Skip to main content
Log in

Chaotic model based semi fragile watermarking using integer transforms for digital fundus image authentication

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a new reversible, imperceptible, semi fragile watermarking scheme for the authentication of digital fundus images that satisfies eight mandatory requirements. They are reversible, tamper detection, localization of modification, imperceptibility, capacity, complete blind detection, semi fragility and security. The proposed scheme generates the watermark dynamically using chaotic system and it is embedded using integer transform in reversible way. It precisely locates the tampering areas in the images and detects the watermark in complete blind approach without using the knowledge of both original image and watermark. It is found subjectively that 30,000 bits is the best size of the watermark for the proposed scheme to ensure the security and it is achieved for the PSNR value of around 60 dB at an average by retaining good level of imperceptibility. The proposed scheme is sensitive to the jittering, geometrical and filtering attacks and it modifies around 40 % of bits in the watermark for jittering and geometrical attacks, around 45 % of the bits in the watermark for filtering attacks to authenticate the images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. Image Process IEEE Trans 13(8):1147–1156

    Article  MathSciNet  Google Scholar 

  2. Allaert FA, Dusserre L (1994) Security of Health System in France. What we do will no longer be different from what we tell. Int J Biomed Comput 35(suppl 1):201–204

    Google Scholar 

  3. Barton JM (1997) Method and apparatus for embedding authentication information within digital data. US Patent 5:646–997

    Google Scholar 

  4. Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11:585–595

    Article  Google Scholar 

  5. Celik M, Sharma G, Tekalp A (2006) Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans Image Process 15:1042–1049

    Article  Google Scholar 

  6. Chen T-S, Chang C-C, Hwang M-S (1998) Virtual image cryptosystem based upon vector quantization. IEEE Trans Image Process 7(10):1485–1488

    Article  MATH  MathSciNet  Google Scholar 

  7. Coatrieux G, Lamard M, Daccache W, Puentes J, Roux C (2005) A Low distortion and reversible watermark: application to angiographic images of the retina. Proceedings of the 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference Shanghai, China

  8. Coatrieux G, Maître H, Sankur B, Rolland Y, Collorec R (2000) Relevance of Watermarking in Medical Imaging. In: Information technology applications in biomedicine, IEEE-EMBS Conference, Arlington, USA, pp. 250–255

  9. Coatrieux G, Sankur B, Maître H (2001) Strict integrity control of biomedical images. In: Electronic imaging 2001, security and watermarking of multimedia contents III, SPIE., San Jose, CA, USA, pp. 229–240

  10. De Vleeschouwer C, Delaigle J-F, Macq B (2003) Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimedia 5(1):97–105

    Article  Google Scholar 

  11. Fridrich J (1998) Image watermarking for tamper detection. In: IEEE Inter Conf Image Processing. Chicago, Illinois, USA, pp. 404–408

  12. Fridrich J, Goljan J, Du R (2001) Invertible authentication. In: Proc SPIE 2001, security and watermarking of multimedia content. San Jose, CA, pp. 197–208

  13. Fridrich J, Goljan M, Du R (2002) Lossless data embedding -new paradigm in digital watermarking. EURASIP J Appl Signal Process 2002(2):185–196

    Article  MATH  Google Scholar 

  14. Fujita H et al (2008) The emerging of three CAD systems induced by Japanese health care needs. Comp Meth Prog Biomed. doi:10.1016/j.cmpb.2008.04.003

  15. Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9:432–441

    Article  Google Scholar 

  16. Honsinger CW, Jones P, Rabbani M, Stoffel JC (2001) Lossless recovery of an original image containing embedded data. US Patent 6:278,791

    Google Scholar 

  17. Lou D-C et al (2008) Multiple layer data hiding scheme for medical images. Comput Stand Interfaces. doi:10.1016/j.csi.2008.05.009

  18. Macq B (2000) Lossless multiresolution transform for image authenticating watermarking. In: Proc EUSIPCO 2000. Tampere, Finland

  19. Ni R, Ruan Q, Zhao Y (2008) Pinpoint authentication watermarking based on a chaotic system. Forensic Sci Int J 179:54–62

    Article  Google Scholar 

  20. Palma Hernandez C, Torres-Huitzi C (2011) A fragile watermarking scheme for image authentication in mobile devices. Proceedings of the 8th International Conference on Electrical Engineering Computing Science and Automatic Control (CCE), Digital Object Identifier, pp 1–6. doi:10.1109/ICEEE.2011.6106601

  21. Poonkuntran S, Aju D, Anitha C (2007) A Smart system for retinal blood vessel identification and width computation. Proceedings of International conference on Trends in Intelligent Electronic Systems

  22. Poonkuntran S, Rajesh RS (2011) A messy watermarking for medical image authentication. Proceedings of the International Conference on Communication and Signal Processing, NIT Calicut, Kerala,India, pp 418–422, 10–12

  23. Shanmugam P, Rajesh RS, Eswaran Perumal (2008) A reversible watermarking with low warping: an application to digital fundus images. Proceedings of the International Conference on Computer and Communication Engineering May 13–15, 2008. Kuala Lumpur, Malaysia, pp 472–477

  24. Shi YQ, Zhicheng N, Dekun Z, Changyin L, Guorong X (2004) Lossless data hiding: fundamentals, algorithms and applications’. In: Proc. ISCAS ‘04, Circuits and Systems, International Symposium on, Vol. 2, pp. 23–26

  25. Tian J (2002) Wavelet-based reversible watermarking for authentication. Proc SPIE Secur Watermarking Multimedia Contents IV 4675:679–690

    Article  Google Scholar 

  26. Tian J (2002) Reversible watermarking by difference expansion. Proceedings of workshop on multimedia and security: authentication, secrecy, and steganalysis, pp. 19–22

  27. Tian J (2003) High capacity reversible data embedding and content authentication. In Proc. ICASSP ‘03, Acoustics, Speech, and Signal Processing, IEEE International Conference on, Vol. 3, pp. 6–10

  28. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890–893

    Article  Google Scholar 

  29. Walton S (1995) Image authentication for a slippery new age. Dr Dobb’s J 20:18–26

    Google Scholar 

  30. Wu M, Liu B (1998) Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, Illinoise,US, pp 437–441

  31. Wu J, Zhu B, Li S, Lin F (2004) A secure image authentication algorithm with pixel-level tamper. In: International conference on image processing, Singapore, pp. 1573–1576

  32. Yeung M, Mintzer (1998) Invisible watermarking for image verification. J Electron Imag 7:578–591

    Article  Google Scholar 

  33. Zhicheng N, Shi YQ, Ansari N, Wei S (2003) Reversible data hiding. In: Proc ISCAS ‘03, circuits and systems. Int Symp 2:25–28

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Poonkuntran.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Poonkuntran, S., Rajesh, R.S. Chaotic model based semi fragile watermarking using integer transforms for digital fundus image authentication. Multimed Tools Appl 68, 79–93 (2014). https://doi.org/10.1007/s11042-012-1227-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-012-1227-5

Keywords

Navigation