Image Authentication and Restoration Using Digital Watermarking by Quantization of Integer Wavelet Transform Coefficients

  • Received : 2012.07.13
  • Accepted : 2012.11.03
  • Published : 2012.10.30

Abstract

An image authentication scheme for gray scale image through embedding a digital watermark by quantization of Integer Wavelet Transform (IWT) coefficients of the image is proposed in this paper. Proposed method is designed to detect modification of an image and to identify tampered location of the image. To embed the watermark mid-frequency band of a second level IWT was used. An approximation of the original image based on LL band was stored in LSB bits of the pixel data as a recovery mark for restoration of the image. Watermarked image has achieved a good PSNR of 40 dB compared to original cover image. Restored image quality was also very good with a PSNR of more than 35 dB compared to unmodified watermarked image even when 25% of the received image is cropped. Thus, the proposed method ensures a proper balance between the fidelity of the watermarked image and the quality of the restored image.

Keywords

References

  1. I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, T. Kalker, Digital Watermarking and Steganography, Second Edition, p. 375, 2008
  2. C.-Y. Lin and S.-F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation", IEEE Trans. Circuits Syst. Video Techmol., vol. 11, no. 2, pp. 153-168, Feb. 2001. https://doi.org/10.1109/76.905982
  3. P. W. Wong, "A watermark for image integrity and ownership verification", in Proceedings of IS&T PIC Congerence, (Portland, OR), May 1998
  4. P. W. Wong, "A public key watermark for image verigication and authentication", in Proceedings of ICIP, (Chicago, IL), October 1998
  5. P. W. Wong and N. Memon, "Secret and Public Key Image Watermarking, Schemes for Image Authentication and Ownership Verification", IEEE Transactions on Image Processing, Vol. 10, no. 10, pp. 1593 - 601. 2001 https://doi.org/10.1109/83.951543
  6. J. Fridrich and M. Goljan, Protection of Digital images Using Self-Emvedding", Symposium on Content Security and Data Hiding in Digital Media, New Jersey Institute of Technology, May 14, 1999
  7. J. Fridrich and M. Goljan, "Images with Self-correcting Capabilities," in Proceedings of the IEEE International Conference on Image Processing, volume 3, pp. 792-796, 1999
  8. K. Ke, T. Zhao & O. Li, "A Restoorative Image Authentication Scheme with Discrimination of Tampers on Image or Watermark", 4th International Conference on Multimedia and Ubiquitous Engi-neering (MUE), pp. 1-5, 2010
  9. A. T. S. Ho, X. Zhu, J. Shen, and P. Marziliano, "Fragile Watermarking Based on Eneoding of the Zeroes of the z-Transform", IEEE Transactions on Information Forensics and Security, Vol: 3, Issue:3, pp. 567-569, 2008 https://doi.org/10.1109/TIFS.2008.926994
  10. C. H. Lin, C. Y. Yang, "Multipurpose Watermarking Based on Blind Vector Quantization (BVQ)", Journal of Information Hiding, and Multimedia Signal Processing, Volume 2, Number 3, July 2011
  11. J. Xiao, Z. Ma, B. Lin, J. Su, Y. Wang, "A semi-fragile watermarking distinguishing JPEG compression and gray-scale-transformation from malicious manipulation", IEEE Youth Conference on Information Computing and Telecommunications, 2010
  12. D. Zou, Y.Q. Shi, Z. Ni, W. Su, "A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform", IEEE Transactions on Circuits and Systems for Video Technology, 2006
  13. F. B. Coelho, J. S. Barbar, G. S. B. do Carmo, "The Use of Watermark and Hash Function for the Authentication of Digital Images Mapped through tne use of the Wavelet Transform", Second International Conference on Internet and Web Applications and Services, 2007
  14. C-C Chang, C-C Lin, Y-S Hu, "An SVD Oriented Warermark Embedding Scheme with High Qualities for the Restored Image", Infornational Journal of Innovative Computing, Information and Control, Volume 3, Number 3, June 2007
  15. D. Kundur and D Hatzinakos, "Digital Watermarking for Telltale Tamper-Proofing and Authentication", Proceedings of the IEEE, Volume: 87, Issue:7, July 1999
  16. C. Fei, D. Kundur and R. Kwong, "A Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication". IEEE Transactions on Information Forensics and Security, Volume 4, Issue 2, June 2009