Watermarking-based image authentication with recovery capability using halftoning technique

In this paper two watermarking algorithms for image content authentication with localization and recovery capability of the tampered regions are proposed. In both algorithms, a halftone version of the original gray-scale image is used as an approximated version of the host image (image digest) which is then embedded as a watermark sequence into given transform domains of the host image. In the first algorithm, the Integer Wavelet Transform (IWT) is used for watermark embedding which is denominated WIA-IWT (Watermarking-based Image Authentication using IWT), while in the second one, the Discrete Cosine Transform (DCT) domain is used for this purpose, we call this algorithm WIA-DCT (Watermarking-based Image Authentication using DCT). In the authentication stage the tampered regions are detected using the Structural Similarity index (SSIM) criterion, which are then recovered using the extracted halftone image. In the recovery stage, a Multilayer Perceptron (MLP) neural network is used to carry out an inverse halftoning process to improve the recovered image quality. The experimental results demonstrate the robustness of both algorithms against content preserved modifications, such as JPEG compression, as well as an effective authentication and recovery capability. Also the proposed algorithms are compared with some previously proposed content authentication algorithms with recovery capability to show the better performance of the proposed algorithms.

[1]  Franco Bartolini,et al.  Self Recovery Authentication Of Images In The Dwt Domain , 2005, Int. J. Image Graph..

[2]  Shu-Chuan Chu,et al.  Self Embedding Watermarking Using Halftoning Technique , 2008 .

[3]  Zhou Wang,et al.  Image Quality Assessment: From Error Measurement to Structural Similarity , 2004 .

[4]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[5]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[6]  Xing Xin,et al.  A quantization-based semi-fragile watermarking scheme for image content authentication , 2011, J. Vis. Commun. Image Represent..

[7]  Ingemar J. Cox,et al.  Copy protection for DVD video , 1999, Proc. IEEE.

[8]  Ton Kalker,et al.  A robust image fingerprinting system using the Radon transform , 2004, Signal Process. Image Commun..

[9]  Vishal Monga,et al.  Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.

[10]  Shuenn-Shyang Wang,et al.  Automatic image authentication and recovery using fractal code embedding and image inpainting , 2008, Pattern Recognit..

[11]  Mariko Nakano-Miyatake,et al.  Halftoning-based self-embedding watermarking for image authentication and recovery , 2010, 2010 53rd IEEE International Midwest Symposium on Circuits and Systems.

[12]  Kôki Abe,et al.  A Semi-Fragile Watermarking Scheme Using Weighted Vote with Sieve and Emphasis for Image Authentication , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[13]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[14]  Asifullah Khan,et al.  Authentication and recovery of images using multiple watermarks , 2010, Comput. Electr. Eng..

[15]  M. Mese,et al.  Recent Advances in Digital Halftoning and Inverse Halftoning Methods , 2002 .

[16]  Asifullah Khan,et al.  Digital image authentication and recovery: Employing integer transform based information embedding and extraction , 2010, Inf. Sci..

[17]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[18]  Ke Ding,et al.  Wavelet-Based Semi-Fragile Watermarking with Tamper Detection , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[19]  Zhenxing Qian,et al.  Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction , 2011, IEEE Transactions on Information Forensics and Security.

[20]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[21]  Amit Phadikar,et al.  Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images , 2012, J. Vis. Commun. Image Represent..

[22]  Ammar M. Hassan,et al.  Tamper detection with self-correction hybrid spatial-DCT domains image authentication technique , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).

[23]  Mariko Nakano,et al.  Semi-fragile watermarking based content image authentication scheme , 2010 .

[24]  Jana Dittmann Content-fragile watermarking for image authentication , 2001, IS&T/SPIE Electronic Imaging.

[25]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[26]  P. Guevara,et al.  Basic definitions for discrete modeling of computer worms epidemics , 2015 .

[27]  Mariko Nakano Miyatake,et al.  Semi-Fragile Watermarking Based Image Authentication with Recovery Capability , 2009, 2009 International Conference on Information Engineering and Computer Science.

[28]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[29]  Jeng-Shyang Pan,et al.  Self Embedding Watermarking Scheme Using Halftone Image , 2008, IEICE Trans. Inf. Syst..

[30]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[31]  Shih-Fu Chang,et al.  New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Trans. Multim..

[32]  Helen Treharne,et al.  A Novel Semi-Fragile Image Watermarking, Authentication and Self-Restoration Technique Using the Slant Transform , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[33]  Yong Huang,et al.  Texture decomposition by harmonics extraction from higher order statistics , 2004, IEEE Trans. Image Process..

[34]  Shinfeng D. Lin,et al.  Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..

[35]  Shih-Fu Chang,et al.  New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Transactions on Multimedia.

[36]  Ioannis Pitas,et al.  Embedding robust watermarks by chaotic mixing , 1997, Proceedings of 13th International Conference on Digital Signal Processing.

[37]  Jiri Fridrich,et al.  Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).