Abstract
A novel blind semi-fragile watermarking scheme for authentication and tamper detection of digital images is proposed in this paper. This watermarking scheme is based on Discrete Curvelet Transform (DCLT), which captures the information content of the image in few coefficients compared to other transforms. The novelty of the approach is that the first level coarse DCLT coefficients of the input image are quantized into 4 bits which is used as watermark and embedded into the pseudo randomly determined coefficients. At the receiver side, the extracted and generated first level coarse DCLT coefficients of the watermarked image are divided into blocks of uniform size. The difference in the energy between each block of extracted and generated coefficients is compared and if the difference exceeds threshold, the block is marked as tampered. This scheme exhibits higher Normalization Correlation Coefficient (NCC) values for various incidental attacks and is thus more robust than existing scheme [1]. The proposed scheme outperforms in localizing tampered regions compared to method [1].
References
Ghofrani, S. et.al., Image content authentication and tamper localization based on semi fragile watermarking by using the Curvelet transform, TENCON 2012—2012 IEEE Region 10 Conference, Cebu, pp. 1–6, (2012).
Prabhishek Singh et.al., A Survey of Digital Watermarking Techniques, Applications and Attacks, International Journal of Engineering and Innovative Technology (IJEIT), Vol. 2, No. 9, pp. 165–175 (2013).
W.H. Chang and L.W. Chang, Semi-Fragile Watermarking for Image Authentication, Localization, and Recovery Using Tchebichef Moments, International Symposium on Communications and Information Technologies (ISCIT), pp. 749–754. (2010).
G. Schirripa, C. Simonetti and L. Cozzella, Fragile Digital Watermarking by Synthetic Holograms, Proc. of European Symposium on Optics/Fotonics in security & Defence, London, UK, pp. 173–182. (2004).
J. Dittmann, L. Croce Ferri and C. Vielhauer, Hologram Watermarks for Document Authentications, Proceedings of IEEE International Conference on Information Technology, Las Vegas, pp. 60–64 (2001).
Y. Aoki, Watermarking Technique Using Computer-Generated Holograms, Electronics and Communications in Japan, Part 3, Vol. 84, No. 1, pp. 21–31. (2001).
K. Maeno, Q. Sun, S. Chang and M. Suto, New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization, IEEE Trans. Multimedia, Vol. 8, No. 1, pp. 32–45. (2006).
L. Xin and L. Xiaoqi and W. Wing, A semi-fragile digital watermarking algorithm based on integer Wavelet matrix norm quantization for medical images, IEEE International conference on bioinformatics and biomedical engineering, pp. 776–779, (2008).
X. Wu and J. Huang and J. Hu and Y. Shi, Secure semi-fragile watermarking for Image authentication based on parameterized integer Wavelet, Journal of Computers, Vol. 17, No. 2, pp. 27–36, (2006).
D. L. Donoho and M. R. Duncan, Digital Curvelet transform: Strategy, implementation and experiments, Proc. Society optics and photonics, Vol. 4056, pp. 12–29, (2000).
L. Chen, G. Lu, and D. S. Zhang, Effects of Different Gabor Filter Parameters on Image Retrieval by Texture, in Proc. of IEEE 10th International Conference on Multi-Media Modelling, Australia, pp. 273–278. (2004).
E. J. Candès, L. Demanet, D. L. Donoho, and L. Ying, Fast Discrete Curvelet Transforms, Multiscale Modeling and Simulation, Vol. 5, pp. 861–899 (2005).
J.-L. Starck and M.J. Fadili, Numerical Issues When using Wavelets, in Encyclopedia of Complexity and Systems Science, Meyers, Robert (Ed.), Springer New York, Vol 14, pp 6352–6368, (2009).
E. Candes and D. Donoho, New tight frames of Curvelets and optimal representations of objects with C2 singularities Comm. Pure Appl. Mathematics, Vol. 57, No. 2, pp. 219–266, (2004).
Yevgeniy Dodis et.al., Threshold and proactive pseudo-random permutations, TCC’06 Proceedings of the Third conference on Theory of Cryptography, Verlag Berlin, Heidelberg, pp. 542–560, (2006).
Jaejin Lee, Chee Sun Won, A Watermarking Sequence Using Parities of Error Control Coding For Image Authentication And Correction, Consumer Electronics, IEEE Transactions, Vol. 46, No. 2, pp. 313–317 (2000).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Nirmala, S., Chetan, K.R. (2016). A New Curvelet Based Blind Semi-fragile Watermarking Scheme for Authentication and Tamper Detection of Digital Images. In: Satapathy, S.C., Mandal, J.K., Udgata, S.K., Bhateja, V. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 434. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2752-6_2
Download citation
DOI: https://doi.org/10.1007/978-81-322-2752-6_2
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2750-2
Online ISBN: 978-81-322-2752-6
eBook Packages: EngineeringEngineering (R0)