Open Access Open Access  Restricted Access Subscription or Fee Access

A Fragile Watermarking Algorithm for Strict Image Authentication in the Wavelet Domain

U.M. Gokhale, Y.V. Joshi

Abstract


A fragile watermarking algorithm which is based on watermark scrambling in the wavelet domain is discussed in this paper. In the proposed algorithm, chaotic signals are generated using logistic mapping and are used for scrambling the original watermark. The initial values of logistic mapping are taken as private keys. The host image is decomposed into four bands using integer wavelet transform; and the scrambled watermark is embedded in the low frequency band. Any modification made to the original image is reflected in the watermark.

Keywords


Integer Wavelet Transform, Fragile Watermarking, Logistic Mapping

Full Text:

PDF

References


W. Stallings, Network security Essentials: Applications and standards. NJ USA: Prentice Hall, 2000.

Walton S (1995) Information authentication for a slippery new age .Dr Dobb’s J 20(4):18-26

P.W.Wong, “A watermark for image integrity and ownership verification”, Proc. IS&T PIC conference, Oregon, 1998.

M.Swanson, M. Kobayashi, A. Tewfik, “Multimedia data embedding and watermarking technologies, “Proceedings of the IEEE, vol. 86 no 6, pp 1064-1087, June 1998.

Yeung M., Mintzer F (1997) An Invisible watermarking technique for image verification. In: proceedings of the ICIP ’97, Santa Barbara, California, USA.

G. Friedman, “The Trustworthy digital camera: Restoring credibility to the photographic image,” IEEE Transactions on Consumer Electronics, vol.39, pp905-910, November 1993.

Ding K, He C, Wang H X, “A chaotic fragile watermarking technique with precise localization [J]. Acta Electronics Sinica, 2004, 32(6):1009-1012.

Chen L.J, “ A novel Fragile watermarking Method for medical Images using quad tree structure”, proceeding of the 2005 IEEE, Shanghai, China, sep 6258-6261,2005.

X.Y. Zhong , Q J Feng , W.F. Chen, G.P.Jiang, “ Hard authentication for Medical Image Based on Sensitivity of hash Function”, Journal of Image and graphics Vol. 13, No2. Feb2008.

Zheng Qiumei, Shi Gongxi, LV Xinghui, “A robust digital watermarking scheme based on integer wavelet using compound encryption, in proceedings of 4th International Conference on computer science & education 2009, pp 716-719.

Zhuang Jiahe, Zeng Wenhua ,Li Chenling, “A fragile watermarking scheme based on Integer Wavelet transform”, in proceedings of IEEE International Symposium on IT in Medicine and Education 2008, pp1028-1033.

Wim Sweldens, “The Lifting Scheme: A construction of second generation wavelets,” SIAMJ Math Anal, 1997, 29, pp.511-546.

Fridrich J (1999), “ Methods for tampering detection in digital image,” In Proceedings of multimedia and security workshop at ACM multimedia’99, ACM, Orlando, FL,USA, pp 29-33.

R.B. Wolfgang, C.I.Podilchuk and E.J. Delp, “Perceptual watermarks for Digital Images and Video, “Proceedings of the IEEE, Vol. 87, No.7, July 1999, pp1108-1126.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.