Advanced
Fragile Watermarking Scheme Based on Wavelet Edge Features
Fragile Watermarking Scheme Based on Wavelet Edge Features
Journal of Electrical Engineering and Technology. 2015. Sep, 10(5): 2149-2154
Copyright © 2015, The Korean Institute of Electrical Engineers
This is an Open-Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • Received : December 21, 2014
  • Accepted : May 01, 2015
  • Published : September 01, 2015
Download
PDF
e-PUB
PubReader
PPT
Export by style
Article
Author
Metrics
Cited by
TagCloud
About the Authors
D. Vaishnavi
Corresponding Author: Dept. of Computer Science and Engineering Faculty of Engineering and Technology, Annamalai University, Tamilnadu, India. (vaishume11@gmail.com)
T.S. Subashini
Dept. of Computer Science and Engineering Faculty of Engineering and Technology, Annamalai University, Tamilnadu, India. (rtramsuba@gmail.com)

Abstract
This paper proposes a novel watermarking method to discover the tampers and localize it in digital image. The image which is to be used to generate a watermark is first wavelet decomposed and the edge feature from the sub bands of high frequency coefficients are retrieved to generate a watermark (Edge Feature Image) and which is to be embed on the cover image. Before embedding the watermark, the pixels of cover image are disordered through the Arnold Transform and this helps to upgrade the security of the watermark. The embedding of generated edge feature image is done only on the Least Significant Bit (LSB) of the cover image. The invisibleness and robustness of the proposed method is computed using Peak-Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) and it proves that the proposed method delivers good results and the proposed method also detects and localizes the tampers efficiently. The invisibleness of proposed method is compared with the existing method and it proves that the proposed method is better.
Keywords
1. Introduction
The images play an important role in news reporting, criminal investigation, insurance claiming, security assessment and military communications etc. Due to the advancement of technology, images are stored in digital form and can be transmitted over an internet medium. These images may be easily accessed and manipulated with the intension to collapse their integrity. As a consequence, it needs to be checked whether it is trustworthy. The digital image watermarking technique is one of the methods to check their integrity and it is consists of two methods: Robust method used to protect copy right of images [1] and Fragile method used to detect the tampers in the images [2 - 5] . A fragile watermarking scheme which is used to detect the tampers must follow the certain properties such as Invisibleness, Sensitivity and Security are very essential among them.
Invisibleness : The embedded mark should be perceptually unnoticeable to safeguard its shielding concealment.
Sensitivity : The embedded mark must be fragile to malicious tampering.
Security : The watermark must be hidden in a protected manner and it cannot be isolated illegally.
The modification or alteration on the watermarked image destroys the integrity of cover image and also content of the watermark image embedded on it. Therefore, verification process is required in watermarking system to detect and localize the tampered region. There are relative a number of fragile watermarking methods proposed in literature. The authors in [6] , generated a watermark using the five Most Significant Bit (MSB) planes and embedded into the 3 Least Significant Bit (LSB) planes. The scheme in [7] , uses the block-wise independence watermarking scheme using two Least Significant Bits in each image block of pixels. The method proposed in [15] , utilizes logistic map to obtain the choatic pattern to generate the watermark and which is embedded in the LSB of each pixels. In [8] , the authors detected the image modifications using a two-pass logistic map with Hamming code. Shivendra Shivani et al., [9] embedded the shuffled extensive ten bit recovery data and two bit authentication data of the image block into its Least Significant Bits (LSB) of its corresponding mapping block. The work in [10] uses the K-mean clustering algorithm on the watermarked image to calculate the number of one’s and number of zero’s in each layer separately. These clustered values are used as secret key and the tampered region in an image is mapped by comparing clustering values of watermarked image and tampered watermarked image. Sumalatha et al. [11] proposed a block based reversible watermarking using Discrete Wavelet Transform and the watermark is generated from the wavelet subbands. Bedi et al. [12] embedded a watermark either on the Discrete Hartley Transform (DHT) domain or in Discrete Cosine Transform (DCT) domain depending upon the number of edges in the block.
In this paper, a fragile watermarking scheme is proposed to detect the tampers using the Discrete Wavelet Transform (DWT). This paper consists of following sections. Section 2 furnishes the background study of the algorithms used in this paper, section 3 illustrates the proposed method, Section 4 discusses the experimental results and Section 5 concludes the paper.
