Skip to main content

Content-Based Image Authentication Framework with Semi-fragile Hybrid Watermark Scheme

  • Conference paper
Man-Machine Interactions 2

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 103))

Abstract

This paper presents a novel content-based image authentication framework which embeds the semi-fragile image features into the host image based on wavelet transform. In particular, a hybrid method which combines DCT (Discrete Cosine Transform) and DWT (Discrete Wavelet Transform) is introduced to improve the semi-fragile characteristic of the watermarking scheme. Zernike moments of the original image are extracted as feature set and the quantized feature set is embedded in the original image. In the watermark retrieval process, content modification is identified by comparing the Euclidean distance of generated and extracted watermark of the tampered image with predefined threshold. The experimental results demonstrate that the newly proposed DWT-DCT hybrid watermark embedding algorithm is robust for JPEG compression and Gaussian noise up to certain limit.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abbasfard, M.: Digital image watermarking robustness: A comparative study. Master’s thesis, Delft, Netherlands (2009)

    Google Scholar 

  2. Al-Haj, A.: Combined DWT-DCT digital image watermarking. Journal of Computer Science 3(9), 740–746 (2007)

    Article  Google Scholar 

  3. Haque, R.: Singular value decomposition and discrete cosine transform based image watermarking. Master’s thesis, Karlskrona, Sweden (2008)

    Google Scholar 

  4. Henry, C.: Near Sets: Theory and application. Ph.D. thesis, Department of Electrical and Computer Engineering, University of Manitoba, Winnipeg, Canada (2010)

    Google Scholar 

  5. Hu, Y., Han, D.: Using two semi-fragile watermark for image authentication. In: Proceedings of the International Conference on Machine Learning and Cybernetics, vol. 9, pp. 5484–5489 (2005)

    Google Scholar 

  6. Kao, C., Chang, L.: Zernike moments and edge features based semi- fragile watermark for image authentication with tampering localizations. In: Proceedings of Asia-Pacific Signal and Information Processing Association, pp. 555–562 (2009)

    Google Scholar 

  7. Lin, C., Chang, S.: A robust image authentication method distinguishing jpeg compression from malicious manipulation. IEEE Transactions on Circuits and Systems of Video Technology 11(2), 153–168 (2001)

    Article  MathSciNet  Google Scholar 

  8. Liu, H., Lin, J., Huang, J.: Image authentication using content based watermark. In: Proceedings of the IEEE International Symposium on Circuits and Systems, pp. 4014–4017 (2005)

    Google Scholar 

  9. Liu, H., Yao, X., Huang, J.: Semi-fragile zernike moment-based image watermarking for authentication. EURASIP Journal on Advances in Signal Processing 7(3), 1–17 (2010)

    Google Scholar 

  10. Teh, C., Chin, R.T.: On image analysis by the methods of moments. IEEE Transactions on Pattern Analysis and Machine Intelligence 10(4), 496–513 (1988)

    Article  MATH  Google Scholar 

  11. Yeung, M.M., Mintzer, F.: Invisible watermarking for image verification. Journal of Electronic Imaging 7(3), 578–591 (1998)

    Article  Google Scholar 

  12. Zernike, V.F.: Beugungstheorie des schneidenver-fahrens und seiner verbesserten form, der phasenkontrastmethode. Physica 1(7-12), 689–704 (1934)

    Article  MATH  Google Scholar 

  13. Zhang, D., Pan, Z.: A contour-based semi-fragile image watermarking algorithm in DWT domain. In: Proceedings of the Education Technology and Computer Science (ETCS), Second International Workshop, vol. 3, pp. 228–231 (2010)

    Google Scholar 

  14. Zhou, X., Duan, X., Wang, D.: A semi-fragile watermark scheme for image authentication. In: Proceedings of the 10th International Multimedia Modelling Conference, pp. 374–378. IEEE Computer Society, Los Alamitos (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Madduma, B., Ramanna, S. (2011). Content-Based Image Authentication Framework with Semi-fragile Hybrid Watermark Scheme. In: Czachórski, T., Kozielski, S., Stańczyk, U. (eds) Man-Machine Interactions 2. Advances in Intelligent and Soft Computing, vol 103. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23169-8_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23169-8_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23168-1

  • Online ISBN: 978-3-642-23169-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics