A novel color palette image authentication scheme

In this paper, a digital fragile watermarking technique is proposed to aim for protecting the content of a color palette image. This technique is based on the palette clustering to facilitate the authentication of the image integrity. First, the image to be protected is partitioned into non-overlapped blocks where block features are calculated by the clustering information conducted on the color palette. The block features are considered as the unique authentication information, which are later embedded into the index values of the color palette using the least significant bit (LSB) substitution technique. Finally, we replace the original index value by another one which holds the closest color appearance and belongs to the same cluster group. As a result, this kind of replacement, which supersedes the LSB substitution technique, significantly decreases the image distortion and produces a watermarked image with high visual quality. Obviously, when the receiver acquires the watermarked image, the authentication information being embedded can be extracted for comparison. As a consequence, the receiver will be able to verify the integrity of the watermarked image as well as identify any possible area which has been tampered.

[1]  Jeng-Shyang Pan,et al.  VQ-based digital image watermarking method , 2000 .

[2]  Chin-Chen Chang,et al.  A new steganographic method for color and grayscale image hiding , 2007, Comput. Vis. Image Underst..

[3]  Chang-Tsun Li Digital fragile watermarking scheme for authentication of JPEG images , 2004 .

[4]  Mei-Yi Wu,et al.  An iterative method of palette-based image steganography , 2004, Pattern Recognit. Lett..

[5]  Michael P. Ekstrom,et al.  Digital Image Processing Techniques , 1984 .

[6]  Frank Y. Shih,et al.  An adjusted-purpose digital watermarking technique , 2004, Pattern Recognit..

[7]  B. S. Manjunath,et al.  Robust image-adaptive data hiding using erasure and error correction , 2004, IEEE Transactions on Image Processing.

[8]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[9]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..

[10]  Jeng-Shyang Pan,et al.  A VQ-based robust multi-watermarking algorithm , 2002, 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering. TENCOM '02. Proceedings..

[11]  Chin-Chen Chang,et al.  Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization , 2004, Fundam. Informaticae.

[12]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[13]  Jiwu Huang,et al.  A high capacity distortion-free data hiding algorithm for palette image , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[14]  Rui Du,et al.  Invertible authentication watermark for JPEG images , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[15]  Yen-Ping Chu,et al.  Adaptive lossless steganographic scheme with centralized difference expansion , 2008, Pattern Recognit..

[16]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[17]  Ming-Shi Wang,et al.  A fuzzy c-means clustering-based fragile watermarking scheme for image authentication , 2009, Expert Syst. Appl..

[18]  Jiri Fridrich,et al.  Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).

[19]  Beng Chin Ooi,et al.  Tailored reversible watermarking schemes for authentication of electronic clinical atlas , 2005, IEEE Transactions on Information Technology in Biomedicine.

[20]  Jessica J. Fridrich,et al.  Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.

[21]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[22]  Masaaki Fujiyoshi,et al.  Lossless Data Hiding in the Spatial Domain for High Quality Images , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[23]  Chin-Chen Chang,et al.  A difference expansion oriented data hiding scheme for restoring the original host images , 2006, J. Syst. Softw..

[24]  Gregory Joy,et al.  Center-cut for color-image quantization , 2005, The Visual Computer.

[25]  Armando J. Pinho,et al.  On the relation between Memon's and the modified Zeng's palette reordering methods , 2006, Image Vis. Comput..

[26]  Nasir D. Memon,et al.  Further attacks on Yeung-Mintzer fragile watermarking scheme , 2000, Electronic Imaging.

[27]  Pao-Ta Yu,et al.  Digital watermarking based on neural networks for color images , 2001, Signal Process..

[28]  Jiri Fridrich A New Steganographic Method for Palette-Based Images , 1999, PICS.

[29]  Jiri Fridrich,et al.  Robust Digital Watermarking Based on Key-Dependent Basis Functions , 1998, Information Hiding.

[30]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[31]  Wen-Hsiang Tsai,et al.  Adaptive data hiding in palette images by color ordering and mapping with security protection , 2004, IEEE Trans. Commun..

[32]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[33]  Yi-Ching Liaw,et al.  A Novel Approach of Reordering Color Palette for Indexed Image Compression , 2007, IEEE Signal Processing Letters.

[34]  Jessica J. Fridrich,et al.  Lossless Data Embedding—New Paradigm in Digital Watermarking , 2002, EURASIP J. Adv. Signal Process..