Accepted Manuscript Regular paper Watermarking based image authentication and tamper detection algorithm using vector quantization approach Archana Tiwari, Manisha Sharma, Raunak Kumar Tamrakar PII: DOI: Reference:
S1434-8411(16)31029-9 http://dx.doi.org/10.1016/j.aeue.2017.05.027 AEUE 51898
To appear in:
International Journal of Electronics and Communications
Received Date: Revised Date: Accepted Date:
19 October 2016 14 March 2017 17 May 2017
Please cite this article as: A. Tiwari, M. Sharma, R.K. Tamrakar, Watermarking based image authentication and tamper detection algorithm using vector quantization approach, International Journal of Electronics and Communications (2017), doi: http://dx.doi.org/10.1016/j.aeue.2017.05.027
This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
1 2 3 4 5 6
Watermarking based image authentication and tamper detection algorithm using vector quantization approach Archana Tiwari1, Manisha Sharma2* and Raunak kumar Tamrakar3 1,2
Department of Electronics & Telecommunication, Bhilai Institute of Technology, Durg 3
7 8
Department of Applied Physics, Bhilai Institute of Technology, Durg *Corresponding Author:
[email protected]
9 10
Abstract-
11
quantization (VQ) approach is presented for digital image authentication. Watermarks are
12
embedded in two successive stages for image integrity verification and authentication. In the
13
first stage, a key based approach is used to embed robust zero level watermark using
14
properties of indices of vector quantized image. In the second stage,semifragile watermark is
15
embedded by using modified index key based (MIKB) method. Random keys are used to
16
improve the integrity and security of the designed system. Further, to classify an attack
17
quantitatively as acceptable or as a malicious attack, pixel neighborhood clustering approach
18
is introduced. Proposed approach is evaluated on 250 standard test images using performance
19
measures such as peak signal to noise ratio (PSNR) and normalized hamming similarity
20
(NHS). The experimental results shows that propose approach achieve average false positive
21
rate 0.00024 and the average false negative rate 0.0012. Further, the average PSNR and
22
tamper detection/localization accuracy of watermarked image is 42 dB
23
respectively; while tamper localization sensitivity is very high. The proposed model is found
24
to be robust to common content preserving attacks while fragile to content altering attacks.
25
Index Terms -Attack classification; Biometric verification watermark; Image authentication;
26
Robust watermarking; Semifragile watermarking; Vector quantization.
27
In the present work, a novel image watermarking algorithm using vector
and 99.8%
1. INTRODUCTION
28
With development of the digital technology recreation of digitally generated information has
29
become very easy, and can be transmitted by digital media with ease among other medias of
30
message conveyance images are most common. Therefore protection of these images and its
31
content authentication is important. To authenticate the integrity and authenticity of a digital
32
image, digital watermarking techniques have been considered an effective technique [1-
33
5].The watermarking technique for authentication purpose can be classified as Robust, fragile
34
and semifragile watermarking techniques based on their level of security. A robust watermark
1
35
finds application in the area of ownership verification and copyright protection [6-9]. A
36
fragile watermark destroys itself even for small accidental or intentional changes [10-12].On
37
the other hand, semi-fragile watermarking is a practical technique which can protect integrity
38
of digital images and can locate the tampered areas [13-16]. Thus fragile or semi-fragile
39
watermarking are those image watermarking techniques which find application in images and
40
video content authentication and tamper detection [7, 13, 16, 17]. Given the limitations of
41
robust and fragile watermarking schemes, multiple-watermarking is applied to digital data
42
where copyright protection and content authentication is required to be addressed
43
simultaneously [7]. Lu [7], pioneered the concept of VQ based image watermarking
44
technique. Various VQ (vector quantization) based watermarking techniques are
45
recommended by researchers in the past decade for image watermarking [17-20] with the
46
objective of image compression and authentication.
47
Most of the methods suggested in above literatures need improvement in issues
48
related to watermarked image quality, identification of attacks as malicious or content
49
preserving manipulation, and efficiency of the system in authentication of images. Therefore,
50
an efficient image authentication algorithm having a good visual quality of watermarked
51
image, having the advantage of comparatively less bandwidth and storage space, with high
52
accuracy in attacks classification, tolerant to acceptable manipulations, and high tamper
53
detection accuracy needs to be designed. Thus in proposed work, watermarks are embedded
54
in two successive stages. In the first phase robust watermark is used for ‘zero level
55
watermarking’ [21] utilizing the statistical properties of VQ indices for enhancing the
56
security of watermarked image by biometric verification. The advantage of first stage of
57
watermarking is, it does not affect VQ reconstructed image. In the second step, the
58
semifragile watermark is embedded by using a Modified Index Key based method (MIKB)
59
for image authentication. A ‘quantitative threshold-based approach’ is suggested for
60
classifying attacks and localizing tampered area. Further statistical analysis is done to find
61
false positive rate, false negative rate, % of correctly identified authenticated images and %
62
of falsely verified images to validate the correctness of the system. Thus, present image
63
authentication fulfils desired characteristics of an effective image authentication technique.
64
The significant features of proposed improvised scheme are-
65 66
Watermarks are embedded using VQ indices properties; it enhances security and saves bandwidth requirements.
