DOI QR코드

DOI QR Code

LBP and DWT Based Fragile Watermarking for Image Authentication

  • Wang, Chengyou (School of Mechanical, Electrical and Information Engineering, Shandong University) ;
  • Zhang, Heng (School of Mechanical, Electrical and Information Engineering, Shandong University) ;
  • Zhou, Xiao (School of Mechanical, Electrical and Information Engineering, Shandong University)
  • 투고 : 2017.02.14
  • 심사 : 2017.05.30
  • 발행 : 2018.06.30

초록

The discrete wavelet transform (DWT) has good multi-resolution decomposition characteristic and its low frequency component contains the basic information of an image. Based on this, a fragile watermarking using the local binary pattern (LBP) and DWT is proposed for image authentication. In this method, the LBP pattern of low frequency wavelet coefficients is adopted as a feature watermark, and it is inserted into the least significant bit (LSB) of the maximum pixel value in each block of host image. To guarantee the safety of the proposed algorithm, the logistic map is applied to encrypt the watermark. In addition, the locations of the maximum pixel values are stored in advance, which will be used to extract watermark on the receiving side. Due to the use of DWT, the watermarked image generated by the proposed scheme has high visual quality. Compared with other state-of-the-art watermarking methods, experimental results manifest that the proposed algorithm not only has lower watermark payloads, but also achieves good performance in tamper identification and localization for various attacks.

키워드

참고문헌

  1. G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, "Watermarking digital image and video data: A state-of-the-art overview," IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20-46, 2000. https://doi.org/10.1109/79.879337
  2. H. Nyeem, W. Boles, and C. Boyd, "Digital image watermarking: Its formal model, fundamental properties and possible attacks," EURASIP Journal on Advances in Signal Processing, vol. 2014, no. 1, pp. 1-22, 2014. https://doi.org/10.1186/1687-6180-2014-1
  3. T. Hai, C. M. Li, J. M. Zain, and A. N. Abdalla, "Robust image watermarking theories and techniques: A review," Journal of Applied Research and Technology, vol. 12, no. 1, pp. 122-138, 2014. https://doi.org/10.1016/S1665-6423(14)71612-8
  4. K. Sreenivas and V. K. Prasad, "Fragile watermarking schemes for image authentication: A survey," International Journal of Machine Learning and Cybernetics, pp. 1-26, 2017. https://doi.org/10.1007/s13042-017-0641-4
  5. S. Walton, "Information authentication for a slippery new age," Dr. Dobb's Journal, vol. 20, no. 4, pp. 18-26, 1995.
  6. S. H. Liu, H. X, Yao, W. Gao, and Y. L. Liu, "An image fragile watermark scheme based on chaotic image pattern and pixel-pairs," Applied Mathematics and Computation, vol. 185, no. 2, pp. 869-882, 2007. https://doi.org/10.1016/j.amc.2006.07.036
  7. S. Rawat and B. Raman, "A chaotic system based fragile watermarking scheme for image tamper detection," AEU - International Journal of Electronics and Communications, vol. 65, no. 10, pp. 840-847, 2011. https://doi.org/10.1016/j.aeue.2011.01.016
  8. L. Teng, X. Y. Wang, and X. K. Wang, "Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme," AEU - International Journal of Electronics and Communications, vol. 67, no. 6, pp. 540-547, 2013. https://doi.org/10.1016/j.aeue.2012.12.001
  9. W. Y. Zhang and F. Y. Shih, "Semi-fragile spatial watermarking based on local binary pattern operators," Optics Communications, vol. 284, no. 16-17, pp. 3904-3912, 2011. https://doi.org/10.1016/j.optcom.2011.04.004
  10. J. D. Chang, B. H. Chen, and C. S. Tsai, "LBP-based fragile watermarking scheme for image tamper detection and recovery," in Proceedings of the IEEE International Symposium on Next-Generation Electronics, Kaohsiung, Taiwan, 2013, pp. 173-176.
  11. O. Benrhouma, H. Hermassi, A. A. A. El-Latif, and S. Belghith, "Chaotic watermark for blind forgery detection in images," Multimedia Tools and Applications, vol. 75, no. 14, pp. 8695-8718, 2016. https://doi.org/10.1007/s11042-015-2786-z
  12. R. O. Preda, "Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain," Measurement, vol. 46, no. 1, pp. 367-373, 2013. https://doi.org/10.1016/j.measurement.2012.07.010
  13. T. Ojala, M. Pietikainen, and D. Harwood, "A comparative study of texture measures with classification based on feature distributions," Pattern Recognition, vol. 29, no. 1, pp. 51-59, 1996. https://doi.org/10.1016/0031-3203(95)00067-4
  14. Z. P. Dan, Y. F. Chen, Z. Yang, and G. Wu, "An improved local binary pattern for texture classification," Optik, vol. 125, no. 20, pp. 6320-6324, 2014. https://doi.org/10.1016/j.ijleo.2014.08.003
  15. B. Yang and S. C. Chen, "A comparative study on local binary pattern (LBP) based face recognition: LBP histogram versus LBP image," Neurocomputing, vol. 120, pp. 365-379, 2013. https://doi.org/10.1016/j.neucom.2012.10.032
  16. H. Shi, X. H. Wang, M. C. Li, J. Bai, and B. Feng, "Secure variable-capacity self-recovery watermarking scheme," Multimedia Tools and Applications, vol. 76, no. 5, pp. 6941-6972, 2017. https://doi.org/10.1007/s11042-016-3328-z
  17. G. Bhatnagar and B. Raman, "A new robust reference watermarking scheme based on DWT-SVD," Computer Standards and Interfaces, vol. 31, no. 5, pp. 1002-1013, 2009. https://doi.org/10.1016/j.csi.2008.09.031
  18. H. Zhang, C. Y. Wang, and X. Zhou, "Fragile watermarking for image authentication using the characteristic of SVD," Algorithms, vol. 10, no. 1, article no. 27, 2017.