,et al.  A chaotic system based fragile watermarking scheme for image tamper detection , 2011 .

[6]  Suneeta Agarwal,et al.  DCT Based Approach for Tampered Image Detection and Recovery Using Block Wise Fragile Watermarking Scheme , 2013, IbPRIA.

[7]  Jingbing Li,et al.  The medical volume data watermarking using arnold scrambling and 3D-DWT , 2013, Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC).

[8]  Salvatore Sessa,et al.  Fragile watermarking tamper detection with images compressed by fuzzy transform , 2012, Inf. Sci..

[9]  Ming-Shi Wang,et al.  A fuzzy c-means clustering-based fragile watermarking scheme for image authentication , 2009, Expert Syst. Appl..

[10]  Shekhar Verma,et al.  Robust Watermarking of Image in the Transform Domain Using Edge Detection , 2009, 2009 11th International Conference on Computer Modelling and Simulation.

[11]  Chin-Chen Chang,et al.  A secure fragile watermarking scheme based on chaos-and-hamming code , 2011, J. Syst. Softw..

[12]  Raphael C.-W. Phan,et al.  Tampering with a watermarking-based image authentication scheme , 2008, Pattern Recognit..

[13]  L. Sumalatha,et al.  Image Content Authentication based on Wavelet Edge Features , 2012 .

[14]  Frank Y. Shih,et al.  An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post-processing , 2012 .