2
67
Random keys are used for embedding robust zero level watermark and semi-fragile
68
watermark respectively; random nature of key improves the integrity and security of
69
designed system.
70
71 72
preserving attack.
73 74
A quantitative analysis is suggested to classify the attack as malicious or content
Tamper detection accuracy of proposed system is very high; it can detect tampering upto 10% as malicious attack.
Biometric verification watermark is used to enhance reliability of designed system.
75
The structure of the paper is organized into three sections namely proposed scheme,
76
Experimental results and discussion of deigned algorithm, and lastly conclusion of the paper
77
is addressed.
78
2. PROPOSED SCHEME
79
In this section, the detail of proposed image authentication algorithm is presented. The
80
proposed method uses two-stage VQ, to divide the encoding task into successive stages;
81
wherein initial stage performs a relatively rough quantization of the input vector using a
82
codebook. Then, a second stage quantizer performs on the error vector between the original
83
and quantized first-stage output. The quantized error vector then gives a second
84
approximation to the original input vector thereby provides a more accurate or refined
85
depiction of the input. The binary watermark images are embedded in two successive stages
86
using random key based approach and properties of indices, the output of both stages are
87
combined to get watermarked image. Watermarked image is sent over, an open
88
communication channel, where accidental or malicious changes may affect contents of
89
watermarked image. In the verification and authentication step, the watermark sequence is
90
extracted independently from received watermarked image, using passkey1 and passkey2 in
91
stage 1 and passkey3 in stage 2. The authenticity of the received image is analyzed using the
92
extracted watermark images. Details of tamper detection, localization, and classification of
93
attacks are described in subsequent sections. Figure 1 shows two stage vector quantization
94
procedure followed in proposed method.
95
The proposed technique is described in four subsections; subsection 2.1 describes
96
codebook generation , 2.2 explains proposed watermark embedding technique, subsection 2.3
3
97
discusses watermark extraction in two consecutive stages. Finally, authentication and
98
verification of received image are discussed in subsection 2.4.
99 100
2.1 Codebook generation
101
To create a codebook of M codewords, input training images are selected. Each input image
102
is partitioned into non-overlapping image blocks of m×m pixels. Thereafter, M image blocks
103
from the input image blocks are selected as the initial codewords. This set of initial
104
codewords can be termed as the initial codebook. After generation of the initial codebook, an
105
iterative process for several rounds is executed to generate the codebook using LBG
106
algorithm [22]. In each round, the data clustering procedure and the centroid updating
107
procedure are performed. In the data clustering procedure, the nearest codeword of each input
108
image block in the codebook is to be found. To determine the nearest codeword of each input
109
image block in the codebook, a total number of M squared Euclidean distances are computed.
110
Then, the closest codeword is determined by finding the minimal squared Euclidean distance
111
from itself to the input image block. After the data clustering process is executed, all these
112
input image blocks are classified into M groups. In the centroid updating procedure, the mean
113 114
Figure1: Proposed two stage vector quantization procedure.
115 116
vector of the training image blocks in each group is calculated. These M computed image
117
vectors generate new codebook. By repeatedly executing the same process in each round, a
118
representative set of codewords can be generated for first stage. In second stage error image
119
is used as input training image for generation of codebook2 by repeating same process. In
120
proposed work a new codebook is generated each time algorithm runs, for same input image,
121
to enhance security of algorithm. Randomness is achieved by randomly generating a set of
4
122
input training vectors for codebook generation in the range of minimum to maximum pixel
123
values.
124
2.2 Proposed watermark embedding technique
125
Embedding of the watermark is done in two stages: robust zero level watermark embedding
126
and semifragile watermark embedding. The detail of watermark embedding process is
127
described in two subsections namely 2.2.1 discusses watermark embedding in the first stage,
128
and 2.2.2 explains the second stage of watermark embedding and final watermarked image
129
construction.
130
2.2.1. First stage of watermark embedding: In the first stage, a robust binary fingerprint
131
watermark is embedded. Robust zero level watermark embedding is done in two steps:
132
Step 1: Robust zero level watermark embedding: After generation of codebook1 (C1), the
133
robust binary watermark
134
passkey1, where
135
original image S with size is m
136
(a, b) denotes the image block at the position of (a, b). After that, each vector s (a, b) finds its
137
best codeword in the codebook C1 and a index ‘g’ is assigned to s (a, b), we can then obtain
138
the indices matrix T with elements t (a, b). , which can be represented by:
139
T=VQ(S)=
140
For most images, the VQ indices in the neighboring blocks may be same; this characteristic is
141
used to calculate parameter ‘E,' called embedding function.
142
, with pixel of size (p × q) is scrambled with randomly generated
passkey1
((p × q), resultant scrambled robust watermark is then divided into vectors s (a, b) with size 4
=
, where s
(1)
of adjacent blocks.
143 144
. The
(2) The embedding function can be computed as follows:
145
E=
146
Where
(3) ;
147
Where ‘Th’ is a threshold, i.e. standard deviation of one-dimensional indices matrix T. Now
148
embedded robust watermark or passkey2 can be generated by EX-ORing of the scrambled
149
watermark with the embedding function. The watermark is termed as ‘robust zero level
150
watermark,' as it is robust to almost all image manipulations and it does not change VQ
151
compressed image at all.
