Authentication and tamper detection in images using dual watermarking approach

Watermarking of multimedia content is important to authenticate, copy-control and ownership detection. In this paper, multimedia authentication and tamper detection scheme is proposed with the security of AES(Advanced Encryption Standard) ciphered watermarking and hash function. The algorithm embeds two watermarks in the host image for authentication and tamper detection. We first used Unique Identification Code (UIC) as first robust watermark which is then embedded using the 2-level discrete wavelet transform. Hash code of host image is calculated and used as secondary watermark for tamper detection. This method is blind in nature. The PSNR, SSIM values are used as a metric to test the efficiency of the enhanced watermarking technique. The results show that the imperceptibility of method is high as compared to the existing.

[1]  Stéphane Bounkong Digital image watermarking , 2004 .

[2]  Imed Riadh Farah,et al.  A Watermarking System Using the Wavelet Technique for Satellite Images , 2008 .

[3]  NIKITA KASHYAP Image Watermarking Using 2-level Dwt , 2012 .

[4]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[5]  Wilhelm Burger,et al.  Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.

[6]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[7]  R. Abd-Alhameed,et al.  A new robust and fragile watermarking scheme for images captured by mobile phone cameras , 2013, 2013 1st International Conference on Communications, Signal Processing, and their Applications (ICCSPA).

[8]  Alan G. Konheim Hashing in Computer Science: Fifty Years of Slicing and Dicing , 2010 .

[9]  Sang-Woong Lee,et al.  Image authentication and restoration by multiple watermarking techniques with advance encryption standard in digital photography , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).

[10]  Jun-Dong Chang,et al.  LBP-based fragile watermarking scheme for image tamper detection and recovery , 2013, 2013 International Symposium on Next-Generation Electronics.