Abstract

Recently, researchers have proposed semi-fragile watermarking techniques with the additional capability of image recovery. However, these approaches have certain limitations with respect to capacity, imperceptibility, and robustness. In this paper, we are proposing two independent watermarks, one for image recovery and the other for authentication. The first watermark (image digest), a highly compressed version of the original image itself, is used to recover the distorted image. Unlike the traditional quantisation matrix, genetic programming based matrices are used for compression purposes. These matrices are based on the local characteristics of the original image. Furthermore, a second watermark, which is a pseudo-random binary matrix, is generated to authenticate the host image precisely. Experimental results show that the semi-fragility of the watermarks makes the proposed scheme tolerant of JPEG lossy compression and it locates the tampered regions accurately.

Highlights

  • The internet has brought substantial benefits, one of which is the distribution of multimedia content; images, video, audio, text, graphics etc

  • We develop the quantisation matrices using Genetic Programming (GP)

  • An exemplary numerical expression in prefix form, developed by GP, is given as: The proposed approach can be used for colour image authentication as well

Read more

Summary

Introduction

The internet has brought substantial benefits, one of which is the distribution of multimedia content; images, video, audio, text, graphics etc. The three different watermarking approaches: (1) fragile, (2) semi-fragile, and (3) robust are applied for securing the digital content. There is an intrinsic relationship between three of its contradicting attributes: (1) robustness, (2) imperceptibility, and (3) capacity. The field of watermarking has great potential in authentication-based applications. The basic requirements of authenticating digital content are: imperceptibility, fragility, security, and efficient computation. A watermarking technique is proposed in [3], where two watermarks are embedded in LL3, HL2 and LH2 sub-bands of the wavelet transform. This scheme accurately authenticates images but at the cost of imperceptibility. In authentication related applications, they have rarely been exploited

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call