Abstract
This paper presents a two-stage watermarking technique for image authentication adapting the advantages of vector quantization (VQ). In the proposed algorithm, robust watermark and semifragile watermark are embedded independently in two successive stages. Robust watermark and VQ enhance the security of the system by providing double protection to the designed system, while semifragile watermark helps in authenticating the received image. Watermarks of varying sizes are embedded in the cover image, and their performance is measured in terms of peak signal-to-noise ratio (PSNR), weighted PSNR, and bit error rate. A threshold-based approach is suggested for identification of attacks as acceptable or malicious. The experimental results demonstrate the capabilities of the method in classifying attacks and correctly locating the tampered area. It is possible to detect and determine tampering with very high sensitivity. The present scheme outperforms previous algorithms in terms of imperceptibility, attack classification criteria, robustness feature, and tamper detection feature.
Bibliography
[1] H. M. Al-Otum, Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique, J. Vis. Commun. Image Represent.25 (2014), 1064–1081.10.1016/j.jvcir.2013.12.017Search in Google Scholar
[2] M. Barni, F. Bartolini and A. Piva, Improved wavelet-based watermarking through pixel-wise masking, IEEE Trans. Image Process.10 (2001), 783–791.10.1109/83.918570Search in Google Scholar PubMed
[3] J. C. Chuang and Y. C. Hu, An adaptive image authentication scheme for vector quantization compressed image, J. Vis. Commun. Image Represent.22 (2011), 440–449.10.1016/j.jvcir.2011.03.011Search in Google Scholar
[4] I. J. Cox and M. L. Miller, Review of watermarking and the importance of perceptual modelling, in: Electronic Imaging ’97, pp. 92–99, International Society for Optics and Photonics, 1997.10.1117/12.274502Search in Google Scholar
[5] S. Das, On Medical Image Processing, Analysis, Retrieval and Security Management, Doctoral thesis of University of Kolkata, 2014.Search in Google Scholar
[6] J. R. Hernandez, M. Amado and F. Perez-Gonzalez, DCT-domain watermarking techniques for still images: detector performance analysis and a new structure, IEEE Trans. Image Process.9 (2000), 55–68.10.1109/83.817598Search in Google Scholar PubMed
[7] A. M. Iliyasu, P. Q. Le, F. Dong and K. Hirota, Watermarking and authentication of quantum images based on restricted geometric transformations, Inform. Sci.186 (2012), 126–149.10.1016/j.ins.2011.09.028Search in Google Scholar
[8] B. Joshi, M. S. Raval, P. P. Rege and S. K. Parulkar, Multi-stage VQ based exact authentication for biometric images, J. Comput.2 (2013), R3–R25.Search in Google Scholar
[9] M. Li, D. Xiao and Y. Zhang, Attack and improvement of the fidelity preserved fragile watermarking of digital images, Arab. J. Sci. Eng.41 (2016), 941–950.10.1007/s13369-015-1941-1Search in Google Scholar
[10] Y. Linde, A. Buzo and R. Gray, An algorithm for vector quantizer design, IEEE Trans. Commun.28 (1980), 84–95.10.1109/TCOM.1980.1094577Search in Google Scholar
[11] Z. M. Lu and S. H. Sun, Digital image watermarking technique based on vector quantisation, Electron. Lett.36 (2000), 1.10.1049/el:20000309Search in Google Scholar
[12] Z. M. Lu, C. H. Liu, D. G. Xu and S. H. Sun, Semi-fragile image watermarking method based on index constrained vector quantisation, Electron. Lett.39 (2003), 1.10.1049/el:20030041Search in Google Scholar
[13] Z. M. Lu, D. G. Xu and S. H. Sun, Multipurpose image watermarking algorithm based on multistage vector quantization, IEEE Trans. Image Process.14 (2005), 822–831.10.1109/TIP.2005.847324Search in Google Scholar
[14] M. L. Lv, Z. M. Lu and Y. L. Huang, Multipurpose image hashing based on multistage vector quantization, Int. J. Innov. Comput. Inform. Control7 (2011), 6865–6873.Search in Google Scholar
[15] K. Maeno, Q. Sun, S. F. Chang and M. Suto, New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization, IEEE Trans. Multimed.8 (2006), 32–45.10.1109/TMM.2005.861293Search in Google Scholar
[16] A. Makur and S. S. Selvi, Variable dimension vector quantization based image watermarking, Signal Process.81 (2001), 889–893.10.1016/S0165-1684(01)00026-3Search in Google Scholar
[17] M. L. Miller, I. J. Cox, J. P. M. Linnartz and T. Kalker, A review of watermarking principles and practices, Digital Signal Process. Multimed. Syst. (1999), 461–485.Search in Google Scholar
[18] R. Pandey, A. K. Singh, B. Kumar and A. Mohan, Iris based secure NROI multiple eye image watermarking for teleophthalmology, Multimed. Tools Appl.75 (2016), 14381–14397.10.1007/s11042-016-3536-6Search in Google Scholar
[19] C. Qin, P. Ji, J. Wang and C. C. Chang, Fragile image watermarking scheme based on VQ index sharing and self-embedding, Multimed. Tools Appl.76 (2017), 2267–2287.10.1007/s11042-015-3218-9Search in Google Scholar
