Escolar Documentos
Profissional Documentos
Cultura Documentos
Regular Paper
School of Engineering and Technology, Tra Vinh University, Tra Vinh Province, Viet Nam
Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan, ROC
c
Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan, ROC
b
a r t i c l e
i n f o
Article history:
Received 16 July 2015
Accepted 2 May 2016
Keywords:
High quality
Image authentication
Reversibility
Tamper detection
Watermarking
a b s t r a c t
Image authentication technique protects the integrity of images. Many image authentication schemes
have been proposed in recent years. However, in these schemes, the image is permanently distorted
and cannot be recovered to its original version after image authentication. In this paper, we propose a
new, reversible watermarking scheme for image authentication scheme in the DWT domain to achieve
high accuracy of tamper detection, and complete reversibility while maintaining high image quality of
watermarked images. In the proposed scheme, authentication code is randomly generated and embedded
into 2nd DWT low-frequency subbands of each image block. Our experimental results demonstrated that
the proposed scheme has ability to resist against different attacks, i.e., different sizes of tampered regions,
content tampered attack, and collage attack, with small distortion of the watermarked image. In addition,
the proposed scheme achieves reversibility that is quite important to some special fields, i.e., medical
images, military images, and fine artwork.
2016 Elsevier GmbH. All rights reserved.
1. Introduction
With the rapid development of multimedia and digital image
processing technologies, a variety of processes, i.e., copying, editing, and digital contents processing, have been used extensively.
This means that the integrity of images can be easily infringed.
For example, the content of the image can be altered illegally
and tampered maliciously during storing or transmitting over the
Internet. Therefore, the protection of such content has become a
very essential issue that attracts a great deal of attention in both
academia and industry [13]. Watermarking is the most popular
technique to protect the integrity and authenticity of the image
[4]. Depending on various applications, watermarking can be partitioned into three various categories, i.e., robust, semi-fragile,
and fragile watermarking. The first category, robust watermarking
[5,6], is used to counteract intentional and unintentional modifications, while the second one, semi-fragile watermarking [711], is
able to resist unintentional manipulations done by some common
image processing operations. The third category, fragile watermarking [1222], is sensitive to modifications and used to counter-
1056
bit into each block, three different watermark bits are embedded
in each block to increase the accuracy of the localization capacity,
it means that any modifications implemented in the image block
will determined correctly. Fig. 1 shows main processes of the proposed watermark embedding phase.
In DWT algorithm, using low and intermediate frequencies for
watermark embedding provides weak robust watermarking. However, this property is considered as an advantage for image authentication by embedding watermark into 2nd level DWT lowfrequency subbands of the image. After image blocks are transformed by the 2nd level DWT algorithm, low-frequency subbands
of LL1, LH1, and HL1 (marked as Red color in Fig. 2) are obtained
and selected for carrying watermark bits.
The watermark embedding algorithm consists of six steps,
which are described as following.
Input: A grayscale host image H, a secret key K.
Output: A watermarked image.
Step 1: The host image H is partitioned into non-overlapping
blocks Bm,n(i, j) for i = 1, 2, , 8 and j = 1, 2, , 8, it means that each
block has 8 8 pixels. The watermark W in binary form is randomly generated from the secret key K, which is then used as the
authentication code, and the length of W is similar to the number
of DWT blocks.
Step 2: The received Bm,n blocks are transformed by DWT algorithm to generate transformed coefficients TBm,n. Then, three subblocks LL, LH, HL of each TBm,n are continually transformed by
2nd level DWT by Eq. (1).
subband Dsb
m;n for embedding watermark bit using Eq. (2).
Dsb
m;n i; j DWTTBm;n i; j
band Dsb
m;n . In this work, we only use two coefficients, U and B, for
image authentication by embedding watermark bits to achieve
the robustness against incidental modifications and to identify
the tampered localization.
Step 4: Determine the selected coefficient X in the coefficient
X
U;
if
U>B
B;
if
U6B
After coefficient selection, the average value Avg of the coefficient subband Dsb
m;n is calculated according to three unselected coefficients. Then, compute the absolute distance value F between the
selected coefficient X and the average value Avg, and decompose it
into two portions, I and D as below.
