Browse > Article
http://dx.doi.org/10.3745/JIPS.03.0096

LBP and DWT Based Fragile Watermarking for Image Authentication  

Wang, Chengyou (School of Mechanical, Electrical and Information Engineering, Shandong University)
Zhang, Heng (School of Mechanical, Electrical and Information Engineering, Shandong University)
Zhou, Xiao (School of Mechanical, Electrical and Information Engineering, Shandong University)
Publication Information
Journal of Information Processing Systems / v.14, no.3, 2018 , pp. 666-679 More about this Journal
Abstract
The discrete wavelet transform (DWT) has good multi-resolution decomposition characteristic and its low frequency component contains the basic information of an image. Based on this, a fragile watermarking using the local binary pattern (LBP) and DWT is proposed for image authentication. In this method, the LBP pattern of low frequency wavelet coefficients is adopted as a feature watermark, and it is inserted into the least significant bit (LSB) of the maximum pixel value in each block of host image. To guarantee the safety of the proposed algorithm, the logistic map is applied to encrypt the watermark. In addition, the locations of the maximum pixel values are stored in advance, which will be used to extract watermark on the receiving side. Due to the use of DWT, the watermarked image generated by the proposed scheme has high visual quality. Compared with other state-of-the-art watermarking methods, experimental results manifest that the proposed algorithm not only has lower watermark payloads, but also achieves good performance in tamper identification and localization for various attacks.
Keywords
Discrete Wavelet Transform (DWT); Fragile Watermarking; Image Authentication; Local Binary Pattern (LBP); Semi-blind Detection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, "Watermarking digital image and video data: A state-of-the-art overview," IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20-46, 2000.   DOI
2 L. Teng, X. Y. Wang, and X. K. Wang, "Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme," AEU - International Journal of Electronics and Communications, vol. 67, no. 6, pp. 540-547, 2013.   DOI
3 W. Y. Zhang and F. Y. Shih, "Semi-fragile spatial watermarking based on local binary pattern operators," Optics Communications, vol. 284, no. 16-17, pp. 3904-3912, 2011.   DOI
4 J. D. Chang, B. H. Chen, and C. S. Tsai, "LBP-based fragile watermarking scheme for image tamper detection and recovery," in Proceedings of the IEEE International Symposium on Next-Generation Electronics, Kaohsiung, Taiwan, 2013, pp. 173-176.
5 B. Yang and S. C. Chen, "A comparative study on local binary pattern (LBP) based face recognition: LBP histogram versus LBP image," Neurocomputing, vol. 120, pp. 365-379, 2013.   DOI
6 H. Shi, X. H. Wang, M. C. Li, J. Bai, and B. Feng, "Secure variable-capacity self-recovery watermarking scheme," Multimedia Tools and Applications, vol. 76, no. 5, pp. 6941-6972, 2017.   DOI
7 G. Bhatnagar and B. Raman, "A new robust reference watermarking scheme based on DWT-SVD," Computer Standards and Interfaces, vol. 31, no. 5, pp. 1002-1013, 2009.   DOI
8 H. Zhang, C. Y. Wang, and X. Zhou, "Fragile watermarking for image authentication using the characteristic of SVD," Algorithms, vol. 10, no. 1, article no. 27, 2017.
9 T. Hai, C. M. Li, J. M. Zain, and A. N. Abdalla, "Robust image watermarking theories and techniques: A review," Journal of Applied Research and Technology, vol. 12, no. 1, pp. 122-138, 2014.   DOI
10 H. Nyeem, W. Boles, and C. Boyd, "Digital image watermarking: Its formal model, fundamental properties and possible attacks," EURASIP Journal on Advances in Signal Processing, vol. 2014, no. 1, pp. 1-22, 2014.   DOI
11 K. Sreenivas and V. K. Prasad, "Fragile watermarking schemes for image authentication: A survey," International Journal of Machine Learning and Cybernetics, pp. 1-26, 2017. https://doi.org/10.1007/s13042-017-0641-4   DOI
12 S. Walton, "Information authentication for a slippery new age," Dr. Dobb's Journal, vol. 20, no. 4, pp. 18-26, 1995.
13 S. H. Liu, H. X, Yao, W. Gao, and Y. L. Liu, "An image fragile watermark scheme based on chaotic image pattern and pixel-pairs," Applied Mathematics and Computation, vol. 185, no. 2, pp. 869-882, 2007.   DOI
14 S. Rawat and B. Raman, "A chaotic system based fragile watermarking scheme for image tamper detection," AEU - International Journal of Electronics and Communications, vol. 65, no. 10, pp. 840-847, 2011.   DOI
15 Z. P. Dan, Y. F. Chen, Z. Yang, and G. Wu, "An improved local binary pattern for texture classification," Optik, vol. 125, no. 20, pp. 6320-6324, 2014.   DOI
16 O. Benrhouma, H. Hermassi, A. A. A. El-Latif, and S. Belghith, "Chaotic watermark for blind forgery detection in images," Multimedia Tools and Applications, vol. 75, no. 14, pp. 8695-8718, 2016.   DOI
17 R. O. Preda, "Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain," Measurement, vol. 46, no. 1, pp. 367-373, 2013.   DOI
18 T. Ojala, M. Pietikainen, and D. Harwood, "A comparative study of texture measures with classification based on feature distributions," Pattern Recognition, vol. 29, no. 1, pp. 51-59, 1996.   DOI