Skip to main content

An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection

  • Conference paper
Computational Science and Its Applications – ICCSA 2007 (ICCSA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4707))

Included in the following conference series:

  • 1150 Accesses

Abstract

By taking full advantage of the masking characteristics of the HVS (Human Visual System), this paper first deduces a JND (Just Noticeable Differences) threshold matrix based on blocks, and then presents an image-adaptive semi-fragile watermarking technique operating in DWT (Discrete Wavelet Transform) domain. The proposed technique exploits HVS characteristics and the polarity of the sum of the absolute values of coefficients of the vertical and the horizontal detail subbands of image sub-blocks to embed a binary watermark with visually recognizable pattern. The embedded watermark is invisible to human eyes and adaptive to the original image characteristics because of the utilization of HVS characteristics. The experimental results show that the proposed algorithm is effective and can classify effectively the attacks made on the watermarked image into malicious attacks and non-malicious attacks by the adaptive threshold. The embedded watermark is sensitive to malicious attacks while is robust to non-malicious attacks. Moreover, the scheme has a good accuracy in locating tampered blocks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yu-jie, S., Tie-niu, T.: A Brief Review on Fragile Watermarking Based Image Authentication. Journal of image and graphics 8(A)1, 1–7 (2003)

    Google Scholar 

  2. Wu, X., Hu, J., Gu, Z., et al.: A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters. In: Proc. of Australasian Information Security Workshop 2005, Newcastle, Australia (2005)

    Google Scholar 

  3. Ishihara, N., Abe, K.: A Semi-Fragile Watermarking Scheme for Image Authentication and Tamper-Proofing. In: Proc. of 2nd International Conference on Intelligent Computing and Information Systems, Cairo, Egypt, pp. 590–595 (2005)

    Google Scholar 

  4. Lin, C.Y., Chang, S.F.: Semi-Fragile Watermarking for Authenticating JPEG Visual Content. SPIE Security and Watermarking of Multimedia Contents II, EI’ 00, San Jose, CA, pp. 140–151(2000)

    Google Scholar 

  5. Feng, G.-r., Jiang, L.-g., He, C.: Permutation-Based Semi-Fragile Watermark Scheme. IEICE Trans. Fundamentals E88-A(1), 374–377 (2005)

    Article  Google Scholar 

  6. Lu, Z.-M., Liu, C.-H., Xu, D.-G., Sun, S.-H.: Semi-fragile Image Watermarking Method Based on Index Constrained Vector Quantisation. IEE Electronics Letters 39(1), 35–36 (2003)

    Article  Google Scholar 

  7. Kang, H., Park, J.: A Semi-Fragile Watermarking Using JND. In: Proceedings of Pacific Rim Workshop on Digital Steganography 2003, Kitakyushu, Japan (2003)

    Google Scholar 

  8. Liu, Y., Gao, W., Yao, H., Liu, S.: A Texture-based Tamper Detection Scheme by Fragile Watermark. In: The 2004 IEEE International Symposium on Circuits and Systems, ISCAS 2004, Vancouver, CA, pp. 177–180 (May23-26, 2004)

    Google Scholar 

  9. Hengfu, Y., Zihua, Y., Mingfang, J.: Content Based Image Public Watermarking. In: Proceedings of Eurographics Workshop on multimedia 2004, pp. 163–172 (2004)

    Google Scholar 

  10. Bartollini, F., Tefas, A., Barni, M., Pitas, I.: Image Authentication Techniques for Surveillance Applications. In: Proc. IEEE, vol. 89 (10), pp. 1403–1418. IEEE Computer Society Press, Los Alamitos (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Osvaldo Gervasi Marina L. Gavrilova

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, H., Sun, X., Wang, B., Qin, Z. (2007). An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4707. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74484-9_93

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74484-9_93

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74482-5

  • Online ISBN: 978-3-540-74484-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics