A Quantization based Watermarking Scheme for Image Authentication

Manisha Sharma*, M. Kowar**
*-** Department of Electronics & Telecommunication Engineering, Bhilai Institute of Technology, Bhilai House, Durg, Chhattisgarh, India.
Periodicity:April - June'2010
DOI : https://doi.org/10.26634/jse.4.4.1184

Abstract

A watermarking technique for image authentication inserts hidden data into an image in order to detect any accidental or malicious alteration. In the proposed work, a watermark in the form of a visually meaningful binary pattern is embedded for the purpose of tamper detection. The watermark is embedded in the discrete cosine transform coefficients of the image by quantizing the coefficients proportionally according to the watermarked bit. Experimental results demonstrate the performance and effectiveness of the scheme for image authentication by maintaining good values for both, the Peak Signal to Noise Ratio (PSNR) and Tamper Assessment Function (TAF).

Keywords

Watermark, DCT, Image tampering, Quantization.

How to Cite this Article?

Manisha Sharma and M. Kowar (2010). A Quantization based Watermarking Scheme for Image Authentication. i-manager’s Journal on Software Engineering, 4(4), 74-79. https://doi.org/10.26634/jse.4.4.1184

References

[1]. Chris Shoemaker, (2002). Hidden Bits: A Survey of Techniques for Digital Watermarking, Independent Study Report EER-290, Spring 2002
[2]. Cox, I., Miller, M., and Bloom, J. (2002). Digital Watermarking: Principles and Practice, Morgan Kaufmann Publishers, USA, 2002.
[3]. Cox, I.J., Kilian, J., and Leighton, F.T. (1997). “Secure Spread Spectrum Watermarking for Multimedia”, IEEE Trans. on Image Processing, Vol. 6, No.12, pp.1673-1687, December 1997.
[4]. Jiwu Huang, Yun Q. Shi and Yi Shu, (2000). “Embedding Image Watermark in DC Components”, IEEE Trans. on Circuits and Systems for Video Technology, Vol. 10, No. 6, pp.974-979, September 2000.
[5]. Katzenbeisser, S., and Petitcolas, F. (2000). Information Hiding: Techniques for Steganography and Watermarking, Artech House Publisher, USA, 2000.
[6]. Kundur, D., and Hatzinakos, D. (1999). “Digital Watermarking for Telltale Proofing and Authentication”, Proceedings of the IEEE, Vol. 87, No.7, pp.1167-1180, July 1999.
[7]. Li, C.T. (2004). “Digital fragile watermarking scheme for authentication of jpeg images”, IEE Proceedings - Vision, Image, and Signal Processing, Vol. 151, No.6, pp.460-466, 2004.
[8]. Lin, C.Y., and Chang, S.F. (2000). “Semi-Fragile Watermarking for Authentication JPEG Visual Content”, The International Society for Optical Engineering Proceedings, Vol. 3971, pp.140 – 151.
[9]. Memon, N., and Wong, P.W. (1998). Protecting digital Media Content, Comm. of the ACM, Vol. 41, No.7, July 1998.
[10]. Min-Jen Tsai and Hsiao–Ying Hung, (2005). “Wavelet Transforms based Digital Watermarking for Image Authentication” Proceedings of IEEE International Conference on Computer and Information Science, ACIS (2005), pp.408-411, 2005.
[11]. Song Yu-jie and Tan Tie-niu, (2003). “A Brief Review on Fragile Watermarking for Image Authentication”, Journal of Image and Graphics, Vol. 8 (A), No.1, 2003.
[12]. Swanson, M., Kobayashi, M., and Tewfik, A. (1998). Multimedia Data-Embedding and watermarking Technologies, Proc. IEEE, Vol. 86, pp.1064-1087, June.
[13]. Winne, D.A., Knowles, H. D., Bull, D. R. and Canagarajah, C.N. (2002). “Digital Watermarking in Wavelet domain with Pre-distortion for Authenticity Verification and Localization”, Proceedings of the International Society for Optical Engineering, Vol. 4675, pp.349-356, 2002.
[14]. Xia, X. G., Boncelet, C.G., and Arce, G.R. (1997). “A Multiresolution Watermark for digital Images”, IEEE (ICIP'97), Vol. 1, pp.363-368, June 1997.
[15]. Zeng, W., and Liu, B. (1999). “A statistical watermark detection technique without using original images for resolving rightful ownership of digital images”, IEEE Transaction on Image Processing, Vol. 8, No.11, pp.1534- 1548, November, 1999.
[16]. Zhu, W., Xiong, Z., and Zhang, Y. Q. (1998). “Multiresolution watermarking for Images and Video: A Unified approach”, IEEE (ICIP'98), Vol. 1, October 1998.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.