Abstract
This paper proposes a new reversible, imperceptible, semi fragile watermarking scheme for the authentication of digital fundus images that satisfies eight mandatory requirements. They are reversible, tamper detection, localization of modification, imperceptibility, capacity, complete blind detection, semi fragility and security. The proposed scheme generates the watermark dynamically using chaotic system and it is embedded using integer transform in reversible way. It precisely locates the tampering areas in the images and detects the watermark in complete blind approach without using the knowledge of both original image and watermark. It is found subjectively that 30,000 bits is the best size of the watermark for the proposed scheme to ensure the security and it is achieved for the PSNR value of around 60 dB at an average by retaining good level of imperceptibility. The proposed scheme is sensitive to the jittering, geometrical and filtering attacks and it modifies around 40 % of bits in the watermark for jittering and geometrical attacks, around 45 % of the bits in the watermark for filtering attacks to authenticate the images.
Similar content being viewed by others
References
Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. Image Process IEEE Trans 13(8):1147–1156
Allaert FA, Dusserre L (1994) Security of Health System in France. What we do will no longer be different from what we tell. Int J Biomed Comput 35(suppl 1):201–204
Barton JM (1997) Method and apparatus for embedding authentication information within digital data. US Patent 5:646–997
Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11:585–595
Celik M, Sharma G, Tekalp A (2006) Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans Image Process 15:1042–1049
Chen T-S, Chang C-C, Hwang M-S (1998) Virtual image cryptosystem based upon vector quantization. IEEE Trans Image Process 7(10):1485–1488
Coatrieux G, Lamard M, Daccache W, Puentes J, Roux C (2005) A Low distortion and reversible watermark: application to angiographic images of the retina. Proceedings of the 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference Shanghai, China
Coatrieux G, Maître H, Sankur B, Rolland Y, Collorec R (2000) Relevance of Watermarking in Medical Imaging. In: Information technology applications in biomedicine, IEEE-EMBS Conference, Arlington, USA, pp. 250–255
Coatrieux G, Sankur B, Maître H (2001) Strict integrity control of biomedical images. In: Electronic imaging 2001, security and watermarking of multimedia contents III, SPIE., San Jose, CA, USA, pp. 229–240
De Vleeschouwer C, Delaigle J-F, Macq B (2003) Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimedia 5(1):97–105
Fridrich J (1998) Image watermarking for tamper detection. In: IEEE Inter Conf Image Processing. Chicago, Illinois, USA, pp. 404–408
Fridrich J, Goljan J, Du R (2001) Invertible authentication. In: Proc SPIE 2001, security and watermarking of multimedia content. San Jose, CA, pp. 197–208
Fridrich J, Goljan M, Du R (2002) Lossless data embedding -new paradigm in digital watermarking. EURASIP J Appl Signal Process 2002(2):185–196
Fujita H et al (2008) The emerging of three CAD systems induced by Japanese health care needs. Comp Meth Prog Biomed. doi:10.1016/j.cmpb.2008.04.003
Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9:432–441
Honsinger CW, Jones P, Rabbani M, Stoffel JC (2001) Lossless recovery of an original image containing embedded data. US Patent 6:278,791
Lou D-C et al (2008) Multiple layer data hiding scheme for medical images. Comput Stand Interfaces. doi:10.1016/j.csi.2008.05.009
Macq B (2000) Lossless multiresolution transform for image authenticating watermarking. In: Proc EUSIPCO 2000. Tampere, Finland
Ni R, Ruan Q, Zhao Y (2008) Pinpoint authentication watermarking based on a chaotic system. Forensic Sci Int J 179:54–62
Palma Hernandez C, Torres-Huitzi C (2011) A fragile watermarking scheme for image authentication in mobile devices. Proceedings of the 8th International Conference on Electrical Engineering Computing Science and Automatic Control (CCE), Digital Object Identifier, pp 1–6. doi:10.1109/ICEEE.2011.6106601
Poonkuntran S, Aju D, Anitha C (2007) A Smart system for retinal blood vessel identification and width computation. Proceedings of International conference on Trends in Intelligent Electronic Systems
Poonkuntran S, Rajesh RS (2011) A messy watermarking for medical image authentication. Proceedings of the International Conference on Communication and Signal Processing, NIT Calicut, Kerala,India, pp 418–422, 10–12
Shanmugam P, Rajesh RS, Eswaran Perumal (2008) A reversible watermarking with low warping: an application to digital fundus images. Proceedings of the International Conference on Computer and Communication Engineering May 13–15, 2008. Kuala Lumpur, Malaysia, pp 472–477
Shi YQ, Zhicheng N, Dekun Z, Changyin L, Guorong X (2004) Lossless data hiding: fundamentals, algorithms and applications’. In: Proc. ISCAS ‘04, Circuits and Systems, International Symposium on, Vol. 2, pp. 23–26
Tian J (2002) Wavelet-based reversible watermarking for authentication. Proc SPIE Secur Watermarking Multimedia Contents IV 4675:679–690
Tian J (2002) Reversible watermarking by difference expansion. Proceedings of workshop on multimedia and security: authentication, secrecy, and steganalysis, pp. 19–22
Tian J (2003) High capacity reversible data embedding and content authentication. In Proc. ICASSP ‘03, Acoustics, Speech, and Signal Processing, IEEE International Conference on, Vol. 3, pp. 6–10
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890–893
Walton S (1995) Image authentication for a slippery new age. Dr Dobb’s J 20:18–26
Wu M, Liu B (1998) Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, Illinoise,US, pp 437–441
Wu J, Zhu B, Li S, Lin F (2004) A secure image authentication algorithm with pixel-level tamper. In: International conference on image processing, Singapore, pp. 1573–1576
Yeung M, Mintzer (1998) Invisible watermarking for image verification. J Electron Imag 7:578–591
Zhicheng N, Shi YQ, Ansari N, Wei S (2003) Reversible data hiding. In: Proc ISCAS ‘03, circuits and systems. Int Symp 2:25–28
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Poonkuntran, S., Rajesh, R.S. Chaotic model based semi fragile watermarking using integer transforms for digital fundus image authentication. Multimed Tools Appl 68, 79–93 (2014). https://doi.org/10.1007/s11042-012-1227-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-012-1227-5