Block-Chain Based Fragile Watermarking Scheme with Superior Localization

This paper proposes a block-chain based fragile watermarking scheme to address the issue of security and accuracy of tamper localization. The relationship between the security strength and block size is also discussed. In the proposed scheme, all blocks in the original image randomly form a linear chain based on the secret key in such a manner that the watermark of an image block is hidden in the next block in the block-chain. In the tamper detection process, the legitimacy of image block is determined by the adjacent blocks of the block and the following block in the block-chain. Compared with conventional block-wise fragile watermarking techniques, the proposed block-chain based scheme not only satisfactorily resists the VQ and collage attacks, but also improves the localization accuracy without sacrificing security. Moreover, the security strength is proposed to quantitatively evaluate the security ability of fragile watermarking techniques.

[1]  P. Barreto,et al.  Toward secure public-key blockwise fragile authentication watermarking , 2002 .

[2]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[3]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[4]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[5]  Nasir D. Memon,et al.  Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.

[6]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[7]  Xiao-Ping Zhang,et al.  Multiscale Fragile Watermarking Based on the Gaussian Mixture Model , 2006, IEEE Transactions on Image Processing.

[8]  Jiri Fridrich,et al.  Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[9]  Shan Suthaharan,et al.  Fragile image watermarking using a gradient image for improved localization and security , 2004, Pattern Recognit. Lett..

[10]  Xinpeng Zhang,et al.  Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels , 2007, IEEE Signal Processing Letters.

[11]  Thierry Pun,et al.  Secure hybrid robust watermarking resistant against tampering and copy attack , 2003, Signal Process..

[12]  Jessica J. Fridrich,et al.  Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.

[13]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[14]  Heng-Ming Tai,et al.  A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication , 2006, IWDW.

[15]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[16]  Hongxia Wang,et al.  Synchronous Counterfeiting Attacks on self-embedding Watermarking Schemes , 2006 .

[17]  R. H. Deng,et al.  Security of an ill-posed operator for image authentication , 2005 .

[18]  Ton Kalker,et al.  Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform , 2007, IEEE Transactions on Information Forensics and Security.