Content-Based Watermarking for Image Authentication Using Independent Component Analysis

This paper proposes a novel approach to content-based watermarking for image authentication that is based on Independent Component Analysis (ICA). In the scheme proposed here, ICA is applied to blocks of the host image and the resulting mixing matrix represents the features of the image blocks. Frobenius norm of the mixing matrix is adopted as the content-based feature. This is embedded as the watermark in a mid-frequency DCT coefficient of the block. This authentication technique is robust against incidental image processing operations, but detects malicious tampering and correctly locates the tampered regions. Povzetek: Predlagana je nova metoda avtentikacije slik.

[1]  James V. Stone Independent component analysis: an introduction , 2002, Trends in Cognitive Sciences.

[2]  Bogdan Matei,et al.  A Review of Independent Component Analysis Techniques , 2022 .

[3]  R. M. Everson,et al.  Independent Component Analysis: Introduction , 2001 .

[4]  Chai Wah Wu Limitations and requirements of content-based multimedia authentication systems , 2001, IS&T/SPIE Electronic Imaging.

[5]  Qiuqi Ruan,et al.  Secure semi-blind watermarking based on iteration mapping and image features , 2005, Pattern Recognit..

[6]  Marco Ferretti,et al.  A taxonomy for image authentication techniques and its application to the current state of the art , 2001, Proceedings 11th International Conference on Image Analysis and Processing.

[7]  Juan José Murillo-Fuentes,et al.  Independent component analysis applied to digital image watermarking , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[8]  Franco Bartolini,et al.  Standard metadata embedding in a digital image , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[9]  Nasir D. Memon,et al.  Distortion-bounded authentication techniques , 2000, Electronic Imaging.

[10]  David Saad,et al.  ICA for Watermarking Digital Images , 2003, J. Mach. Learn. Res..

[11]  Yen-Wei Chen,et al.  Robust multi-logo watermarking by RDWT and ICA , 2006, Signal Process..

[12]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[13]  Edward J. Delp,et al.  Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.

[14]  Ju Liu,et al.  A DIGITAL WATERMARKING SCHEME BASED ON ICA DETECTION , 2003 .

[15]  Arto Kaarna,et al.  Watermarking Spectral Images Through the PCA Transform , 2003, PICS.

[16]  Won-Hyung Lee,et al.  A Robust Image Watermarking Technique for JPEG Images Using QuadTrees , 2004, PCM.

[17]  Kai-Kuang Ma,et al.  Watermark Detection and Extraction Using Independent Component Analysis Method , 2002, EURASIP J. Adv. Signal Process..

[18]  Chang-Tsun Li,et al.  Image authentication and integrity verification via content-based watermarks and a public key cryptosystem , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[19]  Alex ChiChung Kot,et al.  Binary Image Authentication With Tampering Localization by Embedding Cryptographic Signature and Block Identifier , 2006, IEEE Signal Processing Letters.

[20]  Po-Whei Huang,et al.  A fragile watermarking scheme for image authentication with localization and recovery , 2004, IEEE Sixth International Symposium on Multimedia Software Engineering.

[21]  Liu Ju A Digital Watermarking Scheme Based on ICA , 2003 .

[22]  Chai Wah Wu,et al.  On the design of content-based multimedia authentication systems , 2002, IEEE Trans. Multim..

[23]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[24]  Minfen Shen,et al.  A METHOD FOR DIGITAL IMAGE WATERMARKING USING ICA , 2003 .

[25]  Aapo Hyvärinen,et al.  Survey on Independent Component Analysis , 1999 .

[26]  Jagdish Chandra Patra,et al.  Digital Image Watermarking Using Independent Component Analysis , 2004, PCM.