Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization

There is a great adventure of watermarking usage in the context of conventional authentication since it does not require additional storage space for supplementary metadata. However JPEG compression, being a conventional method to compress images, leads to exact authentication breaking. We discuss a semi-fragile watermarking system for digital images tolerant to JPEG/JPEG2000 compression. Recently we have published a selective authentication method based on Zernike moments. But unfortunately it has large computational complexity and not sufficiently good detection of small image modifications. In the current paper it is proposed (in contrast to Zernike moments approach) the usage of image finite differences and 3-bit quantization as the main technique. In order to embed a watermark (WM) into the image, some areas of the Haar wavelet transform coefficients are used. Simulation results show a good resistance of this method to JPEG compression with $\mbox{\rm CR}\leq 30\%$ (Compression Ratio), high probability of small image modification recognition, image quality assessments $\mbox{\rm PSNR}\geq 40$ (Peak signal-to-noise ratio) dB and $\mbox{\rm SSIM}\geq 0.98$ (Structural Similarity Index Measure) after embedding and lower computation complexity of WM embedding and extraction. All these properties qualify this approach as effective.

[1]  David Eberly,et al.  Derivative Approximation by Finite Differences , 2016 .

[2]  Yun Q. Shi,et al.  Reversible Data Hiding , 2003, IWDW.

[3]  Shahram Shirani,et al.  Subjective and Objective Quality Assessment of Image: A Survey , 2014, ArXiv.

[4]  G. H. Raisoni,et al.  A Semi Fragile Watermarking Algorithm Based on SVD-IWT for Image Authentication , 2012 .

[5]  Ajaz Hussain Mir,et al.  Digital Image Forgeries and Passive Image Authentication Techniques: A Survey , 2014 .

[6]  Guillermo Morales-Luna,et al.  Selective image authentication tolerant to JPEG compression , 2015, 2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA).

[7]  Venkatesan Guruswami Iterative Decoding of Low-Density Parity Check Codes , 2006, Bull. EATCS.

[8]  Ralf Steinmetz,et al.  Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[9]  Mohammed Ghanbari,et al.  Scope of validity of PSNR in image/video quality assessment , 2008 .

[10]  Mauro Barni,et al.  Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .

[11]  Robert G. Gallager,et al.  Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.

[12]  Mohammed Yakoob Siyal,et al.  A Robust and Secure Signature Scheme for Video Authentication , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[13]  Jiwu Huang,et al.  Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication , 2010, EURASIP J. Adv. Signal Process..

[14]  Piotr Porwik,et al.  The Haar – Wavelet Transform in Digital Image Processing : Its Status and Achievements , 2004 .

[15]  Guillermo Morales-Luna,et al.  Image Authentication Based on Modular Embedding , 2006, IEICE Trans. Inf. Syst..

[16]  Rui Du,et al.  Invertible authentication watermark for JPEG images , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[17]  Jessica J. Fridrich,et al.  Distortion-Free Data Embedding for Images , 2001, Information Hiding.

[18]  Rita Noumeir,et al.  Methods for image authentication: a survey , 2008, Multimedia Tools and Applications.

[19]  Shuihua Han,et al.  Content-based image authentication: current status, issues, and challenges , 2009, International Journal of Information Security.