8
A Robust Watermarking Algorithm for Image Authentication M.V.S.S.BABU + Dept of Electronics and Communication Engineering, Karunya University Abstract. The algorithm of discrete wavelet transform and Hankel transform combined is developed to achieve the integrity authentication of color image contents through embedding watermarking. Firstly, a new watermarking image is generated with the XOR between the original binary watermarking and the image which is processed with Hankel transform. When the watermark is embedded, the original image color is converted first and the brightness component is decomposed into three discrete wavelets. Then, the low frequency approximation sub-image of third-level is extracted, and its least significant bit is set 0. Finally, the new watermark is embedded into its least significant bit. Through comparing the pixels of original watermarking image with that of the extracted watermarking image, it can be determined whether the watermarking image has been tampered, and the tampered area of the original color image is located. The results of simulation experiment shows that the algorithm has the strong capabilities of detection and location and it also can keep the original image quality well. Keywords: wavelet transform, hankel transform, digital image watermarking, image authentication. 1. Introduction 1.1. Overview In the last few years, fragile watermarking has been widely used to authentication and content integrity verification. The technique modify the host image in order to insert the pattern but the permanent embedding distortion is intolerable for the applications that requires high quality images such as medical and military images. The most adequate solution for this problem is robust watermarking algorithm. The robust watermarking not only provides authentication and tamper proofing but also can recover the original image from the suspected image. After the verification process if the transmitted image is deemed to be authentic the doctor reconstitutes the original image and uses it in its diagnosis avoiding all risk of modification. An intriguing feature of the robust watermark embedding is the reversibility, that is one can remove the embedded image to restore the original image. From the information hiding point of view, the robust image embedding hides some information in the digital image in such a way that an authorized party could decode the hidden information and also restore the image to its original state. 1.2. Hankel matrix The Hankel matrix H of the integer sequence {a,b,c,d,………….} is the infinite matrix a b c d e ………………. b c d e f ……………….. c d e f g ……………… A= d e f g h ………………. . . . . . ……………… with elements {a,b,c,d……..}. + Corresponding author. Tel.: + 91-9789406090. E-mail address: [email protected]. 220 2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) © (2012) IACSIT Press, Singapore

A Robust Watermarking Algorithm for Image Authentication · The algorithm of discrete wavelet transform and Hankel transform combined is developed to achieve the integrity authentication

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: A Robust Watermarking Algorithm for Image Authentication · The algorithm of discrete wavelet transform and Hankel transform combined is developed to achieve the integrity authentication

A Robust Watermarking Algorithm for Image Authentication

M.V.S.S.BABU +

Dept of Electronics and Communication Engineering, Karunya University

Abstract. The algorithm of discrete wavelet transform and Hankel transform combined is developed to achieve the integrity authentication of color image contents through embedding watermarking. Firstly, a new watermarking image is generated with the XOR between the original binary watermarking and the image which is processed with Hankel transform. When the watermark is embedded, the original image color is converted first and the brightness component is decomposed into three discrete wavelets. Then, the low frequency approximation sub-image of third-level is extracted, and its least significant bit is set 0. Finally, the new watermark is embedded into its least significant bit. Through comparing the pixels of original watermarking image with that of the extracted watermarking image, it can be determined whether the watermarking image has been tampered, and the tampered area of the original color image is located. The results of simulation experiment shows that the algorithm has the strong capabilities of detection and location and it also can keep the original image quality well.

Keywords: wavelet transform, hankel transform, digital image watermarking, image authentication.

1. Introduction

1.1. Overview In the last few years, fragile watermarking has been widely used to authentication and content integrity

verification. The technique modify the host image in order to insert the pattern but the permanent embedding distortion is intolerable for the applications that requires high quality images such as medical and military images. The most adequate solution for this problem is robust watermarking algorithm. The robust watermarking not only provides authentication and tamper proofing but also can recover the original image from the suspected image. After the verification process if the transmitted image is deemed to be authentic the doctor reconstitutes the original image and uses it in its diagnosis avoiding all risk of modification. An intriguing feature of the robust watermark embedding is the reversibility, that is one can remove the embedded image to restore the original image. From the information hiding point of view, the robust image embedding hides some information in the digital image in such a way that an authorized party could decode the hidden information and also restore the image to its original state.

1.2. Hankel matrix The Hankel matrix H of the integer sequence {a,b,c,d,………….} is the infinite matrix a b c d e ………………. b c d e f ……………….. c d e f g ……………… A= d e f g h ………………. . . . . . ……………… with elements {a,b,c,d……..}.