F jAv g Xj I D
where I and D are the integer value and the fraction value of F,
respectively. It is noted that, before embedding watermark bit, the
order of digits in D is inverted to the value D0 as D0 = Invert(D),
where Invert() means the inverse function. We also remarked that
if the number of digits after the decimal point of F is smaller five,
these digits are used as the value of D. Otherwise, the fraction value
of F is rounded to five decimal places after the decimal point that is
used as the value of D in the proposed scheme. For example,
F = 373.67, the value of D will be 67. Thus, the inverted value
1057
D00 invertD0 2 w
8
Av g F 0 ; If X P 0 and Av g P 0
>
>
>
>
0
>
>
< Av g F ; If X P 0 and Av g < 0
0
X Av g F 0 ; If X < 0 and Av g P 0
>
>
>
> Av g F 0 ; If X < 0; Av g < 0 and Av g P X
>
>
:
Av g F 0 ; If X < 0; Av g < 0 and Av g < X
After updating the watermarked coefficient X0 into the coefficient subband Dsb
m;n , utilize 2nd level IDWT to generate the watermarked block B0 m,n.
Step 6: Steps 1 to 5 are repeatedly performed until the entire
image blocks have been processed completely.
To clarify our watermark embedding phase, an example is given
in Fig. 4. Assume that the original coefficient subband Dsb
m;n is
shown in Fig. 4(a) and the watermark bit w = 1 is embedded into
Dsb
m;n to generate the watermarked coefficient subband as shown
in Fig. 4(b). It can be seen in Fig. 4(a), U = 3027, and B = 2463, thus,
X = 3027 is calculated according to Eq. (2). The average value Avg is
then calculated as Av g 259724632885
2648:33, then, the abso3
lute distance value F is calculated as F jAv g Xj
j2648:33 3027j 378:67. Since I and D are the integer portion
and the fractional portion of F, respectively, so I = 378 and D = 67.
After that, the order of digits in D is inverted to D0 = Invert(D)
= Invert(67) = 76. Eq. (4) is used to embed the watermark bit
to
generate
D00 invert76 2 1
w=1
into
D0
0
00
invert153 351. Therefore, F = ID = 378.351.
1058
(a) Case 1
(b) Case 2
(c) Case 3
(d) Case 4
Table 1
Comparison of visual quality between obtained images and the original host image.
Images
PSNR
Airplane
Lena
Peppers
Watermarked image
Reconstructed image
83.54 dB
Infinite
83.52 dB
Infinite
83.58 dB
Infinite
Images
Airplane
Lena
Peppers
(a)
(b)
(c)
(d) 83.54 dB
(e) 83.52 dB
(f) 83.58 dB
Original
Watermarked
and PNSRs
1059
Size of tampered
region
Small
Median
Large
(a)
(b)
(c)
(d)
(e)
(f)
Watermarked
images
Tampered
images
Fig. 8. Watermarked and tampered images with different sizes of tampered regions.
Size of tampered
region
Small
Median
Large
( a)
(b )
( c)
(d )
( e)
(f)
Binary version of
raw detected
images
Binary version
refined detected
images
F 0 jAv g Xj I D00
00
6
0
where I and D are the integer value and the fraction value of F ,
respectively.
To extract the watermark bit w0 from F0 , the inverted value D0 is
calculated as D0 = Invert(D00 ). Then, the watermark bit w is
extracted, and the original fractional portion D is reconstructed
by Eqs. (7) and (8), respectively:
w0 D0 mod 2
D invertD0 w=2
8
Av g F; If X 0 P 0 and Av g P 0
>
>
>
>
0
>
>
< Av g F; If X P 0 and Av g < 0
X Av g F; If X 0 < 0 and Av g P 0
>
>
>
Av g F; If X 0 < 0; Av g < 0 and Av g P X 0
>
>
>
:
Av g F; If X 0 < 0; Av g < 0 and Av g < X 0
1060
PSNR 10log10
2552
PM
1=M i1 Hi H0i
10
where M is the size of the original image, and Hi and H0 i are the pixel
values before and after embedding the watermark, respectively.
Table 1 shows the comparison of the image quality between the
watermarked image or the reconstructed image and the original
host image. Obviously, the proposed scheme guarantees that if none
of modification is performed in the host image that can be reconstructed to its original version correctly. Fig. 7 shows that, three
images before and after the watermark was embedded. As can be
seen in Fig. 7, the proposed scheme made the watermark invisible
when the values of PSNR is greater than 83 dB for different images.
3. Experimental results
In this section, extensive experiments were conducted to
demonstrate the performance of the proposed scheme. Four
512 512 images, including Airplane, Lena, Peppers, and Barbara,
were used in the experiment. The proposed technique is evaluated
in terms of image quality and tamper detection under different
attacks, i.e., different sizes of tampered region, content tampered
and collage attacks.
Block
size
Average PSNR
of watermarked
image
Reversibility
The number
of skipped
blocks for
embedding
44
44
44
88
40.58 dB
38.87 dB
51.62 dB
83.54 dB
No
No
Yes
Yes
0
0
6493
0
1061
[1] Luo L, Chen Z, Chen M, Zeng X, Xiong Z. Reversible image watermarking using
interpolation technique. IEEE Trans Inf Forensics Secur 2011;5(1):18793.
