An image fragile watermark scheme based on chaotic image pattern and pixel-pairs

Fragile watermarking techniques for digital content have been studied in the past few years. Fragile watermarks are used to determine if a piece of watermarked digital content has been tampered, and distinguish tampered areas from non-tampered areas without referring to the original digital content. In this paper, a general framework for fragile watermark is proposed, and then a novel fragile watermarking scheme for image authentication is presented. The embedding process of fragile watermark starts from computing the difference image between the host image and its chaotic pattern. followed by mapping the difference image into a binary image. The binary image is then inserted into the least significant bit (LSB) bitplane of the host image. In addition, chaotic map is used to generate the chaotic pattern image, which can be used as secret key to improve the security of watermark algorithm. Due to employing permutation transform and chaotic image pattern, the corresponding position relation is broken between pixels in the watermarked image and the watermark. Simulation results and performance analysis show that the presented method is fast, secure and capable of detecting and localizing modification.

[1]  Nasir D. Memon,et al.  On the Security of the Yeung Mintzer Authentication Watermark , 1999, PICS.

[2]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[3]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.

[4]  Sai Ho Kwok,et al.  Watermark-based copyright protection system security , 2003, CACM.

[5]  Shipeng Li,et al.  Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[6]  Deepa Kundur,et al.  Dual domain watermarking for authentication and compression of cultural heritage images , 2004, IEEE Transactions on Image Processing.

[7]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[8]  Shipeng Li,et al.  New attacks on SARI image authentication system , 2004, IS&T/SPIE Electronic Imaging.

[9]  Li Wenbo,et al.  A chaos-based robust wavelet-domain watermarking algorithm , 2004 .

[10]  Jiri Fridrich,et al.  New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[11]  Mauro Barni,et al.  A general framework for robust watermarking security , 2003, Signal Process..

[12]  Jui-Cheng Yen,et al.  Watermark embedded in permuted domain , 2001 .

[13]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[14]  Nasir D. Memon,et al.  Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.

[15]  Nasir D. Memon,et al.  Secret and public key authentication watermarking schemes that resist vector quantization attack , 2000, Electronic Imaging.

[16]  Jessica J. Fridrich,et al.  Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.

[17]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[18]  Nasir D. Memon,et al.  Further attacks on Yeung-Mintzer fragile watermarking scheme , 2000, Electronic Imaging.

[19]  Hua Yuan,et al.  Fragile watermark based on the Gaussian mixture model in the wavelet domain for image authentication , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[20]  S J Hickman,et al.  Seeing is not believing , 2005, British Journal of Ophthalmology.

[21]  Mohan S. Kankanhalli,et al.  Robust image authentication using content based compression , 2003, Multimedia Systems.

[22]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[23]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[24]  Ahmed H. Tewfik,et al.  Geometric Invariance in image watermarking , 2004, IEEE Transactions on Image Processing.

[25]  Shipeng Li,et al.  A secure image authentication algorithm with pixel-level tamper localization , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[26]  Rabab Kreidieh Ward,et al.  Wavelet packets-based digital watermarking for image verification and authentication , 2003, Signal Process..