+ Corresponding author. Tel.: + 91-9789406090. E-mail address: [email protected].

220

2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) © (2012) IACSIT Press, Singapore

Page 2: A Robust Watermarking Algorithm for Image Authentication · The algorithm of discrete wavelet transform and Hankel transform combined is developed to achieve the integrity authentication

If the i,jthe Toeplitzsee Hilbert

2. Water

2.1. DigiDigital

verify its auvisible idenor video, bumade easy tembedded ior other deshidden emb

A digitaquantizationto rejection

2.2. GenA digita

detected reldegradationtemporal mimperceptibIn general, and impercbeen proposin professio

2.3. RobA digita

watermarksclearly are watermark transformatwatermark iin copy prot

2.4. Perc

j element of z matrix (a Hmatrix.

rmarking

ital watermwatermarkinuthenticity o

ntification. Inut it cannot bto retrieve oin the digital scriptive info

bedded informal watermarkn. Quantizatiof host inter

neral requiral watermarkliably from thns are JPEG

modifications ble if the watit is easy toeptible watesed as tool fo

onal video co

bustness al watermark

s are commonnoticeable cis called seions. Semi-fis called robutection appli

ceptibility

f A is denotedHankel matri

g

marking ng is the procor the identitn invisible dibe perceived r, it may be signal. In ei

formation to mation as a mking methodion watermarrference.

rements k is called rohe marked sicompressionand MPEG

termarked co create robu

ermarks has or the protectontent.

k is called frnly used for commonly aremi-fragile ifragile watermust if it resisications to ca

d Ai,j, then wix is an upsi

cess of embety of its owngital watermas such. Thea form of st

ither case, asthe signal in

means of covd is said to brks suffer fro

Fig. 1: W

obust with resignal, even in; rotation, c

compressioontent is percust watermark

proven to btion of digita

fragile if it fatamper detecre not referrf it resists bmarks comm

sts a designatarry copy and

we have Ai,j

ide-down To

edding informners, in the

marking, infore watermark teganography in visible wn a way thatvert communbe of quantiom low robu

Watermarking P

spect to tranf degraded bcropping, adn often are ceptually equks -or- impee quite chalal content, fo

fails to be dection (integrred to as wabenign trans

monly are useted class of td no access c

= Ai-1,j+1.Theoeplitz matrix

mation into asame mannermation is admay be inte

y, where a pwatermarkingt is difficult nication betwization type ustness, but h

Procedure

sformations by any numbditive noise,added to thiuivalent to therceptible walenging. Rob

or example a

etectable afteity proof). M

atermarks, busformations, ed to detect transformatiocontrol inform

e Hankel max). For a spe

a digital signer as paper bdded as digitended for widarty commu

g, the objectivto remove. I

ween individuif the marke

have a high i

if the embeder of transfo, and quantizis list. A dighe original, uatermarks, bubust imperces an embedd

er the slighteModificationsut as general

but fails demalignant tr

ons. Robust wmation.

atrix is closeecial case of

nal which mabearing a watal data to audespread use

unicates a secve is to attacIt also is posuals. ed signal is information c

dded informaormations. Tyzation for vigital watermaun-watermarut the creatieptible waterded no-copy-

est modificats to an originlized barcodetection afteransformationwatermarks m

ely related tof this matrix

ay be used toatermark forudio, picture,e and thus, iscret messagech ownershipssible to use

obtained bycapacity due

ation may beypical imagedeo content,ark is calledrked content.on of robustrmarks haveallowed flag

tion. Fragilenal work thatdes A digitaler malignantns. A digitalmay be used

o x

o r , s e p e

y e

e e ,

d . t e g

e t l t l d

221

Page 3: A Robust Watermarking Algorithm for Image Authentication · The algorithm of discrete wavelet transform and Hankel transform combined is developed to achieve the integrity authentication

A digital watermark is called imperceptible if the original cover signal and the marked signal are (close to) perceptually indistinguishable. A digital Watermark is called perceptible if its presence in the marked signal is noticeable, but non-intrusive.

2.5. Capacity The length of the embedded message determines two different main classes of digital watermarking

schemes: The message is conceptually zero-bit long and the system is designed in order to detect the presence or the absence of the watermark in the marked object. This kind of watermarking scheme is usually referred to as zero-bit or presence watermarking schemes. Sometimes, this type of watermarking scheme is called 1-bit watermark, because a 1 denotes the presence (and a 0 the absence) of a watermark.

