Authentication Algorithm for Color Images using Watermarking Techniques

Similar documents
Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Journal of mathematics and computer science 11 (2014),

Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.

Robust watermarking based on DWT SVD

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Jayalakshmi M., S. N. Merchant, Uday B. Desai SPANN Lab, Indian Institute of Technology, Bombay jlakshmi, merchant,

High capacity robust audio watermarking scheme based on DWT transform

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

Integer Wavelet Bit-Plane Complexity Segmentation Image Steganography

Direct Binary Search Based Algorithms for Image Hiding

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Image Quality Estimation of Tree Based DWT Digital Watermarks

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

A Survey of Substantial Digital Image Watermarking Techniques

An Implementation of LSB Steganography Using DWT Technique

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

FPGA implementation of DWT for Audio Watermarking Application

IJESRT: 7(10), October, 2018 ISSN:

ENEE408G Multimedia Signal Processing

A Modified Image Coder using HVS Characteristics

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

PRIOR IMAGE JPEG-COMPRESSION DETECTION

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

Tampering Detection Algorithms: A Comparative Study

Digital Watermarking Using Homogeneity in Image

GNE College, Ludhiana, Punjab, India

ARTICLE IN PRESS. Signal Processing

FPGA implementation of LSB Steganography method

SPIHT Algorithm with Huffman Encoding for Image Compression and Quality Improvement over MIMO OFDM Channel

APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING

A NEW SEMI-FRAGILE WATERMARKING SCHEME FOR AUTHENTICATION AND TAMPER LOCALIZATION IN REMOTE SENSING IMAGES

An Efficient Data Security System Using Reserve Room Approach on Digital Images for Secret Sharing

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

MLP for Adaptive Postprocessing Block-Coded Images

2. REVIEW OF LITERATURE

Half-Tone Watermarking. Multimedia Security

An Enhanced Least Significant Bit Steganography Technique

A New Image Steganography Depending On Reference & LSB

Design and Testing of DWT based Image Fusion System using MATLAB Simulink

Color Image Compression using SPIHT Algorithm

Digital Image Watermarking

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

A Source and Channel-Coding Framework for Vector-Based Data Hiding in Video

Fragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang

A Blind EMD-based Audio Watermarking using Quantization

International Journal of Advance Research in Computer Science and Management Studies

Analysis on Color Filter Array Image Compression Methods

Module 6 STILL IMAGE COMPRESSION STANDARDS

An Improvement for Hiding Data in Audio Using Echo Modulation

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Assistant Lecturer Sama S. Samaan

Robust and Blind Spatial Watermarking in Digital Image

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

Efficient Image Compression Technique using JPEG2000 with Adaptive Threshold

An Enhanced Approach in Run Length Encoding Scheme (EARLE)

Image Forgery Detection Using Svm Classifier

Lossless Image Watermarking for HDR Images Using Tone Mapping

Lossless Huffman coding image compression implementation in spatial domain by using advanced enhancement techniques

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

Practical fingerprinting system for images

IMAGE COMPRESSION BASED ON BIORTHOGONAL WAVELET TRANSFORM

Introduction to Video Forgery Detection: Part I

Direction-Adaptive Partitioned Block Transform for Color Image Coding

Colored Digital Image Watermarking using the Wavelet Technique

Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique

A New Steganographic Method for Palette-Based Images

Image Compression Supported By Encryption Using Unitary Transform

STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION

Concealing Data for Secure Transmission and Storage

Robust Watermarking Scheme Using Phase Shift Keying Embedding

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

Commutative reversible data hiding and encryption

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Pattern Recognition 41 (2008) Contents lists available at ScienceDirect. Pattern Recognition

Information Hiding: Steganography & Steganalysis

Introduction to Audio Watermarking Schemes

Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography

Digital Image Processing

Comparative Analysis of Lossless Image Compression techniques SPHIT, JPEG-LS and Data Folding

Ch. Bhanuprakash 2 2 Asistant Professor, Mallareddy Engineering College, Hyderabad, A.P, INDIA. R.Jawaharlal 3, B.Sreenivas 4 3,4 Assocate Professor

Watermarking Still Images Using Parametrized Wavelet Systems

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Image compression using hybrid of DWT, DCT, DPCM and Huffman Coding Technique

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Coding and Analysis of Cracked Road Image Using Radon Transform and Turbo codes

