A robust multimedia authentication and restoration scheme in digital photography

Image authentication and restoration is an important area of modern research. In digital photography, copyright protection is very crucial. Visible signatures distract from the meaning of the photograph as well as they are easy to be removed by using advanced softwares. Invisible watermarks provide protection, offer a better look to photographs than visible watermarking, and prevent the photographs from unauthorized manipulations. A robust multiple watermarking scheme is required which could invisibly protect the content and also should survive the manipulations for later verification and restoration. In this paper, a robust and imperceptible multimedia authentication and restoration scheme is proposed. The security of Advanced Encryption Standard (AES) is utilized to make an encrypted watermark. The encrypted watermark is then embedded into photographs in the salient regions by proposed Feature-Closest Point Transform (F-CPT) algorithm. The second watermark is generated by wavelet decomposition and embedded in the second and third level wavelet sub-bands of the cover photographs. Several security attacks are performed e.g. noise attack, compression attack, resizing attack, rotation attack, collage attack, and cropping attack on multiple watermarked photographs to examine the system robustness by normalized cross correlation (NCC) for retrieved authentication watermarks. Result of PSNR, MSE, and SSIM show the high imperceptibility of our technique and aesthetic score (AS) shows the aesthetic quality of watermarked photographs (WPs).

[1]  Marian Cristian Mihaescu,et al.  Two Spatial Watermarking Techniques for Digital Images , 2010 .

[2]  Yu-Chee Tseng,et al.  Secure and invisible data hiding in 2-color images , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[3]  Azizah Abdul Manaf,et al.  Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking , 2012 .

[4]  Chin-Chen Chang,et al.  Reversible Data Hiding Based on Histogram Modification of Pixel Differences , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Dasu Vaman Ravi Prasad An Improved Invisible Watermarking Technique for Image Authentication , 2013 .

[6]  Sushil Jajodia,et al.  Information Hiding: Steganography and Steganalysis , 2005 .

[7]  Yu-Chee Tseng,et al.  A secure data hiding scheme for two-color images , 2000, Proceedings ISCC 2000. Fifth IEEE Symposium on Computers and Communications.

[8]  Chin-Chen Chang,et al.  Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism , 2012, Signal Process..

[9]  M. L. Valarmathi,et al.  A Study on Watermarking Schemes for Image Authentication , 2010 .

[10]  Asifullah Khan,et al.  Authentication and recovery of images using multiple watermarks , 2010, Comput. Electr. Eng..

[11]  Xingming Sun,et al.  Semi-Fragile Watermarking for Image Authentication and Tamper Detection Using HVS Model , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[12]  Leonidas J. Guibas,et al.  The Earth Mover's Distance as a Metric for Image Retrieval , 2000, International Journal of Computer Vision.

[13]  Matthew J. B. Robshaw,et al.  The Cryptanalysis of the AES - A Brief Survey , 2004, AES Conference.

[14]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[15]  Weilin Huang,et al.  Watermarking-based content authentication of motion-JPEG sequences , 2008 .

[16]  Frank Y. Shih Multimedia security : watermarking, steganography, and forensics , 2012 .

[17]  Edward J. Delp,et al.  Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.

[18]  Christof Paar,et al.  Introduction to Cryptography and Data Security , 2010 .

[19]  Asifullah Khan,et al.  Wavelet Based Image Authentication and Recovery , 2007, Journal of Computer Science and Technology.

[20]  Mohamed Ali Hajjaji,et al.  A Watermarking of Medical Image: Method Based "LSB" , 2011 .

[21]  James Ze Wang,et al.  Studying Aesthetics in Photographic Images Using a Computational Approach , 2006, ECCV.

[22]  Alessandro Piva,et al.  Cryptography and Data Hiding for Media Security , 2008 .

[23]  Feng Bao,et al.  Evaluating Ouda's Tamper-Localization Watermarking Scheme , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[24]  Darko Kirovski,et al.  Protection of Multimedia Content in Distribution Networks , 2006 .

[25]  Asifullah Khan,et al.  A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform , 2008 .

[26]  Lakhmi C. Jain,et al.  Multimedia Services in Intelligent Environments: Advanced Tools and Methodologies , 2008 .

[27]  A. Randall A Novel Semi-Fragile Watermarking Scheme with Iterative Restoration , 2009 .

[28]  Ahmed Al-Jaber,et al.  A Fragile Watermarking Algorithm for Content Authentication , 2005 .

[29]  Jun Tian,et al.  Wavelet-based reversible watermarking for authentication , 2002, IS&T/SPIE Electronic Imaging.

[30]  Adam Finkelstein,et al.  The PatchMatch randomized matching algorithm for image manipulation , 2011, Commun. ACM.

[31]  Chang-Tsun Li,et al.  Image integrity and authenticity verification via content-based watermarks and a public key cryptosystem , 2003 .

[32]  Kun Ho Lee,et al.  Aesthetic Score Assessment based on Generic Features in Digital Photography Sidra , 2012 .

[33]  Xinpeng Zhang,et al.  Fragile Watermarking With Error-Free Restoration Capability , 2008, IEEE Transactions on Multimedia.

[34]  Ali N. Akansu,et al.  CHAPTER 3 – Communication with Side Information and Data Hiding , 2004 .

[35]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[36]  D. Sathik,et al.  An Improved Invisible Watermarking Technique for Image Authentication , 2010 .

[37]  Kuo-Ming Hung,et al.  Automatic image authentication and recovery using multiple watermarks , 2012, 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT2012).