Application of Binary Image Authentication Algorithm in Digital Watermarking

A novel fragile watermarking scheme is proposed using a hierarchical mechanism, in which the embedded watermark data are derived both from pixels and blocks. On the receiver side, one can first identify the blocks containing the tampered content, and then

  • PDF / 426,944 Bytes
  • 8 Pages / 439.37 x 666.142 pts Page_size
  • 8 Downloads / 212 Views

DOWNLOAD

REPORT


Application of Binary Image Authentication Algorithm in Digital Watermarking Wang Chunxian and Li Huishan

Abstract A novel fragile watermarking scheme is proposed using a hierarchical mechanism, in which the embedded watermark data are derived both from pixels and blocks. On the receiver side, one can first identify the blocks containing the tampered content, and then use the watermark hidden in the rest blocks to exactly locate the tampered pixels. By combining the advantages of both block-wise and pixel-wise techniques, the proposed scheme is capable of finding the detailed tampered positions even if the modified area is more extensive. Moreover, after localizing the tampered-pixel, the original watermarked version can be perfectly restored using. Experimental results show that the watermark can be blindly extracted, the proposed method can detect any modification to the watermarked image, and verify the ownership while the watermarked image is not manipulated. Keywords Digital watermarking Pixel spread deviation

 Image authentication  Chaos encryption 

95.1 Introduction Rapid development and extensive use of computer network technique, communication technique and multimedia technique, especially the rocketing development of Internet, have made the security and protection of network information be a W. Chunxian (&) Engineering Teach Practice Training Center, Tianjin Polytechnic University, Tianjin 300160, China e-mail: [email protected] L. Huishan Department of Auto Engineering Military Traffic Academy, Tianjin 300161, China e-mail: [email protected]

W. Lu et al. (eds.), Proceedings of the 2012 International Conference on Information Technology and Software Engineering, Lecture Notes in Electrical Engineering 212, DOI: 10.1007/978-3-642-34531-9_95, Ó Springer-Verlag Berlin Heidelberg 2013

887

888

W. Chunxian and L. Huishan

problem, which needs to be urgently resolved. The information hiding technique used as the main method for copyright protection and covert communication has been focused on the international information security field. Clear focus on protecting the fidelity, integrity and security of digital content, digital watermarking [1]as an effective scheme can be used in the modern electronically-driven world, especially suitable for fragile watermarking authentication of digital products [2], proof tamper and integrity of the content has aroused great attention. The fragile watermark is one of the watermarking methods for authentication that has a low robustness toward modifications where even small changes of the content will destroy embedded information. The grayscale or color maps have been used for the fragile digital watermark, in addition, leading watermarking technology providers developed solutions for other emerging applications, such as using watermarks in digital cinema implementations to help law enforcement determine which specific theater a camcorder copy came from. In this paper, the pixels in binary image are divided into two categories, one is the flippable pixels and anot