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

The Application of Selective Image Compression Techniques

A Robust Nonlinear Filtering Approach to Inverse Halftoning

Comparing CSI and PCA in Amalgamation with JPEG for Spectral Image Compression

Transcription:

Auntication Algorithm for Color Images using Watermarking Techniques LUIS ROSALES-ROLDAN, CLARA CRUZ-RAMOS, MARIKO NAKANO-MIYATAKE and HECTOR PEREZ-MEANA Postgraduate Section, Mechanical Electrical Engineering School, National Polytechnic Institute. Av. Santa Ana No. 1000, San Francco Culhuacan, Coyoacán, C.P. 04430. MEXICO D.F. rrosalesr0600@ipn.mx, ccruzra@ipn.mx, mnakano@ipn.mx, hmperezm@ipn.mx. Abstract: - In th paper we present a watermarking algorithm for color image content auntication with localization and recovery capability of modified areas. We use a halftone image generated by Floyd- Steinberg kernel as an approximate version for luminance channel of host image and an encoded version of color information (chrominance channels). We adopt th halftone image an encoded chrominance channels as watermark sequences and embed it using quantization watermarking method into sub-band LL, HL and LH of Integer Wavelet Transform (IWT) of host image. Due to fact that watermark embedded into se sub-bands of IWT, proposed method robust to JPEG compression. Moreover, we employ a Multilayer Perceptron Neural Network (MLP) as inverse halftoning process to improve recovered image quality. Using extracted luminance channel, shape of modified area estimated by MLP. The experimental results demonstrate effectiveness of proposed scheme. Key-Words: - Image Auntication, Color Image, Halftone, IWT, Recovery Capability, Tamper Detection, NCD, Neural Network. 1 Introduction During last few years, we have seen a tremendous growth in technological advances creating new and better tools in areas such as informatics, electronic and telecommunications. These advances have a strong impact on people s life, for example it quite common to take pictures everywhere and every time using h/her cell phones with digital cameras. And also 3125 pictures per minute are uploaded to cloud to be share in any social network. However se digital pictures can be easily modified using computational drawing tools, such as Photoshop or GIM without causing any dtortion. Nowadays almost all digital images are color images and until now se color images have been treated as an extension of gray scale images, however due to that vulnerability and importance between color and luminance information are very different, color information must be treated in a different manner. Watermarking algorithms are generally used for content origin identification, copy protection, illegal copy tracking, fingerprinting and content access control, which are based eir on an additive, multiplicative or a quantization process. Although several methods have been proposed to watermark grey level images, only a few methods have been designed for color images. According to [1] color information can be add using htogram, frequency domain transform or spatial domain processing. The most common watermarking color image through a transform domain (DCT, DFT or DWT), witch embeds marking information into coefficients of transform. Some transform watermarking schemes based on Dcrete Wavelet Transform (DWT) have been proposed [2-6]. The main advantage of se schemes that it takes into account image charactertics, witch make it possible to embed more strongly a watermark sequence. The authors in [6] control imperceptibility and robustness of watermarked images using contextual entropies of host wavelet coefficients. The scheme proposed by [7] use a non-linear Supported Vector Machine (SVM) to exploits color stattics of a first-order and high-order wavelet stattics, simplifying detection of mark. However th approach applied independently to each color component. In th paper we present a colorwatermarking algorithm for image content auntication with localization and recovery capability of modified areas. We use a halftone image generated by Floyd-Steinberg kernel as an approximate version for luminance channel of host image and an encoded version of color information. We adopt th information as ISBN: 978-1-61804-179-1 78

