CHAOTIC WATERMARKING SCHEME FOR AUTHENTICATION OF JPEG IMAGES
#1

CHAOTIC WATERMARKING SCHEME FOR AUTHENTICATION OF JPEG IMAGES
VISAKH VIJAYAN
S7 ECE
NO : 71
College of Engineering, Trivandrum
2007-11 batch


[attachment=6971]

OUTLINE
INTRODUCTION
WATERMARK EMBEDDING
WATERMARK EMBEDDING PROCESS
WATERMARK EXTRACTION & AUTHENTICATION
CONCLUSION
REFERENCE

INTRODUCTION
Watermarking: Process of embedding digital signal (information) in a way that is difficult to remove.
Information may be text or a logo which is used for identification and authentication purposes.
Watermarking may be visible watermarking or invisible watermarking.
In visible watermarking, information is visible whereas in invisible watermarking information is invisible.

Applications :
Copyright protection systems.
Source tracing.
Annotation of photographs.
Broadcast monitoring.
Covert communication.

This seminar propose a novel chaotic fragile watermarking algorithm for JPEG images.
JPEG images are preferred due to its better store capacity and difficulty to extract watermarked information.
In fragile watermarking, data fails to be detected after slightest modification.





The figure shows two watermarked images. Figure ‘a’ shows an invisible watermarking image and figure ‘b’ shows a visible watermarking image.
WATERMARK EMBEDDING
Watermarking will be performed on quantized DCT coefficients.
Original image is first performed entropy decoding. Then quantized DCT coefficients are obtained.
For each 8*8 block of quantized DCT coefficients, we select the AC coefficients ( ) .
To generate and embed the watermark, the LSB (Least Significant Bit) plane is set to zero and obtain .
We map each to the range of initial values of chaotic mapping as follows :





where d is the parameter for controlling the range of .
These mapped initial values are closely related to the content of the image.
We know that an important property of chaos is that a very small change in the initial state of the chaotic system can lead to a large effect on its later state.
Based on this property of chaos, the initial value
mapped by is performed n times iteration by chaotic system.
nth iteration result of after binary quantization is as the watermark bit to be embed into the LSB plane of quantized AC coefficients.
Then we get the watermarked quantized DCT coefficients .
Finally, we perform entropy coding to the DCT coefficients carrying watermark information and watermarked image can be obtained.
Note that iteration time n is random for security purpose when we perform chaotic iteration, which is decided by the random numbers generated by a chaotic system whose initial conditions as the key.
WATERMARK EMBEDDING PROCESS
WATERMARK EXTRACTION AND AUTHENTICATION

The watermark extraction will be performed in the compressed domain, so that we can skip re-quantization, inverse DCT etc in JPEG decoding procedure.
After decoding Huffman code & run length code, the 8*8 blocks with watermarked quantized DCT coefficients are obtained.
We extract the watermark bits from the LSB plane of DCT blocks to form a watermark version
On the other hand, the quantized DCT coefficients whose LSB is set to zero are generated another watermark version by chaotic iteration.
Then the two versions of watermark make the comparison.
The generated watermark version is different from the one that is extracted.
Thus we think this generated 8*8 image block is tampered.
Let denote a 8*8 image block, and assume some pixels , (1 i ,j 8) is maliciously
tampered to ,then the whole
corresponding 8*8 DCT coefficient block will be different from the original one .
The tampered matrix is as follows:


where the non zero will be tampered block.
After all of 8*8 blocks in image are detected, the tampered region is obtained & authentication is completed.
CONCLUSION
The proposed scheme avoids the quantization error coming from JPEG quantization and re-quantization process
The proposed scheme avoids a large of computation on full decoding and re-encoding process, so the authentication speed is quick.
The applications of proposed scheme are the authentication of JPEG images on Internet network and trust-worthy digital cameras.
The scheme is very fit for the integrity authentication of the electronic image in Internet.
SOME WATERMARK IMAGES


REFERENCES

W. N. Lie, L. C. Chang, “Robust and high-quality time-domain audio watermarking based on low-frequency amplitude modification,” IEEE Trans. on Multimedia, vol.8, no.1, pp. 46-59, January 2006.
FU Yu, WU Xiaoping, Chen Zemao, Ye Qing, “A Wavelet Digital Watermarking Algorithm Based on Chaotic Mapping”, International Symposium on Electronic Commerce and Security, IEEE computer society,pp.886-889,2008.
Z. M. Lu, D. G. Xu, S. H. Sun, “Multipurpose image watermarking algorithm based on multistage vector quantization,” IEEE Trans. Image Processing, vol.14, no.6, pp. 822-831, June 2005.






Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: steganography in jpeg, new channel selection rule for jpeg steganography pdf, new channel selection rule for jpeg steganography project, matlab source code for image encryption based on chaotic map** ece websites list, digital watermarking scheme, image steganography chaotic code in matlab, a survey of watermarking algorithms for image authentication,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Authentication Schemes for Session Passwords using Color and Images computer girl 2 2,356 20-09-2013, 10:52 AM
Last Post: computer topic
  VISUAL CRYPTOGRAPHIC STEGANOGRAPHY IN IMAGES seminar class 8 5,694 11-02-2013, 11:42 AM
Last Post: Guest
  DISTRIBUTED CALL ADMISSION CONTROL SCHEME FOR MOBILE MICRO-CELLULAR NETWORKS project topics 2 2,934 24-01-2013, 09:31 PM
Last Post: fake_lover01
Information Automated Authentication of Identity Documents Computer Science Clay 2 2,167 19-01-2013, 12:46 AM
Last Post: jellajagadish
Video Automated Authentication of Identity Documents computer science crazy 2 3,513 29-12-2012, 11:38 AM
Last Post: seminar details
  IMAGE AUTHENTICATION TECHNIQUES seminars report electronics seminars 6 8,553 15-11-2012, 12:24 PM
Last Post: seminar details
  Seminar Report on Image Authentication Techniques mechanical wiki 1 3,636 15-11-2012, 12:24 PM
Last Post: seminar details
  Histogram Specification: A Fast and Flexible Method to Process Digital Images computer girl 2 1,548 20-10-2012, 01:27 PM
Last Post: seminar details
  Digital image watermarking capacity and detection error rate computer science crazy 1 2,536 20-10-2012, 01:27 PM
Last Post: seminar details
  An Efficient and Fair Scheduling Scheme for Multiuser OFDM Wireless Networks computer girl 0 913 09-06-2012, 01:27 PM
Last Post: computer girl

Forum Jump: