A rough k-means fragile watermarking approach for image authentication

In the past few years, various fragile watermarking systems have been proposed for image authentication and tamper detection. In this paper, we propose a rough k-means (RKM) fragile watermarking approach with a block-wise dependency mechanism which can detect any alterations made to the protected image. Initially, the input image is divided into blocks with equal size in order to improve image tamper localization precision. By combining image local properties with human visual system, authentication data are acquired. By computing the class membership degree of each image block property, data are generated by applying rough k-means clustering to create the relationship between all image blocks and cluster all of them. The embed watermark is carried by least significant bits (LSBs) of each pixel within each block. The effectiveness of the proposed approach is demonstrated through a series simulations and experiments. Experimental results show that the proposed approach can embed watermark without causing noticeable visual artifacts, and does not only achieve superior tamper detection in images accurately, it also recovers tampered regions effectively. In addition, the results show that the proposed approach can effectively thwart different attacks, such as the cut-and paste attack and collage attack, while sustaining superior tamper detection and localization accuracy. Furthermore, the results show that the proposed approach can embed watermark without causing noticeable visual artifacts.

[1]  Pawan Lingras,et al.  Applications of Rough Set Based K-Means, Kohonen SOM, GA Clustering , 2007, Trans. Rough Sets.

[2]  Chin-Chen Chang,et al.  An efficient image authentication method based on Hamming code , 2007, Pattern Recognit..

[3]  Edward J. Delp,et al.  Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.

[4]  Heng-Ming Tai,et al.  A neighborhood-characteristic-based detection model for statistical fragile watermarking with localization , 2010, Multimedia Tools and Applications.

[5]  Chin-Chen Chang,et al.  A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..

[6]  Ajith Abraham,et al.  Rough Sets in Medical Imaging: Foundations and Trends , 2009 .

[7]  Jerzy W. Grzymala-Busse,et al.  Rough Sets , 1995, Commun. ACM.

[8]  Pawan Lingras,et al.  Interval Set Clustering of Web Users with Rough K-Means , 2004, Journal of Intelligent Information Systems.

[9]  Chang-Tsun Li,et al.  Digital watermarking scheme exploiting nondeterministic dependence for image authentication , 2006 .

[10]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[11]  Fei Peng,et al.  A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation , 2010, Comput. Aided Des..

[12]  Ming-Shi Wang,et al.  A majority-voting based watermarking scheme for color image tamper detection and recovery , 2007, Comput. Stand. Interfaces.

[13]  Zhenxing Qian,et al.  Reversible fragile watermarking for locating tampered blocks in JPEG images , 2010, Signal Process..

[14]  LuChun-Shien,et al.  Structural digital signature for image authentication , 2003 .

[15]  Agostino Cortesi,et al.  A Persistent Public Watermarking of Relational Databases , 2010, ICISS.

[16]  Ajith Abraham,et al.  Computational Intelligence in Solving Bioinformatics Problems: Reviews, Perspectives, and Challenges , 2008, Computational Intelligence in Biomedicine and Bioinformatics.