[2] Lin PY, Lee JS, Chang CC. Dual digital watermarking for internet media based on
hybrid strategies. IEEE Trans Circuits Syst Video Technol 2009;19(8):116971.
[3] Swaminathan A, Mao YN, Wu M. Robust and secure image hashing. IEEE Trans
Inf Forensics Secur 2006;1(2):21530.
[4] Zhu BB, Swanson MD, Tewfik AH. When seeing isnt believing. IEEE Signal
Process Mag 2004;3:409.
[5] Minamoti T, Ohura R. A blind digital image watermarking method based on the
dyadic wavelet transform and interval arithmetic. Appl Math Comput
2014;236:30619.
[6] Yeo DG, Lee HY, Kim BM. High capacity reversible watermarking using
differential histogram shifting and predicted error compensation. J Electron
Imaging 2011;20(1):013001.
[7] Qi X, Xin X. A quantization-based semi-fragile watermarking scheme for image
content authentication. J Visual Commun Image Represent 2011;22
(2):187200.
[8] Zhang W, Frank YS. Semi-fragile spatial watermarking based on local binary
pattern operators. Opt Commun 2011;284(1617):390412.
[9] Zhu X, Ho ATS, Marziliano P. A new semi-fragile image watermarking with
robust tampering restoration using irregular sampling. Signal Process Image
Commun 2007;22(5):51528.
[10] Preda RO. Semi-fragile watermarking for image authentication with sensitive
tamper localization in the wavelet domain. Measurement 2013;46(1):36773.
[11] Al-Otum HM. Semi-fragile watermarking for grayscale image authentication
and tamper detection based on an adjusted expanded-bit multiscale
quantization-based technique. J Visual Commun Image Represent 2014;25
(5):106481.
[12] Wong PW, Memon N. Secret and public key image watermarking schemes for
image authentication and ownership verification. IEEE Trans Image Process
2001;10(10):1593601.
[13] Maeno K, Sun Q, Suto M. New semi-fragile image authentication watermarking
techniques using random bias and nonuniform quantization. IEEE Trans
Multimedia 2006;8(1):3245.
[14] Lee TY, Lin SFD. Dual watermark for image tamper detection and recovery.
Pattern Recognit 2008;41(11):3497506.
[15] Chan CS. An image authentication method by applying Hamming code on
rearranged bits. Pattern Recognit Lett 2011;32(14):167990.
[16] Chuang JC, Hu YC. An adaptive image authentication scheme for vector
quantization compressed image. J Visual Commun Image Represent 2011;22
(5):4409.
[17] Zhang XP, Wang SZ. Statistical fragile watermarking capable of locating
individual tampered pixels. IEEE Signal Process Lett 2007;14(10):72730.
[18] Nguyen TS, Chang CC, Chung TF. A tamper-detection scheme for BTCcompressed images with high-quality images. KSII Trans Internet Inf Syst
2014;8(6):200521.
[19] Hu YC, Chen WL, Lo CC, Wu CM. A novel tamper detection scheme for BTC
compressed images. Opto-Electron Rev 2013;21(1):13746.
[20] Hu YC, Lo CC, Chen WL, Wen CH. Joint image coding and image authentication
based on absolute moment block truncation coding. J Electron Image 2013;22
(1):112.
[21] Qin C, Chang CC, Chen KN. Adaptive self-recovery for tampered images based
on VQ indexing and inpainting. Signal Process 2013;93:93346.
[22] Zhang X, Qian Z, Ren Y, Feng G. Watermarking with flexible self-recovery
quality based on compressive sensing and compositive reconstruction. IEEE
Trans Inf Forensics Secur 2011;6(4):122332.
[23] Lo CC, Hu YC. A novel reversible image authentication scheme for digital
images. Signal Process 2014;98:17485.
[24] Tian J. Reversible data embedding using different expansion. IEEE Trans
Circuits Syst Video Technol 2003;13(8):8906.
[25] Chang CC, Nguyen TS, Lin CC. A reversible compression code hiding using SOC
and SMVQ indices. Inf Sci 2015;300:8599.
[26] Ni Z, Shi YQ, Ansari N, Su W. Reversible data hiding. IEEE Trans Circuits Syst
Video Technol 2006;16(3):35462.
[27] Caoa F, Huanga HK, Zhoub XQ. Medical image security in a HIPAA mandated
PACS environment. 4650 Sunset Boulevard Mailstop 81,Los Angeles, CA 90027,
USA: Department of Radiology, Childrens Hospital of Los Angeles, University of
Southern California; 2002.