We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

LBP based Watermarking Scheme for Image Tamper Detection and Recovery

by Priyanka B. Patil, J.V. Shinde
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 14
Year of Publication: 2015
Authors: Priyanka B. Patil, J.V. Shinde
10.5120/ijca2015907108

Priyanka B. Patil, J.V. Shinde . LBP based Watermarking Scheme for Image Tamper Detection and Recovery. International Journal of Computer Applications. 129, 14 ( November 2015), 41-45. DOI=10.5120/ijca2015907108

@article{ 10.5120/ijca2015907108,
author = { Priyanka B. Patil, J.V. Shinde },
title = { LBP based Watermarking Scheme for Image Tamper Detection and Recovery },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 14 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 41-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number14/23145-2015907108/ },
doi = { 10.5120/ijca2015907108 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:23:27.674719+05:30
%A Priyanka B. Patil
%A J.V. Shinde
%T LBP based Watermarking Scheme for Image Tamper Detection and Recovery
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 14
%P 41-45
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, digital images are in use in a wide range of Applications and for multiple purposes. They also play an important role in the storage and transfer of visual information, especially the secret ones. With this widespread usage of digital images, in addition to the increasing number of tools and software of digital images editing, it has become easy to manipulate and change the actual information of the image. Therefore, it has become necessary to check the authenticity and the integrity of the image by using modern and digital techniques, which contribute to analysis and understanding of the images’ content, and then make sure of their integrity Digital image fragile watermarking is an information hiding technique which adds the watermark into the host image for authentication .while achieving the high integrity one should not compromise with quality distortion of images. numbers of watermarking schemes exist today for balancing between the tamper detection rate and quality of reconstructed images in propose scheme we aim at maintain high tamper detection rate as well as high Peak to Signal Noise Ratio (PSNR) of reconstructed images for their quality. For that we utilize Local Binary Pattern (LBP) for this purpose to obtain the optimum solution. In the proposes scheme we used a fragile image watermarking scheme with recover ability based on local binary pattern (LBP). The local binary pattern operator used to extract localized spatial features. A local binary pattern is used to represent the localized relations of a pixel with its neighborhood pixels. Every pixel measured by the LBP operator and obtained its own local binary pattern as representation of local spatial relations. We utilizes the LBP operator to generate authentication data which are embedded into each image block with 3 × 3 pixels size for tamper detection and recovery. The recovery information is obtained by calculating the mean value of each image block, and then the mean value is converted into a binary string which is embedded into eight neighboring pixels’ LSBs of each image block for image recovering In the propose scheme we can take the input as 256 × 256 as well as 512×512 dimension image, one of the advantage compare to other existing system is that it can also processed the color image. The quality is calculated by the PSNR but in the proposed scheme PSNR at peak point is also calculated to get better result.

References
  1. T. Ojala, M. Pietikainen, and D. Harwood (1994), “Performance evaluation of texture measures with classification based on Kullback discrimination of distributions”, Proceedings of the 12th IAPR International Conference on Pattern Recognition (ICPR 1994), vol. 1, pp. 582 – 585.
  2. T. Ojala, N Pietikainen, and D. Harwood (1996), “A Comparative Study of Texture Measures with Classification Based on Feature Distributions”, Pattern Recognition, vol. 29, pp. 51-59.
  3. Z. Wenyin and Frank Y. Shih, “Semi-fragile Spatial Watermarking Based on Local Binary Pattern Operators,” Optics Communications, Vol. 284, Issues 16–17, 2011, pp. 3904-3912.
  4. G. Voyatzis and I. Pitas, “Chaotic Mixing of Digital Images and Applications to Watermarking,” Proceedings of European Conference on Multimedia Applications, Services and Techniques (ECMAST ‘96), Vol. 2, May 1996, pp. 687-695.
  5. G. Voyatzis and I. Pitas, “Applications of Toral Automorphisms in Image Watermarking,” Proceedings of the International Conference on Image Processing, Vol. 2, 1996, pp. 237-240.
  6. Chun-Shien Lu, Hong-Yuan Mark Liao,” MultipurposeWatermarking for Image Authentication and Protection”, IEEE Transactions On Image Processing, Vol. 10, No. 10, October 2001.
  7. Ismail Avcıbas¸, Member, Nasir Memon,, and Bülent Sankur, “Steganalysis Using Image Quality Metrics”, IEEE Trans. On Image Processing, Vol. 12, No. 2, February 2013.
  8. Chih-Wei Tang and Hsueh-Ming Hang,” A Feature-Based Robust Digital Image Watermarking Scheme”, IEEE Trans. On Signal Processing, Vol. 51, No. 4, April 2013.
  9. Mohammad Ali Akhaee, S. Mohammad Ebrahim Sahraeian,Bulent Sankur, and Farokh Marvasti, ,”Robust Scaling-Based Image Watermarking Using Maximum-Likelihood Decoder With Optimum Strength Factor”, IEEE Trans.On Multimedia, Vol. 11, No. 5, August 2009.
  10. Anil K. Jain, Fellow,Umut Uludag,”Hiding Biometric Data”, IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 25, No. 11, November 2003.
  11. Yonghong Chen, Jiancong Chen,” Digital Image Watermarking Based on Mixed Error Correcting Code”, Journal of Information Security, 2012, 3, 156-161.
  12. Darko Kirovski and Henrique S. Malvar,” Spread-Spectrum Watermarking of Audio Signals”, IEEE Transactions On Signal Processing, Vol. 51, No. 4, April 2013.
  13. Ning Bi, Qiyu Sun, Daren Huang, Zhihua Yang, and Jiwu Huang,” Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition”, IEEE Transactions On Image Processing, Vol. 16, No. 8, August 2007.
  14. Chao-Ming Wu, Yan-Shuo Shih,” A Simple Image Tamper Detection and Recovery Based on Fragile Watermark with One Parity Section and Two Restoration Sections”, Optics and Photonics Journal, 2013, 3, 103-107.
  15. Arvind Kumar Parthasarathy and Subhash Kak,” An Improved Method of Content BasedImage Watermarking”, IEEE Transactions On Broadcasting, Vol. 53, No. 2, June 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication signal noise information hiding integrity