152
passkey2=
(4)
5
153
Step2: First stage VQ image reconstruction: After robust watermark embedding, the
154
reconstructed image S’ (m, n) and error image Q (m, n) can be obtained as follows. In first
155
stage compressed image is watermarked without actually inserting it explicitly .This concept
156
of Zero-watermark algorithm was suggested by Wen et al. [21], which does not modify the
157
original image. And the most important step is it is constructed from characteristics of the
158
original image. VQ-1
159
(5)
160
Q(m,n)=S (m, n)-S’ (m, n)
161
Equation 5 shows reconstructed image after the first stage. While equation 6 represents the
162
output of the first stage, this is treated as an input to the subsequent stage.
163
2.2.2 Second stage of watermark embedding: In the second stage, a semifragile
164
authentication watermark is embedded. For a codebook2 generation, the error image, Q (m,n)
165
serves as input training sequence to improved LBG algorithm. Further, like the original
166
image, Q (m, n), is also divided into ‘L’ vectors ‘q (a, b),' each of size 4×4, where q (a, b)
167
denotes the image block at the position of (a, b) .After codebook (C2) generation, each vector
168
of input training vector finds its most suitable code vector C2x, in codebook2 (C2) and
169
assigns indices
170
elements x (a, b) which can be represented as follows.
171
X=VQ (Q) =
172
Now each element of indices matrix, X is modified according to binary semifragile
173
watermark Ws .For semifragile watermark embedding; a single bit of watermark Ws is
174
inserted into each element of X. Let K be the size of codebook2, where K=2v then each
175
index has got ‘v’ binary bits. The embedding position of each semifragile watermark bit is
176
decided using randomly generated passkey3, where
177
significant bit) end watermark bit Ws replaces binary bit of each index of matrix X at the
178
position defined by passkey3. For example let, X11=22, its binary equivalent is
179
(000000000010110)2, assuming passkey3=3 and Ws (11) =0, then after watermark
180
embedding, X11 is modified to (000000000010010)2 i.e. 18. Using these modified indices
181
semi fragile watermarked image is reconstructed at VQ decoder, thus method is termed as
182
modified indices key based method (MIKB). Let reconstructed image be
183
stage output, which is represented as follows:
184
=
(6)
to q(a, b). Now using these indices, indices matrix X is created, with
=
(7)
passkey3
. From LSB (least
i.e. second
(8)
6
185
Each time algorithm runs a unique random generated key is used for semifragile watermark
186
embedding. Finally, watermarked image is obtained by combining first stage and second
187
stage outputs.
188
(9)
189
Thus, in the proposed scheme the watermarks are embedded independently in successive
190
stages for verifying integrity and authenticity of the image.
191
2.3 Watermark extraction in two stages
192
This subsection explains watermark extraction procedure of proposed algorithm. It is
193
understood here that both sender and receiver share same codebooks. The procedure adopted
194
for watermark extraction is given below.
195
Step1- Robust watermark extraction in the first stage: At the receiver side, the reverse
196
process of the watermark embedding process is carried out. The received image
197
similar way while encoding, is divided into non-overlapping blocks of size 4×4. The VQ
198
encoder as discussed before is used along with codebook1 to find encoded indices of first
199
stage. Obtained VQ indices are used to compute embedding function ‘E’. Then XOR
200
operation is performed between the embedding function ‘E’ and passkey2 to get back
201
permuted robust watermark
202
passkey1 to get the extracted robust watermark
203
reconstruct the first stage approximate output
204
Step 2-Semifragile watermark extraction: In the second stage of extraction, watermarked
205
image
206 207 208 209 210
. Further, these indices are used to
Codebook 1
Watermarked Image
Partitioned into 16384 blocks each of size 4×4
Indices
First stage VQ encoder
Passkey1 Inverse permutation
212
Extracted robust watermark
213
217 218 219 220 221
. Finally inverse permutation process is carried out with
is segmented using the previous phase output
211
214 215 216
, in
Permuted robust watermark
Embedding function (E) computation
E
Codebook 2 Second stage VQ encoder
Watermarked image segmentation
First stage o/p reconstruction using VQ decoder
Indices Passkey3
Extract bit positions
Restore extracted bits to reconstruct semifragile watermark
Extracted semifragile watermark
Figure 2: Illustration of steps involved in the extraction of the watermark in two subsequent stages. 7
222
To obtain the second stage approximated image Q’’ (m, n) which is further divided into L
223
vectors, each of size 4×4.Standard VQ encoder executes the nearest neighbourhood search to
224
obtain encoded indices (
225
are recovered from indices
226
embedding order to form extracted semi fragile watermark
227
extraction is given in figure 2.
228
2.4 Verification and authentication of received image
229
The verification and authentication procedure is divided into five steps. After extraction of
230
the robust and the semifragile watermarks, the received image is to be verified and
231
authenticated. In next step, details of various stages involved including tamper detection
232
localization procedure and performance evaluation parameters are explained.
