Abstract
In this paper we present a simple and elegant technique for fragile image watermarking inthe Karhunen-Loève transform (KLT) domain with the objective of content integrity. The proposed method inserts a binary watermark into some KLT coefficients defined using a secret key image. The coefficients are modified according to a rule based on a weighted-modulo sum. The KLT is applied to contiguous blocks of the host image and a Genetic Algorithm (GA) is used to modify the pixel values in such a way that the resulting blocks contain the watermark. Given that the KLT space of insertion of the watermark is kept secret, the security of the method is strong. We experimentally demonstrate that the algorithm achieves an excellent sensitivity even to small modifications of the watermarked image.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2008)
He, H., Chen, F., Tai, H.-M., Kalker, T., Zhang, J.: Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme. IEEE Transactions on Information Forensics and Security 7(1), 185–196 (2012)
Botta, M., Cavagnino, D., Pomponiu, V.: KL-F: Karhunen-Loève Based Fragile Watermarking. In: 5th International Conference on Network and System Security, NSS 2011, pp. 65–72 (2011)
Lin, P.-Y., Lee, J.-S., Chang, C.-C.: Protecting the content integrity of digital imagery with fidelity preservation. ACM Trans. Multimedia Comp. Commun. and Appl. 7(3), 15:1–15:20, Article 15 (August 2011)
Yeung, M.M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proc. of International Conference on Image Processing, vol. 2, pp. 680–683 (1997)
Ho, A.T.S., Zhu, X.-Z., Shen, J., Marziliano, P.: Fragile watermarking based on encoding of the zeroes of the z-transform. IEEE Transactions on Information Forensics and Security 3(3), 567–569 (2008)
Oktavia, V., Lee, W.-H.: A Fragile Watermarking Technique for Image Authentication Using Singular Value Decomposition. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3332, pp. 42–49. Springer, Heidelberg (2005)
Rawat, S., Raman, B.: A chaotic system based fragile watermarking scheme for image tamper detection. AEU-International Journal of Electronics and Communications 65, 840–847 (2011)
Dafas, P., Stathaki, T.: Digital image watermarking using block-based Karhunen-Loeve transform. In: Proceedings of the 3rd IEEE International Symposium on Image and Signal Processing and Analysis, pp. 1072–1075 (2003)
Aslantas, V., Ozer, S., Ozturk, S.: Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Optics Communications 282(14), 2806–2817 (2009)
Barni, M., Bartolini, F., De Rosa, A., Piva, A.: Color image watermarking in the Karhunen-Loeve transform domain. Journal of Electronic Imaging 11(1), 87–95 (2002)
Lai, C.-C., Yeh, C.-H., Ko, C.-H., Chiang, C.-Y.: Image Watermarking Scheme Using Genetic Algorithm. In: Proc. of Sixth International Conference on Genetic and Evolutionary Computing (ICGEC), pp. 476–479 (2012)
Chen, Y.-H., Huang, H.-C.: Robust Image Watermarking Based on Coevolutionary Genetic Algorithm. In: Proc. of Sixth International Conference on Genetic and Evolutionary Computing (ICGEC), pp. 484–487 (2012)
Gonzalez, R.C., Wintz, P.: Digital Image Processing, 2nd edn. Addison-Wesley Publishing Company (1987)
Barreto, P.S.L.M., Kim, H.Y., Rijmen, V.: Toward secure publickeyblockwise fragile authentication watermarking. In: IEE Proceedings - Vision, Image and Signal Processing 2002, vol. 148(2), pp. 57–62 (2002)
The Keccak sponge function family (2012), http://keccak.noekeon.org/
Wang, Z., Bovik, A.C.: Mean squared error: love it or leave it? A new look at signal fidelity measures. IEEE Signal Processing Magazine 26(1), 98–117 (2009)
Li, L.-J., Wang, G., Li, F.-F.: OPTIMOL: automatic Object Picture collecTion via Incremental Model Learning. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–8 (2008)
Botta, M., Cavagnino, D., Pomponiu, V.: ‘Protecting the Content Integrity of Digital Imagery with Fidelity Preservation’: an improved version. Submitted to ACM Transactions on Multimedia Computing Communications and Applications (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Botta, M., Cavagnino, D., Pomponiu, V. (2013). Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain. In: Accorsi, R., Ranise, S. (eds) Security and Trust Management. STM 2013. Lecture Notes in Computer Science, vol 8203. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41098-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-41098-7_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41097-0
Online ISBN: 978-3-642-41098-7
eBook Packages: Computer ScienceComputer Science (R0)