Skip to main content

Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain

  • Conference paper
Book cover Security and Trust Management (STM 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8203))

Included in the following conference series:

Abstract

In this paper we present a simple and elegant technique for fragile image watermarking inthe Karhunen-Loève transform (KLT) domain with the objective of content integrity. The proposed method inserts a binary watermark into some KLT coefficients defined using a secret key image. The coefficients are modified according to a rule based on a weighted-modulo sum. The KLT is applied to contiguous blocks of the host image and a Genetic Algorithm (GA) is used to modify the pixel values in such a way that the resulting blocks contain the watermark. Given that the KLT space of insertion of the watermark is kept secret, the security of the method is strong. We experimentally demonstrate that the algorithm achieves an excellent sensitivity even to small modifications of the watermarked image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2008)

    Google Scholar 

  2. He, H., Chen, F., Tai, H.-M., Kalker, T., Zhang, J.: Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme. IEEE Transactions on Information Forensics and Security 7(1), 185–196 (2012)

    Article  Google Scholar 

  3. Botta, M., Cavagnino, D., Pomponiu, V.: KL-F: Karhunen-Loève Based Fragile Watermarking. In: 5th International Conference on Network and System Security, NSS 2011, pp. 65–72 (2011)

    Google Scholar 

  4. Lin, P.-Y., Lee, J.-S., Chang, C.-C.: Protecting the content integrity of digital imagery with fidelity preservation. ACM Trans. Multimedia Comp. Commun. and Appl. 7(3), 15:1–15:20, Article 15 (August 2011)

    Google Scholar 

  5. Yeung, M.M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proc. of International Conference on Image Processing, vol. 2, pp. 680–683 (1997)

    Google Scholar 

  6. Ho, A.T.S., Zhu, X.-Z., Shen, J., Marziliano, P.: Fragile watermarking based on encoding of the zeroes of the z-transform. IEEE Transactions on Information Forensics and Security 3(3), 567–569 (2008)

    Article  Google Scholar 

  7. Oktavia, V., Lee, W.-H.: A Fragile Watermarking Technique for Image Authentication Using Singular Value Decomposition. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3332, pp. 42–49. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Rawat, S., Raman, B.: A chaotic system based fragile watermarking scheme for image tamper detection. AEU-International Journal of Electronics and Communications 65, 840–847 (2011)

    Article  Google Scholar 

  9. Dafas, P., Stathaki, T.: Digital image watermarking using block-based Karhunen-Loeve transform. In: Proceedings of the 3rd IEEE International Symposium on Image and Signal Processing and Analysis, pp. 1072–1075 (2003)

    Google Scholar 

  10. Aslantas, V., Ozer, S., Ozturk, S.: Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Optics Communications 282(14), 2806–2817 (2009)

    Article  Google Scholar 

  11. Barni, M., Bartolini, F., De Rosa, A., Piva, A.: Color image watermarking in the Karhunen-Loeve transform domain. Journal of Electronic Imaging 11(1), 87–95 (2002)

    Article  Google Scholar 

  12. Lai, C.-C., Yeh, C.-H., Ko, C.-H., Chiang, C.-Y.: Image Watermarking Scheme Using Genetic Algorithm. In: Proc. of Sixth International Conference on Genetic and Evolutionary Computing (ICGEC), pp. 476–479 (2012)

    Google Scholar 

  13. Chen, Y.-H., Huang, H.-C.: Robust Image Watermarking Based on Coevolutionary Genetic Algorithm. In: Proc. of Sixth International Conference on Genetic and Evolutionary Computing (ICGEC), pp. 484–487 (2012)

    Google Scholar 

  14. Gonzalez, R.C., Wintz, P.: Digital Image Processing, 2nd edn. Addison-Wesley Publishing Company (1987)

    Google Scholar 

  15. Barreto, P.S.L.M., Kim, H.Y., Rijmen, V.: Toward secure publickeyblockwise fragile authentication watermarking. In: IEE Proceedings - Vision, Image and Signal Processing 2002, vol. 148(2), pp. 57–62 (2002)

    Google Scholar 

  16. The Keccak sponge function family (2012), http://keccak.noekeon.org/

  17. Wang, Z., Bovik, A.C.: Mean squared error: love it or leave it? A new look at signal fidelity measures. IEEE Signal Processing Magazine 26(1), 98–117 (2009)

    Article  Google Scholar 

  18. Li, L.-J., Wang, G., Li, F.-F.: OPTIMOL: automatic Object Picture collecTion via Incremental Model Learning. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–8 (2008)

    Google Scholar 

  19. Botta, M., Cavagnino, D., Pomponiu, V.: ‘Protecting the Content Integrity of Digital Imagery with Fidelity Preservation’: an improved version. Submitted to ACM Transactions on Multimedia Computing Communications and Applications (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Botta, M., Cavagnino, D., Pomponiu, V. (2013). Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain. In: Accorsi, R., Ranise, S. (eds) Security and Trust Management. STM 2013. Lecture Notes in Computer Science, vol 8203. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41098-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41098-7_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41097-0

  • Online ISBN: 978-3-642-41098-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics