A Gradient image dependent fragile watermarking for improved security and localization

Most fragile watermarking techniques are block-wise independent based schemes. They are either vulnerable to vector quantization (VQ) attack or sacrifice localization accuracy to improve security. This paper presents a gradient image dependent fragile watermarking scheme, which thwarts VQ attack while providing superior localization properties. The proposed technique provides distinct input keys for each image block from a large (1024! - 8770-bits entries) key space, a master key, a session key and block-wise permutated versions of a gradient image. The watermarking scheme requires only the master key (one time exchange) and the session key (each session) to be exchanged between the communication parties securely. Analysis and experimental results indicate that the proposed method possess better authentication and tamper detection capabilities compared to many other fragile watermarking schemes available in the literature. It can also be seen that the proposed scheme is suitable for both digital images and video.

[1]  A. Murat Tekalp,et al.  A hierarchical image authentication watermark with improved localization and security , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[2]  Shan Suthaharan,et al.  A perceptually significant block-edge impairment metric for digital video coding , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[3]  Nasir D. Memon,et al.  Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.

[4]  Jessica J. Fridrich,et al.  Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.

[5]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[6]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[7]  Minerva M. Yeung,et al.  Fragile imperceptible digital watermark with privacy control , 1999, Electronic Imaging.