Skip to main content

An Intelligent Blind Semi-fragile Watermarking Scheme for Effective Authentication and Tamper Detection of Digital Images Using Curvelet Transforms

  • Conference paper
  • First Online:
Advances in Signal Processing and Intelligent Recognition Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 425))

Abstract

A novel intelligent semi-fragile watermarking scheme for authentication and tamper detection of digital images is proposed in this paper. This watermarking scheme involves embedding and extraction of the quantized first level Discrete Curvelet Transform (DCLT) coarse coefficients. The amount of quantization of the first level coarse DCLT coefficients of the input image is decided intelligently based on the energy contribution of the coefficients. At the receiver side, the extracted and generated first level coarse DCLT coefficients of the watermarked image is divided into blocks of uniform size. A feature similarity index value between each block of extracted and generated coefficients is compared and if the difference exceeds threshold, the block is marked as tampered. The watermarking scheme is blind and does not require any additional information to identify authenticity of the watermarked image. Experiments are conducted rigorously and the results reveal that the proposed method is robust than the existing method [1]. Better accuracy in localizing tampered regions is achieved compared to method [1].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ghofrani, S., et al.: Image content authentication and tamper localization based on semi fragile watermarking by using the curvelet transform. In: TENCON 2012 - 2012 IEEE Region 10 Conference, Cebu, pp. 1–6 (2012)

    Google Scholar 

  2. Singh, P., et al.: A Survey of Digital Watermarking Techniques, Applications and Attacks. International Journal of Engineering and Innovative Technology (IJEIT) 2(9), 165–175 (2013)

    Google Scholar 

  3. Chang, W.H., Chang, L.W.: Semi-fragile watermarking for image authentication, localization, and recovery using tchebichef moments. In: International Symposium on Communications and Information Technologies (ISCIT), pp. 749–754 (2010)

    Google Scholar 

  4. Schirripa, G., Simonetti, C., Cozzella, L.: Fragile digital watermarking by synthetic holograms. In: Proc. of European Symposium on Optics/Fotonics in security & Defence, London, UK, pp. 173–182 (2004)

    Google Scholar 

  5. Dittmann, J., Ferri, L.C., Vielhauer, C.: Hologram watermarks for document authentications. In: Proceedings of IEEE International Conference on Information Technology, Las Vegas, pp. 60–64 (2001)

    Google Scholar 

  6. Aoki, Y.: Watermarking Technique Using Computer-Generated Holograms. Electronics and Communications in Japan, Part 3 84(1), 21–31 (2001)

    Article  Google Scholar 

  7. Maeno, K., Sun, Q., Chang, S., Suto, M.: New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization. IEEE Trans. Multimedia 8(1), 32–45 (2006)

    Article  Google Scholar 

  8. Gokhale, U.M., Joshi, Y.V.: A Semi Fragile Watermarking Algorithm Based on SVD-IWT for Image Authentication. International Journal of Advanced Research in Computer and Communication Engineering 1(4), 217–222 (2012)

    Google Scholar 

  9. Wu, X., Huang, J., Hu, J., Shi, Y.: Secure semi-fragile watermarking for Image authentication based on parameterized integer Wavelet’. Journal of Computers 17(2), 27–36 (2006)

    Google Scholar 

  10. Zou, D., et al.: A semi-fragile lossless digital watermarking scheme based on integer wavelet transform. In: IEEE 6th Workshop on Multimedia Signal Processing, pp. 195–198 (2004)

    Google Scholar 

  11. Wu, X., et al.: Reversible semi-fragile image authentication using zernike moments and integer wavelet transform. In: Digital Rights Management. Technologies, Issues, Challenges and Systems. Lecture Notes in Computer Science, vol. 3919, pp 135–145 (2006)

    Google Scholar 

  12. Kavadia, C., Shrivastava, V.: A Novel Digital Watermarking Technique based on Feature Attribute Selection using Integer Wavelet Transform Function and ID3 Algorithm. International Journal of Computer Applications 88(16), 35–40 (2014)

    Article  Google Scholar 

  13. Donoho, D.L., Duncan, M.R.: Digital curvelet transform: strategy, implementation and experiments. In: Proc. Society Optics and Photonics, vol. 4056, pp. 12–29 (2000)

    Google Scholar 

  14. Zhang, L., et al.: FSIM: A Feature Similarity Index for Image Quality Assessment. IEEE Transactions on Image Processing 20(8), 2378–2386 (2011)

    Article  MathSciNet  Google Scholar 

  15. Starck, J.-L., Fadili, M.J.: Numerical issues when using wavelets. In: Meyers, R. (ed.) Encyclopedia of Complexity and Systems Science, vol. 14, pp. 6352–6368. Springer, New York (2009)

    Chapter  Google Scholar 

  16. Chen, L., Lu, G., Zhang, D.S.: Effects of different gabor filter parameters on image retrieval by texture. In: Proc. of IEEE 10th International Conference on Multi-Media Modelling, Australia, pp. 273–278 (2004)

    Google Scholar 

  17. Candès, E.J., Demanet, L., Donoho, D.L., Ying, L.: Fast Discrete Curvelet Transforms. Multiscale Modeling and Simulation 5, 861–899 (2005)

    Article  Google Scholar 

  18. Candes, E., Donoho, D.: New tight frames of Curvelets and optimal representations of objects with C2 singularities. Comm. Pure Appl. Mathematics 57(2), 219–266 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  19. Dodis, Y., et al.: Threshold and proactive pseudo-random permutations. In: TCC 2006 Proceedings of the Third conference on Theory of Cryptography, Verlag Berlin, Heidelberg, pp. 542–560 (2006)

    Google Scholar 

  20. Lee, J., Won, Chee Sun: A Watermarking Sequence Using Parities of Error Control Coding For Image Authentication And Correction. IEEE Transactions on Consumer Electronics 46(2), 313–317 (2000)

    Article  Google Scholar 

  21. Morrone, M.C., Burr, D.C.: Feature detection in human vision: a phase-dependent energy model. Proc. R. Soc. Lond. B 235(1280), 221–245 (1988)

    Article  Google Scholar 

  22. Morrone, M.C., Ross, J., Burr, D.C., Owens, R.: Mach bands are phase dependent. Nature 324(6049), 250–253 (1986)

    Article  Google Scholar 

  23. Morrone, M.C., Owens, R.A.: Feature detection from local energy. Pattern Recognit. Letters 6(5), 303–313 (1987)

    Article  Google Scholar 

  24. Kovesi, P.: Image features from phase congruency. Videre: J. Comp. Vis. Res. 1(3), 1–26 (1999)

    Google Scholar 

  25. http://sipi.usc.edu/database/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. R. Chetan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Chetan, K.R., Nirmala, S. (2016). An Intelligent Blind Semi-fragile Watermarking Scheme for Effective Authentication and Tamper Detection of Digital Images Using Curvelet Transforms. In: Thampi, S., Bandyopadhyay, S., Krishnan, S., Li, KC., Mosin, S., Ma, M. (eds) Advances in Signal Processing and Intelligent Recognition Systems. Advances in Intelligent Systems and Computing, vol 425. Springer, Cham. https://doi.org/10.1007/978-3-319-28658-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28658-7_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28656-3

  • Online ISBN: 978-3-319-28658-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics