Regular paperWatermarking based image authentication and tamper detection algorithm using vector quantization approach
Introduction
With development of the digital technology recreation of digitally generated information has become very easy, and can be transmitted by digital media with ease among other medias of message conveyance images are most common. Therefore protection of these images and its content authentication is important. To authenticate the integrity and authenticity of a digital image, digital watermarking techniques have been considered an effective technique [1], [2], [3], [4], [5]. The watermarking technique for authentication purpose can be classified as robust, fragile and semifragile watermarking techniques based on their level of security. A robust watermark finds application in the area of ownership verification and copyright protection [6], [7], [8], [9]. A fragile watermark destroys itself even for small accidental or intentional changes [10], [11], [12]. On the other hand, semi-fragile watermarking is a practical technique which can protect integrity of digital images and can locate the tampered areas [13], [14], [15], [16]. Thus fragile or semi-fragile watermarking are those image watermarking techniques which find application in images and video content authentication and tamper detection [7], [13], [16], [17]. Given the limitations of robust and fragile watermarking schemes, multiple-watermarking is applied to digital data where copyright protection and content authentication is required to be addressed simultaneously [7]. Lu [7], pioneered the concept of VQ based image watermarking technique. Various VQ (vector quantization) based watermarking techniques are recommended by researchers in the past decade for image watermarking [17], [18], [19], [20] with the objective of image compression and authentication.
Most of the methods suggested in above literatures need improvement in issues related to watermarked image quality, identification of attacks as malicious or content preserving manipulation, and efficiency of the system in authentication of images. Therefore, an efficient image authentication algorithm having a good visual quality of watermarked image, having the advantage of comparatively less bandwidth and storage space, with high accuracy in attacks classification, tolerant to acceptable manipulations, and high tamper detection accuracy needs to be designed. Thus in proposed work, watermarks are embedded in two successive stages. In the first phase robust watermark is used for “zero level watermarking” [21] utilizing the statistical properties of VQ indices for enhancing the security of watermarked image by biometric verification. The advantage of first stage of watermarking is, it does not affect VQ reconstructed image. In the second step, the semifragile watermark is embedded by using a Modified Index Key based method (MIKB) for image authentication. A “quantitative threshold-based approach” is suggested for classifying attacks and localizing tampered area. Further statistical analysis is done to find false positive rate, false negative rate, percentage of correctly identified authenticated images and percentage of falsely verified images to validate the correctness of the system. Thus, proposed image authentication method fulfils desired characteristics of an effective image authentication technique. The significant features of proposed improvised scheme are-
- •
Watermarks are embedded using VQ indices properties; it enhances security and saves bandwidth requirements.
- •
Random keys are used for embedding robust zero level watermark and semi-fragile watermark respectively; random nature of key improves the integrity and security of designed system.
- •
A quantitative analysis is suggested to classify the attack as malicious or content preserving attack.
- •
Tamper detection accuracy of proposed system is very high; it can detect tampering up to 10% as malicious attack.
- •
Biometric verification watermark is used to enhance reliability of designed system.
The structure of the paper is organized into three sections namely proposed scheme, Experimental results and discussion of deigned algorithm, and lastly conclusion of the paper is addressed.
Section snippets
Proposed scheme
In this section, the detail of proposed image authentication algorithm is presented. The proposed method uses two-stage VQ, to divide the encoding task into successive stages; wherein initial stage performs a relatively rough quantization of the input vector using a codebook. Then, a second stage quantizer performs on the error vector between the original and quantized first-stage output. The quantized error vector then gives a second approximation to the original input vector thereby provides
Experimental result and discussion
The performance of the proposed watermarking based technique for digital image verification and authentication using vector quantization approach is investigated. The experiment is performed using MATLAB version 7.10.0.499 (R2010a), 64-bit (win64) software. In the first phase, the experiment is conducted on 300 different 8-bit images of resolution 600 dpi each of size 512 × 512, the binary watermark image of size 128 × 128 as a robust watermark image and semifragile watermark image. Fig. 5 shows
Conclusions
In present work novel vector quantization based watermarking scheme for digital image authentication application has been designed using two stages of watermark embedding technique with an additional feature of qualitative analysis of the received signal. In the first stage robust ‘zero level’ watermark is embedded while another image is used as a semifragile watermark for embedding in the second stage using modified index key based (MIKB) method.
- •
In proposed algorithm robust watermark is used
References (25)
- et al.
From single watermark to dual watermark: a new approach for image watermarking
Comput Electr Eng
(2012) - et al.
A novel digital image watermarking scheme based on the vector quantization technique
Comput Secur
(2005) - et al.
A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain
AEU-Int J Electron Commun
(2016) - et al.
Color image watermarking based on self-embedded color permissibility with preserved high image quality and enhanced robustness
AEU-Int J Electron Commun
(2011) - et al.
A robust associative watermarking technique based on vector quantization
Digital Signal Process
(2010) - et al.
Fragile image watermarking scheme based on VQ index sharing and self-embedding
Multimedia Tools Appl
(2017) Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique
J Vis Commun Image Represent
(2014)Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain
Measurement
(2013)- et al.
Recover the tampered image based on VQ indexing
Signal Process
(2010) - et al.
Variable dimension vector quantization based image watermarking
Signal Process
(2001)
An adaptive image authentication scheme for vector quantization compressed image
J Vis Commun Image Represent
VQ-based watermarking scheme with genetic codebook partition
J Network Comput Appl
Cited by (50)
Secure blind watermarking using Fractional-Order Lorenz system in the frequency domain
2024, AEU - International Journal of Electronics and CommunicationsAn efficient fragile watermarking scheme for tamper localization in satellite images
2023, Computers and Electrical EngineeringPerceptual image hashing using rotation invariant uniform local binary patterns and color feature
2023, Advances in ComputersVerifiable medical images for E-healthcare: A novel watermarking approach using robust bit-wise association of self-mutating offsprings of pixels
2022, Microprocessors and MicrosystemsCitation Excerpt :However, the imperceptibility of the image is not satisfactory. Tiwari et al. [49] have presented a dual watermarking technique where one is robust which is used for verification and other one is Semi-fragile which is used for authentication. Based on the findings of the literature survey, some major research gaps or limitations have been marked.
An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm
2022, Journal of King Saud University - Computer and Information SciencesCitation Excerpt :However, the time consumption was more as compared with the conventional watermarking optimization techniques. Tiwari et al. (2017), proposed a two successive stage work of watermark embedding. They have increased the levels of security by utilising modified index key based approach for embedding the watermark.