Abstract
By taking full advantage of the masking characteristics of the HVS (Human Visual System), this paper first deduces a JND (Just Noticeable Differences) threshold matrix based on blocks, and then presents an image-adaptive semi-fragile watermarking technique operating in DWT (Discrete Wavelet Transform) domain. The proposed technique exploits HVS characteristics and the polarity of the sum of the absolute values of coefficients of the vertical and the horizontal detail subbands of image sub-blocks to embed a binary watermark with visually recognizable pattern. The embedded watermark is invisible to human eyes and adaptive to the original image characteristics because of the utilization of HVS characteristics. The experimental results show that the proposed algorithm is effective and can classify effectively the attacks made on the watermarked image into malicious attacks and non-malicious attacks by the adaptive threshold. The embedded watermark is sensitive to malicious attacks while is robust to non-malicious attacks. Moreover, the scheme has a good accuracy in locating tampered blocks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Yu-jie, S., Tie-niu, T.: A Brief Review on Fragile Watermarking Based Image Authentication. Journal of image and graphics 8(A)1, 1–7 (2003)
Wu, X., Hu, J., Gu, Z., et al.: A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters. In: Proc. of Australasian Information Security Workshop 2005, Newcastle, Australia (2005)
Ishihara, N., Abe, K.: A Semi-Fragile Watermarking Scheme for Image Authentication and Tamper-Proofing. In: Proc. of 2nd International Conference on Intelligent Computing and Information Systems, Cairo, Egypt, pp. 590–595 (2005)
Lin, C.Y., Chang, S.F.: Semi-Fragile Watermarking for Authenticating JPEG Visual Content. SPIE Security and Watermarking of Multimedia Contents II, EI’ 00, San Jose, CA, pp. 140–151(2000)
Feng, G.-r., Jiang, L.-g., He, C.: Permutation-Based Semi-Fragile Watermark Scheme. IEICE Trans. Fundamentals E88-A(1), 374–377 (2005)
Lu, Z.-M., Liu, C.-H., Xu, D.-G., Sun, S.-H.: Semi-fragile Image Watermarking Method Based on Index Constrained Vector Quantisation. IEE Electronics Letters 39(1), 35–36 (2003)
Kang, H., Park, J.: A Semi-Fragile Watermarking Using JND. In: Proceedings of Pacific Rim Workshop on Digital Steganography 2003, Kitakyushu, Japan (2003)
Liu, Y., Gao, W., Yao, H., Liu, S.: A Texture-based Tamper Detection Scheme by Fragile Watermark. In: The 2004 IEEE International Symposium on Circuits and Systems, ISCAS 2004, Vancouver, CA, pp. 177–180 (May23-26, 2004)
Hengfu, Y., Zihua, Y., Mingfang, J.: Content Based Image Public Watermarking. In: Proceedings of Eurographics Workshop on multimedia 2004, pp. 163–172 (2004)
Bartollini, F., Tefas, A., Barni, M., Pitas, I.: Image Authentication Techniques for Surveillance Applications. In: Proc. IEEE, vol. 89 (10), pp. 1403–1418. IEEE Computer Society Press, Los Alamitos (2001)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, H., Sun, X., Wang, B., Qin, Z. (2007). An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4707. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74484-9_93
Download citation
DOI: https://doi.org/10.1007/978-3-540-74484-9_93
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74482-5
Online ISBN: 978-3-540-74484-9
eBook Packages: Computer ScienceComputer Science (R0)