Semi fragile watermarking using Gaussian mixture model for malicious image attacks

In this paper, the requirements, techniques and applications of digital watermarking for high-quality images were discussed. The several classes of digital watermarking techniques defined by their appearance and application domains specify the requirements and summarize the current research efforts in the image applications. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. For robustness this algorithm should resist all kinds of attacks, such as common signal processing operators, geometric attacks and so on.

[1]  Xinge You,et al.  A Blind Watermarking Scheme Using New Nontensor Product Wavelet Filter Banks , 2010, IEEE Transactions on Image Processing.

[2]  Lahouari Ghouti,et al.  Digital image watermarking using balanced multiwavelets , 2006, IEEE Transactions on Signal Processing.

[3]  Tiago Rosa Maria Paula Queluz,et al.  Spatial watermark for image verification , 2000, Electronic Imaging.

[4]  Mauro Barni,et al.  Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..

[5]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[6]  Xiao-Ping Zhang,et al.  Multiscale Fragile Watermarking Based on the Gaussian Mixture Model , 2006, IEEE Transactions on Image Processing.

[7]  Justin K. Romberg,et al.  Bayesian tree-structured image modeling using wavelet-domain hidden Markov models , 2001, IEEE Trans. Image Process..

[8]  Jiwu Huang,et al.  Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition , 2007, IEEE Transactions on Image Processing.

[9]  H. K. Garg,et al.  Maximum-likelihood detection in DWT domain image watermarking using Laplacian modeling , 2005, IEEE Signal Processing Letters.

[10]  Chih-Chin Lai,et al.  Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition , 2010, IEEE Transactions on Instrumentation and Measurement.

[11]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[12]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[13]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[14]  Sheng-He Sun,et al.  Multipurpose image watermarking algorithm based on multistage vector quantization , 2005, IEEE Transactions on Image Processing.