CFP last date
20 May 2024
Reseach Article

Image Content Authentication based on Wavelet Edge Features

by L. Sumalatha, V. Venkata Krishna, A. Vinay Babu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 23
Year of Publication: 2012
Authors: L. Sumalatha, V. Venkata Krishna, A. Vinay Babu
10.5120/7944-1281

L. Sumalatha, V. Venkata Krishna, A. Vinay Babu . Image Content Authentication based on Wavelet Edge Features. International Journal of Computer Applications. 49, 23 ( July 2012), 24-29. DOI=10.5120/7944-1281

@article{ 10.5120/7944-1281,
author = { L. Sumalatha, V. Venkata Krishna, A. Vinay Babu },
title = { Image Content Authentication based on Wavelet Edge Features },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 23 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number23/7944-1281/ },
doi = { 10.5120/7944-1281 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:46:59.218112+05:30
%A L. Sumalatha
%A V. Venkata Krishna
%A A. Vinay Babu
%T Image Content Authentication based on Wavelet Edge Features
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 23
%P 24-29
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Reversible image authentication has drawn a great attention for its ability to recover the original image from the watermarked image. The primary concern of authentication is to prevent from unauthorized manipulation of the image and hence has attained good importance. This paper proposes a block based reversible watermarking scheme for image authentication based on histogram modification of the differences between adjacent coefficients using DWT. A content watermark is computed from the image wavelet edge features (WEF) and is inserted into the vertical (LH) subband in a reversible manner. The proposed scheme restores the original image without any distortion from the marked image after the hidden data have been extracted. Also can detect and localize tampered areas of the watermarked image. Experimental results demonstrate the performance of the proposed scheme.

References
  1. Schneider M, Chang S-F, 1996. A Robust content based digital signature for image authentication. In Proceedings of the IEEE international conference on image processing, vol 2, pp 231-235.
  2. Queluz MP, 1998. Towards robust content based techniques for image authentication. In: Proceedings of IEEE Signal processing society, workshop on multimedia signal processing.
  3. Dittman J. Steimatez A, 1999. Content based digital signature for motion pictures authentication and content fragile watermarking. In: Proceedings of the IEEE international conference on multimedia computing and systems, vol II, Florence, Italy, pp 209-213.
  4. Dugelay J-L, rey C, 2002. Un panorama des Methods de Tatouage Permettant d'Asseurer un Service d'Intégrité. Revue Traitement du Signal, 18(4), France.
  5. Storck D, 1996. A new approach to integrity of digital images. In proceedings of the IFIP conference on mobile communications, pp 309-316.
  6. Yu S, Hu Y. Zhou J, 2004. Content based watermarking scheme for image authentication. In: Proceedings of the control, automation, robotics and vision conference, vol 2, pp 1083-1087.
  7. Lou DC, Liu JL, 2000. Fault resilient and compression tolerant digital signature for image authentication, IEEE Trans Consum Electron, 46:31-39
  8. Tzeng CH, Tsai WH, 2001. A new technique for authentication of image/vedio for multimedia applications. In: proceedings of ACM multimedia workshops –multimedia and security: new challenges, Ottawa, Ontario, Canada.
  9. Ellinas, J. N. , Dimitios E. Manolakis, 2007. A Robust Wavelet-based Watermarking Algorithm Using Edge Detection, Proceedings of World Academy of Science, Engineering and Technology, vol. 25, 438-443.
  10. Bedi S. S, Tomar G. S, Shekhar Varma, 2009. Robust Watermarking of Image in the Transform Domain using Edge Detection, IEEE UKSim 2009: 11th International Conference on Computer Modeling and Simulation.
  11. Lu W, Lu H, Chung F. L, 2010. Feature based robust watermarking using image normalization, Computers and Electrical Engineering 36, pp 2–18.
  12. Thurgood J, Peplow R, A, 2005. Digital Watermarking Algorithm for Authentication and Tamper Detection, Proceedings, Prasa, pp 05-09.
  13. Roy S and Sun Q, Sep 2007. Robust hash for detecting and localizing image tampering, in Proc. IEEE International Conference on Image Processing.
  14. Ni Z, Shi Y, Ansari N, and Su W, 2003. Reversible data hiding, Proc. ISCAS ,vol. 2, pp. 912–915.
  15. De Vleeschouwer C, Delaigle J. F, Macq B, 2003. Circular interpretation of bijective transformations in lossless watermarking for media asset management, IEEE Trans. On Multimeida, vol. 5, no. 1.
  16. Lee S. K. , Suh Y. H, and Ho Y. S, 2006. Reversible image authentication based on watermarking, in Proc. IEEE Int. Conf. Multimedia Expo, Toronto, ON, Canada, pp. 1321–1324.
  17. Tang C. H and Hang H. M, 2003. A Feature-Based Robust Digital Image Watermarking Scheme, IEEE Transactions on Signal Processing, Vol. 51(4).
  18. Al-Qershi O. M, Bee Ee K, 2009. Authentication and Data Hiding Using a Reversible ROI-based Watermarking Scheme for DICOM Images, World Academy of Science, Engineering and Technology 50, pp 801-806.
  19. Hameed K,. Mumtaz A, Gilani S. A. M, 2006. Digital image watermarking in the wavelet transform domain, World Academy of Science and Technology, 13 pp 86-89.
  20. Kung C. M, Chao S. T, Tu Y. C, Yan Y. H, Kung C. H, 2009. A Robust Watermarking and Image Authentication Scheme used for Digital Content Application J. Multimedia, 4 (3) 112.
  21. Tai W. L, Yeh C. M, and Chang C. C, 2009. Reversible Data Hiding Based on Histogram Modification of Pixel Differences, IEEE Transactions On Circuits And Systems For Video Technology, Vol. 19(6), pp 906-910.
Index Terms

Computer Science
Information Sciences

Keywords

Image authentication Reversible data hiding Simple hash Tamper detection