Attack Detection through Image Adaptive Self Embedding Watermarking

Now a days, a significant part of commercial and governmental organisations like museums, cultural organizations, libraries, commercial enterprises, etc. invest intensively in new technologies for image digitization, digital libraries, image archiving and retrieval. Hence image authorization, authentication and security has become prime need. In this paper, we present a semi-fragile watermarking scheme for color images. The method converts the host image into YIQ color space followed by application of orthogonal dual domains of DCT and DWT transforms. The DCT helps to separate relevant from irrelevant image content to generate silent image features. DWT has excellent spatial localisation to help aid in spatial tamper characterisation. Thus image adaptive watermark is generated based of image features which allows the sharp detection of microscopic changes to locate modifications in the image. Further, the scheme utilises the multipurpose watermark consisting of soft authenticator watermark and chrominance watermark. Which has been proved fragile to some predefined processing like intentinal fabrication of the image or forgery and robust to other incidental attacks caused in the communication channel.





References:
[1] M. Wu and B. Liu, "Watermarking for image authentication," in Proc.
ICIP, Chicago, IL, Oct. 1998.
[2] W. Stallings, ÔÇÿNetwork Security Essentials: Applications and Standards,-
Prentice Hall, 2000.
[3] William Stallings, "Cryptography and network security," Third Edition,
Pearson Publications, 2003.
[4] M. Goljan and J. Fridrich, "Protection of Digital Image Using Self
Embedding," Symposium on Content Security and Data Hiding in
Digital Media, May 1999.
[5] V. Cappellini, F. Bartolini, R. Caldelli, A. De Rosa, A. Piva, M. Barni,
and M. Wada, "Copyright protection for CH multimedia data through
digital watermarking techniques," in Proc. 11th IEEE Int. Workshop on
Database and Expert Systems Applications, September 2000, pp. 935-
939.
[6] C.-T. Hsu and J.-L. Wu, "Multiresolution Watermarking for digital
images," IEEE Trans. Consumer Electron., vol.45, pp.1097-101, Aug.
1998.
[7] Y. Zhao, Dual Domain "Semi-Fragile Watermarking for Image
Authentication," M.A.Sc. Thesis, Univ. Toronto, Toronto, On, Canada,
2003.
[8] R. Mehul and R. Priti, "Discrete Wavelet Transform Based Multiple
Watermarking Scheme," Proceedings of IEEE Region 10 Technical
Conference on Convergent Tech. for the Asia-Pacific, Bangalore,India,
October 14-17, 2003.
[9] V. Licks and R. Jordan, "On Digital Image Watermarking Robust to
Geometric Transformations," Proceedings of 2000 International
Conference Image Proc (ICIP 2000), Vol. 3, Vancouver, BC, Canada,
September 10-13, 2000, pp. 690-693.
[10] Rafael C. Gonzalez, Richard E. Woods, Steven L. Eddins, ÔÇÿDigital
Image Processing using Matlab,- Pearson Edition 2004.
[11] Prof. Ramkumar & Ali N. Akansu, "Capacity estimates for data hiding
in compressed images," IEEE Tr. on Image proc. Vol. 10 no.8, 8Aug,
2001.