Authentication and recovery of images using multiple watermarks

A novel wavelet domain based semi-fragile watermarking scheme is presented for securing digital content and to concisely determine the regions where the integrity fails. In addition, another watermark is embedded to perform self-recovery in case of malicious attack. The security weaknesses of the traditional block-based approaches are circumvented by correlating the watermark bits with wavelet coefficients of the approximation subband of the host image. Semi-fragility exhibits robustness to JPEG compression, while recovery attribute makes the scheme suitable for video surveillance and remote sensing applications. Experimental investigations are performed to evaluate the performance of the proposed multiple semi-fragile watermarks and shows the suitability of the proposed approach for accurate authentication and recovery based applications.

[1]  Franco Bartolini,et al.  Self Recovery Authentication Of Images In The Dwt Domain , 2005, Int. J. Image Graph..

[2]  Asifullah Khan,et al.  Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding , 2007, Inf. Fusion.

[3]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[4]  Lakhmi C. Jain,et al.  Multiuser-based shadow watermark extraction system , 2007, Inf. Sci..

[5]  Asifullah Khan,et al.  Wavelet Based Image Authentication and Recovery , 2007, Journal of Computer Science and Technology.

[6]  Tung-Shou Chen,et al.  Image tamper detection and recovery system based on discrete wavelet transformation , 2001, 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233).

[7]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[8]  Tae-Sun Choi,et al.  Machine learning based adaptive watermark decoding in view of anticipated attack , 2008, Pattern Recognit..

[9]  Chang-Tsun Li Digital Watermarking Schemes for Multimedia Authentication , 2008 .

[10]  S.Y. Yang,et al.  A novel semi-fragile watermarking technique for image authentication , 2004, Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004..

[11]  Martin Steinebach,et al.  Semi-Fragile Watermarking for Image Authentication with High Tampering Localization Capability , 2006, 2006 Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution (AXMEDIS'06).

[12]  Malay Kumar Kundu,et al.  Dual purpose FWT domain spread spectrum image watermarking in real time , 2009, Comput. Electr. Eng..

[13]  Kôki Abe,et al.  A Semi-Fragile Watermarking Scheme Using Weighted Vote with Sieve and Emphasis for Image Authentication , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[14]  Chang-Tsun Li,et al.  Semi-fragile watermarking scheme for authentication of JPEG images , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[15]  Hongtao Lu,et al.  Robust watermarking based on DWT and nonnegative matrix factorization , 2009, Comput. Electr. Eng..

[16]  Deepa Kundur,et al.  Analysis and design of secure watermark-based authentication systems , 2006, IEEE Transactions on Information Forensics and Security.