Image Authentication using Semifragile Watermarking and Vector Quantization

Archana Tiwari*, Manisha Sharma**
* Professor, Department of Electronics and Instrumentation, Chhatrapati Shivaji Institute of Technology, Durg, Chhattisgarh.
** Professor, Department of Electronics and Telecommunication, Bhilai Institute of Technology, Durg, Chhattisgarh.
Periodicity:April - June'2015
DOI : https://doi.org/10.26634/jip.2.2.3405

Abstract

In this paper, a new technique for image authentication is presented which uses semifragile watermarking scheme using vector quantization approach. The proposed scheme suggests semifragile watermarking scheme for blind image authentication using VQ (Vector quantization) by applying novel index based method combined with Discrete cosine transform. Present method is tested using, different combinations of code books for watermark insertion and extraction procedure . The proposed method results in an improved PSNR with an average value of 42 dB compared to average value 30 dB suggested by Lu et al.

Keywords

Image Authentication, Semifragile Watermark, Watermark Embedding, Vector Quantization, Blind Extraction.

How to Cite this Article?

Tiwari, A., and Sharma, M. (2015). Image Authentication using Semifragile Watermarking and Vector Quantization. i-manager’s Journal on Image Processing, 2(2), 32-37. https://doi.org/10.26634/jip.2.2.3405

References

[1]. Tiwari, A., & Sharma, M. (2012). A Survey of Transform Domain based Semifragile Watermarking Schemes for Image Authentication. Journal of the Institution of Engineers (India): Series B, Vol. 93, No. 3, pp.185-191.
[2]. Cox, I. J., & Miller, M. L. (2002). “The first 50 years of electronic watermarking”. EURASIP Journal on Applied Signal Processing, Vol. 1, pp.126-132.
[3]. Naci, U.,& Akcay, M. (2004). “Comparative evaluation of semifragile watermarking algorithms”. Journal of Electronic Imaging, Vol. 13, No. 1, pp. 209-219.
[4]. Lin, E. T., Podilchuk, C. I., & Delp III, E. J. (2000). “Detection of image alterations using semifragile watermarks”. In Electronic Imaging, International Society for Optics and Photonics, pp. 152-163
[5]. Piper, A., & Safavi-Naini, R. (2013). “Scalable fragile watermarking for image authentication”. Information Security, IET, Vol. 7, No. 4, pp. 300-311.
[6]. Lin, C. Y., & Chang, S. F. (2000). “Semifragile watermarking for authenticating JPEG visual content”. In Electronic Imaging, International Society for Optics and Photonics, pp. 140-151.
[7]. Maeno, K., Sun, Q., Chang, S. F., & Suto, M. (2006). “New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization”. IEEE Transactions on Multimedia, Vol. 8, No.1, pp.32-45.
[8]. Chen, T. S., & Chang, C. C. (1997). “A new image coding algorithm using variable-rate side-match finitestate vector quantization”. IEEE Transactions on Image Processing, Vol. 6, No. 8, pp. 1185-1187.
[9]. Ning, C. H. E. N., & J ie, Z. H. U. (2007). “Multipurpose speech watermarking based on multistage vector quantization of linear prediction coefficients”. The Journal of China Universities of Posts and Telecommunications, Vol. 14, No. 4, pp. 64-69.
[10]. Faúndez-Zanuy, M. (2001). “A combination between VQ and covariance matrices for speaker recognition(ICASSP '01). 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 1, pp. 453-456.
[11]. Sayood, K. (2012). Introduction to data compression.Newnes.
[12]. Gersho, A., & Gray, R. M. (2012). “Vector quantization and signal compression”. Springer Science & Business Media, Vol.159.
[13]. Lu, Z. M., & Sun, S. H. (2000). “Digital image watermarking technique based on vector quantization'. Electronics Letters, Vol. 36, No. 4, pp. 303-305.
[14]. Makur, A., & Selvi, S. S. (2001). “Variable dimension vector quantization based image watermarking”. Signal Processing, Vol. 81, No. 4, pp. 889-893.
[15]. Huang, H. C., Feng-Hsing, W. A. N. G., & Jeng- Shyang, P. A. N. (2002). “A VQ-based robust multiwatermarking algorithm”.IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Vol. 85, No. 7, pp.1719-1726.
[16]. Lu, Z. M., Liu, C. H., Xu, D. G., & Sun, S. H. (2003). “Semi-fragile image watermarking method based on index constrained vector quantization”. Electronics Letters, Vol. 39, No. 1, pp. 35-36.
[17]. Wu, H. C., & Chang, C. C. (2005). “A novel digital image watermarking scheme based on the vector quantization technique”. Computers & Security, Vol. 24, No. 6, pp. 460-471.
[18]. Lu, Z. M., Xu, D. G., & Sun, S. H. (2005). “Multipurpose image watermarking algorithm based on multistage vector quantization”. IEEE Transactions on Image Processing, Vol. 14, No. 6, pp. 822-831.
[19]. Linde, Y., Buzo, A., & Gray, R. M. (1980). “An algorithm for vector quantizer design”. IEEE Transactions on Communications, Vol. 28, No.1, pp. 84-95.
[20]. Barreto, P. S., Kim, H. Y., & Rijmen, V. (2002). “Toward secure public-key blockwise fragile authentication watermarking”. IEEEProceedings-Vision, Image and Signal Processing, Vol.149, No. 2, pp. 57-62.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.