CFP last date
20 December 2024
Reseach Article

Authenticating Images using Blind Fragile Watermarking Scheme based on LSB Technique

by Mamta Baghel, Rashmi Bhardwaj, Shivendra Shivani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 18
Year of Publication: 2013
Authors: Mamta Baghel, Rashmi Bhardwaj, Shivendra Shivani
10.5120/10180-4991

Mamta Baghel, Rashmi Bhardwaj, Shivendra Shivani . Authenticating Images using Blind Fragile Watermarking Scheme based on LSB Technique. International Journal of Computer Applications. 62, 18 ( January 2013), 15-19. DOI=10.5120/10180-4991

@article{ 10.5120/10180-4991,
author = { Mamta Baghel, Rashmi Bhardwaj, Shivendra Shivani },
title = { Authenticating Images using Blind Fragile Watermarking Scheme based on LSB Technique },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 18 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number18/10180-4991/ },
doi = { 10.5120/10180-4991 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:12:09.650607+05:30
%A Mamta Baghel
%A Rashmi Bhardwaj
%A Shivendra Shivani
%T Authenticating Images using Blind Fragile Watermarking Scheme based on LSB Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 18
%P 15-19
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposes blind fragile watermarking scheme along with the pixel-wise technique. Proposed scheme is capable enough in detecting tampered pixels and also able to provide security. For inserting watermark, 3-LSB substitution technique is used. As scheme is focus on blind watermarking technique that's why, embed self-watermark into the image. Self-watermark is generated by applying some set of operations on the pixel value of host image. For the generation of watermark: Firstly, generate secret matrix from the secret key . Secondly, generate pixel matrix from 5MSBs of pixel. Then, generate image matrix from pixel and secret matrices. Finally, generate final matrix consisting 3 rows and 1 column and this matrix gives 3LSBs which will be embedded into the host image to generate watermarked image. Security is provided by secret key and by using the concept of RSA algorithm.

References
  1. S. Radharani and Dr. M. L. Valarmathi, Ph. D. " A Study on Watermarking Schemes for Image Authentication" IJCA (0975 – 8887) Volume 2 – No. 4, June 2010.
  2. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding—A survey," Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, Jul. 1999.
  3. Eugene T. Lin and Edward J. Delp. "A review of fragile watermarking, Center for Education and Research in Information Assurance and Security" ,Purdue University, West Lafayette, IN 47907-2086.
  4. C. Y Lin, . and C. Chang, "Semi-fragile watermarking for authenticating JPEG visual content", SPIE International Conference on Security and Watermarking of Multimedia Contents II. San Jose, USA, January 2000.
  5. C. Y. Lin and S. F. Chang, "A robust image authentication method surviving JPEG lossy compression," Proc. SPIE, vol. 3312, pp. 296-307, 1998.
  6. B. B. Zhu, M. D. Swanson, and A. H. Tewfik, "When Seeing Is n't Believing," IEEE Signal Processing, vol. 21, no. 2, pp. 40-49, March 2004.
  7. B. B. Zhu and M. D. Swanson, "Multimedia Authentication and Watermarking," Multimedia Information Retrieval and Management, D. Feng, W. C. Siu, and H. Zhang, Eds. Springer-Verlag, Berlin, Heidelberg, New York, 2003 chap. 7, pp. 148-177.
  8. Xinpeng Zhang and Shuozhong Wang, "Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels" IEEE Signal processing letters, VOL. 14, NO. 10, October 2007.
  9. K. Ganesan and Tarun Kumar Guptha, "Multiple Binary Images Watermarking in Spatial and Frequency Domains", Signal & Image Processing : An International Journal(SIPIJ), Vol. 1, No. 2, December 2010.
  10. Jaseena K. U. , Anita John, "An Invisible Zero Watermarking Algorithm using Combined Image and Text for Protecting Text Documents", International Journal on Computer Science and Engineering (IJCSE), Vol. 3, No. 6 , June 2011.
  11. Sajjad Dadkhah, Azizah Abd Manaf and Somayeh Sadeghi, "Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, January 2012.
  12. Rosline Nesa Kumari, Vijaya Kumar, Sumalatha and Krishna, "Secure and Robust Digital Watermarking on Grey Level Images", International Journal of Advanced Science and Technology, Vol. 11, October, 2009.
  13. W. Lin et al, "Multimedia Analysis, Processing & Communications", Springer-Verlag Berlin Heidelberg, 2011 SCI 346, pp. 139–183.
  14. Yin Ke-xin, Zhu Jian-qi, Liu Bing, Zhong Guan-qun, "Pixel-based fragile image watermarking algorithm", 2010 Second International Workshop on Education Technology and Computer Science.
Index Terms

Computer Science
Information Sciences

Keywords

Fragile watermarking Temporization Detection Blind approach LSB substitution Pixel-wise technique