An SVD-based fragile watermarking scheme with grouped blocks

This paper proposes a novel fragile watermarking scheme for digital image authentication which is based on Singular Value Decomposition(SVD) and grouped blocks. The watermark bits which include two types of bits are inserted into the least significant bit(LSB) plane of the host image using the adaptive chaotic map to determine the positions. The groped blocks break the block-wise independence and therefore can withstand the Vector Quantization attack(VQ attack). The inserting positions are related to the statistical information of image block data, in order to increase the security and provide an auxiliary way to authenticate the image data. The effectiveness of the proposed scheme is checked by a variety of attacks, and the experimental results prove that it has a remarkable tamper detection ability and also has a precise locating ability.

[1]  Chun-Chi Lo,et al.  Probability-based Tamper Detection Scheme for BTC-compressed Images Based on Quantization Levels Modification , 2013 .

[2]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[3]  Tieniu Tan,et al.  An SVD-based watermarking scheme for protecting rightful ownership , 2002, IEEE Trans. Multim..

[4]  Balasubramanian Raman,et al.  A chaotic system based fragile watermarking scheme for image tamper detection , 2011 .

[5]  Xinpeng Zhang,et al.  Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels , 2007, IEEE Signal Processing Letters.

[6]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[7]  Shan Suthaharan,et al.  Fragile image watermarking using a gradient image for improved localization and security , 2004, Pattern Recognit. Lett..

[8]  John G. Keating,et al.  Performance analysis of chaotic and white watermarks in the presence of common watermark attacks , 2009 .

[9]  Rita Noumeir,et al.  Methods for image authentication: a survey , 2008, Multimedia Tools and Applications.

[10]  Kaoru Kurosawa,et al.  On Parallel Hash Functions Based on Block-Ciphers , 2003, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[11]  Rui Sun,et al.  A SVD- and quantization based semi-fragile watermarking technique for image authentication , 2002, 6th International Conference on Signal Processing, 2002..

[12]  Wen Gao,et al.  An image fragile watermark scheme based on chaotic image pattern and pixel-pairs , 2007, Appl. Math. Comput..

[13]  Yongjun Ren,et al.  Designated-Verifier Provable Data Possession in Public Cloud Storage , 2013 .

[14]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[15]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..

[16]  Chih-Chin Lai,et al.  A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm , 2011, Digit. Signal Process..

[17]  Ninghui Li,et al.  Oblivious signature-based envelope , 2003, PODC.

[18]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[19]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.

[20]  Weisi Lin Multimedia Analysis, Processing and Communications , 2011 .