The proposed aunticationn algorithm composed by three stages: self-embedding, auntication and recovery stage as shown in Fig.1. watermark sequences and embed it using quantization watermarking method into sub- band LL, HL and LH of Integer Wavelet Transform (IWT) of host image. Due to fact that watermark embedded into se sub- bands of IWT, proposed method robust to JPEG compression. Moreover, we employ a Multilayer Perceptron neural network (MLP) as inverse halftoning process to improve recovered image quality [8]. Using extracted luminance channel, shape of modified area estimated by MLP. The experimental results demonstrate effectiveness of proposed scheme. The rest of th paper organized as follows. Section 2 describes proposed algorithm and experimental results are presented in Section 3. Finally Section 4 concludes th work. 2 Proposed Watermarking-based Algorithms Fig.1 General scheme of proposed algorithm. 2.1 Self-embedding Stage The self-embedding stage has two different processes, first one watermark sequence generation and second one embedding process. In watermark sequence generation original color image converted from RGB into YCbCr color space, n luminance cannel (Y) down-sampled with half size in height and width to generate watermark sequence. Then we applied error diffusion halftoning method proposed by Floyd-Steinberg to down-sampled image to get halftone image. The halftone image permuted by chaotic mixing method [9] using user s secret key, creating luminance watermark sequence (HTY). On or hand, chrominance cannels Cb and Cr are down-sampled with half size in height and width twice to obtain two new chrominance channels (Cb 2 and Cr 2 ), se chrominance are segmented into 8x8 pixels blocks, which are transformed by using 2D-iDCT with a quantization matrix with compression factor Q=50. Form each of se blocks; DC and first two AC values are coding using 7 bits and 8 bits, respectively. Finally a parity bit added to create a sequence of 16 bits for each 8x8 pixels block. Creating two color watermarks, BinQCb and BinQCr, respectively. Transformation Process Fig.2 Watermarks generation. In embedding process, color original image converted from RGB to YCbCr color space, n luminance channel (Y) decomposed using IWT to obtain four sub-bands: LL,, LH, HL and HH. The HTY watermark sequence embedded into sub-band LL using quantization watermarking method. On or hand sub- band LH and HL are decomposed using IWT twice to obtain LL2 and LL4 respectively. The BinQCb and BinQCr watermark sequences are embedded into sub-band LL2 and LL4 using same quantization watermarking method, respectively. The quantization embedding formula used for algorithm given by: %c = v 1 if c v 1 c v 2 w k = %c = v 2 orwe where sign c ( i, j ) c 2S 2S, w k = 0 v 1 = sign ( c i, j ) c 2S 2S+ S, w k =1 v 2 = v 1 + sign c ) 2S v 2 ( (1) (2) and w k k-th watermark bit, c and %c ar i, j i, j re original and watermarked IWT coefficients, respectively, and S quantization step size. Finally we obtained watermarked image applying inverse IWT to watermarked sub-bands LL2, LL4 and LL. Th stage shown in Figure 3. ISBN: 978-1-61804-179-1 79

Fig.3 Watermark embedding. 2.2 Auntication Stage In auntication stage (see Fig.4) firstly suspicious color image converted form RGB to YCbCr color space and watermark extracted for sub-bands LL, LL2 and LL4 of luminance channel (Y) from suspicious color image converted, n, extracted bits from LL are reorderedd using user s secret key given in embedding stage. The watermark extraction process given by: image converted are encoded as watermark generation, n, ir are decoded using inverse 2D-iDCT and matrix quantizationn Q for each 8x8 block. Creating suspicious preprocessed image (SPI). In th stage, an accurate detection of modified areas important; reforee high quality of gray-scale image not necessary. Then both images (EWI and SPI) are compared each or to localize modified areas. To do th we employed a block-we strategy, in which comparon carried out in each block of NxN pixels and normalized color difference (NCD) of each block calculated by (5) and it compared with a predetermined threshold value Th. w ~ k 0 = 1 ) c if round ) if ro c und = even S = oddd S (3) Next we generatee a halftone image from luminance channel (Y) of suspicious watermarked color image converted and it re- converted in a gray-scale image using same Gaussian low-pass filter. Th inverse halftoning simplest method, even though it produces low quality gray-scale image. The or two channels (Cb and Cr) form suspicious watermarked color where %w k extracted watermark bit, and c ) i, j IWT coefficient of sub-bands LL, LL2 and LL4 of watermarked and possibly modified color image. S same quantization step size used in embedding stage. The reordered watermark sequence extracted from LL sub-band halftone version of luminance channel of original color image and n it converted to gray scale image using a Gaussian low-pass filter given by (4). To recover color information embedded into suspicious color image watermark sequences extracted from LL2 and LL4 sub- bands are decoded using inversee 2D-iDCT and matrix quantizationn Q for each 8x8 block. Creating extracted watermark image (EWI). 0.1628 0.3215 1 0.3215 0.6352 F G = 0.4035 0.7970 11.566 0.3215 0.6352 0.1628 0.3215 0.4035 0.3215 0.1628 0.7970 0.6352 0.3215 1 0.79700 0.4035 0.7970 0.6352 0.3215 0.4035 0.3215 0.1628 (4) Fig.4 Auntication stage. Extracted watermark image (EWI) creation, Suspicious preprocessed image (SPI). D k = NCD ( EWI, SPI ); k = 1,2,3,..., TB (5) where TB total of block of NxN pixels. 2.3 Recovery Stage If auntication stage shows that some blocks of suspicious color image are tampered, n recovery stage will be triggered. In th stage we will use as input data, down-sample ed suspicious watermarked image, its halftone version, information about modified blocks and extracted halftone image ( signal HT in Fig.4). Also or two extracted watermarks from de sub- band HL and LH. (signalss Cb1 and Cr1 in Fig.4). According to [8], in th stage we firstly use down-sampled luminance channel (Y) of suspicious image and its halftone version to train MLP by Backpropagation (BP) algorithm. Th recovery stage shown in Fig.5 and MLP used to estimate gray-scale image shown in Fig.6. ISBN: 978-1-61804-179-1 80