233
Step 1: Verification of received image: In the first step the integrity of received
234
image
235
the embedded fingerprint robust watermark, using parameter NHS. NHS [7] is defined in
236
equation 10, where
237
watermark.
238
NHS
). Then using passkey3 semifragile authentication watermark bits . These extracted watermarking bits are then grouped as per . Detail process of watermark
is to be verified, the extracted fingerprint robust watermark is compared with
represents the embedded watermark and
denotes the extracted
(10)
239
Here HD (.,.) stands for the Hamming distance between two binary images, i.e., the number
240
of bits different in two binary images. If the value of NHS is equal to unity, that means
241
embedded watermark and extracted watermark are identical. Thus, the integrity of source is
242
verified, otherwise not.
243 244
(a)
(b)
245
Figure 3 (a) Depicts an error pixel surrounded by five pixels which are error pixel (b) Depicts
246
an error pixel surrounded by two error pixels.
247 248
Step 2: Authentication of received image: In next phase, authentication of received image
249
is performed, the similarity between the embedded and the extracted semifragile watermark is
250
checked. If the value of
251
received image
then there is a possibility of some security attack on . As semifragile watermark is used as authentication watermark in 8
252
proposed algorithm, all authentication analysis is performed using the semifragile watermark.
253
Further difference image is obtained as
254
.If any pixel of
is one it is considered as an error pixel; otherwise, it is not an error pixel. A pixel
255
neighbourhood criterion is used for content authentication of image, as explained in step 3.
256
Step3: Tamper detection, localization, and attack classification: If any error pixel is
257
identified in
258
neighbourhood approach. A pixel is considered as malicious pixel if more than four pixels in
259
its surrounding eight pixels are having value one otherwise it, is classified as a nonmalicious
260
pixel. Figure 3 (a) shows malicious pixel, whereas Figure 3 (b) shows nonmalicious pixel.
261
The threshold (TR) value is obtained after testing of 250 images for different nonmalicious
262
and malicious attacks. It was found malicious attacks contains more than 57 percentage
263
malicious error pixel, so the threshold is set to 57 percentages accordingly. Table 1, shows
264
notations used in the algorithm for authenticating images.
265
Table 1 Notations used in algorithm for authenticating image Notations R(m,n) N N1 N2 T1 T2
266 267 268
, it is checked for malicious or nonmalicious attack by using 3×3 pixel
Descriptions Difference image of size m×n. ). Total no of error pixels in No of pixels having four or more than four surrounding error pixel. , percentage of error pixels. , percentage of malicious pixels.
The algorithmic structure of proposed system for attacks classification is given as:
275
Compute N1 from image . If T1=0, then image is not attacked. The image is considered as authentic. o End. If, T1≠0, then compute the value of NHS. If NHS> 0.7, then extracted image is recognizable. Further, check for authenticity of the biometric image. o If T2
TR, thenotations image isused nonauthentic. Else for authenticating images. The scheme uses If T1>0 and approach NHS< 0.7for and T2
276
White pixel areas on the difference image broadly identify the tampered location, while
277
tampering is localized by finding coordinates of rows and columns of all tampered pixels
278
locations. Table 2 explain various evaluation parameters used for tamper detection and
279
classification of attack and Table 3 represents pixels classification statistics.
269 270 271 272 273 274
9
280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296
Figure 4 Verification and authentication process Table 2 Performance parameters used to test the effectiveness of proposed scheme. Parameter M
Description Total pixels in received image . Total tampered pixels in received image . Denote no of tampered pixels which are accurately identified as tampered. Denote no of pixels which are not tampered but falsely detected as tampered pixels. Denote no of pixels which are tampered but not identified as tampered pixels.
True positive: TP False negative: FP True negative :(TN)
-
False positive: (FN) False positive rate: False negative rate: % Accuracy Mean square error (MSE)
% Accuracy= (TP+TN) / (TP+TN+FP+FN)
PSNR 10
297
Table no 3 Pixel classification based on statistical results Pixel classification No. of Tampered pixels No of non-tampered pixels
Test positive
Test negative
298 299
3. EXPERIMENTAL RESULT AND DISCUSSION
300
The performance of the proposed watermarking based technique for digital image verification
301
and authentication using vector quantization approach is investigated. The experiment is
302
performed using MATLAB version 7.10.0.499 (R2010a), 64-bit (win64) software. In the first
303
phase, the experiment is conducted on 300 different 8-bit images of resolution 600 dpi each
304
of size 512 ×512, the binary watermark image of size 128×128 as a robust watermark image
305
and semifragile watermark image. Figure-5 shows five test images whose experimental
306
results are given in the subsequent subsection. The work is carried out employing various
307
combinations of codebook1 and codebook2 under the condition codebook size is less than
308
512.The visual quality of the watermarked images is evaluated by PSNR ,which comes to be
309
42 dB (average). It is observed that maximum PSNR is achieved for all images for codebook
310
size 256, for both codebooks.
311
(2)
(1)
(3)
(4)
(5)
312 313
Figure 5: Different input test images used in the proposed method (1) Lena (2) Baboon(3)
314
Pepper(4)Cameraman(5)F-16.
