scholarly journals A Fragile Watermarking Based on Separable Discrete Hartley Transform for Color Image Authentication (FWSDHTCIA)

2012 ◽  
Vol 3 (6) ◽  
pp. 23-33 ◽  
Author(s):  
J. K. Mandal
Author(s):  
Sudipta Kr Ghosal ◽  
Jyotsna Kumar Mandal

In this chapter, a fragile watermarking scheme based on One-Dimensional Discrete Hartley Transform (1D-DHT) has been proposed to verify the authenticity of color images. One-Dimensional Discrete Hartley Transform (1D-DHT) converts each 1 x 2 sub-matrix of pixel components into transform domain. Watermark (along with a message digest MD) bits are embedded into the transformed components in varying proportion. To minimize the quality distortion, genetic algorithm (GA) based optimization is applied which yields the optimized component corresponding to each embedded component. Applying One-Dimensional Inverse Discrete Hartley Transform (1D-IDHT) on 1 x 2 sub-matrices of embedded components re-generates the pixel components in spatial domain. The reverse approach is followed by the recipient to retrieve back the watermark (along with the message digest MD) which in turn is compared against the re-computed Message Digest (MD') for authentication. Simulation results demonstrate that the proposed technique offers variable payload and less distortion as compared to existing schemes.


2021 ◽  
Vol 11 (7) ◽  
pp. 3187
Author(s):  
Rogelio Reyes-Reyes ◽  
Clara Cruz-Ramos ◽  
Volodymyr Ponomaryov ◽  
Beatriz P. Garcia-Salgado ◽  
Javier Molina-Garcia

In this paper, a fragile watermarking scheme for color image authentication and self-recovery with high tampering rates is proposed. The original image is sub-sampled and divided into non-overlapping blocks, where a watermark used for recovery purposes is generated for each one of them. Additionally, for each recovery watermark, the bitwise exclusive OR (XOR) operation is applied to obtain a single bit for the block authentication procedure. The embedding and extraction process can be implemented in three variants (1-LSB, 2-LSB or 3-LSB) to solve the tampering coincidence problem (TCP). Three, six or nine copies of the generated watermarks can be embedded according to the variant process. Additionally, the embedding stage is implemented in a bit adjustment phase, increasing the watermarked image quality. A particular procedure is applied during a post-processing step to detect the regions affected by the TCP in each recovery watermark, where a single faithful image used for recovery is generated. In addition, we involve an inpainting algorithm to fill the blocks that have been tampered with, significantly increasing the recovery image quality. Simulation results show that the proposed framework demonstrates higher quality for the watermarked images and an efficient ability to reconstruct tampered image regions with extremely high rates (up to 90%). The novel self-recovery scheme has confirmed superior performance in reconstructing altered image regions in terms of objective criteria values and subjective visual perception via the human visual system against other state-of-the-art approaches.


Author(s):  
M. Monzoy-Villuendas ◽  
M. Salinas-Rosales ◽  
M. Nakano-Miyatake ◽  
H. M. Perez-Meana

Author(s):  
Luis Rosales-Roldan ◽  
Manuel Cedillo-Hernandez ◽  
Jinhui Chao ◽  
Mariko Nakano-Miyatake ◽  
Hector Perez-Meana

Sign in / Sign up

Export Citation Format

Share Document