Digital Watermarking for Image Tamper Detection using Block-Wise Technique

Fragile watermarking has the characteristics where the inserted watermark should be easily breakable for a trivial tampering of the image. So, fragile watermarking technique is proposed for the purpose of authentication or tamper detection. In this paper, we propose an efficient image tamper detection method using block-wise technique which is able to detect the tamper locations. In the proposed method, a digital signature is generated from the hash code of the blocks of the final level where the watermark is inserted and the blocks of the upper level where those blocks are included in the image division process and this signature is used as the watermark, which is randomly inserted into selected image blocks. As the result of experiment, the proposed method was confirmed to be able to detect the tampered parts of the image without testing the entire block of the watermarked image.

[1]  A. Murat Tekalp,et al.  Localized lossless authentication watermark (LAW) , 2003, IS&T/SPIE Electronic Imaging.

[2]  S. Singh,et al.  Face Tampering Detection from Single Face Image using Gradient Method , 2013 .

[3]  Azizah Abdul Manaf,et al.  Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking , 2012 .

[4]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[5]  Jihah Nah,et al.  Digital Watermarking Robust to Geometric Distortions , 2012 .

[6]  Nasir D. Memon,et al.  Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.

[7]  Chien-Chang Chen,et al.  A wavelet-based public key image authentication watermarking , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..

[8]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[9]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[10]  Mehdi Hussain,et al.  Information Hiding Using Edge Boundaries of Objects , 2011 .

[11]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[12]  A. A. Manaf,et al.  Efficient Two Level Image Tamper Detection Using Three LSB Watermarking , 2012, 2012 Fourth International Conference on Computational Intelligence and Communication Networks.

[13]  Jean-Paul M. G. Linnartz,et al.  Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.

[14]  Wei-Kuan Shih,et al.  Watermarking for Multi-resolution Image Authentication , 2012 .