A Semi-Fragile Watermarking Scheme for Color Image Authentication
Authors: M. Hamad Hassan, S.A.M. Gilani
Abstract:
In this paper, a semi-fragile watermarking scheme is proposed for color image authentication. In this particular scheme, the color image is first transformed from RGB to YST color space, suitable for watermarking the color media. Each channel is divided into 4×4 non-overlapping blocks and its each 2×2 sub-block is selected. The embedding space is created by setting the two LSBs of selected sub-block to zero, which will hold the authentication and recovery information. For verification of work authentication and parity bits denoted by 'a' & 'p' are computed for each 2×2 subblock. For recovery, intensity mean of each 2×2 sub-block is computed and encoded upto six to eight bits depending upon the channel selection. The size of sub-block is important for correct localization and fast computation. For watermark distribution 2DTorus Automorphism is implemented using a private key to have a secure mapping of blocks. The perceptibility of watermarked image is quite reasonable both subjectively and objectively. Our scheme is oblivious, correctly localizes the tampering and able to recovery the original work with probability of near one.
Keywords: Image Authentication, YST Color Space, Intensity Mean, LSBs, PSNR.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1061778
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1837References:
[1] Phen Lan Lin, Chung-Kai Hsieh, Po-Whei Huang, "Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery", Journal of Pattern Recognition, Elsevier, 2005.
[2] Jagdish C. Patra, Kah K. Ang and Ee-Luang Ang, "Hierarchical Multiple Image Watermarking for Image Authentication and Ownership Verification", ICIP, 2004.
[3] Francesco Benedetto, Gaetano Giunta, Alessandro Neri, "A New Color Space Domain for Digital Watermarking in Multimedia Applications", ICIP, 2005.
[4] G. Voyatzis, I. Pitas, "Applications of Toral Automorphism in Image Watermarking," ICIP, Vol II, 1996, pp.237-240, 1996.
[5] S. Walton, "Image Authentication for a Slippery New Age", Dr. Dobb-s Journal of Software Tools for Professional Programmers, Vol. 20, Apr. 1995.
[6] R. G. van Schyndel, A. Z. Tirkel, and C. F Osborne, "A Digital Watermark", Proc. of the IEEE Int. Conf. on Image Processing, vol. 2, pp. 86-90, Austin, Texas,1994.
[7] R. B. Wolfgang and E. J. Delp, "A Watermark for Digital Images", Proc. IEEE Int. Conf. on Image Processing, vol. 3, pp. 219-222, 1996.
[8] J. Fridrich, "Image Watermarking for Tamper Detection", Proc. ICIP -98, Chicago, Oct 1998.
[9] J.Fridrich and M.Goljan, "Protection of Digital Images using Self Embedding", symposium on Content Security and Data Hiding in Digital Media, Newark, NJ, USA, May 1999.
[10] J. Fridrich, "Methods for Tamper Detection in Digital Images", Multimedia and Security Workshop at ACM Multimedia, Orlando, Florida, USA, Oct, 1999.
[11] T. Liu and Z.D. Qiu, "The Survey of Digital Watermarking based Image Authentication Techniques", 6th International Conference, pp. 1566-1559, 2002.