Skip to main content
Top

2016 | OriginalPaper | Chapter

A New Curvelet Based Blind Semi-fragile Watermarking Scheme for Authentication and Tamper Detection of Digital Images

Authors : S. Nirmala, K. R. Chetan

Published in: Information Systems Design and Intelligent Applications

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A novel blind semi-fragile watermarking scheme for authentication and tamper detection of digital images is proposed in this paper. This watermarking scheme is based on Discrete Curvelet Transform (DCLT), which captures the information content of the image in few coefficients compared to other transforms. The novelty of the approach is that the first level coarse DCLT coefficients of the input image are quantized into 4 bits which is used as watermark and embedded into the pseudo randomly determined coefficients. At the receiver side, the extracted and generated first level coarse DCLT coefficients of the watermarked image are divided into blocks of uniform size. The difference in the energy between each block of extracted and generated coefficients is compared and if the difference exceeds threshold, the block is marked as tampered. This scheme exhibits higher Normalization Correlation Coefficient (NCC) values for various incidental attacks and is thus more robust than existing scheme [1]. The proposed scheme outperforms in localizing tampered regions compared to method [1].

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ghofrani, S. et.al., Image content authentication and tamper localization based on semi fragile watermarking by using the Curvelet transform, TENCON 2012—2012 IEEE Region 10 Conference, Cebu, pp. 1–6, (2012). Ghofrani, S. et.al., Image content authentication and tamper localization based on semi fragile watermarking by using the Curvelet transform, TENCON 2012—2012 IEEE Region 10 Conference, Cebu, pp. 1–6, (2012).
2.
go back to reference Prabhishek Singh et.al., A Survey of Digital Watermarking Techniques, Applications and Attacks, International Journal of Engineering and Innovative Technology (IJEIT), Vol. 2, No. 9, pp. 165–175 (2013). Prabhishek Singh et.al., A Survey of Digital Watermarking Techniques, Applications and Attacks, International Journal of Engineering and Innovative Technology (IJEIT), Vol. 2, No. 9, pp. 165–175 (2013).
3.
go back to reference W.H. Chang and L.W. Chang, Semi-Fragile Watermarking for Image Authentication, Localization, and Recovery Using Tchebichef Moments, International Symposium on Communications and Information Technologies (ISCIT), pp. 749–754. (2010). W.H. Chang and L.W. Chang, Semi-Fragile Watermarking for Image Authentication, Localization, and Recovery Using Tchebichef Moments, International Symposium on Communications and Information Technologies (ISCIT), pp. 749–754. (2010).
4.
go back to reference G. Schirripa, C. Simonetti and L. Cozzella, Fragile Digital Watermarking by Synthetic Holograms, Proc. of European Symposium on Optics/Fotonics in security & Defence, London, UK, pp. 173–182. (2004). G. Schirripa, C. Simonetti and L. Cozzella, Fragile Digital Watermarking by Synthetic Holograms, Proc. of European Symposium on Optics/Fotonics in security & Defence, London, UK, pp. 173–182. (2004).
5.
go back to reference J. Dittmann, L. Croce Ferri and C. Vielhauer, Hologram Watermarks for Document Authentications, Proceedings of IEEE International Conference on Information Technology, Las Vegas, pp. 60–64 (2001). J. Dittmann, L. Croce Ferri and C. Vielhauer, Hologram Watermarks for Document Authentications, Proceedings of IEEE International Conference on Information Technology, Las Vegas, pp. 60–64 (2001).
6.
go back to reference Y. Aoki, Watermarking Technique Using Computer-Generated Holograms, Electronics and Communications in Japan, Part 3, Vol. 84, No. 1, pp. 21–31. (2001). Y. Aoki, Watermarking Technique Using Computer-Generated Holograms, Electronics and Communications in Japan, Part 3, Vol. 84, No. 1, pp. 21–31. (2001).
7.
