Attack Detection through Image Adaptive Self Embedding Watermarking
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
Attack Detection through Image Adaptive Self Embedding Watermarking

Authors: S. Shefali, S. M. Deshpande, S. G. Tamhankar

Abstract:

Now a days, a significant part of commercial and governmental organisations like museums, cultural organizations, libraries, commercial enterprises, etc. invest intensively in new technologies for image digitization, digital libraries, image archiving and retrieval. Hence image authorization, authentication and security has become prime need. In this paper, we present a semi-fragile watermarking scheme for color images. The method converts the host image into YIQ color space followed by application of orthogonal dual domains of DCT and DWT transforms. The DCT helps to separate relevant from irrelevant image content to generate silent image features. DWT has excellent spatial localisation to help aid in spatial tamper characterisation. Thus image adaptive watermark is generated based of image features which allows the sharp detection of microscopic changes to locate modifications in the image. Further, the scheme utilises the multipurpose watermark consisting of soft authenticator watermark and chrominance watermark. Which has been proved fragile to some predefined processing like intentinal fabrication of the image or forgery and robust to other incidental attacks caused in the communication channel.

Keywords: Cryptography, Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Watermarking.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1080776

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1984

References:


[1] M. Wu and B. Liu, "Watermarking for image authentication," in Proc. ICIP, Chicago, IL, Oct. 1998.
[2] W. Stallings, ÔÇÿNetwork Security Essentials: Applications and Standards,- Prentice Hall, 2000.
[3] William Stallings, "Cryptography and network security," Third Edition, Pearson Publications, 2003.
[4] M. Goljan and J. Fridrich, "Protection of Digital Image Using Self Embedding," Symposium on Content Security and Data Hiding in Digital Media, May 1999.
[5] V. Cappellini, F. Bartolini, R. Caldelli, A. De Rosa, A. Piva, M. Barni, and M. Wada, "Copyright protection for CH multimedia data through digital watermarking techniques," in Proc. 11th IEEE Int. Workshop on Database and Expert Systems Applications, September 2000, pp. 935- 939.
[6] C.-T. Hsu and J.-L. Wu, "Multiresolution Watermarking for digital images," IEEE Trans. Consumer Electron., vol.45, pp.1097-101, Aug. 1998.
[7] Y. Zhao, Dual Domain "Semi-Fragile Watermarking for Image Authentication," M.A.Sc. Thesis, Univ. Toronto, Toronto, On, Canada, 2003.
[8] R. Mehul and R. Priti, "Discrete Wavelet Transform Based Multiple Watermarking Scheme," Proceedings of IEEE Region 10 Technical Conference on Convergent Tech. for the Asia-Pacific, Bangalore,India, October 14-17, 2003.
[9] V. Licks and R. Jordan, "On Digital Image Watermarking Robust to Geometric Transformations," Proceedings of 2000 International Conference Image Proc (ICIP 2000), Vol. 3, Vancouver, BC, Canada, September 10-13, 2000, pp. 690-693.
[10] Rafael C. Gonzalez, Richard E. Woods, Steven L. Eddins, ÔÇÿDigital Image Processing using Matlab,- Pearson Edition 2004.
[11] Prof. Ramkumar & Ali N. Akansu, "Capacity estimates for data hiding in compressed images," IEEE Tr. on Image proc. Vol. 10 no.8, 8Aug, 2001.