Advertisement

Design and Analysis of a Fragile Watermarking Scheme Based on Block-Mapping

  • Munkhbaatar Doyoddorj
  • Kyung-Hyune Rhee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7465)

Abstract

Due to the wide variety of attacks and the difficulties of developing an accurate statistical model of host features, the structure of the watermark detector is derived by considering a simplified channel model. In this paper, we present a fragile watermarking based on block-mapping mechanism which can perfectly recover the host image from its tampered version by generating a reference data. By investigating characteristics of watermark detector, we make an effective analysis such as fragility against robustness measure and distinguish its property. In particular, we derive a watermark detector structure with simplified channel model which focuses on the error probability versus watermark-to-noise-ratio curve and describes a design by calculating the performance of technique, where attacks are either absent or as noise addition.

Keywords

Fragile Watermarking Characterization Block-Mapping Tamper Localization 

References

  1. 1.
    Rey, C., Dugelay, J.L.: A survey of watermarking algorithms for image authentication. EURASTP Appl. Signal Process. (6), 613–621 (2002)Google Scholar
  2. 2.
    Suthaharan, S.: Fragile image watermarking using a gradient image for improved localization and security. Pattern Recogn. Lett. 25(16), 1893–1903 (2004)CrossRefGoogle Scholar
  3. 3.
    Lin, P.-L., Hsieh, C.-K., Huang, P.-W.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 38(12), 2519–2529 (2005)CrossRefGoogle Scholar
  4. 4.
    Merhav, N., Sabbag, E.: Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources. IEEE Transactions on Information Theory 54(1) (2008)Google Scholar
  5. 5.
    Celik, M., Sharma, G., Saber, E., Tekalp, A.M.: Hierarchical watermarking for secure image authentication with localization. IEEE Transaction on Image Processessing 11(6), 585–595 (2002)CrossRefGoogle Scholar
  6. 6.
    Suthaharan, S.: Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognition Letters 25, 1893–1903 (2004)CrossRefGoogle Scholar
  7. 7.
    Liu, S., Yao, H., Gao, W., Liu, Y.: An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Applied Mathematics Computation 185(2), 869–882 (2007)zbMATHCrossRefGoogle Scholar
  8. 8.
    Wang, M.S., Chen, W.C.: A majority-voting based watermarking scheme for color image tamper detection and recovery. Computer Standards and Interfaces (29), 561–570 (2007)Google Scholar
  9. 9.
    Yeung, M., Mintzer, F.: Invisible watermarking for image verification. Journal of Electronic Imaging (7), 578–591 (1998)Google Scholar
  10. 10.
    Swanson, M.D., Bin, Z., Tewfik, A.H.: Transparent robust image watermarking. In: IEEE International Conference on Image Processing, vol. (3), pp. 211–214. IEEE Computer Society Press (1996)Google Scholar
  11. 11.
    Holliman, M., Melon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Processing 9(3), 432–441 (2000)CrossRefGoogle Scholar
  12. 12.
    He, H.J., Zhang, J.S., Wang, H.X.: Synchronous counterfeiting attacks on self-embedding watermarking schemes. Internetional Journal Computer Science and Network Security 6(1), 251–257 (2006)Google Scholar
  13. 13.
    Tagliasacchi, M., Valenzise, G., Tubaro, S.: Hash-Based Identification of Sparse Image Tampering. IEEE Transactions on Image Processing 18(11), 2491–2504 (2009)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Lai, C.-C., Tsai, C.-C.: Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition. IEEE Transactions on Instrumentation and Measurement 59(11), 3060–3063 (2010)CrossRefGoogle Scholar
  15. 15.
    Adelsbach, A., Katzenbeisser, S., Sadeghi, A.-R.: A Computational Model for Watermark Robustness. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 145–160. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  16. 16.
    Zhang, X., Wang, S.: Fragile watermarking scheme using a hierarchical mechanism. Signal Processing (89) 675–679 (2009)Google Scholar
  17. 17.
    Zhu, X., Ho, A., Marziliano, P.: A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Processing and Image Communication (22), 515–528 (2009)Google Scholar
  18. 18.
    He, H.J., Chen, F., Tai, H.-M.: Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme. IEEE Transactions on Information Forensics and Security 7(1), 185–196 (2012)CrossRefGoogle Scholar
  19. 19.
    Baeuml, R., Eggers, J.J., Tzschoppe, R., Huber, J.: Channel model for watermarks subject to desynchronization attacks. In: Proc. SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 281–292 (2002)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2012

Authors and Affiliations

  • Munkhbaatar Doyoddorj
    • 1
  • Kyung-Hyune Rhee
    • 1
  1. 1.Department of IT Convergence and Application EngineeringPukyong National UniversityNam-GuRepublic of Korea

Personalised recommendations