315
(Image source: http://sipi.usc.edu/database/database.php?volume=misc.)[25].
316
0
317
In Table 4, performance of the proposed method is evaluated for ‘Lena’ image against
318
different size of watermark has been evaluated, when no attack is applied. For embedding
319
watermarks the original image is partitioned into a number of blocks according to the size of
320
watermark. Moreover, codebook sizes are half of original image size. However, overall
321
performance of proposed method highly depends on size of semifragile watermark, as
322
watermarked image is not affected by robust watermark.
323 11
324 325
Table 4 Performance of proposed method for different size of Lena image against varying watermarks size. Original image
Size of watermarks Robust Semifragile
Biometric robust Binary semifragile PSNR(dB) watermark watermark
256 256
64 64
64 64
40.11
256 256
32 32
32 32
41.98
512 512
64 64
128 128
42.81
128 128
32 32
64 64
39.55
512 512
256 256
64 64
43.94
326 327
3.1 Verification of Received Image using Robust Watermark
328 329
Figure 6.Robust watermark as verification watermark
330 331
Once watermarked image is received, extracted watermark at first stage is checked, for
332
verification of integrity of image. In present method fingerprint verification method is used
333
for finding integrity of image. Referring to figure 4, under no attack condition NHS is one
334
whereas, when any of passkey1 or passkey 2 changes value NHS≠1, that is considered as
335
threat to security of system. In figure 6, row1 shows results when same key is used both at
336
transmitter and receiver end. Whereas, row2 demonstrate results when passkey1 is changed
337
and passkey2 is not changed.
338
3.2. Robustness to Common Image Processing Manipulations
339
The performance of the method is examined by applying six types of image processing
340
attacks such as Median filtering, blurring, low-pass filtering using a Gaussian filter, salt and 12
341
pepper noise, rotation at various angles, and JPEG compression on 250 watermarked images.
342
Table 5 to 10, demonstrate various results obtained for robustness by processing the four test
343
images by applying different content preserving attacks as enumerated above.
344
terminologies used in the Table are: Tw show number of error pixels obtained from extracted
345
watermark image, T1 is a percentage of error pixels in the difference image, T2 is a
346
percentage of malicious pixels in the difference image. Here blur attack is applied for
347
different radius from 0.0 to 0.9; median filtering is applied to various window sizes from 1×1
348
onwards, Gaussian filtering for different variances, salt, and pepper noise for various
349
percentages from one percent onwards, rotation in both clockwise and anti-clockwise
350
directions and JPEG compression for varying quality factor. The degradation in quality is
351
evaluated using PSNR for received watermarked image and NHS for extracted semifragile
352
watermark images.
353
The
Table 5 Experimental results illustrating blurring the image at different radius. Image Pepper Baboon Lena F-16
Tw 3043 4757 3225 2343
%T 52.4 79.92 87.73 56.33
% T2 52.3 50.06 55.12 41.24
PSNR(dB) 38.49 35.56 38.86 37.28
NHS(semi) 0.8112 0.7067 0.8082 0.8570
Blur radius Radius=1.0 Radius=1.1 Radius=1.1 Radius=1.0
Attack Incidental Incidental Incidental Incidental
354 355
Table 6 Experimental results for median filtering at different window sizes. Image Pepper Baboon Lena F-16
356 357 358
%T 46.98 72.14 70.89 60.55
% T2 23.38 56 29.7 20.55
PSNR(dB) 43.04 36.32 41.72 39.16
NHS(semi) 0.8048 0.8304 0.7150 0.7472
Window size 3×3 filter 2×2 filter 3×3 filter 3×3 filter
Attack Incidental Incidental Incidental Incidental
Table 7 Robust performance for a Gaussian filter for 3×3 window using four different values of variance at mean=0. Image Pepper Baboon Lena F-16
359 360
Tw 3798 3491 4665 4142
Tw 3026 4763 815 749
%T 71.67 80.13 75.48 67.06
% T2 54.1 45.81 51.8 37.37
PSNR 44.31 36.49 40.46 37.68
NHS(semi) 0.8163 0.9136 0.9503 0.9543
Standard deviation Sigma=0.8 Sigma=0.6 Sigma=0.6 Sigma=0.6
Attack Incidental Incidental Incidental Incidental
Table 8 Experimental results for salt and pepper noise attack at various noise densities. Image Pepper Baboon Lena F-16
Tw 4986 4712 4924 4881
%T 6.97 6.94 6.04 6.97
T2 0 0 0 0.00005
PSNR(dB) 41.92 42.52 48.76 40.18
NHS(semi) 0.7136 0.7075 0.7679 0.7021
Noise density 0.07 0.07 0.06 0.07
Attack Incidental Incidental Incidental Incidental
361 13
362
Table 9 Robustness performance at different rotation angles Image Pepper Baboon Lena F-16
363 364
Tw 3242 2387 4498 4641
%T 72.44 72.04 85.90 74.39
% T2 50.5 27.00 54.56 54.3
PSNR 40.41 37.24 40.32 40.95
NHS(semi) 0.8021 0.8543 0.7255 0.7167
Rotation angle 0.5 0.4 0.5 0.5
Attack Incidental Incidental Incidental Incidental
Table 10 Robustness performance of JPEG compression at different quality factor Quality factor Tw %T % T2 PSNR (dB) NHS(semi) Attack 70 2819 87.0 57 40.9 0.85 Incidental 80 1454 88.0 56 43.0 0.91 Incidental 90 171 83.9 51 42.0 0.98 Incidental 99 00 23.0 00 43.0 1.00 Incidental
365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392
Figure 7. Illustration of Robustness nature of the scheme: row-wise (1) Gaussian filtering for window size 3×3 and a Sigma 0.6.(2) Median Filtering for a 2×2 window. (3) Salt and pepper noise addition to noise density 0.07. (4) Blurring with radius 1. (5) Rotation by 0.5 clockwise angles.(6) JPEG compression for quality factor 70. The performance of attacks on the image is evaluated based on the computed
393
percentage of malicious pixels. If the percentage is less than threshold i.e. 57% and the NHS
394
is higher than 0.7 the attack is classified as non-malicious otherwise, it is a malicious attack.
