Skip to main content

A New Curvelet Based Blind Semi-fragile Watermarking Scheme for Authentication and Tamper Detection of Digital Images

  • Conference paper
  • First Online:
Information Systems Design and Intelligent Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 434))

Abstract

A novel blind semi-fragile watermarking scheme for authentication and tamper detection of digital images is proposed in this paper. This watermarking scheme is based on Discrete Curvelet Transform (DCLT), which captures the information content of the image in few coefficients compared to other transforms. The novelty of the approach is that the first level coarse DCLT coefficients of the input image are quantized into 4 bits which is used as watermark and embedded into the pseudo randomly determined coefficients. At the receiver side, the extracted and generated first level coarse DCLT coefficients of the watermarked image are divided into blocks of uniform size. The difference in the energy between each block of extracted and generated coefficients is compared and if the difference exceeds threshold, the block is marked as tampered. This scheme exhibits higher Normalization Correlation Coefficient (NCC) values for various incidental attacks and is thus more robust than existing scheme [1]. The proposed scheme outperforms in localizing tampered regions compared to method [1].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Ghofrani, S. et.al., Image content authentication and tamper localization based on semi fragile watermarking by using the Curvelet transform, TENCON 2012—2012 IEEE Region 10 Conference, Cebu, pp. 1–6, (2012).

    Google Scholar 

  2. Prabhishek Singh et.al., A Survey of Digital Watermarking Techniques, Applications and Attacks, International Journal of Engineering and Innovative Technology (IJEIT), Vol. 2, No. 9, pp. 165–175 (2013).

    Google Scholar 

  3. W.H. Chang and L.W. Chang, Semi-Fragile Watermarking for Image Authentication, Localization, and Recovery Using Tchebichef Moments, International Symposium on Communications and Information Technologies (ISCIT), pp. 749–754. (2010).

    Google Scholar 

  4. G. Schirripa, C. Simonetti and L. Cozzella, Fragile Digital Watermarking by Synthetic Holograms, Proc. of European Symposium on Optics/Fotonics in security & Defence, London, UK, pp. 173–182. (2004).

    Google Scholar 

  5. J. Dittmann, L. Croce Ferri and C. Vielhauer, Hologram Watermarks for Document Authentications, Proceedings of IEEE International Conference on Information Technology, Las Vegas, pp. 60–64 (2001).

    Google Scholar 

  6. Y. Aoki, Watermarking Technique Using Computer-Generated Holograms, Electronics and Communications in Japan, Part 3, Vol. 84, No. 1, pp. 21–31. (2001).

    Google Scholar 

  7. K. Maeno, Q. Sun, S. Chang and M. Suto, New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization, IEEE Trans. Multimedia, Vol. 8, No. 1, pp. 32–45. (2006).

    Google Scholar 

  8. L. Xin and L. Xiaoqi and W. Wing, A semi-fragile digital watermarking algorithm based on integer Wavelet matrix norm quantization for medical images, IEEE International conference on bioinformatics and biomedical engineering, pp. 776–779, (2008).

    Google Scholar 

  9. X. Wu and J. Huang and J. Hu and Y. Shi, Secure semi-fragile watermarking for Image authentication based on parameterized integer Wavelet, Journal of Computers, Vol. 17, No. 2, pp. 27–36, (2006).

    Google Scholar 

  10. D. L. Donoho and M. R. Duncan, Digital Curvelet transform: Strategy, implementation and experiments, Proc. Society optics and photonics, Vol. 4056, pp. 12–29, (2000).

    Google Scholar 

  11. L. Chen, G. Lu, and D. S. Zhang, Effects of Different Gabor Filter Parameters on Image Retrieval by Texture, in Proc. of IEEE 10th International Conference on Multi-Media Modelling, Australia, pp. 273–278. (2004).

    Google Scholar 

  12. E. J. Candès, L. Demanet, D. L. Donoho, and L. Ying, Fast Discrete Curvelet Transforms, Multiscale Modeling and Simulation, Vol. 5, pp. 861–899 (2005).

    Google Scholar 

  13. J.-L. Starck and M.J. Fadili, Numerical Issues When using Wavelets, in Encyclopedia of Complexity and Systems Science, Meyers, Robert (Ed.), Springer New York, Vol 14, pp 6352–6368, (2009).

    Google Scholar 

  14. E. Candes and D. Donoho, New tight frames of Curvelets and optimal representations of objects with C2 singularities Comm. Pure Appl. Mathematics, Vol. 57, No. 2, pp. 219–266, (2004).

    Google Scholar 

  15. Yevgeniy Dodis et.al., Threshold and proactive pseudo-random permutations, TCC’06 Proceedings of the Third conference on Theory of Cryptography, Verlag Berlin, Heidelberg, pp. 542–560, (2006).

    Google Scholar 

  16. Jaejin Lee, Chee Sun Won, A Watermarking Sequence Using Parities of Error Control Coding For Image Authentication And Correction, Consumer Electronics, IEEE Transactions, Vol. 46, No. 2, pp. 313–317 (2000).

    Google Scholar 

  17. http://sipi.usc.edu/database/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Nirmala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Nirmala, S., Chetan, K.R. (2016). A New Curvelet Based Blind Semi-fragile Watermarking Scheme for Authentication and Tamper Detection of Digital Images. In: Satapathy, S.C., Mandal, J.K., Udgata, S.K., Bhateja, V. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 434. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2752-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2752-6_2

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2750-2

  • Online ISBN: 978-81-322-2752-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics