The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Semi Fragile Watermarking for Content based Image Authentication and Recovery in the DWT-DCT

Content authentication requires that the image watermarks must highlight malicious attacks while tolerating incidental modifications that do not alter the image contents beyond a certain tolerance limit. This paper proposed an authentication scheme that uses content invariant features of the image as a self authenticating watermark and a quantized down sampled approximation of the original image as a recovery watermark, both embedded securely using a pseudorandom sequence into multiple sub bands in the Discrete Wavelet Transform (DWT) domain. The scheme is blind as it does not require the original image during the authentication stage and highly tolerant to Jpeg2000 compression. The scheme also ensures highly imperceptible watermarked images and is suitable in application with low tolerance to image quality degradation after watermarking. Both Discrete Cosine Transform (DCT) and DWT transform domain are used in the watermark generation and embedding process.


[1] Abbasi A., Seng W., and Ahmad I., Multi Block based Image Watermarking in Wavelet Domain using Genetic Programming, The International Arab Journal of Information Technology, vol. 11, no. 6, pp. 582-589, 2014.

[2] Chamlawi R., Khan A., Idris A. and Munir Z., A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform, World Academy of Science, Engineering and Technology, vol. 2, no. 11, pp. 3866-3870, 2006.

[3] Chen B. and Gregory W., Digital Watermarking and Information Embedding Using Dither Modulation, in Proceedings of the 2nd IEEE workshop on Multimedia Signal Processing, Redondo Beach, pp. 273-278, 1998.

[4] DeRosa A., Barni M., Bartolini F., Cappellini V., and Piva A., Optimum Decoding of Non- additive Full Frame DFT Watermarks, in Proceedings of the 3rd Workshop of Information Hiding, Berlin, pp.159-171,1999.

[5] Hu M., Der-Chyuan D., and Chang M., Dual- Wrapped Digital Watermarking Scheme for Image Copyright Protection, Computers and Security, vol. 26, no. 4, pp.319-330, 2007.

[6] Hu Y., Lo C., Chen W., and Wen C., Joint Image Coding and Image Authentication Based on AMBTC, Journal of Electronic Imaging, vol. 22, no. 1, pp. 013012 -1-013012-11, 2013.

[7] Hu Y., Chuang J., Lo C., and Chen W., Grayscale Image Tamper Detection and Recovery based on Vector Quantization, International journal of Security and its Applications, vol. 7, no. 6, pp. 209-228, 2013.

[8] Hussein J., Spatial Domain Watermarking Scheme for Colored Images Based on Log- Average Luminance, Journal of Computing, vol. 2, no. 1, 2010.

[9] Kundur D. and Dimitrios H., Digital Watermarking for Telltale Tamper Proofing and Authentication, in Proceedings of the IEEE, vol. 87, no. 7, pp. 1167-1180, 1999.

[10] Lie W., Lin G., and Cheng S., Dual Protection of JPEG Images based on Informed Embedding and Two-Stage Watermark Extraction Techniques, IEEE Transactions on Information Forensics and Security, vol. 1, no. 3, pp. 330- 341, 2006.

[11] Lin C. and Chang S., SARI: Self-authentication- and-Recovery Image Watermarking System, Semi Fragile Watermarking for Content based Image Authentication and ... 1081 in Proceedings of the 9th ACM International Conference on Multimedia, Ontario, pp. 628-629, 2001.

[12] Lin C. and Chang S., A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation, IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, no. 2, pp. 153-168, 2001.

[13] Lu C. and Liao H., Multipurpose Watermarking for Image Authentication and Protection, IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1579-1592, 2001.

[14] Parthasarathy A. and Kak S., An Improved Method of Content Based Image Watermarking, IEEE Transactions on Broadcasting, vol. 53, no. 2, pp. 468-479, 2007.

[15] Patra J., Phua J., and Bornand C., A novel DCT Domain CRT-based Watermarking Scheme for Image Authentication Surviving JPEG Compression, Digital Signal Processing, vol. 20, no. 6, pp. 1597-1611, 2010.

[16] Pillai J. and Padma T., The Analysis of PQ Sequences Generated from Continued Fraction for use as Pseudorandom Sequences in Cryptographic Applications, Artificial Intelligence and Evolutionary Computations in Engineering Systems, New Delhi, pp. 633-644, 2016.

[17] Qi X., Xin X., and Chang R., Image Authentication and Tamper Detection using Two Complementary Watermarks, in Proceedings of 16th IEEE International Conference on Image Processing, Cairo, 2009.

[18] Qi X. and Xin X., A Quantization-based Semi- Fragile Watermarking Scheme for Image Content Authentication, Journal of Visual Communication and Image Representation, vol. 22, no. 2, pp. 187-200, 2011.

[19] Seng, W., Jiang Du J., and Pham B., Semi Fragile Watermark with Self Authentication and Self Recovery, Malaysian Journal of Computer Science, vol. 22, no. 1, pp. 64-84, 2009. Jayashree Pillai earned her BE degree in Computer Science from Tamilnadu College of Engineering, Coimbtore, M.Tech degree in Computer Science from M. S Ramaiah Institute of Technology, Bangalore and is presently pursuing her research from Mother Teresa Women s University, Kodaikanal, in the area of image authentication. She is presently working as Associate Professor, Department of MCA, AIMS Institute of Higher Education, Bangalore. Her interests are in the field of Computation, networking and security. She has a number of national and international publications in the area of wireless sensor networks and image authentication. Padma Theagarajan has a Masters degree in Computer Applications from Alamelu Angappan College for Women in 1988 and M. Tech from AAU. She did her Ph. D in C. Sc from Mother Teresa Women s University, Kodaikanal. At present, she is the Professor and Head of MIS, Dept. of MCA, Sona college of Technology, Salem. She has a number of National and International publications to her credit and serves as editor and reviewer of a number of well known national and international She also serves as a subject expert in the BOS of various institutions. She is a Life Member of ISTE and CSI and her areas of specialization include Artificial intelligence, Data mining, DSS and Knowledge based systems.