[20] L. Rosales-Roldan, M. Cedillo-Hernandez, M. Nakano-Miyatake, H. Perez-Meana and B. Kurkoski, Watermarking-based image authentication with recovery capability using halftoning technique, Signal Process. Image Commun.28 (2013), 69–83.10.1016/j.image.2012.11.006Search in Google Scholar
[21] A. Sharma, A. K. Singh and S. P. Ghrera, Robust and secure multiple watermarking for medical images, Wireless Pers. Commun.92 (2017), 1611–1624.10.1007/s11277-016-3625-xSearch in Google Scholar
[22] J. J. Shen and J. M. Ren, A robust associative watermarking technique based on vector quantization, Digital Signal Process.20 (2010), 1408–1423.10.1016/j.dsp.2009.10.015Search in Google Scholar
[23] A. K. Singh, M. Dave and A. Mohan, Robust and secure multiple watermarking in wavelet domain, J. Med. Imaging Health Inform.5 (2015), 406–414.10.1166/jmihi.2015.1407Search in Google Scholar
[24] A. K. Singh, B. Kumar, M. Dave and A. Mohan, Multiple watermarking on medical images using selective discrete wavelet transform coefficients, J. Med. Imaging Health Inform.5 (2015), 607–614.10.1166/jmihi.2015.1432Search in Google Scholar
[25] A. K. Singh, B. Kumar, M. Dave and A. Mohan, Robust and imperceptible dual watermarking for telemedicine applications, Wireless Pers. Commun.80 (2015), 1415–1433.10.1007/s11277-014-2091-6Search in Google Scholar
[26] A. K. Singh, M. Dave and A. Mohan, Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain, Wireless Pers. Commun.83 (2015), 2133–2150.10.1007/s11277-015-2505-0Search in Google Scholar
[27] A. K. Singh, B. Kumar, S. K. Singh, S. P. Ghrera and A. Mohan, Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network, Future Generat. Comput. Syst. (2016). https://doi.org/10.1016/j.future.2016.11.023.https://doi.org/10.1016/j.future.2016.11.023Search in Google Scholar
[28] A. K. Singh, M. Dave and A. Mohan, Hybrid technique for robust and imperceptible multiple watermarking using medical images, Multimed. Tools Appl.75 (2016), 8381–8401.10.1007/s11042-015-2754-7Search in Google Scholar
[29] F. H. Wang, L. C. Jain and J. S. Pan, VQ-based watermarking scheme with genetic codebook partition, J. Netw. Comput. Appl.30 (2007), 4–23.10.1016/j.jnca.2005.08.002Search in Google Scholar
[30] Q. Wen, T. F. Sun and S. X. Wang, Concept and application of zero-watermark, Acta Electron. Sin.31 (2003), 214–216.Search in Google Scholar
[31] H. C. Wu and C. C. Chang, A novel digital image watermarking scheme based on the vector quantization technique, Comput. Secur.24 (2005), 460–471.10.1016/j.cose.2005.05.001Search in Google Scholar
[32] C. W. Yang and J. J. Shen, Recover the tampered image based on VQ indexing, Signal Process.90 (2010), 331–343.10.1016/j.sigpro.2009.07.007Search in Google Scholar
[33] A. Zear, A. K. Singh and P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine, Multimed. Tools Appl. (2016), 1–20. DOI: 10.1007/s11042-016-3862-8.10.1007/s11042-016-3862-8Search in Google Scholar
©2018 Walter de Gruyter GmbH, Berlin/Boston
Articles in the same Issue
- Frontmatter
- Editorial
- Introduction to the Special Issue on Recent Developments in Multimedia Watermarking Using Machine Learning
- Multiple Watermarking for Healthcare Applications
- Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding
- An Image Authentication Algorithm Using Combined Approach of Watermarking and Vector Quantization
- A Novel Scene-Based Video Watermarking Scheme for Copyright Protection
- Novel Relevance Feedback Approach for Color Trademark Recognition Using Optimization and Learning Strategy
- A Parallel Algorithm for Wavelet Transform-Based Color Image Compression
- Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images
- Machine Learning-Based Robust Watermarking Technique for Medical Image Transmitted Over LTE Network
- An Efficient Medical Image Watermarking Technique in E-healthcare Application Using Hybridization of Compression and Cryptography Algorithm
Articles in the same Issue
- Frontmatter
- Editorial
- Introduction to the Special Issue on Recent Developments in Multimedia Watermarking Using Machine Learning
- Multiple Watermarking for Healthcare Applications
- Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding
- An Image Authentication Algorithm Using Combined Approach of Watermarking and Vector Quantization
- A Novel Scene-Based Video Watermarking Scheme for Copyright Protection
- Novel Relevance Feedback Approach for Color Trademark Recognition Using Optimization and Learning Strategy
- A Parallel Algorithm for Wavelet Transform-Based Color Image Compression
- Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images
- Machine Learning-Based Robust Watermarking Technique for Medical Image Transmitted Over LTE Network
- An Efficient Medical Image Watermarking Technique in E-healthcare Application Using Hybridization of Compression and Cryptography Algorithm