CFP last date
20 December 2024
Reseach Article

Two Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization

by M.A. Mohamed, Abdelhameed Ibrahim, M.G. Abd-El-Fattah, A.S. Samrah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 126 - Number 3
Year of Publication: 2015
Authors: M.A. Mohamed, Abdelhameed Ibrahim, M.G. Abd-El-Fattah, A.S. Samrah
10.5120/ijca2015906014

M.A. Mohamed, Abdelhameed Ibrahim, M.G. Abd-El-Fattah, A.S. Samrah . Two Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization. International Journal of Computer Applications. 126, 3 ( September 2015), 23-33. DOI=10.5120/ijca2015906014

@article{ 10.5120/ijca2015906014,
author = { M.A. Mohamed, Abdelhameed Ibrahim, M.G. Abd-El-Fattah, A.S. Samrah },
title = { Two Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 126 },
number = { 3 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 23-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume126/number3/22533-2015906014/ },
doi = { 10.5120/ijca2015906014 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:16:29.882844+05:30
%A M.A. Mohamed
%A Abdelhameed Ibrahim
%A M.G. Abd-El-Fattah
%A A.S. Samrah
%T Two Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization
%J International Journal of Computer Applications
%@ 0975-8887
%V 126
%N 3
%P 23-33
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-based scheme that divides the cover image into non-overlapping 4×4 blocks. We generate an 8-bit authentication watermark for each cover image block based on the block contents and then we use the proposed chaos-based encryption algorithm to encrypt this watermark. These encrypted 8-bit watermark are then embedded into the least significant bits (LSBs) of the highest intensity eight pixels of the block. On the other hand, the second proposed watermarking scheme can be classified as a wavelet-based scheme which uses an external secret watermark. This watermark is encrypted using the proposed chaos-based encryption algorithm. We decompose the cover image using Discrete Wavelet Transform (DWT) and then we use the encrypted watermark to update the approximation coefficients (LL sub-band) of the image. Various experimental tests are carried out to evaluate the performance of the two schemes. Experimental results demonstrate that the two proposed schemes can detect and localize tampering attacks accurately. The two schemes also achieve high degree of imperceptibility performance. Compared to some fragile watermarking schemes, our proposed schemes are more secure and efficient.

