A secure fragile watermarking scheme based on chaos-and-hamming code

In this work, a secure fragile watermarking scheme is proposed. Images are protected and any modification to an image is detected using a novel hybrid scheme combining a two-pass logistic map with Hamming code. For security purposes, the two-pass logistic map scheme contains a private key to resist the vector quantization (VQ) attacks even though the embedding scheme is block independent. To ensure image integrity, watermarks are embedded into the to-be-protected images which are generated using Hamming code technique. Experimental results show that the proposed scheme has satisfactory protection ability and can detect and locate various malicious tampering via image insertion, erasing, burring, sharpening, contrast modification, and even though burst bits. Additionally, experiments prove that the proposed scheme successfully resists VQ attacks.

[1]  Shih-Fu Chang,et al.  Issues and solutions for authenticating MPEG video , 1999, Electronic Imaging.

[2]  Ioannis Pitas,et al.  A Comparative Study of Chaotic and White Noise Signals in Digital Watermarking , 2008 .

[3]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[4]  Rabab Kreidieh Ward,et al.  Wavelet packets-based digital watermarking for image verification and authentication , 2003, Signal Process..

[5]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[6]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[7]  Korris Fu-Lai Chung,et al.  Robust digital image watermarking based on subsampling , 2006, Appl. Math. Comput..

[8]  Richard W. Hamming,et al.  Error detecting and error correcting codes , 1950 .

[9]  Nasir D. Memon,et al.  Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.

[10]  Jessica J. Fridrich,et al.  Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.

[11]  Michael G. Strintzis,et al.  Robust image watermarking based on generalized Radon transformations , 2003, IEEE Trans. Circuits Syst. Video Technol..

[12]  Thierry Pun,et al.  Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..

[13]  Robert M. Gray,et al.  An Algorithm for Vector Quantizer Design , 1980, IEEE Trans. Commun..

[14]  Shu-Fen Tu,et al.  Probability-based tampering detection scheme for digital images , 2010 .

[15]  Li Wenbo,et al.  A chaos-based robust wavelet-domain watermarking algorithm , 2004 .

[16]  John G. Keating,et al.  Generation and detection of watermarks derived from chaotic functions , 2005, SPIE OPTO-Ireland.

[17]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[18]  Wen Gao,et al.  An image fragile watermark scheme based on chaotic image pattern and pixel-pairs , 2007, Appl. Math. Comput..

[19]  Mohan S. Kankanhalli,et al.  Robust image authentication using content based compression , 2003, Multimedia Systems.

[20]  Chin-Chen Chang,et al.  An efficient image authentication method based on Hamming code , 2007, Pattern Recognit..

[21]  Jiri Fridrich,et al.  New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[22]  Wenbo Liu,et al.  Color image authentication based on spatiotemporal chaos and SVD , 2008 .

[23]  Robert L. Devaney,et al.  A First Course In Chaotic Dynamical Systems: Theory And Experiment , 1993 .

[24]  Hsueh-Ming Hang,et al.  A feature-based robust digital image watermarking scheme , 2003, IEEE Trans. Signal Process..