Image Contents Verification Algorithm using Transform Domain Techniques

rapid growth of digital multimedia and Internet technologies has made data security as an important issue in digital world. Encryption techniques are used to achieve data confidentiality, and this paper proposes a novel integrity verification method for images during transit. The confidential image is first divided into dedicated number of blocks; a discrete transform domain algorithm is used to embed a block based mark of the same image in another block according to a specific algorithm. In this work, the popular discrete transform domains, such as the discrete cosine transform (DCT), discrete Fourier transforms (DFT), and discrete wavelet transform (DWT) are examined individually. Different image analyses and comparisons are verified to examine the suitability of proposed algorithm with these domains. The discrete cosine transform (DCT) proved to be more efficient transform domain used with the proposed scheme. Higher sensitivity to simple modifications makes proposed scheme more applicable tool for image integrity verification with hyper secure data transformations such military and nuclear applications.

[1]  Zhigeng Pan,et al.  A Contour-Based Semi-fragile Image Watermarking Algorithm in DWT Domain , 2010, 2010 Second International Workshop on Education Technology and Computer Science.

[2]  R. Petrovic,et al.  Digital watermarks for audio integrity verification , 2005, TELSIKS 2005 - 2005 uth International Conference on Telecommunication in ModernSatellite, Cable and Broadcasting Services.

[3]  K. B. Shiva Kumar,et al.  Coherent steganography using Segmentation and DCT , 2010, 2010 IEEE International Conference on Computational Intelligence and Computing Research.

[4]  Hao Zhou,et al.  Semi-fragile Watermarking Technique for Image Tamper Localization , 2009, 2009 International Conference on Measuring Technology and Mechatronics Automation.

[5]  Chang-Tsun Li,et al.  One-dimensional neighborhood forming strategy for fragile watermarking , 2003, J. Electronic Imaging.

[6]  Ming-Shi Wang,et al.  A fuzzy c-means clustering-based fragile watermarking scheme for image authentication , 2009, Expert Syst. Appl..

[7]  Long-Wen Chang,et al.  Semi-fragile watermarking for image authentication, localization, and recovery using Tchebichef moments , 2010, 2010 10th International Symposium on Communications and Information Technologies.

[8]  Martin F. H. Schuurmans,et al.  Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.

[9]  Shih-Fu Chang,et al.  New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Transactions on Multimedia.

[10]  Wang Xiang A Novel Adaptive Semi-fragile Watermarking Scheme Based on Image Content , 2007 .

[11]  Edward J. Delp,et al.  A Review of Fragile Image Watermarks , 2007 .

[12]  Reecha Sharma,et al.  The Performance Of Fractal Image Compression On Different Imaging Modalities Using Objective Quality Measures , 2014 .

[13]  Shih-Fu Chang,et al.  New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Trans. Multim..

[14]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[15]  Sarbani Palit,et al.  Blind assessment of image quality employing fragile watermarking , 2011, 2011 7th International Symposium on Image and Signal Processing and Analysis (ISPA).

[16]  Min-Jen Tsai,et al.  A wavelet-based semi-fragile watermarking with recovery mechanism , 2008, 2008 IEEE International Symposium on Circuits and Systems.