Image Content Authentication based on Wavelet Edge Features

Reversible image authentication has drawn a great attention for its ability to recover the original image from the watermarked image. The primary concern of authentication is to prevent from unauthorized manipulation of the image and hence has attained good importance. This paper proposes a block based reversible watermarking scheme for image authentication based on histogram modification of the differences between adjacent coefficients using DWT. A content watermark is computed from the image wavelet edge features (WEF) and is inserted into the vertical (LH) subband in a reversible manner. The proposed scheme restores the original image without any distortion from the marked image after the hidden data have been extracted. Also can detect and localize tampered areas of the watermarked image. Experimental results demonstrate the performance of the proposed scheme.

[1]  Chih-Hsien Kung,et al.  A Robust Watermarking and Image Authentication Scheme used for Digital Contant Application , 2009, J. Multim..

[2]  Shekhar Verma,et al.  Robust Watermarking of Image in the Transform Domain Using Edge Detection , 2009, 2009 11th International Conference on Computer Modelling and Simulation.

[3]  John N. Ellinas A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection , 2007 .

[4]  Qibin Sun,et al.  Robust Hash for Detecting and Localizing Image Tampering , 2007, 2007 IEEE International Conference on Image Processing.

[5]  Ralf Steinmetz,et al.  Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[6]  Tiago Rosa Maria Paula Queluz Towards robust, content based techniques for image authentication , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[7]  Hsueh-Ming Hang,et al.  A feature-based robust digital image watermarking scheme , 2003, IEEE Trans. Signal Process..

[8]  Osamah M. Al-Qershi,et al.  Authentication and Data Hiding Using a Reversible ROI-based Watermarking Scheme for DICOM Images , 2009 .

[9]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[10]  Chin-Chen Chang,et al.  Reversible Data Hiding Based on Histogram Modification of Pixel Differences , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[11]  Christophe De Vleeschouwer,et al.  Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..

[12]  M. Hemahlathaa,et al.  A feature-based robust digital image watermarking scheme , 2012, 2012 International Conference on Computing, Communication and Applications.

[13]  Yo-Sung Ho,et al.  Reversiblee Image Authentication Based on Watermarking , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[14]  Adeel Mumtaz,et al.  Digital Image Watermarking in the Wavelet Transform Domain , 2008 .

[15]  Wen-Hsiang Tsai,et al.  A new technique for authentication of image/video for multimedia applications , 2001, MM&Sec '01.

[16]  D. Storck,et al.  A New Approach to Integrity of Digital Images , 1996, IFIP World Conference on Mobile Communications.

[17]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[18]  hoo Bee Ee Authentication and Data Hiding Using a Reversible ROI-based Watermarking Scheme for DICOM Images , 2009 .

[19]  Der-Chyuan Lou,et al.  Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..

[20]  Korris Fu-Lai Chung,et al.  Feature based robust watermarking using image normalization , 2010, Comput. Electr. Eng..

[21]  Shengsheng Yu,et al.  Content-based watermarking scheme for image authentication , 2004, ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004..

[22]  Dong Hoon Shin,et al.  Study of Measures to Secure Video Phone Service Safety through a Preliminary Evaluationof the Information Security of the New IT Service , 2007 .

[23]  Roger Peplow,et al.  A Digital Watermarking Algorithm for Authentication and Tamper Detection , 2005 .