395
Experimental results show that each attack is robust to a certain value of parameters as
396
depicted in Tables 5-10. On comparing the results of the Tables 5-10, it is seen there is a
14
397
small variation in robustness feature of images. For robustness feature, taking minimum
398
values of parameters for different robustness attacks.It is observed that the proposed method
399
is robust for blurring attack for one radius, median filtering up to 2×2 window size, Gaussian
400
filtering for variance 0.6 for the 3×3 filter, for rotation to 0.45 angles, salt and pepper noise
401
density 0.06 and JPEG compression quality factor 70.These results show that there is a slight
402
difference in the level of robustness for different images.
403
Figure 7 illustrates the robust nature of the algorithm; here some results are presented
404
for visualization of experimental results. The algorithm suggests improvement in work
405
proposed by Lu [7]. Lu suggested attacks classification based on NHS value, but the
406
algorithm [7] is unable to classify whether attacks is incidental or malicious. Robustness
407
performance of proposed method is compared with [11, 12, 14, 15, 16]; it is seen none of
408
these algorithms report any method for classifying attacks.
409
3.3. Fragileness characteristics for malicious attacks
410
Further, this algorithm is tested for some content altering attacks such as cutting a portion of
411
watermarked image and cropping the image to different window sizes. Here results of four
412
test images are shown for the cut attack, in Table 11. Table 12, shows crop attack for varying
413
window sizes(window sizes shows dimension of cropped area), the Table shows average
414
results obtained by simulating 250 images. Table 11 and 12 demonstrate that the suggested
415
scheme can identify these attacks as malicious because the percentage of the malicious pixel
416
is more than the threshold in all cases. It is found from experimental results that the proposed
417
method can distinguish a single pixel change in received image and identify tampering
418
greater than 10% as a malicious attempt.
419
Table 11 Simulation results of watermarked test images for Cut attack Image Pepper Baboon Lena F-16
420 421
Tw 29 982 871 128
%T 2.67 2.82 2.77 2.68
% T2 82.33 91.72 89.01 89.46
PSNR(dB) 41.27 39.17 39.51 37.18
NHS(semi) 0.9982 0.9401 0.9468 0.9948
Attack classification Malicious Malicious Malicious Malicious
Table 12 Simulation results of for crop attack results show average values of all images Window Tw %T % T2 PSNR(dB) NHS(semi) Attack classification 8×8 54 0.031 60.49 37.70 0.9967 Malicious 40×40 360 0.640 90.48 38.96 0.9800 Malicious 130×130 1878 6.541 96.96 34.67 0.8853 Malicious 200×200 3149 15.410 98.00 31.48 0.8075 Malicious 300×300 4639 34.600 98.67 28.41 0.7076 Malicious
422
15
423
The sensitivity of given algorithm is clearly shown in Table 12; it can detect and
424
locate cropping as the malicious attack for the 8×8 window. However, the given algorithm
425
can detect a single pixel change in received image. Various performance measures are
426
evaluated for finding tamper detection capacity of algorithm and results are shown in Table-
427
13. The performance evaluation parameters are - TP, TN, FP, FN, FPR, FNR and accuracy of
428
tampered images for different window sizes (tampered area). Values in the Table show
429
average results obtained for various test images. Referring to the same table, results clearly
430
demonstrate that the algorithm shows high accuracy in tamper detection, and is having very
431
low false negative and positive rates. Figure 8, presents a visual presentation of experimental
432
results obtained for various fragile attacks.
433 434 435
Table 13 Statistical analysis of tamper detection capacity of images results show average values Window 40×40 80×80 130×130 200×200 300×300
TP 0.997 0.999 0.999 0.999 0.999
FP 0.00031 0.00063 0.00106 0.00180 0.00350
TN 0.9997 0.9990 0.9989 0.9981 0.9965
FN 0.00250 0.00063 0.00024 0.00010 0.00670
FPR 0.0003 0.0006 0.0002 0.0001 0.0067
FNR 0.0025 0.0006 0.0010 0.0018 0.0035
Accuracy% 99.68 99.94 99.89 99.85 99.77
436
437 438 439 440 441
Figure 8 Illustration of malicious attack and tamper detection capacity of the present scheme under various attacks. Row-wise, (1) shows crop attack for 10 by 10 window .(2) cropping ¼ area from the top of the image. (3) cutting a small portion of the image. (4) text addition to the image. 16
442 443
Table 14 shows performance comparison of the proposed method with the other
444
image authentication algorithms. In the table, first column shows different watermark
445
embedding technique which are, either fragile or semifragile watermarking method.