Fig.5 Recovery process. 3 Experimental Results In th section performance of proposed algorithm, evaluated from several points of view, such as watermark imperceptibility, watermark robustness against JPEG compression, tamper detection accuracy and recovery capability. The watermark imperceptibility and robustness of proposed algorithm are strongly depends on step size value S used in watermark embedding and extraction algorithms given by (2) y (3), respectively. After an analys of image quality and watermark robustness was determinedd value of Step-Size, which 7. 3.1 Watermark Imperceptibility The watermark imperceptibility of proposed algorithm evaluated using 25 color images. Table 1 shows Peak Signal to Noe Ratio (PSNR) and Normalized Color Difference (NCD) of 25 watermarked color images respect to ir original versions. Fig.6 MLP used to estimate gray-scale image. The 4x4 neighborhood template, show in bottom-left part of Fig.6, composed of 16 binary pixels including center pixel X, used to get an input pattern of MLP. The outputt data a gray- scale estimated value of corresponded center pixel X. The extracted halftone image of modified area introduced to th MLP to get a better quality of recovered region. In general case of inversee halftoning, gray-scale image not available, refore MLP-based inverse halftoning in meaningless, however in th case non-modified area of suspicious gray-scale image available. So we can use halftone and corresponded gray-scale image of th non-modified area to generate a high quality image using MLP-based inverse halftoning. Fig.7 shows a comparon between images obtained using Gaussian low-pass filter and MLP. Table 1. Watermark imperceptibility of proposed algorithm. Paso de Cuantización PSNR NCD 5 37.5280 0.0227 6 36.0530 0.0287 7 34.8731 0.0308 8 33.7995 0.0347 9 32.7661 0.0396 10 31.8314 0.0494 (c) Fig.7 Image quality comparon. Original color mage, color image by Gaussian low-pass filter (19.62dB), (c) color image by MLP (20.75dB).. (c) (d) Fig.8 Watermark imperceptibility. (a, b) Original color images, (c, d) Watermarked color images. ISBN: 978-1-61804-179-1 81

Two original color images and ir watermarked color images generated by proposed algorithms are given in Fig.7. From Fig.8, PSNR and NCD values in table, witch approximately 35 db and 0.03, respectively; we can conclude that proposed algorithm provides high imperceptibility of watermark sequences. PSNR and NCD values of watermarked color images 35.04 and 35.15 db, 0.0262 and 0.0241, respectively. 3.2 Watermark Robustness The main attack that not modified content of a color image JPEG compression. JPEG most common image format used by digital cameras and or image capture devices, reducing size of image files. The watermark robustness against JPEG compression of proposed algorithm evaluated varying JPEG quality factor. Table 2 shows relationship between PSNR and NCD of extracted watermark color image after JPEG compression and marked one. P S N R N C D Table 2. Watermark robustness against JPEG compression. JPEG Quality Factor Step 80 90 100 Size 5 9.8872 14.4350 22.4565 6 11.1746 16.0178 22.3495 7 12.4100 19.0537 22.3305 8 13.0906 19.7280 22.2543 9 14.6977 21.3703 22.1448 10 15.5182 21.6217 22.0306 5 0.9324 0.5364 0.1444 6 0.7802 0.4431 0.1473 7 0.6941 0.2871 0.1461 8 0.6292 0.2537 0.1470 9 0.5304 0.1815 0.1482 10 0.4758 0.1708 0.1523 According to previous tests, compression with quality factor 100% enough for a color image, because generated color image 75% smaller than original one. The Fig.9 shows an example of watermark color image extracted after JPEG compression with quality factor 100%, PSNR 23.72 db and NCD 0.1086. Fig.9 Watermark robustness. Watermarked color image, watermarked color image extracted after JPEG compression 100%. 3.3 Tamper Detection and Recovery Capability In proposed algorithm, tamper detection performed by (5). The NCD value D k calculated in each block with N N pixels and n compared with a predefined threshold value Th to determine if block tampered or not. The block size N N set to 8 8, and threshold value Th determined taking account of false alarm and false negative error rates. (c) (d) Fig.10 Watermarked color image, tampered version (3.81%), tampered image with detected tampered blocks shown by (c), and (d) show recovered image (25.11 db). Although using an adequate threshold value Th determined as mentioned above, many olated blocks are detected as tampered one, however an olated block with size 8 8 pixels vually insignificant, and n using connected ISBN: 978-1-61804-179-1 82

