FRAGILITY EVALUATION OF INTERMEDIATE SIGNIFICANT BIT EMBEDDING (ISBE) BASED DIGITAL IMAGE WATERMARKING SCHEME FOR CONTENT AUTHENTICATION

被引:0
|
作者
Parah, Shabir A. [1 ]
Sheikh, Javaid A. [1 ]
Bhat, G. M. [1 ]
机构
[1] Univ Kashmir, Dept Elect, Srinagar 190006, Jammu & Kashmir, India
关键词
Watermarking; Fragile Image Watermarking; Intermediate Significant Bit Embedding; Content authentication;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Digital image watermarking is being extensively used for protecting sensitive image data transmitted over insecure channels. Watermarks are primarily used for two fold operations, copyright protection and content authentication. Robust image watermarks are used for copyright protection and fragile watermarks used for the content authentication. In this paper fragility evaluation of a fragile image watermarking scheme has been carried out to ascertain the areas where the embedded watermark could be more fragile. The embedding has been carried out in spatial domain in various image bit planes using Intermediate Significant Bit Embedding (ISBE). The evaluation has been carried out by subjecting the watermarked image to various image processing attacks like histogram equalization, Low Pass Filtering, addition of white Gaussian noise, JPEG compression etc. The experimental results show that irrespective of the nature of attacks the higher the order of bit plane in which data is embedded lower the fragility of the system and vice-versa.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] DIGITAL IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT AND DISCRETE COSINE TRANSFORMATION
    Anushka
    Saxena, Anuj
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, INSTRUMENTATION AND CONTROL TECHNOLOGIES (ICICICT), 2017, : 1582 - 1586
  • [42] Lossless Codebook-Based Digital Watermarking Scheme with Authentication
    Park, Geum-Dal
    Kim, Dae-Soo
    Yoo, Kee-Young
    2014 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (ITNG), 2014, : 301 - 306
  • [43] Superpixel-Based Watermarking Scheme for Image Authentication and Recovery
    Qiao, Xiumei
    Ni, Rongrong
    Zhao, Yao
    DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014, 2015, 9023 : 160 - 173
  • [44] A SVD-based fragile watermarking scheme for image authentication
    Byun, SC
    Lee, SK
    Tewfik, AH
    Ahn, BH
    DIGITAL WATERMARKING, 2002, 2613 : 170 - 178
  • [45] A New Card Authentication Scheme Based on Image Watermarking and Encryption
    Peng, Xinxin
    Lu, Jianfeng
    Li, Li
    Chang, Chin-Chen
    Zhou, Qili
    DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 10082 : 358 - 369
  • [46] Wavelet-based fragile watermarking scheme for image authentication
    Li, Chang-Tsun
    Si, Huayin
    JOURNAL OF ELECTRONIC IMAGING, 2007, 16 (01)
  • [47] A watermarking-based image ownership and tampering authentication scheme
    Chang, CC
    Hu, YS
    Lu, TC
    PATTERN RECOGNITION LETTERS, 2006, 27 (05) : 439 - 446
  • [48] A novel watermarking-based reversible image authentication scheme
    Gao, Tiegang
    Gu, Qiaolun
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1269 - +
  • [49] Multi-watermarking Scheme for Copyright Protection and Content Authentication of Digital Audio
    Xu, Tingting
    Shao, Xi
    Yang, Zhen
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2009, 2009, 5879 : 1281 - 1286
  • [50] A content-based digital image watermarking scheme resistant to local geometric distortions
    Yang, Hong-ying
    Chen, Li-li
    Wang, Xiang-yang
    JOURNAL OF OPTICS, 2011, 13 (01)