Open Access Open Access  Restricted Access Subscription or Fee Access

Authentication Watermarking using Integer Wavelet Transform

P. Meenakshi Devi, M. Venkatesan, Dr. K. Duraiswamy

Abstract


In a cryptography based authentication watermarking, a message authentication code of the whole image is computed and the resulting code is inserted into the image itself. This paper proposes an efficient authentication watermarking scheme using integer wavelet transform. The already existing spatial domain technique is applied in wavelet domain. Embedding data in wavelet domain offers high degree of robustness against common image processing operations. The proposed scheme reduces the number of required prioritized sub-blocks to be half. To embed k-bits of secret data, the proposed scheme requires only k/2 sub blocks. The scheme is suitable for both small and large images. It detects any alteration while maintaining good visual quality.


Keywords


Authentication Watermarking, Integer Wavelet Transform, Pattern Matching, Lossless Quantization.

Full Text:

PDF

References


P.S.L.M. Barreto, H.Y. Kim, and V. Rijmen, “ Toward a Secure Public-Key Block wise Fragile Authentication Watermarking”, IEE Proc.Vision, Image and Signal Processing, Vol.149, No.2, pp. 57-62, 2002.

C.T. Li, D.C. Lou, and T.H. Chen, “Image Authentication and Integrity Verification via Content-Based Watermarks and a Public Key Cryptosystem”, IEEE Int. Conf. Image Processing, 2000, vol. 3, pp.694-697.

R. Queiroz, and P. Fleckenstein, “Object Modification for Data Embedding through Template Ranking”, Xerox Invention Proposal, 1999.

M.S. Fu, O.C. Au, “Data Hiding by Smart Pair Toggling for Halftone Images”, IEEE Int. Conf. Acoustics, Speech and Signal Processing, Vol.4, pp. 2318-2321, 2000.

M.S. Fu, and O.C. Au, “Data Hiding Watermarking for Halftone Images”, IEEE Trans. Image Processing, Vol. 11, No. 4, pp. 477-484, 2002.

S.C. Pei, and J. M. Guo, “ Hybrid Pixel-Based Data Hiding and Block-Based Watermarking for Error-Diffused Halftone Images”, IEEE Trans. on Circuits and Systems for Video Technology, Vol. 13, No. 8, pp. 867-884, 2003.

H.Y. Kim and A. Afif, “A Secure Authentication Watermarking for Halftone and Binary Images”, Inernational Journal of Imaging Systems and Technology, Vol. 14, Iss. 4, pp. 147 –152.

H.Y. Kim and A. Afif, “Secure Authentication Watermarking for Binary Images”, Proceedings of Sibgrapi Brazilian Symosium on Computer Graphics and Image Processing, pp. 199-206, 2003.

M.U. Celik, G. Sharma, E. Saber, and A.M. Tekalp, “Hierarchical Watermarking for Secure Image Authentication with Localization”, IEEE Trans. Image Processing, Vol. 11, No. 6, pp. 585-595, 2002.

H.Y. Kim, and R. L. Queiroz, “Alteration-Locating Authentication Watermarking for Binary Images”, International Workshop on Digital Watermarking, Springer Berlin / Heidelberg Volume 3304/2005, pp. 125-136, 2005.

Min Wu, Edward Tang and Bede Liu, “Data Hiding in Digital Binary Image”, IEEE International Conference on Multimedia and Expo, New York, USA, July 30-August 2, 2000, pp. 393-396.

Min Wu, and B.ede Liu, “Data Hiding in Binary Image for Authentication and Annotation”, IEEE Transactions On Multimedia, Vol. 6, No. 4,August 2004.

S.V.D. Pamboukian and H.Y. Kim, “Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images”,SBSEG-Brazilian Symposium on Security of Information and Computing Systems, 2006.

Kamran Hameed, Adeel Mumtaz and S.A.M. Gilani, “Digital Image Watermarking in the Wavelet Transform Domain”, Proceedings of World Academy of Science, Engineering and Technology, Vol. 13, May 2006.

V.H. Vallabha, “Multiresolution Watermarking for Digital Images: Multiresolution Watermark Based on Wavelet Transform for Digital images”. Available: www.mathworks.com/matlabcentral/fileexchange/3508

Xin Cindy Guo, “Methodologies in Digital Watermarking: Robust and Reversible Watermarking Techniques for Authentication, Security and Privacy Protection”, Master’s Thesis, University of Toronto, February 2009.

Peter Meerwald, “Digital Image Watermarking in the Wavelet Transform Domain”, Master's thesis, Department of Scientific Computing,University of Salzburg, Austria, January 2001.

HongJie He, JiaShu Zhang and Heng-Ming Tai, “ A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication”,Proceddings of 5th International Workshop on Digital Watermarking,Jeju Island, Korea, November 8-10, 2006, Lecture Notes in Computer Science, Vol. 4283/2006, pp. 422-432.

Chang-Tsun Li and Huayin Si, “Wavelet-based Fragile Watermarking Scheme for Image Authentication”, Journal of Electron Imaging, Vol. 16,Iss. 1, March 2007.

Xiaoyun Wu, Junquan Hu, Zhixiong Gu and Jiwu Huang, “ A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters”, Proceedings of the 2005 Australasian workshop on Grid computing and e-research, Vol. 44, pp.75-80, Newcastle, New South Wales, Australia , January 2005.

Min-Jen Tsai and Hsiao-Ying Hung, “Wavelet Transform Based Digital Watermarking for Image Authentication”, Fourth Annual ACIS International Conference on Computer and Information Science, Jeju Island, South Korea, July 14 -16, 2005, pp. 408-411.

Alexandre H. Paqueta, Rabab K. Wardb and Ioannis Pitasc, “Wavelet packets-based digital watermarking for image verification and authentication”, Signal Processing, Special Section: Security of data hiding technologies, Vol. 83, Iss. 10, October 2003, pp. 2117-2132.

Jeanne Chen, Tung-Shou Chen and Meng-Wen Cheng, “A New Data Hiding Method in Binary Image”, IEEE Fifth International Symposium on Multimedia Software Engineering, Taichung Taiwan, December 10-12, 2003, pp. 88-93.

M. Venkatesan, P. MeenakshiDevi, K. Duraiswamy, K. Thyagarajah, “A New Data Hiding Scheme with Quality Control for Binary Images using Block Parity”, Information Assurance and Security, IAS 2007,Manchester, UK, pp. 468-471, 2007.

M. Venkatesan, P. MeenakshiDevi, K. Duraiswamy, K. Thyagarajah, “ Secure Authentication Watermarking for Binary Images using Pattern Matching”, International Journal of Computer Science and Network Security, Vol.8, No.2, February 2008.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.