Open Access Open Access  Restricted Access Subscription Access

Performance Analysis of a Novel Image Content Authentication Scheme Using Multiple Watermarks in Dual Domains


Affiliations
1 AIMS Institutes, Bangalore, India
2 Sona College of Technology, Salem, India
 

This paper presents a multiple watermark based semi-fragile watermarking scheme that tries to balance the requirements of an effective authentication scheme ensuring imperceptibility, tamper detection and localization of tampered areas. The proposed scheme uses multiple watermarks to enable authentication at multiple levels in the wavelet domain. The scheme is flexible and permits the user to decide on the number of watermarks to be embedded based on the nature of the application. It can also accurately locate the tampered locations.

Keywords

Content Authentication, Authentication Watermark, Recovery Watermark, DWT, Tamper Localization, Robustness, Feature Vector.
User
Notifications
Font Size

  • Hu M., Lou D. and Chang M., “DualWrapped Digital Watermarking Scheme for Image Copyright Protection,” Computers & Security, Vol.26, pp.319-330, 2007.
  • Lin, C.Y. and S.F. Chang, “SARI: SelfAuthentication-and-Recovery Image Watermarking System,” ACM Multimedia, Ottawa, Canada: ACM Press. pp.628-629, 2001
  • Woo Chaw Seng1 et.al., “Semi-Fragile Watermark with Self Authentication and Self Recovery, “ Malaysian Journal of Computer Science, Vol. 22(1), pp 64-84, 2009.
  • Yuping, H., Guangjun, G.: Watermarkingbased authentication with recovery mechanism. In: 2nd International Workshop on Computer Science and Engineering. doi:10.1109/WCSE. 2009.856 (2009)
  • D. Kundur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1167–1180,1999.
  • C. S. Lu and H. Y. M. Laio, “Multipurpose watermarking for image authentication and protection,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 435-439, 2001
  • Hui, L., Yuping, H.: A wavelet-based watermarking scheme with authentication and recovery mechanism. In: International Conference on Electrical and Control Engineering (ICECE). doi:10.1109/iCECE. 2010.86 (2010)
  • Chen, T.S., Chen, J., Chen, J.G.: Tamper detection and retrieval technique based on JPEG 2000 with LL subband. In Proceedings of IEEE International Conference OD Networking, Sensing & Control, Taipei, Taiwan (2004)
  • J. C. Patra, J. E. Phua and C. Bornand, “Anovel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression,” Digital Signal Processing, vol. 20, no. 6, pp. 1597–1611, 2010.
  • X. Qi and X. Xin, “A quantization-based semi-fragile watermarking scheme for image content authentication,” Journal of Visual Communication and Image Representation, vol. 22, no. 2, pp. 187–200, 2011.
  • Tsai, M.J., Chien, C.C.: A wavelet-based semi-fragile watermarking with recovery mechanism. In: IEEE International Symposium on Circuits and Systems, ISCAS 2008. doi:10.1109/ISCAS.2008. 4542097 (2008)
  • De Rosa A., Barni M., Bartolini F., Cappellini V. and Piva A., “Optimum Decoding of Non-additive Full Frame DFT Watermarks”, Proceedings of the 3rd Workshop of Information Hiding, pp.159-171,1999.
  • Parthasarathy A. K. and Subhash Kak, “An Improved Method of Content Based Image Watermarking.” IEEE Transactions on Broadcasting, Vol.53, No.2, pp.468-479, 2007.
  • Chamlawi R., Khan A., Idris A. and Munir Z., “A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform,” World Academy of Science, Engineering and Technology, Vol.23, pp.49-53, 2006.
  • Qi, X., Xin, X., Chang, R. “Image authentication and tamper detection using two complementary watermarks,” 16th IEEE International Conference on Image Processing (ICIP). doi:10.1109/ICIP.2009. 5413681, 2009.
  • A Chen, B., Wornell, G.W., “Digital watermarking and information embedding using dither modulation,” Proceedings of the IEEE workshop on Multimedia Signal Processing, Redondo Beach, CA, December, 1998.Transl. J. Magn. Japan, vol. 2, pp. 740-741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 198.
  • J. S. Pillai, T. Padma. “The analysis of PQ sequences generated from continued fractions for use as pseudorandom sequences in Cryptographic Applications.” In Proc. Advances in Intelligent Systems and Computing, Springer, Vol. 394, Dec. 2015, pp. 633-644.

Abstract Views: 247

PDF Views: 151




  • Performance Analysis of a Novel Image Content Authentication Scheme Using Multiple Watermarks in Dual Domains

Abstract Views: 247  |  PDF Views: 151

Authors

Jayashree Nair
AIMS Institutes, Bangalore, India
T. Padma
Sona College of Technology, Salem, India

Abstract


This paper presents a multiple watermark based semi-fragile watermarking scheme that tries to balance the requirements of an effective authentication scheme ensuring imperceptibility, tamper detection and localization of tampered areas. The proposed scheme uses multiple watermarks to enable authentication at multiple levels in the wavelet domain. The scheme is flexible and permits the user to decide on the number of watermarks to be embedded based on the nature of the application. It can also accurately locate the tampered locations.

Keywords


Content Authentication, Authentication Watermark, Recovery Watermark, DWT, Tamper Localization, Robustness, Feature Vector.

References