Browse > Article

Image Authentication and Restoration Using Digital Watermarking by Quantization of Integer Wavelet Transform Coefficients  

Ahsan, Tanveer (울산대학교 전기공학과)
Chong, Ui-Pil (울산대학교 전기공학과)
Publication Information
Journal of the Institute of Convergence Signal Processing / v.13, no.4, 2012 , pp. 187-193 More about this Journal
Abstract
An image authentication scheme for gray scale image through embedding a digital watermark by quantization of Integer Wavelet Transform (IWT) coefficients of the image is proposed in this paper. Proposed method is designed to detect modification of an image and to identify tampered location of the image. To embed the watermark mid-frequency band of a second level IWT was used. An approximation of the original image based on LL band was stored in LSB bits of the pixel data as a recovery mark for restoration of the image. Watermarked image has achieved a good PSNR of 40 dB compared to original cover image. Restored image quality was also very good with a PSNR of more than 35 dB compared to unmodified watermarked image even when 25% of the received image is cropped. Thus, the proposed method ensures a proper balance between the fidelity of the watermarked image and the quality of the restored image.
Keywords
Integer Wavelet Transform; Digital Watermarking; Image Authentication; Tamper Localization; Image Restoration;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C.-Y. Lin and S.-F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation", IEEE Trans. Circuits Syst. Video Techmol., vol. 11, no. 2, pp. 153-168, Feb. 2001.   DOI   ScienceOn
2 P. W. Wong, "A watermark for image integrity and ownership verification", in Proceedings of IS&T PIC Congerence, (Portland, OR), May 1998
3 P. W. Wong, "A public key watermark for image verigication and authentication", in Proceedings of ICIP, (Chicago, IL), October 1998
4 P. W. Wong and N. Memon, "Secret and Public Key Image Watermarking, Schemes for Image Authentication and Ownership Verification", IEEE Transactions on Image Processing, Vol. 10, no. 10, pp. 1593 - 601. 2001   DOI   ScienceOn
5 J. Fridrich and M. Goljan, Protection of Digital images Using Self-Emvedding", Symposium on Content Security and Data Hiding in Digital Media, New Jersey Institute of Technology, May 14, 1999
6 J. Fridrich and M. Goljan, "Images with Self-correcting Capabilities," in Proceedings of the IEEE International Conference on Image Processing, volume 3, pp. 792-796, 1999
7 K. Ke, T. Zhao & O. Li, "A Restoorative Image Authentication Scheme with Discrimination of Tampers on Image or Watermark", 4th International Conference on Multimedia and Ubiquitous Engi-neering (MUE), pp. 1-5, 2010
8 A. T. S. Ho, X. Zhu, J. Shen, and P. Marziliano, "Fragile Watermarking Based on Eneoding of the Zeroes of the z-Transform", IEEE Transactions on Information Forensics and Security, Vol: 3, Issue:3, pp. 567-569, 2008   DOI
9 C. H. Lin, C. Y. Yang, "Multipurpose Watermarking Based on Blind Vector Quantization (BVQ)", Journal of Information Hiding, and Multimedia Signal Processing, Volume 2, Number 3, July 2011
10 J. Xiao, Z. Ma, B. Lin, J. Su, Y. Wang, "A semi-fragile watermarking distinguishing JPEG compression and gray-scale-transformation from malicious manipulation", IEEE Youth Conference on Information Computing and Telecommunications, 2010
11 D. Zou, Y.Q. Shi, Z. Ni, W. Su, "A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform", IEEE Transactions on Circuits and Systems for Video Technology, 2006
12 F. B. Coelho, J. S. Barbar, G. S. B. do Carmo, "The Use of Watermark and Hash Function for the Authentication of Digital Images Mapped through tne use of the Wavelet Transform", Second International Conference on Internet and Web Applications and Services, 2007
13 C-C Chang, C-C Lin, Y-S Hu, "An SVD Oriented Warermark Embedding Scheme with High Qualities for the Restored Image", Infornational Journal of Innovative Computing, Information and Control, Volume 3, Number 3, June 2007
14 D. Kundur and D Hatzinakos, "Digital Watermarking for Telltale Tamper-Proofing and Authentication", Proceedings of the IEEE, Volume: 87, Issue:7, July 1999
15 C. Fei, D. Kundur and R. Kwong, "A Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication". IEEE Transactions on Information Forensics and Security, Volume 4, Issue 2, June 2009
16 I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, T. Kalker, Digital Watermarking and Steganography, Second Edition, p. 375, 2008