Digital image authentication and recovery: Employing integer transform based information embedding and extraction

被引:54
作者
Chamlawi, Rafiullah [1 ]
Khan, Asifullah [1 ]
机构
[1] Pakistan Inst Engn & Appl Sci, DCIS, Islamabad 45650, Pakistan
关键词
Watermarking; Authentication; Huffman Coding; BCH coding; Embedding and extraction; Integer Discrete Cosine Transform (IDCT); Integer Wavelet Transform (IWT); self-recovery and tamper localization; SEMI-FRAGILE WATERMARKING; ATTACK INFORMATION; ROBUSTNESS; SCHEME; JPEG;
D O I
10.1016/j.ins.2010.08.039
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, several semi-fragile watermarking approaches with the additional capability of image recovery have been proposed. However, the security, robustness, and image recovery aspect of these approaches have certain shortcomings. In this paper, a novel semi-fragile watermarking framework using integer transform based information embedding and extraction is proposed, which allows accurate authentication and recovery of the image. It is based on integer wavelet transform with improved security against collage attack, enhanced robustness, and capability of producing better quality recovered image. Security is enhanced by correlating the to-be-embedded watermark with the approximation sub-band of wavelet transform. Similarly, no unprotected area is left for attacks on the image, either in spatial or transform domain. Robustness is enhanced by using the idea of embedding in largest coefficient inside a group and correlating it with the quantized version of the mean of the group. In particular, the recovery approach is improved by introducing lossless compression and BCH coding of the integer DCT based low-pass version of the cover image itself. Alteration sensitivity is improved compared to traditional block-based approaches and thus the proposed approach can concisely determine the regions where the integrity verification fails. Experimental comparisons with existing approaches validate the usefulness of the proposed multiple semi-fragile watermarking approach. (C) 2010 Elsevier Inc. All rights reserved.
引用
收藏
页码:4909 / 4928
页数:20
相关论文
共 44 条
[1]   Image authentication techniques for surveillance applications [J].
Bartolini, F ;
Tefas, A ;
Barni, M ;
Pitas, I .
PROCEEDINGS OF THE IEEE, 2001, 89 (10) :1403-1418
[2]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[3]   Wavelet based image authentication and recovery [J].
Chamlawi, Rafiullah ;
Khan, Asifullah ;
Idris, Adnan .
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (06) :795-804
[4]   Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery [J].
Chang, Chin-Chen ;
Fan, Yi-Hsuan ;
Tai, Wei-Liang .
PATTERN RECOGNITION, 2008, 41 (02) :654-661
[5]   Preserving robustness and removability for digital watermarks using subsampling and difference correlation [J].
Chang, Chin-Chen ;
Lin, Pei-Yu ;
Yeh, Jieh-Shan .
INFORMATION SCIENCES, 2009, 179 (13) :2283-2293
[6]  
CHI K, 2004, P 83 TIWC, P7
[7]   Comparative evaluation of semifragile watermarking algorithms [J].
Ekici, Ö ;
Sankur, B ;
Coskun, B ;
Naci, U ;
Akcay, M .
JOURNAL OF ELECTRONIC IMAGING, 2004, 13 (01) :209-219
[8]   Analysis and design of secure watermark-based authentication systems [J].
Fei, Chuhong ;
Kundur, Deepa ;
Kwong, Raymond H. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (01) :43-55
[9]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[10]   Hiding digital watermarks using multiresolution wavelet transform [J].
Hsieh, MS ;
Tseng, DC ;
Huang, YH .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2001, 48 (05) :875-882