Novel watermarking scheme for image authentication using vector quantization approach

Authors

DOI:

https://doi.org/10.3103/S0735272717040021

Keywords:

image authentication, vector quantization, robust watermarking, semi-fragile watermarking, attack classification, tamper detection, tamper localization, imperceptibility, modified indices

Abstract

In this paper a new invisible watermarking algorithm using vector quantization approach (VQ) for image content authentication application is proposed. In the first stage, robust verification watermark is embedded using properties of indices of vector quantized image using key based approach. While in the second stage, the semi-fragile watermark is embedded by using modified index key based (MIKB) method. Robust watermark and VQ enhances the security of the system by providing double protection to designed system. While semi-fragile watermark helps in authenticating the received image. Blind extraction of the watermark is done independently in two successive steps i.e. in the order of embedding. Further to classify an attack into quantitatively as incidental or intentional which at present is not being followed, a quantitative threshold approach using pixel neighborhood clustering is suggested. While the existing methods employ the qualitative approach of identifying incidental or intentional attacks. Imperceptibility of watermarked image is 41 dB (average), and it is also possible to detect and locate tamper with very high sensitivity. The present scheme is compared with existing algorithms, and it outperforms in distinguishing malicious tampering from content preserving changes, and tampered regions are localized accurately, the performance of proposed system being tested on various practical images.

References

COX, INGEMAR J.; MILLER, MATT L. Review of watermarking and the importance of perceptual modeling. Proc. SPIE, v.3016, p.92-99, 1997. doi:http://dx.doi.org/10.1117/12.274502.

MILLER, MATT L.; COX, INGEMAR J.; LINNARTZ, JEAN-PAUL M.G.; KALKER, TON. A review of watermarking principles and practices. In Digital Signal Processing for Multimedia Systems. CRC Press, 1999, p.461-485 [ed. by K. K. Parhi, T. Nishitami], ISBN: 0824719247.

ILIYASU, ABDULLAH M.; LE, PHUC Q.; DONG, FANDYAN; HIROTA, KAORU. Watermarking and authentication of quantum images based on restricted geometric transformations. Information Sciences, v.186, n.1, p.126-149, 2012. doi:http://dx.doi.org/10.1016/j.ins.2011.09.028.

ROSALES-ROLDAN, LUIS; CEDILLO-HERNANDEZ, MANUEL; NAKANO-MIYATAKE, MARIKO; PEREZ-MEANA, HECTOR; KURKOSKI, BRIAN. Watermarking-based image authentication with recovery capability using halftoning technique. Signal Processing: Image Communication, v.28, n.1, p.69-83, 2013. doi:http://dx.doi.org/10.1016/j.image.2012.11.006.

KHALIL, MOHAMMED S.; KURNIAWAN, FAJRI; KHAN, MUHAMMAD KHURRAM; ALGINAHI, YASSER M. Two-layer fragile watermarking method secured with chaotic map for authentication of digital holy Quran. The Scientific World Journal, v.2014, Article ID 803983, 2014. doi:http://dx.doi.org/10.1155/2014/803983.

LI, MING; XIAO, DI; ZHANG, YUSHU. Attack and improvement of the fidelity preserved fragile watermarking of digital images. Arabian Journal for Science and Engineering, v.41, n.3, p.941-950, 2016. doi:http://dx.doi.org/10.1007/s13369-015-1941-1.

LIN, CHIA-CHEN; HUANG, YUEHONG; TAI, WEI-LIANG. A novel hybrid image authentication scheme based on absolute moment block truncation coding. Multimedia Tools and Applications, p.21-26, 2015. doi:http://dx.doi.org/10.1007/s11042-015-3059-6.

QIN, CHUAN; JI, PING; WANG, JINWEI; CHANG, CHIN-CHEN. Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimedia Tools and Applications, p.1-21, 2016. doi:http://dx.doi.org/10.1007/s11042-015-3218-9.

LU, Z.M.; SUN, S.H. Digital image watermarking technique based on vector quantization. Electron. Lett., v.36, n.4, p.303-305, 2000. doi:http://dx.doi.org/10.1049/el:20000309.

BARRETO, P.S.L.M.; KIM, H.Y.; RIJMEN, V. Toward secure public-key blockwise fragile authentication watermarking. IEE Proc. Vision, Image and Signal Process, v.149, n.2, p.57-62, 2002. doi:http://dx.doi.org/10.1049/ip-vis:20020168.

LU, ZHE-MING; XU, DIAN-GUO; SUN, SHENG-HE. Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Trans. Image Processing, v.14, n.6, p.822-831, 2005. doi:http://dx.doi.org/10.1109/TIP.2005.847324.

CHEN, WEI-CHE; WANG, MING-SHI. A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Systems with Applications, v.36, n.2, p.1300-1307, 2009. doi:http://dx.doi.org/10.1016/j.eswa.2007.11.018.

MAENO, K.; SUN, QIBIN; CHANG, SHIH-FU; SUTO, M. New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization. IEEE Trans. Multimedia, v.8, n.1, p.32-45, 2006. doi:http://dx.doi.org/10.1109/TMM.2005.861293.

LU, ZHE-MING; LIU, CHUN-HE; XU, DIAN-GUO; SUN, SHENG-HE. Semi-fragile image watermarking method based on index constrained vector quantization. Electron. Lett., v.39, n.1, p.35-36, 2003. doi:http://dx.doi.org/10.1049/el:20030041.

LIN, CHING-YUNG; CHANG, SHIH-FU. Semifragile watermarking for authenticating JPEG visual content. Proc. SPIE, v.3971, p.140-151, 2000. doi:http://dx.doi.org/10.1117/12.384968.

WU, HSIEN-CHU; CHANG, CHIN-CHEN. A novel digital image watermarking scheme based on the vector quantization technique. Computers & Security, v.24, n.6, p.460-471, 2005. doi:http://dx.doi.org/10.1016/j.cose.2005.05.001.

SHEN, JAU-JI; REN, JIA-MIN. A robust associative watermarking technique based on vector quantization. Digital Signal Processing, v.20, n.5, p.1408-1423, 2010. doi:http://dx.doi.org/10.1016/j.dsp.2009.10.015.

YANG, CHUN-WEI; SHEN, JAU-JHEN. Recover the tampered based on VQ indexing. Signal Processing, v.90, n.1, p.331-343, 2010. doi:http://dx.doi.org/10.1016/j.sigpro.2009.07.007.

CHUANG, JUN-CHOU; HU, YU-CHEN. An adaptive image authentication scheme for vector quantization compressed image. Journal of Visual Communication and Image Representation, v.22, n.5, p.440-449, 2011. doi:http://dx.doi.org/10.1016/j.jvcir.2011.03.011.

LINDE, Y.; BUZO, A.; GRAY, R. An algorithm for vector quantizer design. IEEE Trans. Commun., v.28, n.1, p.84-95, 1980. doi:http://dx.doi.org/10.1109/TCOM.1980.1094577.

PAN, JENG-SHYANG; HUANG, HSIANG-CHEH; WANG, FENG-HSING. A VQ-based robust multi-watermarking algorithm. Proc. of TENCON, 28-31 Oct. 2002. IEEE, 2002, p.1719-1726. doi:http://dx.doi.org/10.1109/TENCON.2002.1181228.

Published

2017-04-17

Issue

Section

Research Articles