2. Algorithms
- 2.1 Discrete Wavelet Transform (DWT)
The 2D DWT is a linear transformation and is very commonly used tool in image processing and it decomposes the image into low frequency and high frequency coefficients. The low frequency coefficients give the approximation information and the high frequency coefficients (horizontal, vertical and detailed coefficients) give the detailed information such as edges, ridges and noise etc,. An edge provides the structural properties of objects in an image with reduced amount of information [13] . It aids to increase the invisibleness when watermark with less amount of information on the host image. Also these edge features controls the attacks caused by noise, edge strips and acuity.
- 2.2 Arnold map
It is very sensitive to initial conditions. So, it is mostly used in watermarking and encryption techniques. It is used as preprocessing step to embed the watermark, which reduces the spatial relationship between the pixels and makes the image as meaningless one [14] . The 2-dimentional Arnold scrambling algorithm is defined as:
PPT Slide
Lager Image
where, x , y is the pixel coordinates of the original space: x ' , y ' is the pixel coordinates after iterative computation scrambling; N is the size of the image.
3. Proposed Method
The proposed fragile watermarking method consists of three phases. The first phase is generation of watermark, second phase is watermark embedding & extraction and third phase is tamper detection & localization which are explained in the following subsections.
- 3.1 Watermark generation
The edges are the major features which furnish the information about image content and the wavelet transform is marvelous way to detect the edge features, as, it increases the reliability of edge detection even when it is analyzed at different scales. However, a single level of decomposition is sufficient to obtain the edge features. Hence, the single level DWT is applied on the watermark image with ‘haar’ wavelet. Since, ‘haar’ wavelet is a simplest form of wavelet, computationally cheap, memory efficient and specifically it would be an optimal choice for finding the location of edges. DWT decomposes the image into one low frequency coefficients and high frequency coefficients. Low frequency coefficients contain signal information and high frequency coefficients contain excess details such as edge. In order to retrieve the edge details alone from the high frequency details, an adaptive threshold T is used. When applying a T on the high frequency coefficients, the resultant image of edge features is converted to binary and makes it easy to embed on the cover image. The value of the T is defined as sum value of mean and standard deviation of high frequency coefficients and the binary version of image is obtained using threshold is given in the Eq. (2).
PPT Slide
Lager Image
where, w ( i , j ) is binary edge image and f( i , j ) is high frequency coefficients matrix. Fig. 1 depicts the generation of watermark to embed on the cover image.
PPT Slide
Lager Image
Watermark generation process
- 3.2 Watermark embedding and extraction
The watermarking method begins, only after the generation of watermark edge image was accomplished. Now the resolution of edge image is reduced to half as the host image. Hence the host image is divided into 2×2 non-overlapping blocks and watermark is embedded on the least significant bit of each block’s first pixel element. In fragile watermarking method, watermark must be more sensitive and secure. Therefore, an Arnold scrambling is employed on the host image as a preliminary process. After embedding the edge image, watermarked image is constructed by the inverse Arnold scrambling.
In order to extract the watermark edge image embedded on host image, the Arnold scrambling is applied on watermarked image for number of iterations which is equal to the number of iterations done to embed the watermark edge image. Then it is segregated into 2×2 non-overlapping blocks and watermark is extracted from the least significant bit of first element of each block.
- 3.3 Tamper detection and localization
The tamper detection process begins after the extraction of watermark edge image. The original and extracted watermark edge images are subjected to XOR operation and it detects the difference among them and the image is decided as tampered or trustworthy based on the difference. Once the image is detected as tampered, the tampered region is localized by applying the inverse Arnold scrambling.
4. Results and Discussion
The experiment was done using the Mathworks MATLAB 12a. The sample images are gray scale image whose resolution is 256×256 pixels and the proposed method does not depending the resolution of an image but, the resolution of watermark and cover images must be equal and a square. The single level decomposition with ‘Haar’ wavelet scheme is utilized to get edge features from the wavelet sub-band and the watermark image is generated to embed on host image.
- 4.1 Results of watermarking scheme
The sample host image and the generated watermark image are shown in the Fig. 2 . The watermark edge image is embedded on the host image to construct the watermarked image and the embedded watermark is extracted later to find whether an image was tampered or not. The watermarked and extracted watermark images are provided in Fig. 3(a) & Fig. 3(b) . All the pixels values are zero in xor-ed output of embedded and extracted watermark and is given in the Fig. 3(c) It furnishes that the cover image is trustworthy.