References
  1. H. Y. Kim and A. Afif, “Secure authentication watermarking for binary images,” In Computer Graphics and Image Processing, 2003.SIBGRAPI 2003, XVI Brazilian Symposium on IEEE, 199-206, 2003.
  2. A. Guru, H. Damecha, “Digital Watermarking Classification: A Survey,” International Journal of Computer Science Trends and Technology (IJCST) vol. 5, pp. 8-13, Oct 2014.
  3. J. Fridrich and M. Goljan, “Images with Self-Correcting Capabilities,” IEEE: International Conference of Image Processing, Vol.3, pp. 792-796, 1999.
  4. H. He, J. Zhang, F. Chen, “Block-wise Fragile Watermarking Scheme Based on Scramble Encryption,” IEEE on International Conference on Bio-Inspired Computing: Theories and Applications, pp. 216-220, 2007.
  5. H. He, J. S. Zhang, and H. M. Tai, “Self-recovery Fragile Watermarking Using Block- Neighborhood Tampering Characterization,” Springer-Verlag Berlin Heidelberg, Vol. 5806, pp. 132-145, 2009.
  6. X. Zhao, A.T. Ho, H. Treharne, V. Pankajakshan, C. Culnane and W. Jiang, “A Novel Semi-Fragile Image Watermarking, Authentication and Self-restoration Technique Using the Slant Transform,” Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Vol. 1, pp. 283 – 286, 2007.
  7. C. C. Lo and Y. C. Hu, “A novel reversible image authentication scheme for digital images,” Signal processing, Vol. 98, pp. 174-185, 2014.
  8. J. C. Chuang, Y. C. Hu, C. C. Lo and W. L. Chen, “Grayscale image tamper detection and recovery based on vector quantization,” International journal of security and its applications, Vol. 7, No. 6, pp. 209-228, 2013.
  9. R. Chacko and W. Jebrson “Fragile Pixel-Wise Watermarking using Neighborhood Location Based Technique,” International Journal of Current Engineering and Technology, Vol. 3, No. 5, pp. 1871-1877, 2013.
  10. Y. Lim, C. Xu, and D. D. Feng, “Web based Image Authentication Using Invisible Fragile Watermark,” Proceedings of the Pan-Sydney area workshop on Visual information processing (VIP2001), Vol. 11, 2001.
  11. X. Zhang and S. Wang, “Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels,” IEEE Signal processing letters, Vol. 14, No.10, 2007.
  12. S. Che, B. Ma, Z. Che, “An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System,” IIHMSP '08 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 159-162, 2008.
  13. X. Zhang and S. Wang, “Fragile watermarking scheme using a hierarchical mechanism,” Signal Processing, Vol. 4, No. 89, pp. 675-679, 2009.
  14. P. MeenakshiDevi, M. Venkatesan and K. Duraiswamy, “A Fragile Watermarking Scheme for Image Authentication with Tamper Localization Using Integer Wavelet Transform,” Journal of Computer Science, Vol. 5, No. 11, pp. 831-837, 2009.
  15. D. Kundur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proceedings of the IEEE: Special Issue on Identification and Protection of Multimedia Information, pp. 1167–1180, 1999.
  16. G. Yu, C. Lu and H. Liao, “Mean quantization-based fragile watermarking for image authentication,” Opt. Eng. Vol. 40, No. 7, pp. 1396–1408, 2001.
  17. X. Zhou, X. Duan and D. Wang, “A semi-fragile watermarking scheme for image authentication,” Proceedings of the 10th International Conference on Multimedia Modeling, pp. 374–377, 2004.
  18. H. Kang and J. Park, “A semi-fragile watermarking using JND,” Proceedings of STEG, pp. 127–131, 2003.
  19. Y. Hu and D. Han, “Using two semi-fragile watermarks for image authentication,” Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, pp. 5484–5489, 2005.
  20. H. Liu, J. Lin and J. Huang, “Image authentication using content based watermark,” Proceedings of IEEE International Symposium on Circuits and Systems, pp. 4014–4017, 2005.
  21. Y. Zhu, C. Li and H. Zhao, “Structural digital signature and semi-fragile fingerprinting for image authentication in wavelet domain,” Proceedings of IAS, pp. 478-483, 2007.
  22. H. Yang and X. Sun, “Semi-fragile watermarking for image authentication and tamper detection using HVS model” Proceedings of International Conference on Multimedia and Ubiquitous Engineering, pp. 1112–1117, 2007.
  23. S. Che, B. Ma and Z. Che, “Semi-fragile image watermarking algorithm based on visual features” Proceedings of International Conference on Wavelet Analysis and Pattern Recognition, pp. 382–387, 2007.
  24. C. Cruz, R. Reyes and M. Nakano, H. Perez, “Image content authentication system based on semi-fragile watermarking,” Proceedings of the 51st Midwest Symposium on Circuits and Systems, pp. 306–309, 2008.
  25. Z. Dawei, C. Guanrong, L. Wenbo, “A chaos-based robust wavelet-domain watermarking Algorithm,” Chaos Solitons and Fractals, Vol.22, No. 1, pp. 47–54, 2004.
  26. S. Rakesh, A. Ajitkumar, B. Shadakshari, and B. Annappa, “Image Encryption Using Block Based Uniform Scrambling and Chaotic Logistic Mapping,” International Journal on Cryptography and Information Security (IJCIS), Vol. 2, No. 1, pp. 49-57, 2012.
  27. F. Dachselt and W. Schwarz, “Chaos and Cryptography,” IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications, Vol. 48, pp. 1498-1501, 2001.
  28. T. S. Parker and L. O. Chua, “Chaos: A Tutorial for Engineers,” Proceedings of the IEEE, Vol. 75, No. 8, pp. 982–1008, 1995.
  29. M. S. Baptista, “Cryptography with Chaos,” Physics Letters A, Vol. 240, pp. 50-54, 1998.
  30. H. Liu, Z. Zhu, H. Jiang and B. Wang, “A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map,” In The 9th International Conference for Young Computer Scientists (ICYCS 2008), pp. 3016-3021, 2008.
  31. L. Sumalatha, G. R. Nesa, and V. V. Kumar, “A Simple Block Content Watermarking Scheme for Image Authentication and Tamper Detection,” International Journal of Soft Computing & Engineering, Vol. 2, No. 4, pp. 113 – 117, 2012.
  32. X. Wu, J. Hu, Z. Gu, and J. Huang, “A Secure Semi Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters,” Proceedings of the Australasian Information security workshop (AISW 2005) on Grid computing and e-research, Vol. 44, pp. 75-80, 2005.
  33. E. D. Aggarwal, E. S. Kaur and E. Anantdeep, “An Efficient Watermarking Algorithm to Improve Payload and Robustness without Affecting Image Perceptual Quality,” JOURNAL OF COMPUTING, Vol. 2, No. 4, pp.105-109.
  34. C. C. Chang, Y. S. Hu, T. C. Lu, “A watermarking-based image ownership and tampering authentication scheme”, Pattern Recognition Letters, Vol. 27, No. 5, pp. 439-446, 2006.
  35. C. H. Lin, W. S. Hsieh, “Applying projection and B-spline to image authentication and remedy,” IEEE Transactions, Consumer Electronics, Vol. 49, No. 4, pp. 1234-1239, 2003.
  36. S. Bravo-Solorio, A. K. Nandi, “Fragile watermarking with improved tampering localization and self-recovery capabilities,” In 18th European Signal Processing Conference (EUSIPCO), pp. 820-824, 2010.
  37. C. Kommini, K. Ellanti and E. H. Chowdary, “Semi-Fragile Watermarking Scheme based on Feature in DWT Domain,” International Journal of Computer Applications, Vol. 28, No. 3, pp.42-46, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Fragile Watermarking Tamper detection Image Authentication Discrete Wavelet Transform (DWT).