Secure Semi-Fragile Watermarking for Image Authentication Based on Parameterized Integer Wavelet

With the tremendous amount of images distributed over Internet, image authentication has drawn extensive attention for integrity verification. For instance, watermarking fragile to malicious modifications while robust to data compression has been proposed for image authentication. However, the security of wa- termark has not received enough attention yet. In this paper, we propose a secure semi-fragile watermarking scheme for image authentication based on integer wavelet transform with parameters. The features of the pro- posed scheme are as follows. Firstly, parameterized integer wavelet transform is adopted. The wavelet base is chosen by a parameter. It is impossible to extract the watermark without the exact parameter and thus the se- curity of the watermark is guaranteed. Secondly, the performance of the generated watermark is improved and the computational complexity is reduced due to the lifting scheme used in the proposed framework of param- eterized integer wavelet transform. Thirdly, the proposed watermark can tolerate JPEG lossy compression to a quality factor as low as 40, while being sensitive to malicious attack and able to locate the tampered area ac- curately. Experimental results demonstrate the merits of the proposed algorithm.

[1]  I. Daubechies,et al.  Biorthogonal bases of compactly supported wavelets , 1992 .

[2]  John D. Villasenor,et al.  Visibility of wavelet quantization noise , 1997, IEEE Transactions on Image Processing.

[3]  Jang-Ping Sheu,et al.  Mean quantization blind watermarking for image authentication , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[4]  Deepa Kundur,et al.  Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[5]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[6]  Andreas Uhl,et al.  Key-dependent pyramidal wavelet domains for secure watermark embedding , 2003, IS&T/SPIE Electronic Imaging.

[7]  Jiwu Huang,et al.  Image fragile watermarking based on fusion of multi-resolution tamper detection , 2002 .

[8]  Zhong Guang-jun,et al.  A simple 9/7-tap wavelet filter based on lifting scheme , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[9]  Wim Sweldens,et al.  Building your own wavelets at home , 2000 .

[10]  A. Miyazaki,et al.  Wavelet-based watermarking for tamper proofing of still images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[11]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[12]  Ingemar J. Cox,et al.  The First 50 Years of Electronic Watermarking , 2002, EURASIP J. Adv. Signal Process..

[13]  I. Daubechies,et al.  Factoring wavelet transforms into lifting steps , 1998 .

[14]  Daren Huang,et al.  A robust DWT-based blind data hiding algorithm , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[15]  Andreas Uhl,et al.  Protection of wavelet-based watermarking systems using filter parametrization , 2003, Signal Process..

[16]  I. Daubechies,et al.  Wavelet Transforms That Map Integers to Integers , 1998 .