Regular paper
Watermarking based image authentication and tamper detection algorithm using vector quantization approach

https://doi.org/10.1016/j.aeue.2017.05.027Get rights and content

Abstract

In the present work, a novel image watermarking algorithm using vector quantization (VQ) approach is presented for digital image authentication. Watermarks are embedded in two successive stages for image integrity verification and authentication. In the first stage, a key based approach is used to embed robust zero level watermark using properties of indices of vector quantized image. In the second stage, semifragile watermark is embedded by using modified index key based (MIKB) method. Random keys are used to improve the integrity and security of the designed system. Further, to classify an attack quantitatively as acceptable or as a malicious attack, pixel neighbourhood clustering approach is introduced. Proposed approach is evaluated on 250 standard test images using performance measures such as peak signal to noise ratio (PSNR) and normalized hamming similarity (NHS). The experimental results shows that propose approach achieve average false positive rate 0.00024 and the average false negative rate 0.0012. Further, the average PSNR and tamper detection/localization accuracy of watermarked image is 42 dB and 99.8% respectively; while tamper localization sensitivity is very high. The proposed model is found to be robust to common content preserving attacks while fragile to content altering attacks.

Introduction

With development of the digital technology recreation of digitally generated information has become very easy, and can be transmitted by digital media with ease among other medias of message conveyance images are most common. Therefore protection of these images and its content authentication is important. To authenticate the integrity and authenticity of a digital image, digital watermarking techniques have been considered an effective technique [1], [2], [3], [4], [5]. The watermarking technique for authentication purpose can be classified as robust, fragile and semifragile watermarking techniques based on their level of security. A robust watermark finds application in the area of ownership verification and copyright protection [6], [7], [8], [9]. A fragile watermark destroys itself even for small accidental or intentional changes [10], [11], [12]. On the other hand, semi-fragile watermarking is a practical technique which can protect integrity of digital images and can locate the tampered areas [13], [14], [15], [16]. Thus fragile or semi-fragile watermarking are those image watermarking techniques which find application in images and video content authentication and tamper detection [7], [13], [16], [17]. Given the limitations of robust and fragile watermarking schemes, multiple-watermarking is applied to digital data where copyright protection and content authentication is required to be addressed simultaneously [7]. Lu [7], pioneered the concept of VQ based image watermarking technique. Various VQ (vector quantization) based watermarking techniques are recommended by researchers in the past decade for image watermarking [17], [18], [19], [20] with the objective of image compression and authentication.

Most of the methods suggested in above literatures need improvement in issues related to watermarked image quality, identification of attacks as malicious or content preserving manipulation, and efficiency of the system in authentication of images. Therefore, an efficient image authentication algorithm having a good visual quality of watermarked image, having the advantage of comparatively less bandwidth and storage space, with high accuracy in attacks classification, tolerant to acceptable manipulations, and high tamper detection accuracy needs to be designed. Thus in proposed work, watermarks are embedded in two successive stages. In the first phase robust watermark is used for “zero level watermarking” [21] utilizing the statistical properties of VQ indices for enhancing the security of watermarked image by biometric verification. The advantage of first stage of watermarking is, it does not affect VQ reconstructed image. In the second step, the semifragile watermark is embedded by using a Modified Index Key based method (MIKB) for image authentication. A “quantitative threshold-based approach” is suggested for classifying attacks and localizing tampered area. Further statistical analysis is done to find false positive rate, false negative rate, percentage of correctly identified authenticated images and percentage of falsely verified images to validate the correctness of the system. Thus, proposed image authentication method fulfils desired characteristics of an effective image authentication technique. The significant features of proposed improvised scheme are-

  • Watermarks are embedded using VQ indices properties; it enhances security and saves bandwidth requirements.

  • Random keys are used for embedding robust zero level watermark and semi-fragile watermark respectively; random nature of key improves the integrity and security of designed system.

  • A quantitative analysis is suggested to classify the attack as malicious or content preserving attack.

  • Tamper detection accuracy of proposed system is very high; it can detect tampering up to 10% as malicious attack.

  • Biometric verification watermark is used to enhance reliability of designed system.

The structure of the paper is organized into three sections namely proposed scheme, Experimental results and discussion of deigned algorithm, and lastly conclusion of the paper is addressed.

Section snippets

Proposed scheme

In this section, the detail of proposed image authentication algorithm is presented. The proposed method uses two-stage VQ, to divide the encoding task into successive stages; wherein initial stage performs a relatively rough quantization of the input vector using a codebook. Then, a second stage quantizer performs on the error vector between the original and quantized first-stage output. The quantized error vector then gives a second approximation to the original input vector thereby provides

Experimental result and discussion

The performance of the proposed watermarking based technique for digital image verification and authentication using vector quantization approach is investigated. The experiment is performed using MATLAB version 7.10.0.499 (R2010a), 64-bit (win64) software. In the first phase, the experiment is conducted on 300 different 8-bit images of resolution 600 dpi each of size 512 × 512, the binary watermark image of size 128 × 128 as a robust watermark image and semifragile watermark image. Fig. 5 shows

Conclusions

In present work novel vector quantization based watermarking scheme for digital image authentication application has been designed using two stages of watermark embedding technique with an additional feature of qualitative analysis of the received signal. In the first stage robust ‘zero level’ watermark is embedded while another image is used as a semifragile watermark for embedding in the second stage using modified index key based (MIKB) method.

  • In proposed algorithm robust watermark is used

References (25)

  • J.C. Chuang et al.

    An adaptive image authentication scheme for vector quantization compressed image

    J Vis Commun Image Represent

    (2011)
  • F.H. Wang et al.

    VQ-based watermarking scheme with genetic codebook partition

    J Network Comput Appl

    (2007)
  • Cited by (50)

    • Secure blind watermarking using Fractional-Order Lorenz system in the frequency domain

      2024, AEU - International Journal of Electronics and Communications
    • Verifiable medical images for E-healthcare: A novel watermarking approach using robust bit-wise association of self-mutating offsprings of pixels

      2022, Microprocessors and Microsystems
      Citation Excerpt :

      However, the imperceptibility of the image is not satisfactory. Tiwari et al. [49] have presented a dual watermarking technique where one is robust which is used for verification and other one is Semi-fragile which is used for authentication. Based on the findings of the literature survey, some major research gaps or limitations have been marked.

    • An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm

      2022, Journal of King Saud University - Computer and Information Sciences
      Citation Excerpt :

      However, the time consumption was more as compared with the conventional watermarking optimization techniques. Tiwari et al. (2017), proposed a two successive stage work of watermark embedding. They have increased the levels of security by utilising modified index key based approach for embedding the watermark.

    View all citing articles on Scopus
    View full text