Feature based watermarking scheme for image authentication

Our previous paper, we proposed to use Zernike moments magnitudes (ZMMs) of the image for authentication. We demonstrated the good robustness and discriminative capability of this feature vector and proposed a structure embedding method for the watermark generated from this feature vector to locate the tampered area. In this paper, we extend and improve the algorithm in the following ways: 1) embedding watermark in an image will affect its feature vector, we split the original image into several spaces randomly, one for generating feature vector, one for embedding ZMM based watermark. Thus, we can remove the effect of watermarking itself on the feature vector generating, 2) presenting a two-stage authentication method and improve the discriminating capability of the authentication. Compared with the existing approaches, the proposed scheme has better performance of discriminating high quality JPEG compression from malicious manipulations.

[1]  Van Buskirk Em When seeing isn't believing. , 1997 .

[2]  Jiwu Huang,et al.  Image authentication using content based watermark , 2005, 2005 IEEE International Symposium on Circuits and Systems.

[3]  Roland T. Chin,et al.  On image analysis by the methods of moments , 1988, Proceedings CVPR '88: The Computer Society Conference on Computer Vision and Pattern Recognition.

[4]  Bin Zhu,et al.  When Seeing Isn’t Believing – Current Multimedia Authentication Technologies and Their Applications , 2004 .

[5]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.

[6]  Jiwu Huang,et al.  Binary Image Authentication using Zernike Moments , 2007, 2007 IEEE International Conference on Image Processing.

[7]  Hae Yong Kim,et al.  Secure authentication watermarking for binary images , 2003, 16th Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 2003).

[8]  Yuewei Dai,et al.  Multimedia data authentication in wavelet domain , 2006, SPIE Defense + Commercial Sensing.

[9]  Jana Dittmann Content-fragile watermarking for image authentication , 2001, IS&T/SPIE Electronic Imaging.

[10]  ContentChing-Yung Lin Semi-Fragile Watermarking for Authenti ating JPEG Visual , 2000 .

[11]  Xin Sun,et al.  New semi-fragile authentication watermarking , 2002 .

[12]  Shih-Fu Chang,et al.  New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Trans. Multim..