Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Semi-Fragile Blind Watermarking Mechanism for Color Image Authentication and Tampering


Affiliations
1 Department of Computer Science, Sutex Bank College of Computer Applications and Science, India
2 Department of Computer Science, G.H. Patel P.G. Department of Computer Science and Technology, India
     

   Subscribe/Renew Journal


Digital Image watermarking data hiding technique is proposed in paper to provide authentication to color image. It has capability of tamper detection and tamper localization. The suggested system is blind watermarking system which doesn’t require original information at destination. The system is robust against non-malicious attacks where as fragile with malicious attacks. The watermark is generated based on content of original image and it is embedded using IWT and QIM techniques. To the destination place for authentication purpose, embedded watermark is extracted. For classification of image, extracted and generated watermark from watermarked image are compared and based on this differential information, tampering is analyzed. The image is classified as authentic or tampered as per clustering of pixels within differential information. If image is declared as tampered then tampered region is identified using clustering detail. The PSNR is achieved up to 43.57dB and NCC is near to 1. As per numbers of parameters concern and as per experiments, it is found that proposed system is the improved version of existing systems.

Keywords

Image Watermarking, Image Authentication, Tamper Detection, Tamper Localization, Color Image.
Subscription Login to verify subscription
User
Notifications
Font Size

  • Kommini Chaitanya, Kamalesh Ellanti and E. Harshavardhan Chowdary, “Semi-Fragile Watermarking Scheme based on Feature in DWT Domain”, International Journal of Computer Applications, Vol. 28, No. 3, pp. 42-46, 2011.
  • D. Vaishnavi and T.S. Subashini, “Image Tamper Detection based on Edge Image and Chaotic Arnold Map”, Indian Journal of Science and Technology, Vol. 8, No. 6, pp. 548-555, 2015.
  • L.V. Lintap, “A Semi-Fragile Watermarking Scheme for Image Tamper Localization and Recovery”, Journal of Theoretical and Applied Information Technology, Vol. 42, No. 2, pp. 287-293, 2012.
  • Li Chunlei, “Semi-Fragile Self-Recoverable Watermarking Scheme for Face Image Protection”, Computers and Electrical Engineering, Vol. 54, pp. 484-493, 2016.
  • Archana Tiwari and Manisha Sharma, “An Efficient Vector Quantization Based Watermarking Method for Image Integrity Authentication”, Proceedings of International Conference on Progress in Intelligent Computing Techniques, pp. 215-225, 2017.
  • Cheonshik Kim, Dongkyoo Shin and Ching-Nung Yang, “Self-Embedding Fragile Watermarking Scheme to Restoration of a Tampered Image using AMBTC”, Personal and Ubiquitous Computing, Vol. 22, No. 1, pp. 11-22, 2018.
  • D. Vaishnavi and T.S. Subashini, “Fragile Watermarking Scheme based on Wavelet Edge Features”, Journal of Electrical Engineering and Technology, Vol. 10, No. 5, pp. 2149-2154, 2015.
  • Sanjay Rawat and Balasubramanian Raman, “A Chaotic System based Fragile Watermarking Scheme for Image Tamper Detection”, AEU-International Journal of Electronics and Communications, Vol. 65, No. 10, pp. 840-847, 2011.
  • Phen Lan, Chung Kai Hsieh, and Po Whei Huang, “A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery”, Pattern Recognition, Vol. 38, No. 12, pp. 2519-2529, 2005.
  • Rosales-Roldan, “Watermarking-Based Image Authentication with Recovery Capability using Halftoning Technique”, Signal Processing: Image Communication, Vol. 28, No. 1, pp. 69-83, 2013.
  • Hanen Rhayma, “Semi Fragile Watermarking Scheme for Image Recovery in Wavelet Domain”, Proceedings of International Conference on Advanced Technologies for Signal and Image Processing, pp. 1-12, 2018.
  • B. Feng, Bin, “A Novel Semi-Fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration”, Mobile Networks and Applications, Vol. 25, No. 1, pp. 82-94, 2020.
  • Paween Pongsomboon, Toshiaki Kondo and Yoshiyuki Kamakura, “An Image Tamper Detection and Recovery Method using Multiple Watermarks”, Proceedings of International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, pp. 1-13, 2016.
  • K.R. Chetan and S. Nirmala, “Intelligent Multiple Watermarking Schemes for the Authentication and Tamper Recovery of Information in Document Image”, Proceedings of International Conference on Advanced Computing and Communication Technologies, pp. 183-193, 2018.
  • Sajjad Dadkhah, “An Effective SVD-Based Image Tampering Detection and Self-Recovery using Active Watermarking”, Signal Processing: Image Communication, Vol. 29, No. 10, pp. 1197-1210, 2014.
  • Behrouz Bolourian Haghighi, Amir Hossein Taherinia and Ahad Harati, “TRLH: Fragile and Blind Dual Watermarking for Image Tamper Detection and Self-Recovery based on Lifting Wavelet Transform and Halftoning Technique”, Journal of Visual Communication and Image Representation, Vol. 12, No. 2, pp. 1-18, 2017.
  • Sawiya Kiatpapan and Toshiaki Kondo, “An Image Tamper Detection and Recovery Method based on Self-Embedding Dual Watermarkin”, Proceedings of International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, pp. 1-8, 2015.
  • Na Wang and Chung-Hwa Kim, “Tamper Detection and Self-Recovery Algorithm of Color Image based on Robust Embedding of Dual Visual Watermarks using DWT-SVD”, Proceedings of International Conference on Communications and Information Technology, pp. 1-6, 2009.
  • Nirali N. Jani and Ashish N. Jani, “Image Segmentation Level Key Driven Image Tampering Detection and Localization Enhancement”, Elixir Digital Processing, Vol. 115, pp. 49954-49957, 2018.
  • Javier Molina-Garcia, “An Effective Fragile Watermarking Scheme for Color Image Tampering Detection and Self-Recovery”, Signal Processing: Image Communication, Vol. 81, pp. 715-725, 2020.
  • Prabhishek Singh and R.S. Chadha, “A Survey of Digital Watermarking Techniques, Applications and Attacks”, International Journal of Engineering and Innovative Technology, Vol. 2, No. 9, pp.165-175, 2013.
  • Vidyasagar M. Potdar, Song Han and Elizabeth Chang, “A Survey of Digital Image Watermarking Techniques”, Proceedings of International Conference on Industrial Informatics, pp. 175-183, 2005.
  • A. Zaid and A. Ouled, “Improved QIM-Based Watermarking Integrated to JPEG2000 Coding Scheme”, Signal, Image and Video Processing, Vol. 3, No. 3, pp. 197-207, 2009.
  • Hiral A. Patel and Dipti B. Shah, “Digital Image Watermarking Mechanism for Image Authentication, Image Forgery and Self Recovery”, International Journal of Electronics Engineering, Vol. 11, No. 1, pp. 140-143, 2019.