PPT Slide
Lager Image
sample test images and generated watermark image
PPT Slide
Lager Image
Result of proposed method without tamper
In order to quantify the invisibleness and robustness of the proposed method when the images are not subjected to any attacks or alterations, the image quality metrics namely Peak-Signal-to Noise-Ratio (PSNR) and Normalized Correlation (NC) are computed. The performance of proposed method also validated by the various images which are taken from standard image processing database and its performances are given in Table 1 . Fig. 4 provides the graphical representation about the performances of the proposed method using PSNR value. In order to carry out a performance comparison, the existing method [15] is implemented and its performances of PSNR values are given in the Table 2 . It shows that the invisibleness of the proposed method is much better than the existing method [15] .
Performances of proposed method using PSNR and NC values
PPT Slide
Lager Image
Performances of proposed method using PSNR and NC values
PPT Slide
Lager Image
Performances of proposed method using PSNR
Performance comparison of invisibleness using PSNR
PPT Slide
Lager Image
Performance comparison of invisibleness using PSNR
- 4.2 Results of tamper detection and localization
The proposed method is examined to see how it detects and localizes the tampers namely copy & paste, text addition, image splice and object removal are introduced on the watermarked image. Then the watermark is extracted and results are demonstrated in the following subsections.
- 4.2.1 Copy and paste attack
In the watermarked image, there is only one sailboat which is shown in the Fig. 3(a) . In order to do this copy paste experiment, the sail boat is copied and pasted it near to the original sailboat, which is shown in the Fig. 5(a) . Then the watermark is extracted and is displayed in the Fig. 5(b) . The X-ored output in Fig. 5(c) shows some noise when compared the Xor-ed output of non-tampered image shown in Fig. 3(c) . This indicates that watermarked image has been subjected to some kind of tampering and Fig. 5(d) shows the localized tampered region.
PPT Slide
Lager Image
Result of copy move attack
- 4.2.2 Text addition attack
To perform this experiment, the text ‘Sail Boat’ is merged in the watermarked image and is shown in the Fig. 6(a) . Then the watermark is extracted from this manipulated image is shown in the Fig. 6(b) . The X-ored output in Fig. 6(c) shows some noise when compared the Xor-ed output of non-tampered image shown in Fig. 3(c) . This indicates that watermarked image has been subjected to some kind of tampering and Fig. 6(d) shows the localized tampered region.
PPT Slide
Lager Image
Result of text addition attack
- 4.2.3 Image splicing attack
To test the performance of proposed method, the object swan is combined in the watermarked image and is shown in the Fig. 7(a) . Then the watermark is extracted from this manipulated image and which is displayed in the Fig. 7(b) . The X-ored output in Fig. 7(c) shows some noise when compared the Xor-ed output of non-tampered image shown in Fig. 3(c) . This indicates that watermarked image has been subjected to some kind of tampering and Fig. 7(d) shows the localized tampered region.
PPT Slide
Lager Image
Result of image splicing attack
- 4.2.4 Object removal attack
To carry out this experiment, the object sailboat in the watermarked image is removed and is shown in the Fig. 8 (a) . Then the watermark is extracted from this manipulated image and which is displayed in the Fig. 8(b) . The X-ored output in Fig. 8(c) shows some noise when compared the Xor-ed output of non-tampered image shown in Fig. 3(c) . This indicates that watermarked image has been subjected to some kind of tampering and Fig. 8(d) shows the localized tampered region.
PPT Slide
Lager Image
Result of object removal attack
5. Conclusion
A novel image watermarking method to discover and localize the tampers in an image was implemented successfully. The invisibleness and robustness of the proposed method were estimated using the PSNR and NC values and it provides the good values. The invisibleness and robustness (for non-tampered image) of proposed method were measured using PSNR and NC metrics. The invisibleness of proposed method is compared with the existing method [15] and it proves that the proposed method is better than the existing method. The proposed method is also examined to see how it detects and localizes the tampers subjecting to various tampers and its results shows that proposed method depicts that it efficiently detects and localizes the tampers where the region is altered.
