An Efficient Vector Quantization Based Watermarking Method for Image Integrity Authentication
This paper presents a two-stage watermarking technique for image authentication adapting advantages of vector quantization (VQ). In the present algorithm robust watermark and semifragile watermark are embedded independently in VQ compressed image in two s
- PDF / 407,329 Bytes
- 11 Pages / 439.37 x 666.142 pts Page_size
- 72 Downloads / 294 Views
Abstract This paper presents a two-stage watermarking technique for image authentication adapting advantages of vector quantization (VQ). In the present algorithm robust watermark and semifragile watermark are embedded independently in VQ compressed image in two successive stages. Robust watermark and VQ enhances the security of the system by providing double protection to designed system. A quantitative threshold approach using pixel surrounding error pixel is suggested for identification of attacks as acceptable or malicious. Experimental results demonstrate the capabilities of the method in classifying attacks and correctly locating tamper location. It is possible to detect and determine tamper with very high sensitivity. Present scheme outperforms previous algorithms and can distinguish malicious tampering from acceptable changes, and tampered regions are localized accurately.
⋅
⋅
⋅
Keywords Image authentication Vector quantization Watermarking Semi-fragile watermarking Attack classification Tamper detection Tamper localization
⋅
⋅
⋅
1 Introduction Digital images play a significant role in almost all practical applications like military, medical, and broadcasting images. It is very easy to modify or manipulate digital images with advanced image editing software. Therefore, image authentication has therefore become a significant research topic. As per the recent study, digital watermarking [1, 2, 4, 6, 14, 17] is considered as the most suitable technique A. Tiwari (✉) Chhatrapati Shivaji Institute of Technology, Durg, India e-mail: [email protected] M. Sharma Bhilai Institute of Technology, Durg, India e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2018 P.K. Sa et al. (eds.), Progress in Intelligent Computing Techniques: Theory, Practice, and Applications, Advances in Intelligent Systems and Computing 519, DOI 10.1007/978-981-10-3376-6_24
215
216
A. Tiwari and M. Sharma
for image authentication. Semi-fragile watermark is robust to changes which preserve contents of the image, while fragile to content altering modifications such as addition or deletion of an object, so it is suitable to for practical applications [5]. Vector quantization (VQ) [2, 3, 8], is broadly accepted in image compression applications [7, 9, 10, 13, 19] due to its high compression ratio and is very simple to decode [15]. VQ is an effective method in digital watermarking too. Various VQ techniques are recommended by researchers in past a decade for image watermarking [12, 14, 16, 18]; with the objective of image authentication. However, most of them are having poor visual quality issues and are not able to present quantitative methods for attacks identification. The concept of image watermarking using vector quantization technique was pioneered by [10]. Later modification of the paper was suggested in [11]. In [16] an image authentication algorithm fragile watermarking technique was proposed in the year 2016 [16], this method cannot tolerate any content preserving attacks due to fragile nature of the al
Data Loading...