Abstract Views: 225

PDF Views: 0




  • Semi-Fragile Blind Watermarking Mechanism for Color Image Authentication and Tampering

Abstract Views: 225  |  PDF Views: 0

Authors

Hiral A. Patel
Department of Computer Science, Sutex Bank College of Computer Applications and Science, India
Dipti B. Shah
Department of Computer Science, G.H. Patel P.G. Department of Computer Science and Technology, India

Abstract


Digital Image watermarking data hiding technique is proposed in paper to provide authentication to color image. It has capability of tamper detection and tamper localization. The suggested system is blind watermarking system which doesn’t require original information at destination. The system is robust against non-malicious attacks where as fragile with malicious attacks. The watermark is generated based on content of original image and it is embedded using IWT and QIM techniques. To the destination place for authentication purpose, embedded watermark is extracted. For classification of image, extracted and generated watermark from watermarked image are compared and based on this differential information, tampering is analyzed. The image is classified as authentic or tampered as per clustering of pixels within differential information. If image is declared as tampered then tampered region is identified using clustering detail. The PSNR is achieved up to 43.57dB and NCC is near to 1. As per numbers of parameters concern and as per experiments, it is found that proposed system is the improved version of existing systems.

Keywords


Image Watermarking, Image Authentication, Tamper Detection, Tamper Localization, Color Image.

References