446
Subsequently performance evaluation matrices such as PSNR, similarity between extracted
447
and embedded watermark and tamper detection and localization capacity are compared.
448
Proposed method is having average PSNR=42 dB, NHS= 1, very high efficiency of tamper
449
detection /localization. Methods suggested by other authors have good PSNR, but exact
450
extraction of watermarks is not reported, all algorithms are able to locate tamper but detection
451
accuracy is either low or not calculated. None of reported technique suggested any method to
452
classify attacks quantitatively. Overall proposed algorithm is having superiority in terms of
453
imperceptibility, exact extraction of hidden watermark, high efficiency in tamper detection
454
/localizing, and quantitative criteria for attack classification shows very low FPR and FNR.
455 456
Table 14 Comparison of recent image authentication algorithms with proposed method. Author/year Jun Chou (2011)[20] Hong Shen (2012)[2] Radu (2013)[16] Hozem (2014)[14] Chunlei (2015)[15] Ming Li(2016)[10] Xiao (2016)[23] Hamid (2017)[24] D.Singh(2017)[11] Proposed work
457 458 459 460 461 462 463 464 465
Technique
PSNR (dB) VQ technique Max 34 DWT technique 30 DWT based 40 approach DWT 41 quantization Two level DWT 36 VQ technique DWT based approach DWT and Zernike moments DCT based technique Two stage VQ technique
Similarity factor NC=0.98 -
31.3 40
Tamper detection/ localizing Possible Not discussed Possible ,resolution min 4 Possible, Can detect 8×8 region NC=0.8 Possible, localization accuracy medium. SSIM=0.88 Possible NC=0.98 Not discussed
40.9
-
Possible
39.3
NC=0.98
Possible
42
NHS=1.0
Possible, accuracy is very high.
Table 15 shows comparison of different VQ image watermarking methods in terms of codebook sharing between transmitter and receiver, watermarking technique employed ,PSNR, Subjective evaluation of tamper detection localization, and FPR and FNR is presented. The ‘-’ in table shows the corresponding data is not available in paper. It can be seen only in Lu [7] method codebook is not shared which resulted in poor quality of extracted semifragile watermark, average PSNR reported is 29 dB. Robust watermarking techniques suggested by [8, 18, 23] show good robustness characteristics but unable to detect tamper. The ‘*’ sign in table shows watermarks which are named as per their characteristics (whose 17
466 467 468 469 470 471 472 473
type is not mentioned in the respective papers). Whereas fragile watermarking techniques gives good tamper detection capacity and can localize tampers accurately, but does not show robustness to content preserving operations. Thus, proposed method shows better PSNR, having tamper detection accuracy =99.8% with low FNR and FPR. It also suggests robustness to various image processing attacks and exact extraction of hidden watermark. Thus, proposed scheme outperforms recent algorithms. Table15 Performance comparison of VQ based image watermarking algorithms. Author/year Lu (2005)[11]
Codebook
Not shared Wu(2005)[21] Shared Feng(2007)[22] Shared Jau (2010)[12] Shared Jun(2011)[15] Shared Joshi(2013)[4] Shared Qin(2016)[16] Shared Ming(2016)[8] Proposed work Shared
Watermarking Robust+ Fragile Robust * Robust * Robust Fragile* Fragile Fragile Fragile Robust+ Semifragile
PSNR Tamper detection(dB) localization 29.31 √ 31.16 30.45 30.23 34.00 38.21 40.11 31.34 42
FPR -
FNR -
x x x √ accuracy-75% √ 0.02 √ √ √ accuracy- 99.8% 0.0002 0.001
474 475
4. CONCLUSIONS
476
In present work novel vector quantization based watermarking scheme for digital image
477
authentication application has been designed using two stages of watermark embedding
478
technique with an additional feature of qualitative analysis of the received signal. In the first
479
stage robust ‘zero level’ watermark is embedded while another image is used as a semifragile
480
watermark for embedding in the second stage using modified index key based (MIKB)
481
method.
482
In proposed algorithm robust watermark is used as verification watermark which
483
destroys when the key is changed. Semifragile watermark is embedded as
484
authentication watermark which supports most of the content-preserving attacks. This
485
supplies an additional layer of security with acceptable performance regarding
486
imperceptibility and robustness. Although vector quantization is a lossy compression
487
technique, designed system uses codebook length equal to half of the cover image
488
size. Using optimum codebook size affords a fuller quality of watermarked image and
489
hence reduces compression distortion.
490
The novelty of proposed work is in the randomness of embedding key generation.
491
Independent watermark embedding is performed in two phases, and threshold based
492
quantitative analysis is executed for attacks classifications. 18
493
Experimental results demonstrate that proposed algorithm can identify cut, crop, and
494
text addition attacks as malicious attacks. The efficiency of the proposed work in
495
detecting tamper is 99.8%. The average false positive rate is achieved 0.00021, and
496
the average false negative rate is achieved 0.0014.
