A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization

Utilize relationships of singular values to extract content-dependent watermark.Merge relationships of singular values to choose adaptive quantizer for each block.Apply adaptive quantization to embed secure watermark in the wavelet domain.Define a 3-level authentication process to detect authenticity and prove tampering.Use five measures to compensate misclassification and capture distortions. This paper presents a singular-value-based semi-fragile watermarking scheme for image content authentication. The proposed scheme generates secure watermark by performing a logical operation on content-dependent watermark generated by a singular-value-based sequence and content-independent watermark generated by a private-key-based sequence. It next employs the adaptive quantization method to embed secure watermark in approximation subband of each 4i?4 block to generate the watermarked image. The watermark extraction process then extracts watermark using the parity of quantization results from the probe image. The authentication process starts with regenerating secure watermark following the same process. It then constructs error maps to compute five authentication measures and performs a three-level process to authenticate image content and localize tampered areas. Extensive experimental results show that the proposed scheme outperforms five peer schemes and its two variant systems and is capable of identifying intentional tampering, incidental modification, and localizing tampered regions under mild to severe content-preserving modifications.

[1]  H. Perez,et al.  Image content authentication system based on semi-fragile watermarking , 2008, 2008 51st Midwest Symposium on Circuits and Systems.

[2]  Xiang Zhou,et al.  A semifragile watermark scheme for image authentication , 2004, 10th International Multimedia Modelling Conference, 2004. Proceedings..

[3]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[4]  Fan Chen,et al.  A Restorable Semi-fragile Watermarking Combined DCT with Interpolation , 2013, IWDW.

[5]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[6]  Edward J. Delp,et al.  Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.

[7]  Shih-Fu Chang,et al.  New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Transactions on Multimedia.

[8]  Hazem Al-Otum,et al.  Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique , 2014, J. Vis. Commun. Image Represent..

[9]  Chang-Tsun Li,et al.  Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain , 2007, Third International Symposium on Information Assurance and Security.

[10]  De-Zhi Han,et al.  Using two semi-fragile watermark for image authentication , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[11]  Xiaojun Qi,et al.  A robust content-based digital image watermarking scheme , 2007, Signal Process..

[12]  Jean-Luc Dugelay,et al.  A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..

[13]  Radu Ovidiu Preda,et al.  Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain , 2013 .

[14]  Sheng-Bing Che,et al.  Semi-fragile image watermarking algorithm based on visual features , 2007, 2007 International Conference on Wavelet Analysis and Pattern Recognition.

[15]  Zhenxing Qian,et al.  Reversible fragile watermarking for locating tampered blocks in JPEG images , 2010, Signal Process..

[16]  Min-Jen Tsai,et al.  Authentication and recovery for wavelet-based semifragile watermarking , 2008 .

[17]  F. Chung,et al.  Fragile watermarking scheme for image authentication , 2003 .

[18]  Zhenxing Qian,et al.  Reference Sharing Mechanism for Watermark Self-Embedding , 2011, IEEE Transactions on Image Processing.

[19]  Asifullah Khan,et al.  Digital image authentication and recovery: Employing integer transform based information embedding and extraction , 2010, Inf. Sci..

[20]  Bin Ma,et al.  A Secure Semi-fragile Self-recoverable Watermarking Algorithm Using Group-Based Wavelet Quantization , 2012, PCM.

[21]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[22]  Xingming Sun,et al.  Semi-Fragile Watermarking for Image Authentication and Tamper Detection Using HVS Model , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[23]  Lu Zheng-ding Semi-Fragile Watermarking Scheme for Image Authentication , 2005 .

[24]  Shao Jinyou,et al.  モアレ干渉縞パターンを用いたインプリントリソグラフィのアライメントの測定法 | 文献情報 | J-GLOBAL 科学技術総合リンクセンター , 2008 .

[25]  Fan Chen,et al.  A semi-fragile image watermarking algorithm with two-stage detection , 2012, Multimedia Tools and Applications.

[26]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[27]  Chin-Chen Chang,et al.  Adaptive self-recovery for tampered images based on VQ indexing and inpainting , 2013, Signal Process..

[28]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[29]  Chin-Chen Chang,et al.  Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism , 2012, Signal Process..

[30]  Jiwu Huang,et al.  Image authentication using content based watermark , 2005, 2005 IEEE International Symposium on Circuits and Systems.

[31]  Zi-Quan Hong,et al.  Algebraic feature extraction of image for recognition , 1991, Pattern Recognit..

[32]  Liping Shao,et al.  A Fast Semi-Fragile Watermarking Scheme Based on Quantizing the Weighted Mean of Integer Haar Wavelet Coefficients , 2012, 2012 Symposium on Photonics and Optoelectronics.

[33]  Din-Chang Tseng,et al.  Perceptual Digital Watermarking for Image Authentication in Electronic Commerce , 2004, Electron. Commer. Res..

[34]  Chang-Tsun Li,et al.  Semi-fragile watermarking scheme for authentication of JPEG images , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[35]  HuoYaoran,et al.  A semi-fragile image watermarking algorithm with two-stage detection , 2014 .

[36]  Tarunraj Singh,et al.  Parseval’s Theorem , 2009 .

[37]  Xing Xin,et al.  A quantization-based semi-fragile watermarking scheme for image content authentication , 2011, J. Vis. Commun. Image Represent..

[38]  Takuji Nishimura,et al.  Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.

[39]  Tong Liu,et al.  The survey of digital watermarking-based image authentication techniques , 2002, 6th International Conference on Signal Processing, 2002..