2.6. Blind Some of the conventional watermarking schemes require the help of an original image to retrieve the

embedded watermark. However, the reversible watermarking can recover the original image from the watermarked image directly. Therefore, the reversible watermarking is blind, which means the retrieval process doesn’t need the original image.

2.7. Higher embedding capacity The capable size of embedding information is defined as the embedding capacity. Due to the reversible

watermarking schemes having to embed the recovery information and watermark information into the original image, the required embedding capacity of the reversible watermarking schemes is much more than the conventional watermarking schemes.

The embedding capacity should not be extremely low to affect the accuracy of the retrieved watermark and the recovered image. The procedure of conventional and reversible watermarking schemes can be illustrated by using the flowcharts in the above figure. The steps of conventional watermarking and reversible watermarking are similar except there is an additional function to recover the original image from the suspected image. Therefore, the robust watermarking is especially suitable for the applications that require high quality images such as medical and military images. In addition, there are two research fields often connected with digital watermarking: data hiding and image authentication.

The purpose of data hiding is using the cover image to conceal and transmit the secret information. And the purpose of image authentication is to verify the received image whether it be tampered or not. In order to achieve the goals, the data hiding scheme should have a large embedding capacity to carry more secret information, and it has to be imperceptible to keep the secret undetectable. The image authentication schemes also require embedding some information into the protected image, and also has to keep the imperceptibility between the preprocess image and processed image. As in the definition, the goals of the robust watermarking are to protect the copyrights and can recover the original image.

The robustness, imperceptibility, high embedding capacity, high embedding capacity, readily embedding and retrieving, and blind are the basic criterions of the reversible watermarking. A reversible data hiding scheme and a reversible image authentication scheme can be also defined as the schemes which can recover the original image from the embedded image.

3. Multi-Level Decomposition of Wavelet and Hankle Transform Based Data Hiding

3.1. Multi-Level decomposition For the information hiding algorithms (such as DFT, DCT, DWT, and so on), the secret information may

be extracted by applying the exhaustive algorithm to the information intercepted when these information hiding algorithms are used to conceal the information merely. However, if the secret information is scrambled through the algorithm before it is concealed, it will become disorderly and unsystematic.

Then, when it is embedded into the information carriers, the information will be transmitted more safely. In this case, the secret information will not be identified even if it is extracted, and it will be regarded as that the extracting algorithm is wrong or the information carriers contain nothing.

222

Page 4: A Robust Watermarking Algorithm for Image Authentication · The algorithm of discrete wavelet transform and Hankel transform combined is developed to achieve the integrity authentication

Fig. 2: Process of decomposing the digital image with wavelet transforms.

In Figure 2, the original image is decomposed into four sub-images, including one low frequency sub-image LL1 with quarter pixels and three high frequency sub-images with quarter pixels: HL1 details in the Vertical direction, LH1 details in the horizontal direction and HH1 details in the diagonal direction. When the approximate sub-image LL1 is decomposed again, four lower resolution sub-image images are obtained. If the lower resolution sub-image images are decomposed repeatedly, the wavelet decomposition of digital images can be reached. The main power is contained in the lowest frequency sub-image which includes the main characteristics.

The low frequency sub-images have the capability of resisting the noises, and the high frequency sub-images are easy to be affected by the noises and they are unstable relatively. For improving the speed and security of embedding the watermarking, three-stage discrete wavelet transform is applied and LL3 is selected to be disposed. Because the low frequency sub-images contains the main power of image discomposed, it can embody the invisibility of watermarking and reduce the effect of watermarking on the original image that embeds the watermarking into the least significant digit of the third wavelet transform.

4. Watermark Embedding

4.1. Embedding procedure The digital watermarking embedded process based on wavelet transform (DWT) is shown as Figure 3. Step 1: A binary watermarking image is scrambled through using the Hankel matrix for several times,

and the purpose is to make watermark disorderly with the times of scrambling as a key. Step 2: The original color image is under binarization process with better threshold value chosen. Step 3: A new watermarking image is generated through applying the XOR processing to the image

from Step 1 and Step 2. Step 4: Accordance to the RGB-YUV color space Conversion formula for original image color space

conversion, the color image is converted from the RGB color space to the YUV color space. Step 5: Apply the three discrete wavelet decomposition to the Y component (luminance component) of

the YUV color space, and the lowest effective low-frequency of the third-level wavelet transform is posited 0; Step 6: The new generated watermark is embedded into the least significant bit after Step 5 treatment. Step 7: Apply three discrete wavelet inverse transform. Step 8: Combine the new Y component (luminance component) with the UV components (color

components). Step 9: The image after the process of Step 8 is converted from the YUV to RGB, and a final image with

the watermark generated...

