An Adaptive Data Hiding Technique for Digital Image Authentication

The proposed scheme combines the advantages of cryptographic concept and imperceptibility feature of digital image watermarking in spatial domain. The watermark is first generated based on one-way hash function with the help of user key. Each bit of this new generated watermark is then embedded into respective blocks of the original image, in raster scan order. The embedding is performed by modifying the average value of pixel intensity of each block within a range specified by the contrast value for a given block. This reduces the effects of the modification as perceived by the human eye. The extraction procedure computes and compares the sum of the pixels values for the blocks of the original and watermarked image. The results demonstrates the robustness of scheme against common image processing operations like cropping, modification, low pass filter, median pass filter, scaled down and lossy JPEG compression with various quality index factor. Results also illustrate that the watermark is secure, recoverable and recognizable even after the watermarked image has been tampered, forged and modified by common image processing operations. The comparative study of proposed scheme with existing scheme has also been performed to observe the strength of the scheme.

[1]  Borka Jerman-Blazic Security in value added networks—security requirements for EDI , 1991 .

[2]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[3]  I-Chang Jou,et al.  A Gray Level Watermarking Algorithm Using Double Layer Hidden Approach , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[4]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[5]  Peter Wayner,et al.  Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition) , 2002 .

[6]  Peter Wayner,et al.  Disappearing Cryptography: Information Hiding: Steganography and Watermarking , 2008 .

[7]  Borka Dzonova-jerman-blazic Security in value added networks - security requirements for EDI , 1991 .

[8]  K. Tanaka,et al.  Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.

[9]  Minerva M. Yeung,et al.  Invisible watermarking for image verification , 1998, J. Electronic Imaging.

[10]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[11]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[12]  P. Barreto,et al.  Toward secure public-key blockwise fragile authentication watermarking , 2002 .

[13]  Chin-Chen Chang,et al.  A watermarking technique based on one-way hash functions , 1999, IEEE Trans. Consumer Electron..

[14]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..