497
Future work can be carried out to evaluate the proposed work for reversibility of
498
original image.
499 500
REFERENCES
501
[1] Cox IJ, Miller ML. Review of watermarking and the importance of perceptual
502
modelling. Electronic Imaging. 1997: 92-99.
503
[2] Shen H, Chen B. From single watermark to dual watermark: a new approach for
504
image watermarking. Computers & Electrical Engineering. 2012; 38(5):1310-24.
505
[3] Wu HC, Chang CC. A novel digital image watermarking scheme based on the vector
506
quantization technique. Computers & Security . 2005; 24(6):460-71.
507
[4] Nguyen TS, Chang CC, Yang XQ. A reversible image authentication scheme based
508
on fragile watermarking in discrete wavelet transform domain. AEU-International
509
Journal of Electronics and Communications. 2016; 70(8):1055-61.
510
[5] Al-Otum HM, Al-Sowayan SS. Color image watermarking based on self-embedded
511
color permissibility with preserved high image quality and enhanced robustness. AEU-
512
International Journal of Electronics and Communications. 2011; 65 (7):619-29.
513
[6] Lu
514
quantisation. Electronics Letters. 2000; 36(4):303-5.
515
[7] Lu ZM, Xu DG, Sun SH. Multipurpose image watermarking algorithm based on
516
multistage vector quantization. IEEE Transactions on Image Processing. 2005;
517
14(6):822-31.
518
[8] Shen JJ, Ren JM. A robust associative watermarking technique based on vector
519
quantization. Digital Signal Processing. 2010; 20(5):1408-23.
520
[9] Huang HC, Feng-Hsing WA, Jeng-Shyang PA. A VQ-based robust multi-
521
watermarking algorithm. IEICE Transactions on Fundamentals of Electronics,
522
Communications and Computer Sciences. 2002; 85(7):1719-26.
523
[10] Li M, Xiao D, Zhang Y. Attack and Improvement of the Fidelity Preserved Fragile
524
Watermarking of Digital Images. Arabian Journal for Science and Engineering. 2016;
525
41(3):941-50.
ZM, Sun SH. Digital image watermarking technique based on vector
19
526
[11] Singh, D., & Singh, S. K. DCT based efficient fragile watermarking scheme for
527
image authentication and restoration. Multimedia Tools and Applications. 2017; 76(1):
528
953-977.
529
[12] Qin C, Ji P, Wang J, Chang CC. Fragile image watermarking scheme based on VQ
530
index sharing and self-embedding. Multimedia Tools and Applications. 2017; 76(2):22
531
[13] Lin CY, Chang SF. Semifragile watermarking for authenticating JPEG visual
532
content. Electronic Imaging .2000: 140-151.
533
[14] Al-Otum HM. Semi-fragile watermarking for grayscale image authentication and
534
tamper detection based on an adjusted expanded-bit multiscale quantization-based
535
technique. Journal of Visual Communication and Image Representation. 2014;
536
25(5):1064-81.
537
[15] Li C, Zhang A, Liu Z, Liao L, Huang D. Semi-fragile self-recoverable
538
watermarking algorithm based on wavelet group quantization and double authentication.
539
Multimedia tools and applications. 2015; 74(23):10581-604.
540
[16] Preda, R. O. Semi-fragile watermarking for image authentication with sensitive
541
tamper localization in the wavelet domain. Measurement.2013; 46(1): 367-373.
542
[17] Yang CW, Shen JJ. Recover the tampered image based on VQ indexing. Signal
543
Processing. 2010; 90(1):331-43.
544
[18] Makur A, Selvi SS. Variable dimension vector quantization based image
545
watermarking. Signal Processing. 2001; 81(4):889-93.
546
[19] Joshi B, Raval MS, Rege PP, Parulkar SK. Multi-stage VQ based exact
547
authentication for biometric images. Journal of Computing. 2013; 2(1–2):R3-25.
548
[20] Chuang JC, Hu YC. An adaptive image authentication scheme for vector
549
quantization compressed image. Journal of Visual Communication and Image
550
Representation. 2011; 22(5):440-9.
551
[21] Wen Q, Sun TF, Wang SX. Concept and application of zero-watermark. Acta
552
Electronica Sinica. 2003; 31(2):214-6.
553
[22] Linde Y, Buzo A, Gray R. An algorithm for vector quantizer design. IEEE
554
Transactions on communications. 1980; 28(1):84-95.
555
[23] Wang, F. H., Jain, L. C., & Pan, J. S. VQ-based watermarking scheme with genetic
556
codebook partition. Journal of Network and Computer Applications.2007; 30(1): 4-23.
557
[24] Shojanazeri, H., Adnan, W. A. W. Ahmad, S. M. S., & Rahimipour, S.
558
Authentication of images using Zernike moment watermarking. Multimedia Tools and
559
Applications. 2017; 76(1): 577-606. 20
560
[25] http://sipi.usc.edu/database/database.php?volume=misc. [accessed on 11/01/2016].
561
21