DOI QR코드

DOI QR Code

An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform

  • Zhang, Heng (School of Mechanical, Electrical and Information Engineering, Shandong University) ;
  • Wang, Chengyou (School of Mechanical, Electrical and Information Engineering, Shandong University) ;
  • Zhou, Xiao (School of Mechanical, Electrical and Information Engineering, Shandong University)
  • Received : 2016.10.24
  • Accepted : 2017.01.28
  • Published : 2017.10.31

Abstract

In this paper, we analyze a recently proposed semi-fragile watermarking scheme based on local binary pattern (LBP) operators, and note that it has a fundamental flaw in the design. In this work, a binary watermark is embedded into image blocks by modifying the neighborhood pixels according to the LBP pattern. However, different image blocks might have the same LBP pattern, which can lead to false detection in watermark extraction process. In other words, one can modify the host image intentionally without affecting its watermark message. In addition, there is no encryption process before watermark embedding, which brings another potential security problem. To illustrate its weakness, two special copy-paste attacks are proposed in this paper, and several experiments are conducted to prove the effectiveness of these attacks. To solve these problems, an improved semi-fragile watermarking based on LBP operators is presented. In watermark embedding process, the central pixel value of each block is taken into account and Arnold transform is adopted to guarantee the security of watermark. Experimental results show that the improved watermarking scheme can overcome the above defects and locate the tampered region effectively.

Keywords

References

  1. V. Verma and M. J. Singh, "Digital image watermarking techniques: A comparative study," International Journal of Advances in Electrical and Electronics Engineering, vol. 2, no. 1, pp. 173-184, 2013.
  2. T. Hai, C. M. Li, J. M. Zain, and A. N. Abdalla, "Robust image watermarking theories and techniques: A review," Journal of Applied Research and Technology, vol. 12, no. 1, pp. 122-138, 2014. https://doi.org/10.1016/S1665-6423(14)71612-8
  3. S. H. Liu, H. X. Yao, W. Gao, and Y. L. Liu, "An image fragile watermark scheme based on chaotic image pattern and pixel-pairs," Applied Mathematics and Computation, vol. 185, no. 2, pp. 869-882, 2007. https://doi.org/10.1016/j.amc.2006.07.036
  4. T. Y. Lee and S. D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, 2008. https://doi.org/10.1016/j.patcog.2008.05.003
  5. S. Rawat and B. Raman, "A chaotic system based fragile watermarking scheme for image tamper detection," AEU - International Journal of Electronics and Communications, vol. 65, no. 10, pp. 840-847, 2011. https://doi.org/10.1016/j.aeue.2011.01.016
  6. S. D. Lin, S. C. Shie, and J. Y. Guo, "Improving the robustness of DCT-based image watermarking against JPEG compression," Computer Standards & Interfaces, vol. 32, no. 1-2, pp. 54-60, 2010. https://doi.org/10.1016/j.csi.2009.06.004
  7. Y. F. Zhu and L. Lin, "Digital image watermarking algorithm based on dual transform domain and selfrecovery," International Journal on Smart Sensing and Intelligent Systems, vol. 8, no. 1, pp. 199-219, 2015. https://doi.org/10.21307/ijssis-2017-755
  8. V. Solachidis and I. Pitas, "Circularly symmetric watermark embedding in 2-D DFT domain," IEEE Transactions on Image Processing, vol. 10, no. 11, pp. 1741-1753, 2001. https://doi.org/10.1109/83.967401
  9. J. M. Guo and H. Prasetyo, "Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition," AEU - International Journal of Electronics and Communications, vol. 68, no. 9, pp. 816-834, 2014. https://doi.org/10.1016/j.aeue.2014.03.008
  10. S. Dadkhah, A. A. Manaf, Y. Hori, A. E. Hassanien, and S. Sadeghi, "An effective SVD-based image tampering detection and self-recovery using active watermarking," Signal Processing: Image Communication, vol. 29, no. 10, pp. 1197-1210, 2014. https://doi.org/10.1016/j.image.2014.09.001
  11. A. Tiwari and M. Sharma, "Comparative evaluation of semifragile watermarking algorithms for image authentication," Journal of Information Security, vol. 3, no. 3, pp. 189-195, 2012. https://doi.org/10.4236/jis.2012.33023
  12. W. Y. Zhang and F. Y. Shih, "Semi-fragile spatial watermarking based on local binary pattern operators," Optics Communications, vol. 284, no. 16-17, pp. 3904-3912, 2011. https://doi.org/10.1016/j.optcom.2011.04.004
  13. T. Ojala, M. Pietikainen, and D. Harwood, "A comparative study of texture measures with classification based on featured distributions," Pattern Recognition, vol. 29, no. 1, pp. 51-59, 1996. https://doi.org/10.1016/0031-3203(95)00067-4
  14. B. Yang and S. C. Chen, "A comparative study on local binary pattern (LBP) based face recognition: LBP histogram versus LBP image," Neurocomputing, vol. 120, pp. 365-379, 2013. https://doi.org/10.1016/j.neucom.2012.10.032
  15. A. Alahmadi, M. Hussain, H. Aboalsamh, G. Muhammad, G. Bebis, and H. Mathkour, "Passive detection of image forgery using DCT and local binary pattern," Signal, Image and Video Processing, vol. 11, no. 1, pp. 81-88, 2017. https://doi.org/10.1007/s11760-016-0899-0
  16. J. D. Chang, B. H. Chen, and C. S. Tsai, "LBP-based fragile watermarking scheme for image tamper detection and recovery," in Proceedings of the IEEE International Symposium on Next-Generation Electronics, Kaohsiung, Taiwan, 2013, pp. 173-176.
  17. S. R. Chalamala and K. R. Kakkirala, "Local binary patterns for digital image watermarking," in Proceedings of the 3rd International Conference on Artificial Intelligence, Modelling and Simulation, Kota Kinabalu, Malaysia, 2015, pp. 159-162.
  18. Z. J. Liu, L. Xu, T. Liu, H. Chen, P. F. Li, and S. T. Liu, "Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains," Optics Communications, vol. 284, no. 1, pp. 123-128, 2011. https://doi.org/10.1016/j.optcom.2010.09.013