go back to reference K. Maeno, Q. Sun, S. Chang and M. Suto, New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization, IEEE Trans. Multimedia, Vol. 8, No. 1, pp. 32–45. (2006). K. Maeno, Q. Sun, S. Chang and M. Suto, New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization, IEEE Trans. Multimedia, Vol. 8, No. 1, pp. 32–45. (2006).
8.
go back to reference L. Xin and L. Xiaoqi and W. Wing, A semi-fragile digital watermarking algorithm based on integer Wavelet matrix norm quantization for medical images, IEEE International conference on bioinformatics and biomedical engineering, pp. 776–779, (2008). L. Xin and L. Xiaoqi and W. Wing, A semi-fragile digital watermarking algorithm based on integer Wavelet matrix norm quantization for medical images, IEEE International conference on bioinformatics and biomedical engineering, pp. 776–779, (2008).
9.
go back to reference X. Wu and J. Huang and J. Hu and Y. Shi, Secure semi-fragile watermarking for Image authentication based on parameterized integer Wavelet, Journal of Computers, Vol. 17, No. 2, pp. 27–36, (2006). X. Wu and J. Huang and J. Hu and Y. Shi, Secure semi-fragile watermarking for Image authentication based on parameterized integer Wavelet, Journal of Computers, Vol. 17, No. 2, pp. 27–36, (2006).
10.
go back to reference D. L. Donoho and M. R. Duncan, Digital Curvelet transform: Strategy, implementation and experiments, Proc. Society optics and photonics, Vol. 4056, pp. 12–29, (2000). D. L. Donoho and M. R. Duncan, Digital Curvelet transform: Strategy, implementation and experiments, Proc. Society optics and photonics, Vol. 4056, pp. 12–29, (2000).
11.
go back to reference L. Chen, G. Lu, and D. S. Zhang, Effects of Different Gabor Filter Parameters on Image Retrieval by Texture, in Proc. of IEEE 10th International Conference on Multi-Media Modelling, Australia, pp. 273–278. (2004). L. Chen, G. Lu, and D. S. Zhang, Effects of Different Gabor Filter Parameters on Image Retrieval by Texture, in Proc. of IEEE 10th International Conference on Multi-Media Modelling, Australia, pp. 273–278. (2004).
12.
go back to reference E. J. Candès, L. Demanet, D. L. Donoho, and L. Ying, Fast Discrete Curvelet Transforms, Multiscale Modeling and Simulation, Vol. 5, pp. 861–899 (2005). E. J. Candès, L. Demanet, D. L. Donoho, and L. Ying, Fast Discrete Curvelet Transforms, Multiscale Modeling and Simulation, Vol. 5, pp. 861–899 (2005).
13.
go back to reference J.-L. Starck and M.J. Fadili, Numerical Issues When using Wavelets, in Encyclopedia of Complexity and Systems Science, Meyers, Robert (Ed.), Springer New York, Vol 14, pp 6352–6368, (2009). J.-L. Starck and M.J. Fadili, Numerical Issues When using Wavelets, in Encyclopedia of Complexity and Systems Science, Meyers, Robert (Ed.), Springer New York, Vol 14, pp 6352–6368, (2009).
14.
go back to reference E. Candes and D. Donoho, New tight frames of Curvelets and optimal representations of objects with C2 singularities Comm. Pure Appl. Mathematics, Vol. 57, No. 2, pp. 219–266, (2004). E. Candes and D. Donoho, New tight frames of Curvelets and optimal representations of objects with C2 singularities Comm. Pure Appl. Mathematics, Vol. 57, No. 2, pp. 219–266, (2004).
15.
go back to reference Yevgeniy Dodis et.al., Threshold and proactive pseudo-random permutations, TCC’06 Proceedings of the Third conference on Theory of Cryptography, Verlag Berlin, Heidelberg, pp. 542–560, (2006). Yevgeniy Dodis et.al., Threshold and proactive pseudo-random permutations, TCC’06 Proceedings of the Third conference on Theory of Cryptography, Verlag Berlin, Heidelberg, pp. 542–560, (2006).
16.
go back to reference Jaejin Lee, Chee Sun Won, A Watermarking Sequence Using Parities of Error Control Coding For Image Authentication And Correction, Consumer Electronics, IEEE Transactions, Vol. 46, No. 2, pp. 313–317 (2000). Jaejin Lee, Chee Sun Won, A Watermarking Sequence Using Parities of Error Control Coding For Image Authentication And Correction, Consumer Electronics, IEEE Transactions, Vol. 46, No. 2, pp. 313–317 (2000).
Metadata
Title
A New Curvelet Based Blind Semi-fragile Watermarking Scheme for Authentication and Tamper Detection of Digital Images
Authors
S. Nirmala
K. R. Chetan
Copyright Year
2016
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-2752-6_2

Premium Partner