4.2. Extraction of the watermark The first stage of fragile digital watermarking extraction and detection is same, namely, the image

detection is transformed by three-stage discrete wavelet and then select the part of the third level on LL3. The difference is that the latter part, it is need to extract the LSB of the third level LL3 of the image to be detected, the threshold is used to treat a given color image detection to generate a binary image, and then the generated binary image XOR the extracted LSB image, generating a watermarking image, the watermark generate anti-replacement plan at last. The tamper localization of the fragile watermarking is completed. The process part of digital watermarking extraction and detection is shown in Figure 4.

223

Page 5: A Robust Watermarking Algorithm for Image Authentication · The algorithm of discrete wavelet transform and Hankel transform combined is developed to achieve the integrity authentication

5. Resul

5.1. A roA 512-b

Interpolatiomethod of dresized to 6

Fig

This secsown in the

Fig. 8: G Resize

Fig. 3: Flow

lts

obust waterby-512 colo

on technique determining h4-by-64.

g. 5: Original

cret image w following fi

Grayscale ed secret imag

wchart for emb

rmark embor Lena imag

is applied thigh resoluti

image

was again coigure.

Fig. 9: G

ge Hank

bedding

bedding usige is taken ato the input ion in an ima

Fig. 6:

nverted into

Generated kel matrix

ing hankel as the inputimage to fo

age from its l

: Resized orig

gray scale i

Fig. 10: Lo O

Fig. 4

transformt image. Thiorm the intelow resolutio

inal binary im

image and re

owest resolutio

Original image

4: Flowchart f

s image is cerpolated imaon counterpa

mage Fig

esized into 6

on Fig. E

for extraction

converted biage. Interpo

arts. Later tha

g. 7: Secret im

64-by-64 ima

. 11: watermarEmbedded im

inary image.lation is theat image was

mage

age it was as

rk mage

. e s

s

224

Page 6: A Robust Watermarking Algorithm for Image Authentication · The algorithm of discrete wavelet transform and Hankel transform combined is developed to achieve the integrity authentication

For this gray scale image the hankel transform was applied to generate a watermark image. It is as shown in fig 10 For the original image the Discrete Wavelet transform was applied and the low resolution position LL3 was selected for doing xor operation. The result of this operation gives a 64-by-64 image as shown below. Now the image was embedded with secret image that is the hankel transformed image. It also as shown in the fig 9.This Embedded low resolution image was resized to 512-by-512 image. Then it was converted into color image as shown in the figure 13.

Fig. 12: Resized Embedded grayscale image Fig. 13: Watermarked color image

5.2. Extraction of the image For extraction of the watermark first we select the color image. This image under goes the procedure of

conversation of the RGB into YUV color method. In parallel to this process the image under goes the process of Binarization. From YUV converted image the Y component was extracted a three level discrete wavelet transform applied. Then the image was converted in to 64-by-64 sized image.

Fig. 14: Extracted Y component Fig. 15: Extracted original image Fig. 16: Recovered color image

From this image the low level position that is LL3 position was extracted. This was XOR-ed with Binarization output. The output of the xor operation was under goes to anti-scrambling watermark procedure. Then the tempering location was found in the original image. Finally the original image extracted and tempered location was identified. The extracted image was of size 64-by-64.

5.3. Performance measurements Peak signal to noise ratio (PSNR). In the case of watermarking, PSNR indicates the quality of the

watermarked image. Higher the PSNR, higher will be the quality. Quality of the watermarked image should be higher to the quality. Quality of the watermarked image should be higher to make the secret data invisible to attackers.

PSNR can be calculated by the equation 10 log (1) Where MSE is the mean square error which can be calculated by,

MSE = l i, j l` i, j (2)

Where I is the input image and I` is the watermarked image. W and H indicate the width and height of image. This experiment was done by using some of the images and the MSE and the Quality are tabulated as shown in table 1.

6. Conclusion In this Paper the watermarking image is scrambled with Hankel transform before it is embedded. The

watermarking image formation, the carrier image are used for generating a new watermark, and then the watermark is embedded with Hankel matrix , which can effectively hide and protect the watermarking

225

Page 7: A Robust Watermarking Algorithm for Image Authentication · The algorithm of discrete wavelet transform and Hankel transform combined is developed to achieve the integrity authentication

information from the usual malicious attacks to common image . Thus, it becomes more difficult that the attackers extract the watermark. Even if the attack is not very strong, the watermark extraction can also play a good location performance.

