CFP last date
20 January 2025
Reseach Article

Image Authentication and Restoration using Block-Wise Fragile Watermarking based on k-Medoids Clustering Approach

Published on None 2011 by Shivendra Shivani, Sushila Kamble, Anoop Kumar Patel, Suneeta Agarwal
International Conference and Workshop on Emerging Trends in Technology
Foundation of Computer Science USA
ICWET - Number 14
None 2011
Authors: Shivendra Shivani, Sushila Kamble, Anoop Kumar Patel, Suneeta Agarwal
5d7510f7-b8ca-4dce-8275-32229731686b

Shivendra Shivani, Sushila Kamble, Anoop Kumar Patel, Suneeta Agarwal . Image Authentication and Restoration using Block-Wise Fragile Watermarking based on k-Medoids Clustering Approach. International Conference and Workshop on Emerging Trends in Technology. ICWET, 14 (None 2011), 44-52.

@article{
author = { Shivendra Shivani, Sushila Kamble, Anoop Kumar Patel, Suneeta Agarwal },
title = { Image Authentication and Restoration using Block-Wise Fragile Watermarking based on k-Medoids Clustering Approach },
journal = { International Conference and Workshop on Emerging Trends in Technology },
issue_date = { None 2011 },
volume = { ICWET },
number = { 14 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 44-52 },
numpages = 9,
url = { /proceedings/icwet/number14/2170-is358/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Emerging Trends in Technology
%A Shivendra Shivani
%A Sushila Kamble
%A Anoop Kumar Patel
%A Suneeta Agarwal
%T Image Authentication and Restoration using Block-Wise Fragile Watermarking based on k-Medoids Clustering Approach
%J International Conference and Workshop on Emerging Trends in Technology
%@ 0975-8887
%V ICWET
%N 14
%P 44-52
%D 2011
%I International Journal of Computer Applications
Abstract

This paper proposes a block-wise fragile watermarking scheme based on k-medoids clustering approach. Proposed scheme is effective enough to reconstruct the tampered extensive content of an image. According to the suggested algorithm, first of all image is divided into the blocks and forty eight bits are calculated for each block, which consist of forty five Recovery bits and three Authentication bits namely Union bit, Affiliation bit and Spectrum bit. Authentication bits for a particular block are calculated by extracting five MSBs from each pixel of that block and apply them, on some predefined hash functions. Forty five Recovery bits are calculated using the means of derived clusters and its corresponding mapping bits. These Forty eight bits for each block are pseudo- randomly mapped with some other block using secret key. At the receiver end by comparing extracted and further calculated Authentication bits , one can be acquainted with the tampered block and extracted Recovery bits from mapping blocks gives adequate information to recover extensive content of host image.

References
  1. A. Criminisi, P. Perez, and K. Toyama. Region _lling and object removal by exemplar-based image inpainting. IEEE Trans. Image Process., vol. 13, no. 9, pp. 1200-1212, Sep. 2004.
  2. Anthony T. S. Ho, Xunzhan Zhu, Jun Shen, and Pina Marziliano. Fragile Watermarking Based on Encoding of the Zeros of the -Transform IEEE Transactions On Information Forensic and Security, VOL. 3, NO. 3, September 2008
  3. Anthony T. S. Ho, Xunzhan Zhu,lilian h. tang,Digitalwatermarking authentication and restoration for Chinese calligraphy image,IEEE, 1-4244-0882-2/07,2007
  4. Eugene T. Lin and Edward J. Delp. A review of fragile watermarking. Center for Education and Research in Information Assurance and Security,Purdue University, West Lafayette, IN 47907-2086.
  5. Jiri Fridrich and Miroslav Goljan. Images with Self-Correcting Capabilities. IEEE, 0-7803-546 2/99,1999.
  6. Hongjie He, Jiashu Zhang , Fan Chen. Block-wise Fragile Watermarking Scheme Based on Scramble Encryption. IEEE 978-1-4244-4105-1/07,2007.
  7. Hong-Jie He, Jia-Shu Zhang, and Heng-Ming Tai,Self-recovery Fragile Watermarking Using Block- Neighborhood Tampering Characterization, Springer- Verlag Berlin Heidelberg, IH 2009, LNCS 5806, pp. 132– 145, 2009
  8. Mi-Ae Kim and Won-Hyung Lee. A Content-Based Fragile Watermarking Scheme for Image Authentication Springer-Verlag Berlin Heidelberg,AWCC 2004, LNCS 3309, pp. 258-265, 2004.
  9. Shengbing CHE, Bin MA, Zuguo CHE. An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System IEEE DOI 10.1109/IIH-MSP.2008.24,2008
  10. Xinpeng Zhang and Shuozhong Wang. Fragile Watermarking With Error-Free Restoration Capability, IEEE transaction of multimedia, VOL. 10, NO. 8, December 2008.
  11. Xinpeng Zhang and Shuozhong Wang. Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels, IEEE Signal processing letters,VOL. 14, NO.10, October 2007.
  12. Xinpeng Zhang and Shuozhong Wang. Fragile watermarking scheme using a hierarchical mechanism Elsevier,doi:10.1016/j.sigpro.2008.10.001.
  13. X. Zhao, A.T.S. Ho, H. Treharne, V. Pankajakshan, C.Culnane and W. Jiang, A Novel Semi-Fragile Image Watermarking, Authentication and Self-restoration Technique Using the Slant Transform, University of Surrey Guildford-GU2 7XH, UK
  14. Xinpeng Zhang and Shuozhong Wang, Fragile Watermarking Scheme with Extensive Content Restoration Capability, Springer-Verlag Berlin Heidelberg, IWDW 2009, LNCS 5703, pp. 268–278, 2009.
  15. Yusuk Lim, Changsheng Xu, David Dagan Feng. Web based Image Authentication Using Invisible Fragile Watermark, Australian Computer Society, Inc. 2002.
  16. Yong-Zhong He, Zhen Han, A Fragile Watermarking Scheme with Pixel-wise Alteration Localisation IEEE, 978-1-4244-2179-4/08, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Block-wise fragile watermarking Tamper detection Image Recovery Image Alteration