Abstract
This paper presents a novel content-based image authentication framework which embeds the semi-fragile image features into the host image based on wavelet transform. In particular, a hybrid method which combines DCT (Discrete Cosine Transform) and DWT (Discrete Wavelet Transform) is introduced to improve the semi-fragile characteristic of the watermarking scheme. Zernike moments of the original image are extracted as feature set and the quantized feature set is embedded in the original image. In the watermark retrieval process, content modification is identified by comparing the Euclidean distance of generated and extracted watermark of the tampered image with predefined threshold. The experimental results demonstrate that the newly proposed DWT-DCT hybrid watermark embedding algorithm is robust for JPEG compression and Gaussian noise up to certain limit.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abbasfard, M.: Digital image watermarking robustness: A comparative study. Master’s thesis, Delft, Netherlands (2009)
Al-Haj, A.: Combined DWT-DCT digital image watermarking. Journal of Computer Science 3(9), 740–746 (2007)
Haque, R.: Singular value decomposition and discrete cosine transform based image watermarking. Master’s thesis, Karlskrona, Sweden (2008)
Henry, C.: Near Sets: Theory and application. Ph.D. thesis, Department of Electrical and Computer Engineering, University of Manitoba, Winnipeg, Canada (2010)
Hu, Y., Han, D.: Using two semi-fragile watermark for image authentication. In: Proceedings of the International Conference on Machine Learning and Cybernetics, vol. 9, pp. 5484–5489 (2005)
Kao, C., Chang, L.: Zernike moments and edge features based semi- fragile watermark for image authentication with tampering localizations. In: Proceedings of Asia-Pacific Signal and Information Processing Association, pp. 555–562 (2009)
Lin, C., Chang, S.: A robust image authentication method distinguishing jpeg compression from malicious manipulation. IEEE Transactions on Circuits and Systems of Video Technology 11(2), 153–168 (2001)
Liu, H., Lin, J., Huang, J.: Image authentication using content based watermark. In: Proceedings of the IEEE International Symposium on Circuits and Systems, pp. 4014–4017 (2005)
Liu, H., Yao, X., Huang, J.: Semi-fragile zernike moment-based image watermarking for authentication. EURASIP Journal on Advances in Signal Processing 7(3), 1–17 (2010)
Teh, C., Chin, R.T.: On image analysis by the methods of moments. IEEE Transactions on Pattern Analysis and Machine Intelligence 10(4), 496–513 (1988)
Yeung, M.M., Mintzer, F.: Invisible watermarking for image verification. Journal of Electronic Imaging 7(3), 578–591 (1998)
Zernike, V.F.: Beugungstheorie des schneidenver-fahrens und seiner verbesserten form, der phasenkontrastmethode. Physica 1(7-12), 689–704 (1934)
Zhang, D., Pan, Z.: A contour-based semi-fragile image watermarking algorithm in DWT domain. In: Proceedings of the Education Technology and Computer Science (ETCS), Second International Workshop, vol. 3, pp. 228–231 (2010)
Zhou, X., Duan, X., Wang, D.: A semi-fragile watermark scheme for image authentication. In: Proceedings of the 10th International Multimedia Modelling Conference, pp. 374–378. IEEE Computer Society, Los Alamitos (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Madduma, B., Ramanna, S. (2011). Content-Based Image Authentication Framework with Semi-fragile Hybrid Watermark Scheme. In: Czachórski, T., Kozielski, S., Stańczyk, U. (eds) Man-Machine Interactions 2. Advances in Intelligent and Soft Computing, vol 103. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23169-8_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-23169-8_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23168-1
Online ISBN: 978-3-642-23169-8
eBook Packages: EngineeringEngineering (R0)