Fragile watermarking for image authentication based on DWT-SVD-DCT techniques

Many fragile watermarking schemes for image authentication have been proposed to protect the integrity of digital images. However, these schemes still yielded unsatisfactory image quality of the watermarked images and low accuracy of tamper detection. In this paper, we propose a new, fragile watermarking scheme for image authentication based on the combination of discrete wavelets transform (DWT), singular value decomposition (SVD), and discrete cosines transform (DCT) algorithms. The feature coefficients are extracted and are used to embed the authentication code by using the quantization index modulation (QIM) process. To guarantee that the extracted authentication code is correct, the Gram-Schmidt process is used to adjust the feature coefficients. The experimental results demonstrated that the proposed scheme provides good quality watermarked images and achieves high accuracy of tamper detection under different attacks, i.e., direct cropping and object insertion attacks.

[1]  Radu Ovidiu Preda,et al.  Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain , 2013 .

[2]  Frank Y. Shih,et al.  Semi-fragile spatial watermarking based on local binary pattern operators , 2011 .

[3]  Hassan I. Saleh,et al.  A quality guaranteed robust image watermarking optimization with Artificial Bee Colony , 2017, Expert Syst. Appl..

[4]  Yu-Chen Hu,et al.  An adaptive image authentication scheme for vector quantization compressed image , 2011, J. Vis. Commun. Image Represent..

[5]  Chin-Chen Chang,et al.  Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism , 2012, Signal Process..

[6]  Chin-Chen Chang,et al.  Second-order steganographic method based on adaptive reference matrix , 2015, IET Image Process..

[7]  Xiao Zeng,et al.  Reversible Image Watermarking Using Interpolation Technique , 2010, IEEE Transactions on Information Forensics and Security.

[8]  Durgesh Singh,et al.  DCT based efficient fragile watermarking scheme for image authentication and restoration , 2015, Multimedia Tools and Applications.

[9]  Xin Liao,et al.  Robust Detection of Image Operator Chain With Two-Stream Convolutional Neural Network , 2020, IEEE Journal of Selected Topics in Signal Processing.

[10]  Thanh-Nghi Do,et al.  A high-capacity invertible steganography method for stereo image , 2020 .

[11]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.

[12]  Azadeh Mansouri,et al.  Toward a secure video watermarking in compressed domain , 2019, J. Inf. Secur. Appl..

[13]  Wu-Lin Chen,et al.  A novel tamper detection scheme for BTC-compressed images , 2013 .

[14]  Lei Fu,et al.  Image authentication scheme based on reversible fragile watermarking with two images , 2018, J. Inf. Secur. Appl..

[15]  Chin-Chen Chang,et al.  A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images , 2014, KSII Trans. Internet Inf. Syst..

[16]  Amit Kumar Singh,et al.  Dual watermarking: An approach for securing digital documents , 2019, Multimedia Tools and Applications.

[17]  Hazem Al-Otum,et al.  Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique , 2014, J. Vis. Commun. Image Represent..

[18]  Sharifah Mumtazah Syed Ahmad,et al.  Authentication of images using Zernike moment watermarking , 2015, Multimedia Tools and Applications.

[19]  Chin-Chen Chang,et al.  Adaptive self-recovery for tampered images based on VQ indexing and inpainting , 2013, Signal Process..

[20]  Zheng Qin,et al.  Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features , 2022, IEEE Transactions on Dependable and Secure Computing.

[21]  Karim Afdel,et al.  Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet , 2017 .

[22]  Anthony Tung Shuen Ho,et al.  A new semi-fragile image watermarking with robust tampering restoration using irregular sampling , 2007, Signal Process. Image Commun..

[23]  Chin-Chen Chang,et al.  Reversible data hiding for high quality images exploiting interpolation and direction order mechanism , 2013, Digit. Signal Process..

[24]  Peijia Zheng,et al.  A robust image watermarking scheme in hybrid transform domains resisting to rotation attacks , 2020, Multimedia Tools and Applications.

[25]  Manisha Sharma,et al.  Watermarking based image authentication and tamper detection algorithm using vector quantization approach , 2017 .

[26]  Chi-Shiang Chan An image authentication method by applying Hamming code on rearranged bits , 2011, Pattern Recognit. Lett..