BIO
D.Vaishnavi She has received her BE (IT) degree in the year 2009 and ME (CSE) degree in the year 2011 from Annamalai University. She has worked as Assistant Professor at Anjalai Ammal Mahalingam Engineering College, Thiruvarur District, Tamil nadu, India. Currently, she is pursuing Doctor of Philosophy in Annamalai University. She has published 11 papers in International Journals and conferences. Her area of research is Image Processing, Image watermarking and Digital Forensics.
T.S. Subashini She has received her B.E (CSE) degree in the year 1991 from Bharath Engineering College, Chennai. In the same year she was appointed as Hardware Service Engineer in Sterling Computers Chennai and in 1996 she joined Annamalai University. She was sponsored by the University under Quality Improvement Programme (QIP), to pursue ME (CSE) at Anna University, Chennai 2001. She gained her doctoral degree in Computer Science and Engineering from Annamalai University in 2011. Her area of doctoral research is Medical Image Analysis. She has published over 35 research papers in international journals and conferences. She is now working on UGC sanctioned research project worth Rs. 11.4 lakhs on Breast Cancer. Her research interests include Image and Video processing, Computer Vision and Pattern Classification.
References
Vaishnavi D. , Subashini T. S. 2015 “Robust and Invisible Image Watermarking in RGB Color Space Using SVD,” Procedia Computer Science 46 1770 - 1777    DOI : 10.1016/j.procs.2015.02.130
Vaishnavi D. , Subashini T. S. 2015 “Image Tamper Detection based on Edge Image and Chaotic Arnold Map,” Indian Journal of Science and Technology 8 548 - 555    DOI : 10.17485/ijst/2015/v8i6/70074
Di Martino F. , Sessa S. 2012 “Fragile Watermarking Tamper Detection with Images Compressed by Fuzzy Transform,” Inf. Sci. 195 62 - 90    DOI : 10.1016/j.ins.2012.01.014
Xiao D. , Shih F. Y. 2012 “An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post-processing,” Optics Communications 285 2596 - 2606    DOI : 10.1016/j.optcom.2012.02.002
Phan R. C.-W. 2008 “Tampering with a watermarking-base dimage authentication scheme,” Pattern Recognition 41 3493 - 3496    DOI : 10.1016/j.patcog.2008.05.009
Shan S. 2010 “Logistic map-based fragile watermarking for pixel level tamper detection and resistance,” EURASIP Journal on Information Security 2010
Chen W.-C. , Wang M.-S. 2009 “A fuzzy c-means clustering-based fragile watermarking scheme for image authentication,” Expert Systems with Applications 36 1300 - 1307    DOI : 10.1016/j.eswa.2007.11.018
Chang C.-C. , Chen K.-N. , Lee C.-F. , Liu L.-J. 2011 “ A secure fragile watermarking scheme based on chaos-and-hamming code,” Journal of Systems and Software 84 1462 - 1470    DOI : 10.1016/j.jss.2011.02.029
Shivani S. , Singh D. , Agarwal S. 2013 “DCT Based Approach for Tampered Image Detection and Recovery Using Block Wise Fragile Watermarking Scheme,” Pattern Recognition and Image Analysis Springer 640 - 647
M. N. G. P. , S.A.K. Jilani , Manickam. L 2013 “A Novel Fragile Watermarking Scheme For Image Tamper Detection Using K Mean Clustering,” International Journal of Computer Trends and Technology(IJCTT) 4 3380 - 3385
Sumalatha L. , Krishna V. V. , Babu A. V. 2012 “Image Content Authentication based on Wavelet Edge Features,” International Journal of Computer Applications 50
Bedi S. S. , Tomar G. S. , Verma S. 2009 “Robust watermarking of image in the transform domain using edge detection,” Computer Modelling and Simulation, 2009. UKSIM’09. 11th International Conference on 233 - 238
Zhang D. , Pan Z. , Li H. 2010 “A contour-based semi-fragile image watermarking algorithm in DWT domain,” Education Technology and Computer Science (ETCS), 2010 Second International Workshop on 3 228 - 231
Sui M. , Li J. 2013 “The medical volume data watermarking using arnold scrambling and 3D-DWT,” Mechatronic Sciences, Electric Engineering and Computer (MEC), Proceedings 2013 International Conference on 1120 - 1124
Rawat S. , Raman B. 2011 “A chaotic system based fragile watermarking scheme for image tamper detection,” AEU-International Journal of Electronics and Communications 65 840 - 847    DOI : 10.1016/j.aeue.2011.01.016