component labeling algorithm [10], olated blocks are eliminated, however if false alarm error present, recovered area will be same with lower quality. An example of tamper detection and recovery process of proposed algorithm shown in Fig.10. 4 Conclusions In th paper we proposed a color watermarking-based algorithm for tamper detection and recovery, where, watermark embedding carried out in Integer Wavelet Transform domain. In th algorithm, a halftone image and a coded version of color information are used for tamper detection and recovery of tampered region, which ones are embedded into image as watermark sequences using qualification watermarking algorithm. The proposed algorithm was evaluated from watermark imperceptibility and robustness. The average PSNR and NCD of several watermarked color images respect to ir original versions using an adequate step size value indicates that embedded watermark imperceptible by Human Vual System. Also simulation results showed that embedded watermark robust to JPEG compression with a quality factor larger than 80%. The use of MLP trained by BP algorithm increases quality of recovered image and simulation results showed that proposed method can detect and recover correctly modified areas. [6] Ming-Shing Hsieh, & Din-Chang Tseng. Wavelet-based Color Image Watermarking using Adaptive Entropy Casting. 2006 IEEE International Conference on Multimedia and Expo, 2006, pp. 1593-1596. [7] Lyu, S., & Farid, H. Steganalys using color wavelet stattics and one-class support vector machines. Security, stenography, and watermarking of multimedia contents, Vol. 5306, 2004, pp. 35-45. SPIE. [8] Lu Rosales-Roldan, Manuel Cedillo- Hernandez, Mariko Nakano-Miyatake, Hector Pérez-Meana, Brian Kurkoski, Watermarking-based image auntication with recovery capability using halftone technique, Signal Processing: Image Communication, Vol. 20, No. 1, 2013, pp. 69-83. [9] M. Mese, P. Vaidyanathan, Recent advances in digital halftoning and inverse halftoning methods, IEEE Trans. on Circuits and Systems-I, Vol. 49, No. 6, 2002, pp. 790-805. [10] R. C. Gonzales, R. E. Woods, Digital Image Processing, Addon-Wesley Publhing Company, 3 rd edition, Reading, (2006). References [1] G. Chareyron, J. Da Rugna, A. Trémeau. Color in image watermarking, Advanced Techniques in Multimedia Watermarking: Image, Video and Audio Applications. IGI Global, 2010. [2] Barni, M., Bartolini, F., Cappellini, V., Lippi, A., & Piva, A. DWT-based technique for spatiofrequency masking of digital signatures. Security and Watermarking of Multimedia Contents, Vol. 3657, 1999, pp. 31-39. SPIE. [3] Chae, J., Mukherjee, D., & Manjunath, B. Color image embedding using multidimensional lattice structures. International Conference on Image Processing, Vol. 1, 1998, pp. 460-464. [4] Elbasi, E., & Eskicioglu, A. A Semi-Blind Watermarking Scheme for Color Images Using a Tree Structure. Western New York Image Processing Workshop, 2006, pp. 1-8. [5] Liu, T., & Zheng-ding Qiu. A DWT-based color image steganography scheme. 2002 6th International Conference on Signal Processing,, Vol. 2, 2002, pp. 1568-1571. ISBN: 978-1-61804-179-1 83