Low Complexity Image Authentication Based on Singular Value Decomposition and Mixed Scales Faber Schauder Wavelet
(*) Corresponding author
DOI: https://doi.org/10.15866/irecos.v10i12.8096
Abstract
The technology development has made the modification of digital content easier. The need of authenticating digital content is increasing. Different fragile watermarking methods have been proposed for image authentication. Image authentication is possible by embedding a mark into the digital image using watermarking. In some application low complexity algorithm is required, such as real-time and video processing applications. In this paper, we propose a low complexity image fragile watermarking based on Faber Schauder Discrete Wavelet Transform (FSDWT) and Singular Value Decomposition where the data to be embedded is a logo. The Watermark was generated by applying Xor operation between the logo’s bits and the bits of dominant blocks singular values of the image to authenticate. These dominant blocks are obtained by applying FSDWT to the image to be authenticated. Since the image is characterized by its contours and it’s around textures which contain an important concentration of dominant blocks, any image modification will result in significant change of the dominant blocks singular values, which helps the watermarking scheme to detect the authenticity of the image. Since FSDWT is composed of simple operations, the algorithm has a low complexity. Experimental results and analysis demonstrate the effectiveness of the proposed method.
Copyright © 2015 Praise Worthy Prize - All rights reserved.
Keywords
Full Text:
PDFReferences
C. Ingemar, M. Matthew, B. Jeffrey, F. Jessica, K. Ton, Digital Watermarking and Steganography (ED.2, Morgan Kaufmann Publishers Inc., San Francisco, CA, USA,2007).
S. Taheri, S., Ghaemmaghami., A Hierarchical Approach to SVD-based Fragile Watermarking for Image Authentication, Information, Communications and Signal Processing, Fifth International Conference (Page: 870-876, 2005 ).
http://dx.doi.org/10.1109/icics.2005.1689173
M. Wu, B. Liu, Data hiding in binary image for authentication and annotation, IEEE Trans. Multimedia, Vol. 6, pp. 528-538,2004.
http://dx.doi.org/10.1109/tmm.2004.830814
Kim, H.Y, R.L. de Queiroz, Alteration locating authentication watermarking for binary images, Lecture Notes Comput (2004, 125-136).
http://dx.doi.org/10.1007/978-3-540-31805-7_11
H.Yang, A.C. Kot, Binary image authentication with tampering localization by embedding cryptographic signature and block identifier, IEEE Sign. Proc. Lett., Vol. 13, pp. 741-744,2006.
http://dx.doi.org/10.1109/lsp.2006.879829
Puhan, N.B., A.T.S. Ho., F. Sattar., Erasable authentication watermarking in binary document images, Proceedings of the IEEE International Conference on Innovative Computing, Information and Control (Page: 288-291, 2007).
http://dx.doi.org/10.1109/icicic.2007.289
S.Rawat,B.Raman,A chaotic system based fragile watermarking scheme for image tamper detection, International Journal of Electronics and Communications, Vol. 65, n. 10, pp. 840-847, 2011.
http://dx.doi.org/10.1016/j.aeue.2011.01.016
S.C. Byun., S.K. Lee., A.H. Tew-fik., B.H. Ahn., A SVD-Based Fragile Watermarking Scheme for Image Authentication, International Workshop on Digital Watermarking, LNCS 2613, (Page: 170-178, 2003).
http://dx.doi.org/10.1007/3-540-36617-2_14
K. Bhagyashri., Joshi M. Y., Robust Image Watermarking based on Singular Value Decompositionand Discrete Wavelet Transform, Nanded 2010 IEEE.
http://dx.doi.org/10.1109/iccsit.2010.5563757
M.El Hajji, H. Ouaha, K. Afdel, H. Douzi, Multiple Watermark for Authentication and Tamper Detection using Mixed scales DWT, International Journal of Computer Applications, Vol. 28, n. 6, pp.31-34,2011.
http://dx.doi.org/10.5120/3389-4704
H. Douzi, D. Mammass, F. Nouboud, Faber-Schauder wavelet transformation application to edge detection and image characterization, Journal of Mathematical Imaging and Vision, Kluwer Academic Press, Vol. 14, n. 2, pp. 91-102,2001.
W. Sweldens, The lifting scheme, A construction of second generation wavelets, SIAM Journal on Mathematical Analysis, vol. 29, n. 2, pp. 511-546, 1998.
http://dx.doi.org/10.1137/s0036141095289051
C. T. Dang., M. Kumar., H. Radha., Key Frame Extraction from Consumer Videos Using Epitome, Image Processing (ICIP), 19th IEEE International Conference (Page: 93-96, 2012).
http://dx.doi.org/10.1109/icip.2012.6466803
S.Szenasi, Distributed Region Growing Algorithm for Medical Image Segmentation, International Journal of Circuits, Systems and Signal Processing, Vol. 8, n. 1, pp.173-181,2014.
J. Canny, A computational approach to edge Detection, Pattern Analysis and Machine Intelligence, IEEE Transactions, pp. 679-698, 1986.
http://dx.doi.org/10.1109/tpami.1986.4767851
M. El Hajji, H. Douzi, D. Mammas, R. Harba, F. Ros, A New Image Watermarking Algorithm Based on Mixed Scales Wavelets, J. Electron. Imaging , Vol. 21, n. 1.2012
http://dx.doi.org/10.1117/1.jei.21.1.013003
N. Otsu, A threshold selection method from grey scale histogram, IEEE Trans. on SMC, Vol. 1, pp. 62-66, 1979.
Refbacks
- There are currently no refbacks.
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize