Local Content Based Image Authentication for Tamper Localization

Full Text (PDF, 1184KB), PP.30-36

Views: 0 Downloads: 0

Author(s)

L. Sumalatha 1,* V. Venkata Krishna 2 V.Vijayakumar 3

1. Department of Computer Science and Engineering, University College of Engineering Jawaharlal Nehru Technological University Kakinada

2. Department of Computer Science and Engineering, Chaitanya Institute of Science and Technology Rajahmundry, AP, India.

3. Srinivasa Ramanujan Research Forum (SRRF) Godavari Institute of Engineering and Technology Rajahmundry, A.P. India

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2012.09.05

Received: 13 Apr. 2012 / Revised: 4 Jul. 2012 / Accepted: 16 Aug. 2012 / Published: 8 Sep. 2012

Index Terms

Image authentication, Simple hash, Tamper Localization

Abstract

Digital images make up a large component in the multimedia information. Hence Image authentication has attained a great importance and lead to the development of several image authentication algorithms. This paper proposes a block based watermarking scheme for image authentication based on the edge information extracted from each block. A signature is calculated from each edge block of the image using simple hash function and inserted in the same block. The proposed local edge based content hash (LECH) scheme extracts the original image without any distortion from the marked image after the hidden data have been extracted. It can also detect and localize tampered areas of the watermarked image. Experimental results demonstrate the validity of the proposed scheme.

Cite This Paper

L. Sumalatha,V. Venkata Krishna,V. Vijaya Kumar,"Local Content Based Image Authentication for Tamper Localization ", IJIGSP, vol.4, no.9, pp.30-36, 2012. DOI: 10.5815/ijigsp.2012.09.05

Reference

[1]D.C. Lou, J.L. Liu.Fault resilient and compression tolerant digital signature for image authentication. IEEE Transactions on Consumer Electronics 2000, 46 (1): 31–39.

[2]L. Xie, G.R. Arce, R.F. Graveman. Approximate image message authentication codes, IEEE Transactions on Multimedia, 2001, 3 (2) : 242–252.

[3]P.Y. Tsai, Y.C. Hu, C.C. Chang, A novel image authentication scheme based on quadtree segmentation, Imaging Science Journal 2005, 53 (3):149–162. 

[4]C.S. Chan, C.C. Chang, An efficient image authentication method based on Hamming code, Pattern Recognition 2007,40: 681–691.

[5]S.Walton. Information Authentication for a slippery new age. Dr.Dobbs J. 1995. 20(4):18-26.

[6]P.W. Wong, N. Memon. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 2001, 10 (10): 1593–1601. 

[7]W.N. Lie, G.S. Lin, S.L. Chen.Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques. IEEE Transactions on Information Forensics and Security 2006, 1 (3): 330–341.

[8]T.Y. Lee, S.D. Lin. Dual watermark for image tamper detection and recovery. Pattern Recognition 2008, 41 (11) : 3497–3506.

[9]J.C. Patra, J.E. Phua, C. Bornand, A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digital Signal Processing ,2010, 20 (6): 1597–1611.

[10]F. Ahmed, NM.Y. Siyal. A secure and robust hash-based scheme for image authentication. Signal Processing , 2010, 90 (5): 1456–1470.

[11]John N. Ellinas, Dimitrios E. Manolakis. A Robust Wavelet-based Watermarking Algorithm Using Edge Detection. Proceedings of World Academy of Science, Engineering and Technology. 2007, 25: 438-443. 

[12]S.S. Bedi, G. S. Tomar, Shekhar Verma. Robust Watermarking of Image in the Transform Domain using Edge Detection, IEEE UKSim 2009: 11th International Conference on Computer Modelling and Simulation,2009

[13]Wei Lu, Hongtao Lu, Fu-Lai Chung. Feature based robust watermarking using image normalization. Computers and Electrical Engineering 2010, 36: 2–18

[14]Jeremy Thurgood, Roger Peplow. A Digital Watermarking Algorithm for Authentication and Tamper Detection. Proceedings, Prasa 2005, 05-09

[15]Sujoy Roy, Qibin Sun. Robust hash for detecting and localizing image tampering. Proc. IEEE International Conference on Image Processing, Sep 2007.

[16]P.W. Wong. A public key watermark for image verification and authentication, Proceedings of ICIP, Chicago. 1998: 425-429.

[17]Chin-Chen Chang , Yih-Shin Hu, Tzu-Chuen Lu. A watermarking-based image ownership and tampering authentication scheme. Pattern Recognition Letters , 2006, 27: 439–446

[18]ISOiIEC JTC 29/WG1 FCD 14495 public draft, 1997. JPEG-LS: Lossless and Nearlossless Coding of Continuous-Tone Still Images.

[19]Xian-TingZeng ,Ling-DiPing , Xue-ZengPan. A lossless robust data hiding scheme, Pattern Recognition 43 (2010) 1656–1667

[20]Z.C. Ni, Y.Q. Shi, N. Ansari, W. Su, Q.B. Sun, X. Lin. Robust lossless image data hiding designed for semi-fragile image authentication, IEEE Transactions on Circuits and Systems for Video Technology 18 (4) (2008) 497–509.

[21]Xinpeng Zhang, Shuozhong Wang. Fragile watermarking scheme using a hierarchical mechanism. Signal Processing, Apr. 2009, 89(4):675–679. 

[22]Phen Lan Lin, Chung-Kai Hsieh, Po-Whei Huang. A hierarchical digital watermarking method for image tamper detection and recovery, Pattern Recognition 38 (2005) 2519 – 2529.