Table. 1: Performance measurement comparison for different images

Image MSE Quality

Peacock 0.4181 51.9178

Indian Monkey

0.4145 51.9555

The Office Building

0.4205 51.8927

Elephant 0.4068 52.0370

7. Reference [1] Xinpeng Zhang. Fragile watermarking scheme using a hierarchical mechanism [J]. Signal Processing, School of

Communication and Information Engineering, 2009, 89: 675-679.

[2] Huiping Guo. A fragile watermarking scheme for detecting malicious modifications of database relations [J]. Information Sciences, 2006, 176: 1350-1378.

[3] A Fragile Watermarking Scheme for Image Authentication with Tamper Localization Using Integer Wavelet Transform [J]. P. MeenakshiDevi, Journal of Computer Science,2009, 5 : 831-837.

[4] A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Wei-Che Chen, Expert Systems with Applications, 2009,36:1300-1307.

[5] A Fragile Watermarking Scheme for Color Image Authentication[J]. M. Hamad Hassan,World Academy of Science,Engineering and Technology,2006,19:39-43.

[6] A New Public-key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform[J]. Chin-Chen Chang, International Journal of Signal Processing, Image Processing and Pattern , 2009,3:133-139.

[7] Fragile watermarking scheme using a hierarchical mechanism[J]. Xinpeng Zhang, Signal Processing ,2009, 89: 675-679.

[8] Fragile image watermarking using a gradient imagefor improved localization and security[J]. Shan Suthaharan, Pattern Recognition Letters ,2004, 25: 1893- 1903.

[9] A fragile watermarking scheme for detecting malicious modifications of database relations[J], Huiping Guo, Information Sciences ,2006, 176: 1350- 1378.

[10] A new semi-fragile image watermarking with robust tampering restoration using irregular sampling[J]. Xunzhan Zhu, Signal Processing: Image Communication, 2007, 22 :515-528.

[11] A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform[J]. Rafiullah Chamlawi, World Academy of Science,Engineering and Technology,2006,23:49-53

[12] C.Rey, J.Dugelay: A survey of watermarking algorithm for Image authentication. In: Journal on Applied Signal Processing, Vol.6, pp.613-621, 2002.

[13] C.I.Podilchuk, E.J.Delp: Digital watermarking: algorithms and applications. In: IEEE Signal Processing Magazine, pp. 33-46, July 2001.

[14] Arvind kumar Parthasarathy, Subhash Kak: An Improved Method of Content Based Image Watermarking. In: IEEE Transaction on broadcasting, Vol.53, no.2, June 2007, pp.468 -479.

[15] Ramana Reddy, Munaga V.N.Prasad, D.Sreenivasa Rao: Robust Digital Watermarking of Color Images under Noise Attacks. In: International Journal of Recent Trends in Engineering, Vol.1, No. 1, May 2009.

[16] Q.Ying and W.Ying, “A survey of wavelet-domain based digital image watermarking algorithm”, Computer Engineering and Applications, Vol.11, pp.46-49, 2004.

226

Page 8: A Robust Watermarking Algorithm for Image Authentication · The algorithm of discrete wavelet transform and Hankel transform combined is developed to achieve the integrity authentication

[17] Xiang-Gen Xia, Charles G.Boncelet, Gonzalo: Wavelet Transform based watermark for digital images. In: OPTICS EXPRESS, 1998 Vol.3, No.12, pp 497-511.

[18] Sanjeev Kumar, Balasubramanian Raman, Manoj Thakur: Real Coded Genetic Algorithm based Stereo image Watermarking. In: IJSDIA, 2009, Vol. 1 No.1 pp 23-33.

[19] Rafael C.Gonzalez, R.E.Woods, , Steven L. Eddins : Digital Image Processing Using MATLAB, India (2008)

[20] Hongmei Liu, Junhui Rao, Xinzhi Yao: Feature Based Watermarking Scheme for Image Authentication. In: IEEE, 2008, pp 229-232.

[21] J.Dittmann: Content-fragile Watermarking for Image Authentication. In: Proc. of SPIE, Security and Watermarking of Multimedia Contents III, vol.4314, pp.175-184, 2001.

[22] Yuan Yuan, Decai Huang, Duanyang Liu: An Integer Wavelet Based Multiple Logo-watermarking Scheme. In IEEE, Vol.2 pp.175-179, 2006.

[23] http://www.mathworks.com/access/helpdesk/help/techdoc/ref/hankel.html.

227