Browse > Article
http://dx.doi.org/10.3745/JIPS.02.0063

An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform  

Zhang, Heng (School of Mechanical, Electrical and Information Engineering, Shandong University)
Wang, Chengyou (School of Mechanical, Electrical and Information Engineering, Shandong University)
Zhou, Xiao (School of Mechanical, Electrical and Information Engineering, Shandong University)
Publication Information
Journal of Information Processing Systems / v.13, no.5, 2017 , pp. 1382-1396 More about this Journal
Abstract
In this paper, we analyze a recently proposed semi-fragile watermarking scheme based on local binary pattern (LBP) operators, and note that it has a fundamental flaw in the design. In this work, a binary watermark is embedded into image blocks by modifying the neighborhood pixels according to the LBP pattern. However, different image blocks might have the same LBP pattern, which can lead to false detection in watermark extraction process. In other words, one can modify the host image intentionally without affecting its watermark message. In addition, there is no encryption process before watermark embedding, which brings another potential security problem. To illustrate its weakness, two special copy-paste attacks are proposed in this paper, and several experiments are conducted to prove the effectiveness of these attacks. To solve these problems, an improved semi-fragile watermarking based on LBP operators is presented. In watermark embedding process, the central pixel value of each block is taken into account and Arnold transform is adopted to guarantee the security of watermark. Experimental results show that the improved watermarking scheme can overcome the above defects and locate the tampered region effectively.
Keywords
Digital Image Watermarking; Semi-fragile Watermarking; False Detection; Local Binary Pattern (LBP); Arnold Transform;
Citations & Related Records
연도 인용수 순위
  • Reference
1 V. Verma and M. J. Singh, "Digital image watermarking techniques: A comparative study," International Journal of Advances in Electrical and Electronics Engineering, vol. 2, no. 1, pp. 173-184, 2013.
2 T. Hai, C. M. Li, J. M. Zain, and A. N. Abdalla, "Robust image watermarking theories and techniques: A review," Journal of Applied Research and Technology, vol. 12, no. 1, pp. 122-138, 2014.   DOI
3 S. H. Liu, H. X. Yao, W. Gao, and Y. L. Liu, "An image fragile watermark scheme based on chaotic image pattern and pixel-pairs," Applied Mathematics and Computation, vol. 185, no. 2, pp. 869-882, 2007.   DOI
4 T. Y. Lee and S. D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, 2008.   DOI
5 S. Rawat and B. Raman, "A chaotic system based fragile watermarking scheme for image tamper detection," AEU - International Journal of Electronics and Communications, vol. 65, no. 10, pp. 840-847, 2011.   DOI
6 S. D. Lin, S. C. Shie, and J. Y. Guo, "Improving the robustness of DCT-based image watermarking against JPEG compression," Computer Standards & Interfaces, vol. 32, no. 1-2, pp. 54-60, 2010.   DOI
7 Y. F. Zhu and L. Lin, "Digital image watermarking algorithm based on dual transform domain and selfrecovery," International Journal on Smart Sensing and Intelligent Systems, vol. 8, no. 1, pp. 199-219, 2015.   DOI
8 S. Dadkhah, A. A. Manaf, Y. Hori, A. E. Hassanien, and S. Sadeghi, "An effective SVD-based image tampering detection and self-recovery using active watermarking," Signal Processing: Image Communication, vol. 29, no. 10, pp. 1197-1210, 2014.   DOI
9 V. Solachidis and I. Pitas, "Circularly symmetric watermark embedding in 2-D DFT domain," IEEE Transactions on Image Processing, vol. 10, no. 11, pp. 1741-1753, 2001.   DOI
10 J. M. Guo and H. Prasetyo, "Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition," AEU - International Journal of Electronics and Communications, vol. 68, no. 9, pp. 816-834, 2014.   DOI
11 A. Tiwari and M. Sharma, "Comparative evaluation of semifragile watermarking algorithms for image authentication," Journal of Information Security, vol. 3, no. 3, pp. 189-195, 2012.   DOI
12 W. Y. Zhang and F. Y. Shih, "Semi-fragile spatial watermarking based on local binary pattern operators," Optics Communications, vol. 284, no. 16-17, pp. 3904-3912, 2011.   DOI
13 Z. J. Liu, L. Xu, T. Liu, H. Chen, P. F. Li, and S. T. Liu, "Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains," Optics Communications, vol. 284, no. 1, pp. 123-128, 2011.   DOI
14 T. Ojala, M. Pietikainen, and D. Harwood, "A comparative study of texture measures with classification based on featured distributions," Pattern Recognition, vol. 29, no. 1, pp. 51-59, 1996.   DOI
15 B. Yang and S. C. Chen, "A comparative study on local binary pattern (LBP) based face recognition: LBP histogram versus LBP image," Neurocomputing, vol. 120, pp. 365-379, 2013.   DOI
16 A. Alahmadi, M. Hussain, H. Aboalsamh, G. Muhammad, G. Bebis, and H. Mathkour, "Passive detection of image forgery using DCT and local binary pattern," Signal, Image and Video Processing, vol. 11, no. 1, pp. 81-88, 2017.   DOI
17 J. D. Chang, B. H. Chen, and C. S. Tsai, "LBP-based fragile watermarking scheme for image tamper detection and recovery," in Proceedings of the IEEE International Symposium on Next-Generation Electronics, Kaohsiung, Taiwan, 2013, pp. 173-176.
18 S. R. Chalamala and K. R. Kakkirala, "Local binary patterns for digital image watermarking," in Proceedings of the 3rd International Conference on Artificial Intelligence, Modelling and Simulation, Kota Kinabalu, Malaysia, 2015, pp. 159-162.